Background technology
The Security Assurance Mechanism fragility of mobile backhaul net, safety problem complexity.On the one hand, in base station, (Node B) stops customer side encryption.On the other hand, Mobile backhaul network element can not get due safety guarantee, is positioned at non-complete trusted area.Therefore, the safety that how to guarantee mobile backhaul net is problem urgently to be resolved hurrily, has caused the extensive concern of industrial circle and academia.
3GPP LTE (Long Term Evolution; Long Term Evolution)/SAE (System ArchitectureEvolution; System Architecture Evolution) in security framework standard TS 33.401; suggestion utilizes IPSec (Internet Protocol Security, IP layer protocol safety) protection mobile backhaul net to connect safety.Wherein the administration base network domain security authentication framework TS 33.310 of IPSec certificate implements.Because TS33.310 formulates for the authentication demand between core network element, do not consider the feature of mobile backhaul net, therefore need TS 33.310 to strengthen, make it can be for LTE mobile backhaul net certificate management.
LTE mobile backhaul net about certificate management strengthen demand mainly comprise following some:
(1) first to guarantee the safety of certificate registration process
In TS 33.310, do not set forth the safety that how to guarantee certificate registration process, and the ownership of Mobile backhaul network element not only belongs to operator, also may be user or equipment vendor etc., the safety problem of certificate registration has very large difference with the situation of network domains, between network element, be related to complexity, therefore need to guarantee the safety of certificate registration process.
(2) the same SON of its less important assurance certificate registration scheme (Self-Organized Network, self-organizing network), H (e) NB (Home Evolved Node B, the evolved Node B of family) and the compatibility such as RS (RelayStation, relay station)
SON is eNB self-configuring, the self-optimizing process newly adding, and object is that minimum human participates in, and reaches the object of saving operation cost by self-organizing.In SON process, eNB node first will be based on DHCP (Dynamic Host Configuration Protocol, DHCP)) carry out IP address, gateway and DNS (Domain Name Server, name server) configuration, and carry out OAM (Operation, Administration, Maintenance, operation, management, the safeguard) detection of server.Then eNB node is carried out to authentication, the association of foundation and EPC (Evolved Packet Core Network, Evolved Packet Core), completes the download of eNB software and operational factor configuration.If complete certificate registration distribution in the IP address configuration stage, by maximizing the use value of certificate, for the application such as ensuing authentication, parameter configuration, IPSec SA (Security Association, security association) negotiation provide security credence.
In H (e) NB situation, because H (e) NB is all for user, this proprietorial variation, may bring impact to operator, and especially certificate registration process will be affected.Therefore in design certificate Managed Solution, should consider this impact, and compatible this scene.
In actual mobile backhaul net network application, may there is such scene.Between eNB and SeGW (security gateway), there is shared secret, as PKI (Public Key Infrastructure, PKIX) or wildcard, SeGW and RA (Register Authority, certificate registration audit mechanism) or CA (Certificate Authority, digital certificate authentication center) between have safe connection.How to realize the authentication to eNB, and the certificate of issuing safely operator is to need the problem that solves to eNB.
Summary of the invention
Technical problem to be solved by this invention is, a kind of Mobile backhaul network certificate distributing method and system are provided, and realizes safety certification and credential distribution between eNB and SeGW.
In order to address the above problem, the invention discloses a kind of Mobile backhaul network certificate distributing method, comprising:
Base station and security gateway authenticate based on IKE agreement, and create ipsec tunnel based on IKE SA;
In the time that described security gateway passes through created ipsec tunnel and receives the certificate registration request that described base station sends, this certificate registration request is transmitted to RA or CA, described RA or CA verify described certificate registration request, after being verified, generate base station certificate, and generated base station certificate is sent to security gateway, described security gateway passes through created ipsec tunnel base station certificate is sent to described base station.
Further, in said method, while having the wildcard of configured in advance between described base station and described security gateway, the process that described base station and security gateway authenticate based on IKE agreement is as follows:
Described base station and security gateway carry out after IKE protocol initializing, and authentication request is initiated to security gateway in described base station, and described authentication request comprises the authentication load of described base station;
Described security gateway receives described authentication request, according to the authentication load of base station in the wildcard of configured in advance and described authentication request, described base station is authenticated;
In the time that described security gateway is successful to described base station authentication, described security gateway is to the response of described base station return authentication, and described authentication response comprises the authentication load of described security gateway;
Described base station receives described authentication response, according to the authentication load of security gateway in the wildcard of configured in advance and described authentication response, described security gateway is authenticated.
Wherein, the identification load, security association load and the flow that in described authentication request, also comprise described base station are selected load.
Further, in said method, described base station has device certificate that equipment vendor signs and issues and the root certificate of equipment vendor, when described security gateway has cross-certificate that equipment vendor signs and issues, SeGW certificate that operator signs and issues, the root certificate of equipment vendor and the root certificate of operator, the process that described base station and security gateway authenticate based on IKE agreement is as follows:
Described base station and security gateway carry out after IKE protocol initializing, and authentication request is initiated to security gateway in described base station, and described authentication request comprises the device certificate load of described base station and has the authentication load of base station signing messages;
Described security gateway receives described authentication request, the authentication load that has base station signing messages in this authentication request is authenticated, the authenticity of the device certificate of the root certificate that utilizes equipment vendor to base station in authentication request authenticates, and verifies the validity of the device certificate of described base station;
Described security gateway completes after authentication operation, sends authentication response to described base station, and described authentication response comprises security gateway certificate and cross-certificate load, has the authentication load of security gateway signing messages;
Described base station receives described authentication response, according to security gateway certificate in described authentication response, the authentication load that has security gateway signing messages is authenticated, according to cross-certificate in described authentication response, the authenticity of security gateway certificate is authenticated, and the validity of authenticating security gateway certificate, the validity of described cross-certificate, again according to the authenticity of cross-certificate described in the root certification authentication of equipment vendor, is verified in described base station.
Wherein, also comprise the identification load of described base station in described authentication request, certificate request load, security association load and flow are selected load.
The invention also discloses a kind of mobile backhaul net credential distribution system, comprise base station and security gateway, wherein:
Described base station, for authenticating based on IKE agreement with described security gateway, and the request of the ipsec tunnel creating by described security gateway transmission certificate registration, and the base station certificate sending for receive described security gateway from described ipsec tunnel;
Described security gateway, for authenticating based on IKE agreement with described base station, and create ipsec tunnel based on IKE SA, receive by described ipsec tunnel the certificate registration request that described base station sends, and this certificate registration request is transmitted to RA or CA, and send to described base station for the base station certificate that described RA or CA are returned by described ipsec tunnel.
Further, in said system, while thering is the wildcard of configured in advance between described base station and described security gateway:
Described base station, for sending authentication request to described security gateway, described authentication request comprises the authentication load of described base station, and the authentication response sending for receiving described security gateway, according to the authentication load of security gateway in the wildcard of configured in advance and described authentication response, described security gateway is authenticated;
Described security gateway, the authentication request sending for receiving described base station, according to the authentication load of base station in the wildcard of configured in advance and described authentication request, described base station is authenticated, and for when to described base station authentication success, to the response of described base station return authentication, described authentication response comprises the authentication load of described security gateway.
Wherein, the identification load, security association load and the flow that in described authentication request, also comprise described base station are selected load.
Further, in said system, described base station has device certificate that equipment vendor signs and issues and the root certificate of equipment vendor, when described security gateway has cross-certificate that equipment vendor signs and issues, SeGW certificate that operator signs and issues, the root certificate of equipment vendor and the root certificate of operator:
Described base station, for initiating authentication request to described security gateway, described authentication request comprises the device certificate load of described base station and has the authentication load of base station signing messages, and for receiving described authentication response, according to security gateway certificate in described authentication response, the authentication load that has security gateway signing messages is authenticated, according to cross-certificate in described authentication response, the authenticity of security gateway certificate is authenticated, and the validity of authenticating security gateway certificate, according to the authenticity of cross-certificate described in the root certification authentication of equipment vendor, verify the validity of described cross-certificate,
Described security gateway, be used for receiving described authentication request, the authentication load that has base station signing messages in this authentication request is authenticated, the authenticity of the device certificate of the root certificate that utilizes equipment vendor to base station in authentication request authenticates, and verify the validity of the device certificate of described base station, and for sending authentication response to described base station, described authentication response comprises security gateway certificate and cross-certificate load, has the authentication load of security gateway signing messages.
Wherein, also comprise the identification load of described base station in described authentication request, certificate request load, security association load and flow are selected load.
Technical solution of the present invention has realized issuing of operator's certificate in the verification process in eNB self-configuring stage, with compatibilities such as existing SON, H (e) NB, RS; And operator's certificate of issuing to eNB has versatility in mobile backhaul net, can be communication between the follow-up interface such as S1, X2 safety guarantee is provided, maximize the value of certificate.In addition, technical solution of the present invention connects based on the IPSec setting up in eNB verification process, realizes the protection of certificate registration and dispatch messages, guarantees the safety of certificate registration process.
Embodiment
Main design of the present invention is, realizes operator's certificate authority in the verification process in eNB self-configuring stage, and particularly, certificate secure distribution process can comprise the following steps, as shown in Figure 1:
Step 101:eNB and SeGW authenticate based on IKE (Internet cipher key change, Internet KeyExchange) agreement;
Step 102:eNB and SeGW create IPSec SA based on IKE SA;
The step 103:eNB login request message that Generates Certificate, and certificate registration request message is sent to SeGW by ipsec tunnel based on setting up;
Step 104:SeGW receives the certificate registration request message that eNB sends, and is transmitted to RA or the CA of operator;
Step 105:RA or CA receive certificate registration request message, and request is verified, generate eNB certificate, by credential distribution message, certificate are sent to SeGW;
Step 106:SeGW receives the credential distribution message that RA or CA return, and credential distribution message is returned to eNB by the ipsec tunnel based on setting up.
Below in conjunction with drawings and the specific embodiments, technical solution of the present invention is described in further detail.
A kind of mobile backhaul net credential distribution system, comprises eNB and SeGW, wherein:
ENB, for authenticating based on IKE agreement with SeGW, and the request of the ipsec tunnel creating by SeGW transmission certificate registration, and the base station certificate sending for receive SeGW from ipsec tunnel;
SeGW, for authenticating based on IKE agreement with eNB, and create ipsec tunnel based on IKE SA, receive by ipsec tunnel the certificate registration request that eNB sends, and this certificate registration request is transmitted to RA or the CA of operator, and send to eNB for the base station certificate that RA or CA are returned by ipsec tunnel.
Wherein, in the time thering is the wildcard of configured in advance between eNB and SeGW:
ENB, sends authentication request to SeGW, and this authentication request comprises the authentication load of base station, and the authentication response sending for receiving SeGW, according to the authentication load of security gateway in the wildcard of configured in advance and described authentication response, SeGW is authenticated;
SeGW, receive the authentication request that eNB sends, according to the authentication load of base station in the wildcard of configured in advance and authentication request, eNB is authenticated, and for when to eNB authentication success, to the response of eNB return authentication, this authentication response comprises the authentication load of described security gateway.
When eNB has device certificate that equipment vendor signs and issues and the root certificate of equipment vendor, when SeGW has cross-certificate that equipment vendor signs and issues, SeGW certificate that operator signs and issues, the root certificate of equipment vendor and the root certificate of operator:
ENB, initiate authentication request to SeGW, this authentication request comprises the device certificate load of eNB and has the authentication load of eNB signing messages, and for receiving authentication response, according to SeGW certificate in authentication response, the authentication load that has SeGW signing messages is authenticated, according to cross-certificate in authentication response, the authenticity of SeGW certificate is authenticated, and verify the validity of SeGW certificate, according to the authenticity of the root certification authentication cross-certificate of equipment vendor, the validity of checking cross-certificate;
SeGW, receive authentication request, the authentication load that has eNB signing messages in this authentication request is authenticated, the authenticity of the device certificate of the root certificate that utilizes equipment vendor to eNB in authentication request authenticates, and verify the validity of the device certificate of eNB, and for sending authentication response to eNB, this authentication response comprises SeGW certificate and cross-certificate load, has the authentication load of SeGW signing messages.
Introduce the process of said system secure distribution certificate below in conjunction with concrete application scenarios.
Embodiment 1
In the present embodiment, between eNB and SeGW, there is the wildcard of configured in advance; authentication and IPSec SA that first eNB and SeGW carry out based on IKEv2 agreement consult; then the secure distribution of utilizing the ipsec tunnel protection operator certificate of consulting, detailed process as shown in Figure 2, comprises the following steps:
Step 201:eNB initiates IKEv2 initialization, sends IKE_SA_INIT request message to SeGW;
In this step, IKE_SA_INIT request message comprises HDR, SAi1, Kei and Ni, and wherein, HDR represents IKEv2 message header; SAi1 has comprised the suggestion of promoter for IKE-SA, and suggestion comprises the contents such as cryptographic algorithm, identifying algorithm, DH group; The Diffle-Hellman that KEi has comprised promoter is openly worth; Ni represents promoter's Nonce value.
Step 202:SeGW receives the IKE_SA_INIT request message that eNB sends, in SAi1 in this request message, select certain suggestion to form SAr1, and KEr and Nr are openly worth and Nonce value sends to eNB by response message as the Diffle-Hellman of SeGW respectively;
Step 203:eNB receives after the response message of SeGW, utilizes the SA and the KE that consult in the IKE_SA_INIT stage, initiates verification process, sends IKE_AUTH request message to SeGW;
In this step, IKE-AUTH request message is made up of IKEv2 message header HDR and an encrypted payload, has comprised identification load (ID) in this encrypted payload, authentication load (AUTH), security association load (SA), flow is selected load (TS).
Step 204:SeGW receives the IKE_AUTH request message that eNB sends, and the content that authenticates payload field AUTH in the wildcard based on pre-configured and the IKE_AUTH request message that receives authenticates eNB;
Step 205: when SeGW is during to eNB authentication success, return to IKE_AUTH response message to eNB;
Step 206:eNB receives the IKE_AUTH response message that SeGW returns, and the content that authenticates payload field AUTH in the wildcard based on pre-configured and the IKE_AUTH response message that receives authenticates SeGW, consults to obtain IKE-SA with SeGW;
Step 207:eNB initiates CREATE_CHILD_SA switching phase, sends CREATE_CHILD_SA request message to SeGW, consults IPSec SA;
In this step, CREATE_CHILD_SA request message comprises HDR and an encrypted payload, and encrypted payload comprises the security association parameters (SA) that needs are consulted.
Step 208:SeGW receives after the CREATE_CHILD_SA request message of eNB transmission, returns to CREATE_CHILD_SA response message to eNB, consults to obtain IPSec SA with eNB.
The step 209:eNB login request message that Generates Certificate, and certificate registration request message is sent to SeGW by ipsec tunnel based on setting up;
Step 210:SeGW receives the certificate registration request message that eNB sends, and this request message is transmitted to RA or the CA of operator;
Step 211:RA or CA receive certificate registration request message, and this request is verified, generate eNB certificate, and by credential distribution message, generated certificate are sent to SeGW;
Step 212:SeGW receives the credential distribution message that RA or CA return, and credential distribution message is returned to eNB by the ipsec tunnel based on setting up.
Embodiment 2
In the present embodiment, eNB has the eNB device certificate that equipment vendor signs and issues, and has the root certificate of equipment vendor.SeGW has the cross-certificate that equipment vendor signs and issues, the SeGW certificate that operator signs and issues, the root certificate of equipment vendor and the root certificate of operator.Authentication and IPSec SA that first eNB and SeGW carry out based on IKEv2 consult, and then utilize the secure distribution of the ipsec tunnel protection operator certificate of consulting, and detailed process as shown in Figure 3, comprises the following steps:
Step 301:eNB initiates IKEv2 initialization, sends IKE_SA_INIT request message to SeGW, and message content comprises HDR, SAi1, Kei and Ni;
In this step, HDR represents IKEv2 message header; SAi1 has comprised the suggestion of promoter for IKE-SA, and suggestion comprises the contents such as cryptographic algorithm, identifying algorithm, DH group; The Diffle-Hellman that KEi has comprised promoter is openly worth; Ni represents promoter's Nonce value.
Step 302:SeGW receives after the IKE_SA_INIT request message that eNB sends and selects certain suggestion to form SAr1 in SAi1 in this request message, and KEr and Nr are openly worth and Nonce value sends to eNB by IKE_SA_INIT response message as the Diffle-Hellman of SeGW respectively;
In this step, in IKE_SA_INIT response message, comprise certificate request load CERTREQ, for asking the device certificate of eNB.
Step 303:eNB receives after the IKE_SA_INIT response message of SeGW, utilizes SA and KE that the IKE_SA_INIT stage consults, initiates verification process, sends IKE_AUTH request message to SeGW;
In this step, IKE-AUTH request message is made up of IKEv2 message header HDR and an encrypted payload, in this encrypted payload, comprise identification load (ID), the device certificate load (CERT) of eNB, certificate request load (CERTREQ), has authentication load (AUTH), security association load (SA), the flow of eNB signing messages to select load (TS).
Step 304:SeGW receives the IKE_AUTH request message that eNB sends, and the AUTH load that eNB is sent authenticates, and utilizes the root certificate of equipment vendor to authenticate the authenticity of eNB certificate;
Step 305:SeGW is by the validity of inquiry CRL checking eNB device certificate;
Step 306:SeGW returns to IKE_AUTH response message to eNB after completing authentication, response message comprises IKEv2 message header HDR and an encrypted payload composition, in this encrypted payload, comprise identification load (ID), SeGW certificate and cross-certificate load (CERT), have authentication load (AUTH), security association load (SA), the flow of SeGW signing messages to select load (TS);
Step 307:eNB receives the IKE_AUTH response message that SeGW returns, and the signing messages AUTH that utilizes SeGW certificate to send SeGW authenticates;
Step 308:eNB utilizes cross-certificate to authenticate the authenticity of SeGW certificate, and by the validity of inquiry CRL checking SeGW certificate;
Step 309:eNB utilizes the authenticity of the root certification authentication cross-certificate of equipment vendor, and inquires about the validity of CRL checking SeGW cross-certificate, completes above negotiation and obtains IKE-SA;
Step 310:eNB initiates CREATE_CHILD_SA exchange process, sends CREATE_CHILD_SA request message to SeGW, consults IPSec SA;
In this step, CREATE_CHILD_SA request message comprises HDR and an encrypted payload.
Step 311:SeGW receives after the CREATE_CHILD_SA request message of eNB transmission, returns to CREATE_CHILD_SA response message to eNB, consults to obtain IPSec SA.
The step 312:eNB login request message that Generates Certificate, and certificate registration request message is sent to SeGW by ipsec tunnel based on setting up;
Step 313:SeGW receives the certificate registration request application that eNB sends, and is transmitted to RA or the CA of operator;
Step 314:RA or CA receive certificate registration request message, and request is verified, generate eNB certificate, by credential distribution message, certificate are sent to SeGW;
Step 315:SeGW receives the credential distribution message that RA or CA return, and credential distribution message is returned to eNB by the ipsec tunnel based on setting up.
The above; be only part embodiment of the present invention; be not intended to limit protection scope of the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in the protection range of the appended claim of the present invention.