CN107005410B - Internet protocol security tunnel establishment method, user equipment and base station - Google Patents

Internet protocol security tunnel establishment method, user equipment and base station Download PDF

Info

Publication number
CN107005410B
CN107005410B CN201580035366.5A CN201580035366A CN107005410B CN 107005410 B CN107005410 B CN 107005410B CN 201580035366 A CN201580035366 A CN 201580035366A CN 107005410 B CN107005410 B CN 107005410B
Authority
CN
China
Prior art keywords
base station
user equipment
security
ipsec tunnel
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580035366.5A
Other languages
Chinese (zh)
Other versions
CN107005410A (en
Inventor
陈璟
李�赫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GRABLAN (BEIJING) SOFTWARE ENGINEERING Co.,Ltd.
Original Assignee
Grablan Beijing Software Engineering Co ltd
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Grablan Beijing Software Engineering Co ltd, Huawei Technologies Co Ltd filed Critical Grablan Beijing Software Engineering Co ltd
Publication of CN107005410A publication Critical patent/CN107005410A/en
Application granted granted Critical
Publication of CN107005410B publication Critical patent/CN107005410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The embodiment of the invention discloses an Internet protocol security IPsec tunnel establishment method, user equipment and a base station. When the user equipment requests to access the core network through the wireless local area network, the base station negotiates with the user equipment about anti-replay parameters and IPsec tunnel establishment parameters, establishes an IPsec tunnel, and transmits data in the IPsec tunnel according to the IPsec tunnel transmission parameters included in the tunnel establishment parameters, so that the user equipment can safely access the core network through the wireless local area network, and the safety of data transmission is ensured.

Description

Internet protocol security tunnel establishment method, user equipment and base station
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for establishing an Internet protocol security (IPsec) tunnel, a user equipment, and a base station.
Background
A Long Term Evolution (Long Term Evolution-Wireless Local Area networks (LWA) aggregation is a novel technology for performing downlink data transmission in a Long Term Evolution (Long Term Evolution, LTE) system by using the high data transmission efficiency of a Wireless Local Area Network (WLAN), and is a technique for data offloading. The architecture definition is shown in fig. 1. A Mobility Management Entity (MME)/Serving Gateway (S-GW) is a core network side Node, and represents a core network side in the architecture, and an Evolved Node B (eNB) is connected to the core network side through an S1 interface, and meanwhile, the eNB is connected to a wireless local area network central station (WLAN Terminal, WT) through an Xw interface. Under this architecture, WTs and enbs are deployed separately. The WTs are transparent and invisible to the core network side, i.e., the core network side is not aware of the existence of the WTs. A WT may be connected to multiple Access Points (APs), and a User Equipment (UE) may be connected to an AP to Access a network. When downlink data arrives, the eNB forwards the data to the UE through the WT, so as to realize WLAN shunt.
Fig. 1 shows LWA technology under a new architecture, which requires compatibility with existing WLAN technology. The access mode of the existing WLAN is to access through the interfaces S2a and S2b by using the architecture of fig. 2.
The S2a access mode is an interface used when the UE accesses a trusted WLAN. A trusted WLAN means that the WLAN is operator deployed. In the S2a access mode, after the UE accesses the WLAN and completes authentication, the UE can directly connect to a Packet Data Network-Gateway (P-GW for short) on the core Network side, thereby implementing Network access using the WLAN and Data offloading.
The S2b interface is an interface between the ePDG and the P-GW. The UE uses this interface in case of access to an untrusted WLAN. An untrusted WLAN refers to a WLAN node that is not deployed by the operator. When a user accesses through such an untrusted WLAN, the user needs to be assisted by an evolved Packet Data Gateway (ePDG). The ePDG is a network element deployed by an operator, so that the ePDG is trusted by the operator, which can ensure that the untrusted WLAN has no way to see and modify user data transmitted between the UE and the core network side, thereby ensuring that only the WLAN is used to transmit data, and no other service is provided by the WLAN.
The new requirement is to be compatible with the existing WLAN, namely, to be compatible with the untrusted WLAN access mode under the S2b access mode. According to the architecture of fig. 1, it can be seen that no ePDG is deployed between the WT and the eNB, and thus data security for protecting users under untrusted WLANs cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides an IPsec tunnel establishment method, user equipment and a base station, which are used for establishing an IPsec tunnel between the user equipment and the base station, ensuring that the user equipment is safely accessed to a core network and ensuring the safety of data transmission.
In a first aspect, an internet protocol security IPsec tunnel establishment method is provided, including:
the base station sends a first anti-replay parameter to the user equipment;
the base station determines a second anti-replay parameter of the user equipment, wherein the first anti-replay parameter and the second anti-replay parameter are respectively used for preventing the same key generated by the base station and the user equipment each time;
the base station generates a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generates first authentication information AUTH according to the first Kipsec;
the base station determines IPsec tunnel establishment parameters which comprise a second AUTH, wherein the user equipment generates a second Kipsec according to the KeNB and the second anti-replay parameter, and generates the second AUTH according to the second Kipsec;
the base station verifies the first AUTH, the second AUTH and the identity of the user equipment.
When the user equipment requests to access the core network through the wireless local area network, the base station negotiates with the user equipment about anti-replay parameters and IPsec tunnel establishment parameters, and establishes the IPsec tunnel, so that the user equipment can safely access the core network through the wireless local area network, and the safety of data transmission is ensured.
In a first possible implementation manner of the first aspect, the method further includes:
the base station sends the IP address of the base station to the user equipment;
and the base station receives the IP address of the wireless local area network connected with the user equipment, which is sent by the user equipment.
With reference to the first aspect or the first possible implementation manner of the first aspect, in a second possible implementation manner, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, the IPsec tunnel transmission parameter includes a first security parameter and an identifier TS for identifying an ingress/egress port of an IPsec protected data stream, and the first security parameter includes a security algorithm and the first Kipsec or the second Kipsec.
With reference to the second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the determining, by the base station, an IPsec tunnel establishment parameter includes:
the base station receives a first internet key exchange protocol version 2IKEv2 message sent by the user equipment, wherein the first IKEv2 message comprises a second security parameter;
the base station sends a response message of the first IKEv2 message to the user equipment;
the base station receives a second IKEv2 message sent by the user equipment according to the second security parameter encryption, wherein the second IKEv2 message comprises the IPsec tunnel establishment parameter;
the base station sends a response message of the second IKEv2 message to the user equipment;
the IPsec tunnel establishment parameters further include an identity of the user equipment and an Internet key exchange protocol header HDR, and the HDR includes an identification SPI for identifying an IPsec tunnel establishment process; the security algorithm is a security algorithm with a security algorithm level.
In the implementation mode, the base station and the user equipment negotiate IPsec tunnel establishment parameters through an IP data packet, specifically Internet key exchange protocol version 2 information.
With reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the verifying, by the base station, the identity of the user equipment includes:
and the base station verifies whether the identity of the user equipment is consistent with the identity of the user equipment acquired by the core network side.
With reference to the third possible implementation manner of the first aspect, in a fifth possible implementation manner, the obtaining, by the base station, an IPsec tunnel establishment parameter negotiated with the user equipment includes:
the base station receives at least one Radio Resource Control (RRC) message sent by the user equipment;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
In the implementation mode, the user equipment sends the IPsec tunnel establishment parameters to the base station through the RRC message, the base station receives the IPsec tunnel establishment parameters sent by the user equipment, that is, the whole IKEv2 message for establishing the IPsec tunnel is packaged in the RRC message for transmission, and the RRC message can ensure that the receiving and sending opposite end is authenticated.
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, the determining, by the base station, an IPsec tunnel establishment parameter includes:
the base station receives the second AUTH sent by the user equipment through a Radio Resource Control (RRC) message and a security algorithm list supported by the user equipment;
the base station determines the level of the security algorithm of the first security parameter according to a security algorithm level list of the base station and a security algorithm list supported by the user equipment, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
and the base station sends the IPsec tunnel establishment parameters to the user equipment.
In this implementation, the IPsec tunnel establishment necessary parameters are transmitted via RRC messages, without fully encapsulating the IKEv2 message.
With reference to the first aspect, in a seventh possible implementation manner of the first aspect, the determining, by the base station, an IPsec tunnel establishment parameter includes:
the base station sends the second AUTH and the security algorithm level list of the base station to the user equipment through an RRC message, so that the user equipment determines the security algorithm level of the first security parameter according to the security algorithm list supported by the user equipment and the security algorithm level list of the base station, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
and the base station receives the IPsec tunnel establishment parameters sent by the user equipment.
In this implementation, the IPsec tunnel establishment necessary parameters are transmitted via RRC messages, without fully encapsulating the IKEv2 message.
In a second aspect, a method for establishing an IPsec tunnel is provided, including:
the user equipment receives a first anti-replay parameter sent by a base station;
the user equipment determines a second anti-replay parameter of the user equipment, wherein the first anti-replay parameter and the second anti-replay parameter are respectively used for preventing the same key generated by the base station and the user equipment each time;
the user equipment generates a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, generates second authentication information AUTH according to the second Kipsec, and sends the second AUTH to the base station;
the user equipment receives IPsec tunnel establishment parameters sent by the base station, wherein the IPsec tunnel establishment parameters comprise a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
the user equipment verifies the first AUTH and the second AUTH.
With reference to the first aspect, in a first possible implementation manner, the method further includes:
the user equipment receives an Internet Protocol (IP) address of the base station sent by the base station;
and the user equipment sends the IP address of the wireless local area network connected with the user equipment to the base station.
With reference to the second aspect or the first possible implementation manner of the second aspect, in a second possible implementation manner, the method further includes:
the user equipment sends a first IKEv2 message to the base station, wherein the first IKEv2 message comprises second security parameters;
the user equipment receives a response message of the first IKEv2 message sent by the base station;
the user equipment encrypts a second IKEv2 message according to the second security parameter, and sends the encrypted second IKEv2 message to the base station, the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used for identifying an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used for identifying an egress/ingress port of an IPsec-protected data stream, the first security parameter includes a security algorithm, and the first Kipsec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level;
the user equipment receives a response message of the second IKEv2 message sent by the base station.
With reference to the second possible implementation manner of the second aspect, in a third possible implementation manner, the method further includes:
the user equipment sends at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
With reference to the second aspect, in a fourth possible implementation manner, the method further includes:
the user equipment sends a security algorithm list supported by the user equipment to the base station through an RRC message, so that the base station determines the level of a security algorithm of the first security parameter according to a security algorithm level list of the base station and the security algorithm list supported by the user equipment, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
the user equipment receives the IPsec tunnel establishment parameters sent by the base station, the IPsec tunnel establishment parameters further comprise IPsec tunnel transmission parameters and an Internet key exchange protocol header HDR, the HDR comprises an identification SPI for identifying an IPsec tunnel establishment process, the IPsec tunnel transmission parameters comprise first safety parameters and TS, the first safety parameters comprise safety algorithms for determining the levels, and the first Kipsec or the second Kipsec.
With reference to the second aspect, in a fifth possible implementation manner, the method further includes:
the user equipment receives a security algorithm level list of the base station, which is sent by the base station through an RRC message, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of security algorithm levels;
the user equipment determines the level of the security algorithm of the first security parameter according to a security algorithm list supported by the user equipment and a security algorithm level list of the base station;
the user equipment sends the IPsec tunnel establishment parameters to the base station, the IPsec tunnel establishment parameters further comprise IPsec tunnel transmission parameters and an Internet key exchange protocol header HDR, the HDR comprises an identification SPI for identifying an IPsec tunnel establishment process, the IPsec tunnel transmission parameters comprise first safety parameters and TS, the first safety parameters comprise safety algorithms for determining the levels, and the first Kipsec or the second Kipsec.
In a third aspect, a base station is provided, which has a function of implementing the base station behavior in the above method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible implementation, the base station includes: a transmitter and a processor; wherein the content of the first and second substances,
the transmitter is used for transmitting the first anti-replay parameter to the user equipment;
the processor is configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
the processor is configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec;
the processor is further configured to determine IPsec tunnel establishment parameters, where the IPsec tunnel establishment parameters include a second AUTH, and the user equipment generates a second Kipsec according to the KeNB and the second playback resistance parameter, and generates the second AUTH according to the second Kipsec;
the processor is further configured to verify the first AUTH and the second AUTH and the identity of the user equipment.
In another possible implementation manner, the base station includes:
a sending unit, configured to send a first anti-replay parameter to a user equipment;
a determining unit, configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent keys generated by the base station and the user equipment each time from being the same;
a generating unit, configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec;
the determining unit is further configured to determine IPsec tunnel establishment parameters, where the IPsec tunnel establishment parameters include a second AUTH, and the user equipment generates a second Kipsec according to the KeNB and the second playback resistant parameter and generates the second AUTH according to the second Kipsec;
and the verification unit is used for verifying the first AUTH, the second AUTH and the identity of the user equipment.
In a fourth aspect, a user equipment is provided, where the user equipment has a function of implementing the user equipment behavior in the above method. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In one possible implementation, the user equipment includes: a receiver, a transmitter, and a processor; wherein the content of the first and second substances,
the receiver is used for receiving a first anti-replay parameter sent by a base station;
the processor is configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
the transmitter is further configured to transmit the second AUTH to the base station;
the receiver is further configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
the processor is further configured to verify the first AUTH and the second AUTH.
In another possible implementation manner, the user equipment includes:
the receiving unit is used for receiving a first anti-replay parameter sent by the base station;
a generating unit, configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
a sending unit, configured to send the second AUTH to the base station;
the receiving unit is further configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
and the verification unit is used for verifying the first AUTH and the second AUTH.
According to the internet protocol security IPsec tunnel establishment method, the user equipment and the base station provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station negotiates with the user equipment about anti-replay parameters and IPsec tunnel establishment parameters to establish the IPsec tunnel, so that the user equipment can safely access the core network through the wireless local area network, and the security of data transmission is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic diagram of a long term evolution system-wireless local area network aggregation LWA;
fig. 2 is a schematic view of an access method of a conventional WLAN;
fig. 3 is a schematic flowchart of an IPsec tunnel establishment method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating another IPsec tunnel establishment method according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a further IPsec tunnel establishment method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a base station according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of another base station according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a user equipment according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of another base station according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of another ue according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention requires the new LWA architecture shown in fig. 1 to be compatible with the existing WLAN technology, i.e. requiring the compatibility of the untrusted WLAN access mode under the S2b access mode. The embodiment of the invention establishes the IPsec tunnel between the user equipment and the base station to achieve the function of an ePDG under an S2b interface.
Before implementing the IPsec tunnel establishment method of the embodiment of the present invention, the user equipment has access to the core network and authentication is successful. At this time, the base station already has an identity of the user equipment, such as a cell radio Network Temporary Identifier (C-RNTI), and the base station can find the user equipment through the identity. The result of successful authentication is that air interface security between the ue and the base station is already established, i.e. the ue and the base station already have the same confidentiality key and integrity key, which are used to ensure the security of message transmission between the ue and the base station over the mobile network.
When the user equipment requests to access the core network through the wireless local area network, the base station negotiates with the user equipment about the anti-replay parameter and the IPsec tunnel establishment parameter, establishes the IPsec tunnel, and transmits data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the safety of data transmission is ensured.
Fig. 3 is a flowchart illustrating an IPsec tunnel establishment method according to an embodiment of the present invention, where the method includes the following steps:
s101, the base station and the user equipment negotiate anti-replay parameters.
The anti-replay parameter is to prevent the base station or the user equipment from generating the same key each time or generating the same message, and if the key or the message is the same, an attacker can intercept the previous message and resend the message again. The anti-replay parameter is typically a random number, a timestamp, or a value of a counter.
The base station may carry the anti-replay parameter-1 in the RRC message that sends the IP address of the base station to the user equipment, and the user equipment may or may not carry the anti-replay parameter-2 in replying to the RRC message of the base station, which is determined by specific configuration, for example, if the anti-replay parameter is a random number, the anti-replay parameter-1 and the anti-replay parameter-2 may be the same or different, and if a mode of transferring the random number is selected, the anti-replay parameter-2 is carried in the reply message; if the counter mode is adopted, the base station can set the counter, and the user equipment does not set the counter, so the base station is required to transmit the value of the counter as the anti-replay parameter-1 to the user equipment, and the user equipment does not have a timer, so the anti-replay parameter is not carried in the reply message; if the user equipment is also provided with a counter, the user equipment also needs to transmit the value of the counter of the user equipment to the base station as an anti-replay parameter-2; if time stamping is used, both parties need to transmit anti-replay parameters. Accordingly, the RRC message of the replying base station may include: RRC reconfiguration complete message, RRC complete message, etc.
S102, the base station generates a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generates first authentication information AUTH according to the first Kipsec.
And S103, the user equipment generates a second Kipsec according to the KeNB and the second anti-replay parameter, and generates a second AUTH according to the second Kipsec.
When the air interface security is established, the user equipment and the base station generate the same air interface key KeNB. Then, the base station and the user equipment respectively use the set key generation function to generate a first Kipsec and a second Kipsec according to the KeNB and the negotiated anti-replay parameter, and then respectively generate a first AUTH (authentication) and a second AUTH according to the first Kipsec and the second Kipsec.
S104, the base station negotiates IPsec tunnel establishment parameters with the user equipment.
The IPsec tunnel establishment parameters include authentication information (AUTH) and IPsec tunnel transmission parameters, where the IPsec tunnel transmission parameters include a first Security parameter and an identifier (TS) for identifying an ingress/egress port of a data stream protected by the IPsec, the Security parameter is also called a Security Association parameter (SA), the Security parameter includes a Security algorithm, and a first Kipsec or a second Kipsec, the Security algorithm has a Security algorithm level, the Security algorithm level is used for indicating which algorithm should be considered preferentially, and the first Kipsec or the second Kipsec is used for encrypting the data stream transmitted in the IPsec tunnel in the Security algorithm. The IPsec tunnel establishment parameters may also include the identity IDi of the user equipment and the identity IDr of the base station. In this embodiment, in order for the base station to accurately determine the identity of the user equipment, the C-RNTI may be used as the IDi. Wherein IDi represents the Initiator identity, i.e., Identification-Initiator, and IDr represents the receiver identity, i.e., Identification-Responder.
S105, the base station and the user equipment respectively verify the first AUTH and the second AUTH.
And S106, if the base station verifies that the first AUTH is consistent with the second AUTH, verifying the identity of the user equipment.
After obtaining the negotiated IPsec tunnel establishment parameters, the base station and the user equipment respectively verify whether the authentication information of the opposite terminal is consistent with the authentication information of the base station and the user equipment, and if the authentication is passed, the base station verifies the identity of the user equipment. The base station verifies the identity of the user equipment, may compare the identity of the user equipment that has been acquired when the air interface is connected with the identity of the user equipment that is included in the IPsec tunnel establishment parameter, and if the received message is an RRC message, the identity of the user equipment is verified when the RRC message is received.
The base station and the user equipment negotiate the transmission parameters of the IPsec tunnel, and then the work of establishing the IPsec tunnel is completed, so that data can be transmitted in the IPsec tunnel according to the transmission parameters of the IPsec tunnel.
According to the IPsec tunnel establishment method provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station negotiates with the user equipment about the anti-replay parameter and the IPsec tunnel establishment parameter, establishes the IPsec tunnel, and transmits data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the safety of data transmission is ensured.
Fig. 4 is a flowchart illustrating another IPsec tunnel establishment method according to an embodiment of the present invention, where the method includes the following steps:
s201, the base station sends the IP address of the base station to the user equipment in the RRC reconfiguration message.
The anti-replay parameter-1 is carried in the RRC reconfiguration message.
S202, after receiving the RRC reconfiguration message of the base station, the user equipment replies an RRC reconfiguration complete message.
The anti-replay parameter-2 is carried in the RRC reconfiguration complete message.
When an IPsec tunnel between a user equipment and a base station is established, two operations need to be completed: firstly, both parties need to know the IP addresses of the opposite ends, and secondly, the base station needs to determine that the opposite end for establishing the IPsec tunnel is the user equipment of the base station, but not the user equipment of an attacker or other people, that is, the identity of the user equipment is correct.
First, the base station transmits an IP address of the base station to the user equipment. The base station may select one of a plurality of Radio Resource Control (RRC) messages for transmitting an IP address of the base station, where the RRC message includes: RRC reconfiguration message, RRC establishment request message, RRC reestablishment message, and the like. The choice to pass RRC messaging is based on the mobile network having passed security authentication, which can ensure the security of the sent message.
And simultaneously, the user equipment sends the IP address of the wireless local area network connected with the user equipment to the base station, before the user equipment sends the IP, the user equipment firstly accesses the wireless local area network through the AP, and then obtains the IP address distributed by the wireless local area network.
S203, the base station generates a first pre-shared key Kipsec according to the air interface key KeNB and the negotiated anti-replay parameter by using the set key generation function, and generates first authentication information AUTH according to the first Kipsec.
And S204, the user equipment generates a second Kipsec according to the KeNB and the negotiated anti-replay parameter by using the set key generation function, and generates a second AUTH according to the second Kipsec.
S205, the user equipment accesses the AP.
S206, the user equipment obtains the IP address distributed by the AP.
And S207, the user equipment sends the IP address distributed by the AP to the base station.
S208, the base station and the user equipment negotiate a second security parameter through a first Internet key exchange protocol version 2 message.
Specifically, the ue sends an internet key exchange security association parameter negotiation initial message IKE _ SA _ INIT message to the base station, where the IKE _ SA _ INIT message includes an internet key exchange protocol Header (IKE Header, abbreviated as HDR), a second security parameter SAi1, a sender basic key KEi, and a random number Ni, where the HDR includes a security parameter index (SPI for short) for identifying an IPsec tunnel establishment procedure; the base station replies to the IKE SA INIT message, which includes HDR, SAr1, a replying party basic key KEr, and a random number Nr, thereby completing negotiation of second security parameters between the base station and the ue. The second security parameters also include a security algorithm, a security algorithm level, and a key. Here, the security algorithm levels of SAi1 and SAr1 are determined by IKEv2 messages, and SAi1 and SAr1 include a plurality of security algorithms, and the security algorithms employed are specified by security algorithm levels. The key is generated from the basic keys (KEi and KEr), and the random numbers (Ni, Nr). The second security parameters are used to encrypt a second IKEv2 message carrying IPsec tunnel establishment parameters.
S209, the base station receives a second IKEv2 message sent by the user equipment in an encrypted mode according to the second security parameters.
Specifically, the ue sends an IKE _ AUTH message to the base station, where the IKE _ AUTH message is sent encrypted by the second security parameter. The IKE _ AUTH message comprises HDR, SK { IDi, AUTH, SAi2, TSi, TSr }, wherein SK { } indicates that the parameters in the { } are encrypted and protected by a security algorithm and a key in a second security parameter; the base station replies IKR _ AUTH message of the user equipment, and the replied message comprises HDR, SK { IDr, AUTH, SAr2, TSi, TSr }.
In this embodiment, the IPsec tunnel establishment parameters are negotiated between the base station and the user equipment through an IP data packet, specifically, an internet key exchange protocol version 2 message, and since the IPsec tunnel establishment parameters are transmitted through the IP data packet, the identity of the peer is not verified, and the security of the transmission process cannot be guaranteed, security parameters of the message for transmitting the IPsec tunnel establishment parameters need to be negotiated first, and then the message for transmitting the IPsec tunnel establishment parameters needs to be encrypted through the negotiated security parameters.
As an alternative mode of S208-S209, the ue sends the IPsec tunnel establishment parameter to the base station through an RRC message, and the base station receives the IPsec tunnel establishment parameter sent by the ue, that is, the whole IKEv2 message for establishing the IPsec tunnel is encapsulated in the RRC message for transmission.
S210, the base station and the user equipment respectively verify the first AUTH and the second AUTH.
S211, if the base station verifies that the first AUTH is consistent with the second AUTH, the identity of the user equipment is verified.
Fig. 5 is a flowchart illustrating a further IPsec tunnel establishment method according to an embodiment of the present invention, where the method includes the following steps:
s301, the user equipment accesses the AP.
S302, the user equipment obtains the IP address distributed by the AP.
S303, the base station sends the IP address of the base station to the user equipment in the RRC reconfiguration message.
The anti-replay parameter-1 is carried in this message.
S304, after receiving the RRC reconfiguration message of the base station, the user equipment replies an RRC reconfiguration complete message.
Carries the IP address of the AP to which the user equipment is connected and the anti-replay parameter-2.
S305, the base station generates a first pre-shared key Kipsec according to the air interface key KeNB and the negotiated anti-replay parameter by using a set key generation function, and generates first authentication information AUTH according to the first Kipsec.
S306, the user equipment generates a second Kipsec according to the KeNB and the negotiated anti-replay parameter by using the set key generation function, and generates a second AUTH according to the second Kipsec.
S307, the base station receives a second AUTH sent by the user equipment through the RRC message and a security algorithm list supported by the user equipment.
The method comprises the following steps that user equipment sends IPsec tunnel establishment necessary parameters to a base station through RRC messages, the base station receives the IPsec tunnel establishment necessary parameters sent by the user equipment, and the IPsec tunnel establishment necessary parameters comprise: authentication information, and a list of security algorithms supported by the user equipment, which may include a ciphering algorithm and an integrity protection algorithm.
Optionally, the security algorithm list supported by the ue may also be transmitted to the base station in advance in an Attach process of the ue attaching to the core network, that is, before S301, the ue may carry the security algorithm list supported by the ue in an Attach Request message to the MME, the MME transmits the security algorithm list supported by the ue to the base station in an Attach Accept message, and then completes an Attach procedure of the ue and establishes the default bearer.
S308, the base station determines the level of the security algorithm of the first security parameter according to the self security algorithm level list and the security algorithm list supported by the user equipment.
The base station is provided with a security algorithm level list which comprises a plurality of security algorithms and the corresponding relations of the security algorithm levels. The base station may determine, according to the security algorithm level list and the obtained security algorithm list supported by the user equipment, a level of a security algorithm of the first security parameter from a security algorithm supported by the user equipment, where the security algorithm is used as a security algorithm for protecting IPsec tunnel transmission, and for example, a security algorithm with a highest algorithm security capability level in the security algorithm list supported by the user equipment may be selected.
Alternatively, if the user equipment previously transmits the security algorithm list supported by the user equipment to the base station in the attach procedure, the base station may send the IP address of the base station and the determined level of the security algorithm of the first security parameter to the user equipment in an RRC reconfiguration message.
S309, the base station sends the IPsec tunnel establishment parameters to the user equipment.
After determining the authentication information and the first security algorithm, the base station sends IPsec tunnel establishment parameters to the user equipment, where the IPsec tunnel establishment parameters include a first security parameter and a TS, and the first security parameter includes a security algorithm and the first Kipsec or the second Kipsec.
In this embodiment, the necessary IPsec tunnel establishment parameters are transmitted through RRC messages, the IKEv2 messages are not completely encapsulated, and since the RRC messages themselves can ensure the security of data transmission, the second security parameters do not need to be negotiated.
In this embodiment, the IPsec tunnel establishment is initiated by the user equipment, and as an alternative to S307 to S309, the IPsec tunnel establishment may also be initiated by the base station, that is, the base station sends necessary parameters for the IPsec tunnel establishment to the user equipment through an RRC message, so that the user equipment determines the level of the security algorithm of the first security parameter according to a security algorithm list supported by the user equipment and a security algorithm level list of the base station, and then the user equipment sends the IPsec tunnel establishment parameters to the base station, and the base station receives the IPsec tunnel establishment parameters sent by the user equipment.
S310, the base station and the user equipment respectively verify the first AUTH and the second AUTH.
S311, if the base station verifies that the first AUTH is consistent with the second AUTH, the identity of the user equipment is verified.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
Fig. 6 is a schematic structural diagram of a base station according to an embodiment of the present invention, where the base station 1000 includes a sending unit 11, a determining unit 12, a generating unit 13, and a verifying unit 14. Wherein:
a sending unit 11, configured to send the first anti-replay parameter to the user equipment.
The determining unit 12 is configured to determine that the second anti-replay parameter of the ue may carry the anti-replay parameter-1 in the RRC message to the ue, and the ue may carry the anti-replay parameter-2 in the RRC message returned to the base station, or may not carry the anti-replay parameter-2, which is determined by the specific configuration. Accordingly, the RRC message of the replying base station may include: RRC reconfiguration complete message, RRC complete message, etc.
A generating unit 13, configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec.
When the air interface security is established, the user equipment and the base station generate the same air interface key KeNB. Then, the base station and the user equipment respectively use the set key generation function to generate a first Kipsec and a second Kipsec according to the KeNB and the negotiated anti-replay parameter, and then respectively generate a first AUTH and a second AUTH according to the first Kipsec and the second Kipsec.
The determining unit 12 is further configured to determine IPsec tunnel establishment parameters.
The IPsec tunnel establishment parameters include authentication information and IPsec tunnel transmission parameters, where the IPsec tunnel transmission parameters include a first Security parameter and an identifier for identifying an ingress/egress port of a data flow protected by the IPsec, the Security parameter is also called a Security Association (SA), and the Security parameter includes a Security algorithm, and a first Kipsec or a second Kipsec, the Security algorithm has a Security algorithm level, the Security algorithm level is used to indicate which algorithm should be considered preferentially, and the first Kipsec or the second Kipsec is used to encrypt the data flow transmitted in the IPsec tunnel in the Security algorithm. The IPsec tunnel establishment parameters may also include the identity IDi of the user equipment and the identity IDr of the base station.
An authentication unit 14 for authenticating the first AUTH and the second AUTH and the identity of the user equipment.
After obtaining the negotiated IPsec tunnel establishment parameters, the base station and the user equipment respectively verify whether the authentication information of the opposite terminal is consistent with the authentication information of the base station and the user equipment, and if the authentication is passed, the base station verifies the identity of the user equipment. The base station verifies the identity of the user equipment, may compare the identity of the user equipment that has been acquired when the air interface is connected with the identity of the user equipment that is included in the IPsec tunnel establishment parameter, and if the received message is an RRC message, the identity of the user equipment is verified when the RRC message is received.
And the base station negotiates the transmission parameters of the IPsec tunnel with the user equipment, and the work of establishing the IPsec tunnel is completed.
According to the base station provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station and the user equipment negotiate the anti-replay parameter and the IPsec tunnel establishment parameter, establish the IPsec tunnel, and transmit data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the data transmission safety is ensured.
With continued reference to fig. 6, the base station further includes a receiving unit, and a specific implementation manner of the receiving unit is provided as follows:
the receiving unit is specifically configured to acquire a second security parameter negotiated with the user equipment through a first internet key exchange protocol version 2 message.
Specifically, the user equipment sends an internet key exchange security association parameter negotiation initial message IKE _ SA _ INIT message to the base station, where the IKE _ SA _ INIT message includes HDR, a second security parameter SAi1, a sender basic key KEi, and a random number Ni, where the HDR includes SPI for identifying an IPsec tunnel establishment process; the base station replies to the IKE SA INIT message, which includes HDR, SAr1, a replying party basic key KEr, and a random number Nr, thereby completing negotiation of second security parameters between the base station and the ue. The second security parameters also include a security algorithm, a security algorithm level, and a key. Here, the security algorithm levels of SAi1 and SAr1 are determined by IKEv2 messages, and SAi1 and SAr1 include a plurality of security algorithms, and the security algorithms employed are specified by security algorithm levels. The key is generated from the basic keys (KEi and KEr), and the random numbers (Ni, Nr). The second security parameters are used to encrypt a second IKEv2 message carrying IPsec tunnel establishment parameters.
The receiving unit is further specifically configured to receive a second IKEv2 message sent by the user equipment in accordance with the second security parameter encryption.
Specifically, the ue sends an IKE _ AUTH message to the base station, where the IKE _ AUTH message is sent encrypted by the second security parameter. The IKE _ AUTH message comprises HDR, SK { IDi, AUTH, SAi2, TSi, TSr }, wherein SK { } indicates that the parameters in the { } are encrypted and protected by a security algorithm and a key in a second security parameter; the base station replies IKR _ AUTH message of the user equipment, and the replied message comprises HDR, SK { IDr, AUTH, SAr2, TSi, TSr }.
In this embodiment, the IPsec tunnel establishment parameters are negotiated between the base station and the user equipment through an IP data packet, specifically, an internet key exchange protocol version 2 message, and since the IPsec tunnel establishment parameters are transmitted through the IP data packet, the identity of the peer is not verified, and the security of the transmission process cannot be guaranteed, security parameters of the message for transmitting the IPsec tunnel establishment parameters need to be negotiated first, and then the message for transmitting the IPsec tunnel establishment parameters needs to be encrypted through the negotiated security parameters.
As another alternative implementation manner of the receiving unit, the user equipment sends the IPsec tunnel establishment parameter to the base station through an RRC message, and the receiving unit receives the IPsec tunnel establishment parameter sent by the user equipment, that is, the whole IKEv2 message for establishing the IPsec tunnel is encapsulated in the RRC message for transmission.
Fig. 7 is a schematic structural diagram of another base station according to an embodiment of the present invention, where the base station 2000 includes a sending unit 21, a receiving unit 22, a generating unit 23, a determining unit 24, and a verifying unit 25. Wherein:
a sending unit 21, configured to send the internet protocol IP address and the anti-replay parameter of the base station to the user equipment in the RRC reconfiguration message.
A receiving unit 22, configured to receive the IP address and the anti-replay parameter of the wireless local area network connected to the user equipment, where the IP address and the anti-replay parameter are sent by the user equipment.
The generating unit 23 is configured to generate, by using a set key generation function, a first pre-shared key Kipsec according to the air interface key KeNB and the negotiated anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec.
The receiving unit 22 is further configured to receive a second AUTH sent by the user equipment through an RRC message and a list of security algorithms supported by the user equipment.
The method comprises the following steps that user equipment sends IPsec tunnel establishment necessary parameters to a base station through RRC messages, the base station receives the IPsec tunnel establishment necessary parameters sent by the user equipment, and the IPsec tunnel establishment necessary parameters comprise: authentication information, and a list of security algorithms supported by the user equipment, which may include a ciphering algorithm and an integrity protection algorithm.
Optionally, the security algorithm list supported by the ue may also be transmitted to the base station in advance in an Attach process of the ue attaching to the core network, that is, before S301, the ue may carry the security algorithm list supported by the ue in an Attach Request message to the MME, the MME transmits the security algorithm list supported by the ue to the base station in an Attach Accept message, and then completes an Attach procedure of the ue and establishes the default bearer.
The determining unit 24 is configured to determine the level of the security algorithm of the first security parameter according to the own security algorithm level list and the security algorithm list supported by the user equipment.
The base station is provided with a security algorithm level list which comprises a plurality of security algorithms and the corresponding relations of the security algorithm levels. The base station may determine, according to the security algorithm level list and the obtained security algorithm list supported by the user equipment, a level of a security algorithm of the first security parameter from a security algorithm supported by the user equipment, where the security algorithm is used as a security algorithm for protecting IPsec tunnel transmission, and for example, a security algorithm with a highest algorithm security capability level in the security algorithm list supported by the user equipment may be selected.
Alternatively, if the user equipment previously transmits the security algorithm list supported by the user equipment to the base station in the attach procedure, the base station may send the IP address of the base station and the determined level of the security algorithm of the first security parameter to the user equipment in an RRC reconfiguration message.
The sending unit 21 is further configured to send the IPsec tunnel establishment parameter to the user equipment.
After determining the authentication information and the first security algorithm, the base station sends IPsec tunnel establishment parameters to the user equipment, where the IPsec tunnel establishment parameters include a first security parameter and a TS, and the first security parameter includes a security algorithm and the first Kipsec or the second Kipsec. .
In this embodiment, the necessary IPsec tunnel establishment parameters are transmitted through RRC messages, the IKEv2 messages are not completely encapsulated, and since the RRC messages themselves can ensure the security of data transmission, the second security parameters do not need to be negotiated.
In this embodiment, the IPsec tunnel establishment is initiated by the user equipment, as an alternative, the IPsec tunnel establishment may also be initiated by the base station, that is, the base station sends necessary parameters for the IPsec tunnel establishment to the user equipment through an RRC message, so that the user equipment determines the level of the security algorithm of the first security parameter according to a security algorithm list supported by the user equipment and a security algorithm level list of the base station, and then the user equipment sends the IPsec tunnel establishment parameters to the base station, and the base station receives the IPsec tunnel establishment parameters sent by the user equipment.
And an authentication unit 25 for authenticating the first AUTH and the second AUTH.
The verification unit 25 is further configured to verify the identity of the user equipment if the first AUTH is verified to be consistent with the second AUTH.
Fig. 8 is a schematic structural diagram of a user equipment according to an embodiment of the present invention, where the user equipment 3000 includes a determining unit 31, a generating unit 32, a sending unit 33, a receiving unit 34, and a verifying unit 35; wherein:
a determining unit 31, configured to determine a second anti-replay parameter of a user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
a generating unit 32, configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
a sending unit 33, configured to send the second AUTH to the base station;
a receiving unit 34, configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
a verification unit 35 configured to verify the first AUTH and the second AUTH.
Further, the receiving unit 34 is further configured to receive an internet protocol IP address of the base station sent by the base station;
the sending unit is further configured to send the IP address of the wireless local area network to which the user equipment is connected to the base station.
As an implementation manner, the sending unit 33 is further configured to send a first IKEv2 message to the base station, where the first IKEv2 message includes a second security parameter;
the receiving unit 34 is further configured to receive a response message of the first IKEv2 message sent by the base station;
the sending unit 33 is further configured to encrypt a second IKEv2 message according to the second security parameter, and send the encrypted second IKEv2 message to the base station, where the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used to identify an egress/ingress port of an IPsec-protected data flow, the first security parameter includes a security algorithm, and the first Kipsec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level set;
the receiving unit 34 is further configured to receive a response message of the second IKEv2 message sent by the base station.
As another implementation manner, the sending unit 33 is further configured to send at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
As another implementation manner, the sending unit 33 is further configured to send, through an RRC message, a security algorithm list supported by the ue to the base station, so that the base station determines, according to a security algorithm level list of the base station and the security algorithm list supported by the ue, a security algorithm level of the first security parameter, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the receiving unit 34 is further configured to receive the IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used for identifying an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
As still another implementation manner, the receiving unit 34 is further configured to receive a security algorithm level list of the base station, sent by the base station through an RRC message, where the security algorithm level list includes a plurality of security algorithms and corresponding relationships between security algorithm levels;
the determining unit 31 is further configured to determine a security algorithm level of the first security parameter according to a security algorithm list supported by the determining unit and a security algorithm level list of the base station;
the sending unit 33 is further configured to send the IPsec tunnel establishment parameter to the base station, where the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and a TS, and the first security parameter includes a security algorithm for determining the level and the first Kipsec or the second Kipsec.
According to the user equipment provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station and the user equipment negotiate the anti-replay parameter and the IPsec tunnel establishment parameter, establish the IPsec tunnel, and transmit data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the data transmission safety is ensured.
As shown in fig. 9, a schematic structural diagram of another base station is provided for the embodiment of the present invention, configured to implement the function of establishing the IPsec tunnel described above, and as shown in fig. 9, the base station 4000 includes a transmitter 41 and a processor 42, where the transmitter 41 and the processor 42 are connected to each other through a bus 43. Wherein:
the transmitter is used for transmitting the first anti-replay parameter to the user equipment;
the processor is configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
the processor is further configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec;
the processor is further configured to determine IPsec tunnel establishment parameters, where the IPsec tunnel establishment parameters include a second AUTH, and the user equipment generates a second Kipsec according to the KeNB and the second playback resistance parameter, and generates the second AUTH according to the second Kipsec;
the processor is further configured to verify the first AUTH and the second AUTH, and an identity of the user equipment.
Further, the transmitter is further configured to transmit an internet protocol, IP, address of the base station to the user equipment;
the base station further comprises: a receiver;
the receiver is further configured to receive an IP address of a wireless local area network to which the user equipment is connected, which is sent by the user equipment.
Further, the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters, the IPsec tunnel transmission parameters include a first security parameter and a TS identifier for identifying an ingress/egress port of a data stream protected by the IPsec, and the first security parameter includes a security algorithm and the first Kipsec or the second Kipsec.
Further, the receiver is further configured to receive a first internet key exchange protocol version 2IKEv2 message sent by the user equipment, the first IKEv2 message including second security parameters;
the transmitter is further configured to transmit a response message to the user equipment to the first IKEv2 message;
the receiver is further configured to receive a second IKEv2 message sent by the user equipment in accordance with the second security parameter encryption, the second IKEv2 message including the IPsec tunnel establishment parameter;
the transmitter is further configured to transmit a response message to the user equipment for the second IKEv2 message;
the IPsec tunnel establishment parameters further include an identity of the user equipment and an Internet key exchange protocol header HDR, and the HDR includes an identification SPI for identifying an IPsec tunnel establishment process; the security algorithm is a security algorithm with a security algorithm level.
Further, the processor is further configured to:
and verifying whether the identity of the user equipment is consistent with the identity of the user equipment acquired by the core network side.
Further, the receiver is further configured to receive at least one radio resource control RRC message sent by the user equipment;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
Further, the receiver is further configured to receive the second AUTH and a security algorithm list supported by the ue, which are sent by the ue through a radio resource control, RRC, message;
the processor is further configured to determine a security algorithm level of the first security parameter according to a security algorithm level list of the processor and a security algorithm list supported by the user equipment, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the sender is further configured to send the IPsec tunnel establishment parameter to the user equipment.
Further, the transmitter is further configured to send the second AUTH and the security algorithm level list of the base station to the user equipment through an RRC message, so that the user equipment determines the level of the security algorithm of the first security parameter according to the security algorithm list supported by the user equipment and the security algorithm level list of the base station, where the security algorithm level list includes a plurality of security algorithms and corresponding relationships between security algorithm levels;
the receiver is further configured to receive the IPsec tunnel establishment parameter sent by the user equipment.
According to the base station provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station and the user equipment negotiate the anti-replay parameter and the IPsec tunnel establishment parameter, establish the IPsec tunnel, and transmit data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the data transmission safety is ensured.
As shown in fig. 10, providing another schematic structural diagram of a user equipment for implementing the function of establishing the IPsec tunnel according to the embodiment of the present invention, as shown in fig. 10, the user equipment 5000 includes a receiver 51, a transmitter 52 and a processor 53, where the receiver 51, the transmitter 52 and the processor 53 are connected to each other through a bus 54. Wherein:
the processor is configured to determine a second anti-replay parameter of a user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
the processor is further configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
a transmitter, configured to transmit the second AUTH to the base station;
the receiver is configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
the processor is further configured to verify the first AUTH and the second AUTH.
Further, the receiver is further configured to receive an internet protocol, IP, address of the base station sent by the base station;
the sending unit is further configured to send the IP address of the wireless local area network to which the user equipment is connected to the base station.
Further, the transmitter is further configured to transmit a first IKEv2 message to the base station, the first IKEv2 message including second security parameters;
the receiver is also used for receiving a response message of the first IKEv2 message sent by the base station;
the sender is further configured to encrypt a second IKEv2 message according to the second security parameter, and send the encrypted second IKEv2 message to the base station, where the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used to identify an ingress/egress port of an IPsec-protected data stream, the first security parameter includes a security algorithm, and the first Kipsec psec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level set;
the receiver is also used for receiving a response message of the second IKEv2 message sent by the base station.
Further, the transmitter is further configured to transmit at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
Further, the transmitter is further configured to transmit a security algorithm list supported by the ue to the base station through an RRC message, so that the base station determines a security algorithm level of the first security parameter according to a security algorithm level list of the base station and the security algorithm list supported by the ue, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the receiver is further configured to receive the IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
Further, the receiver is further configured to receive a security algorithm level list of the base station sent by the base station through an RRC message, where the security algorithm level list includes a plurality of security algorithms and security algorithm levels corresponding to each other;
the processor is further configured to determine a security algorithm level of the first security parameter according to a security algorithm list supported by the processor and a security algorithm level list of the base station;
the sender is further configured to send the IPsec tunnel establishment parameters to the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
According to the user equipment provided by the embodiment of the invention, when the user equipment requests to access the core network through the wireless local area network, the base station and the user equipment negotiate the anti-replay parameter and the IPsec tunnel establishment parameter, establish the IPsec tunnel, and transmit data in the IPsec tunnel according to the IPsec tunnel transmission parameter included in the tunnel establishment parameter, so that the user equipment can safely access the core network through the wireless local area network, and the data transmission safety is ensured.
The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs. Those skilled in the art may combine or combine features of different embodiments and features of different embodiments described in this specification.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by hardware, firmware, or a combination thereof. When implemented in software, the functions described above may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. Taking this as an example but not limiting: the computer-readable medium may include Random Access Memory (RAM), Read-Only Memory (ROM), electrically erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-on Memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Furthermore, the method is simple. Any connection is properly termed a computer-readable medium. For example, if software is transmitted from a website, a server, or other remote source using a coaxial cable, a fiber optic cable, a twisted pair, a Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, the coaxial cable, the fiber optic cable, the twisted pair, the DSL, or the wireless technologies such as infrared, radio, and microwave are included in the fixation of the medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy Disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
In short, the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (42)

1. An internet protocol security IPsec tunnel establishment method, comprising:
the base station sends a first anti-replay parameter to the user equipment;
the base station determines a second anti-replay parameter of the user equipment, wherein the first anti-replay parameter and the second anti-replay parameter are respectively used for preventing the same key generated by the base station and the user equipment each time;
the base station generates a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generates first authentication information AUTH according to the first Kipsec;
the base station determines IPsec tunnel establishment parameters which comprise a second AUTH, wherein the user equipment generates a second Kipsec according to the KeNB and the second anti-replay parameter, and generates the second AUTH according to the second Kipsec;
and if the base station verifies that the first AUTH is consistent with the second AUTH, verifying the identity of the user equipment.
2. The method of claim 1, further comprising:
the base station sends the IP address of the base station to the user equipment;
and the base station receives the IP address of the wireless local area network connected with the user equipment, which is sent by the user equipment.
3. The method of claim 1 or 2, wherein said IPsec tunnel establishment parameters further comprise IPsec tunnel transport parameters, said IPsec tunnel transport parameters comprising a first security parameter and an identification, TS, for identifying an ingress/egress port of an IPsec protected data flow, said first security parameter comprising a security algorithm, and said first Kipsec or said second Kipsec.
4. The method of claim 3, wherein said base station determining IPsec tunnel establishment parameters comprises:
the base station receives a first internet key exchange protocol version 2IKEv2 message sent by the user equipment, wherein the first IKEv2 message comprises a second security parameter;
the base station sends a response message of the first IKEv2 message to the user equipment;
the base station receives a second IKEv2 message sent by the user equipment according to the second security parameter encryption, wherein the second IKEv2 message comprises the IPsec tunnel establishment parameter;
the base station sends a response message of the second IKEv2 message to the user equipment;
the IPsec tunnel establishment parameters further include an identity of the user equipment and an Internet key exchange protocol header HDR, and the HDR includes an identification SPI for identifying an IPsec tunnel establishment process; the security algorithm is a security algorithm with a security algorithm level.
5. The method of claim 4, wherein the base station verifying the identity of the user equipment comprises:
and the base station verifies whether the identity of the user equipment is consistent with the identity of the user equipment acquired by the core network side.
6. The method of claim 4, wherein said base station determining IPsec tunnel establishment parameters comprises:
the base station receives at least one Radio Resource Control (RRC) message sent by the user equipment;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
7. The method of claim 3, wherein said base station determining IPsec tunnel establishment parameters comprises:
the base station receives the second AUTH sent by the user equipment through a Radio Resource Control (RRC) message and a security algorithm list supported by the user equipment;
the base station determines the level of the security algorithm of the first security parameter according to a security algorithm level list of the base station and a security algorithm list supported by the user equipment, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
and the base station sends the IPsec tunnel establishment parameters to the user equipment.
8. The method of claim 3, wherein said base station determining IPsec tunnel establishment parameters comprises:
the base station sends the second AUTH and the security algorithm level list of the base station to the user equipment through an RRC message, so that the user equipment determines the security algorithm level of the first security parameter according to the security algorithm list supported by the user equipment and the security algorithm level list of the base station, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
and the base station receives the IPsec tunnel establishment parameters sent by the user equipment.
9. An IPsec tunnel establishment method is characterized by comprising the following steps:
the user equipment receives a first anti-replay parameter sent by a base station;
the user equipment determines a second anti-replay parameter of the user equipment, wherein the first anti-replay parameter and the second anti-replay parameter are respectively used for preventing the same key generated by the base station and the user equipment each time;
the user equipment generates a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, generates second authentication information AUTH according to the second Kipsec, and sends the second AUTH to the base station;
the user equipment receives IPsec tunnel establishment parameters sent by the base station, wherein the IPsec tunnel establishment parameters comprise a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
the user equipment verifies the first AUTH and the second AUTH.
10. The method of claim 9, further comprising:
the user equipment receives an Internet Protocol (IP) address of the base station sent by the base station;
and the user equipment sends the IP address of the wireless local area network connected with the user equipment to the base station.
11. The method of claim 9 or 10, further comprising:
the user equipment sends a first IKEv2 message to the base station, wherein the first IKEv2 message comprises second security parameters;
the user equipment receives a response message of the first IKEv2 message sent by the base station;
the user equipment encrypts a second IKEv2 message according to the second security parameter, and sends the encrypted second IKEv2 message to the base station, the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used for identifying an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used for identifying an egress/ingress port of an IPsec-protected data stream, the first security parameter includes a security algorithm, and the first Kipsec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level;
the user equipment receives a response message of the second IKEv2 message sent by the base station.
12. The method of claim 11, further comprising:
the user equipment sends at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
13. The method of claim 9 or 10, further comprising:
the user equipment sends a security algorithm list supported by the user equipment to the base station through an RRC message, so that the base station determines the level of a security algorithm of a first security parameter according to a security algorithm level list of the base station and the security algorithm list supported by the user equipment, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of the security algorithm levels;
the user equipment receives the IPsec tunnel establishment parameters sent by the base station, the IPsec tunnel establishment parameters further comprise IPsec tunnel transmission parameters and an Internet key exchange protocol header HDR, the HDR comprises an identification SPI for identifying an IPsec tunnel establishment process, the IPsec tunnel transmission parameters comprise first safety parameters and TS, the first safety parameters comprise safety algorithms for determining the levels, and the first Kipsec or the second Kipsec.
14. The method of claim 9 or 10, further comprising:
the user equipment receives a security algorithm level list of the base station, which is sent by the base station through an RRC message, wherein the security algorithm level list comprises a plurality of security algorithms and corresponding relations of security algorithm levels;
the user equipment determines the level of the security algorithm of the first security parameter according to a security algorithm list supported by the user equipment and a security algorithm level list of the base station;
the user equipment sends the IPsec tunnel establishment parameters to the base station, the IPsec tunnel establishment parameters further comprise IPsec tunnel transmission parameters and an Internet key exchange protocol header HDR, the HDR comprises an identification SPI for identifying an IPsec tunnel establishment process, the IPsec tunnel transmission parameters comprise first safety parameters and TS, the first safety parameters comprise safety algorithms for determining the levels, and the first Kipsec or the second Kipsec.
15. A base station, comprising:
a sending unit, configured to send a first anti-replay parameter to a user equipment;
a determining unit, configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent keys generated by the base station and the user equipment each time from being the same;
a generating unit, configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec;
the determining unit is further configured to determine IPsec tunnel establishment parameters, where the IPsec tunnel establishment parameters include a second AUTH, and the user equipment generates a second Kipsec according to the KeNB and the second playback resistant parameter and generates the second AUTH according to the second Kipsec;
and the verification unit is used for verifying the identity of the user equipment if the first AUTH is verified to be consistent with the second AUTH.
16. The base station of claim 15, wherein:
the sending unit is further configured to send an internet protocol IP address of the base station to the user equipment;
the base station further comprises: a receiving unit;
the receiving unit is further configured to receive an IP address of a wireless local area network connected to the user equipment, where the IP address is sent by the user equipment.
17. The base station of claim 16, wherein the IPsec tunnel establishment parameters further comprise IPsec tunnel transport parameters comprising a first security parameter and an identification TS identifying an ingress/egress port of an IPsec protected data flow, the first security parameter comprising a security algorithm, and the first Kipsec or the second Kipsec.
18. The base station of claim 17, wherein:
the receiving unit is further configured to receive a first internet key exchange protocol version 2IKEv2 message sent by the user equipment, the first IKEv2 message including second security parameters;
the sending unit is further configured to send a response message to the user equipment to the first IKEv2 message;
the receiving unit is further configured to receive a second IKEv2 message sent by the user equipment in an encrypted manner according to the second security parameter, where the second IKEv2 message includes the IPsec tunnel establishment parameter;
the sending unit is further configured to send a response message to the user equipment for the second IKEv2 message;
the IPsec tunnel establishment parameters further include an identity of the user equipment and an Internet key exchange protocol header HDR, and the HDR includes an identification SPI for identifying an IPsec tunnel establishment process; the security algorithm is a security algorithm with a security algorithm level.
19. The base station of claim 18, wherein the authentication unit is specifically configured to:
and verifying whether the identity of the user equipment is consistent with the identity of the user equipment acquired by the core network side.
20. The base station of claim 17, wherein:
the receiving unit is further configured to receive at least one radio resource control RRC message sent by the user equipment;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
21. The base station of claim 17, wherein:
the receiving unit is further configured to receive the second AUTH and a security algorithm list supported by the user equipment, where the second AUTH is sent by the user equipment through a radio resource control RRC message;
the determining unit is further configured to determine a security algorithm level of the first security parameter according to a security algorithm level list of the determining unit and a security algorithm list supported by the user equipment, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the sending unit is further configured to send the IPsec tunnel establishment parameter to the user equipment.
22. The base station of claim 17, wherein:
the sending unit is further configured to send the second AUTH and the security algorithm level list of the base station to the user equipment through an RRC message, so that the user equipment determines the security algorithm level of the first security parameter according to a security algorithm list supported by the user equipment and the security algorithm level list of the base station, where the security algorithm level list includes a plurality of security algorithms and corresponding relationships between security algorithm levels;
the receiving unit is further configured to receive the IPsec tunnel establishment parameter sent by the user equipment.
23. A user device, comprising:
a determining unit, configured to determine a second anti-replay parameter of a user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by a base station and the user equipment each time from being the same;
a generating unit, configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
a sending unit, configured to send the second AUTH to the base station;
a receiving unit, configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
and the verification unit is used for verifying the first AUTH and the second AUTH.
24. The user equipment of claim 23, wherein:
the receiving unit is further configured to receive an internet protocol IP address of the base station sent by the base station;
the sending unit is further configured to send the IP address of the wireless local area network to which the user equipment is connected to the base station.
25. The user equipment of claim 23 or 24, wherein:
the transmitting unit is further configured to transmit a first IKEv2 message to the base station, the first IKEv2 message including second security parameters;
the receiving unit is further configured to receive a response message of the first IKEv2 message sent by the base station;
the sending unit is further configured to encrypt a second IKEv2 message according to the second security parameter, and send the encrypted second IKEv2 message to the base station, where the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used to identify an egress/ingress port of an IPsec-protected data flow, the first security parameter includes a security algorithm, and the first Kipsec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level set;
the receiving unit is further configured to receive a response message of the second IKEv2 message sent by the base station.
26. The user equipment of claim 25, wherein:
the sending unit is further configured to send at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
27. The user equipment of claim 23 or 24, wherein:
the sending unit is further configured to send a security algorithm list supported by the ue to the base station through an RRC message, so that the base station determines a security algorithm level of the first security parameter according to a security algorithm level list of the base station and the security algorithm list supported by the ue, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the receiving unit is further configured to receive the IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
28. The user equipment of claim 23 or 24, wherein:
the receiving unit is further configured to receive a security algorithm level list of the base station sent by the base station through an RRC message, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the determining unit is further configured to determine a security algorithm level of the first security parameter according to a security algorithm list supported by the determining unit and a security algorithm level list of the base station;
the sending unit is further configured to send the IPsec tunnel establishment parameter to the base station, where the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and a TS, and the first security parameter includes a security algorithm for determining the level and the first Kipsec or the second Kipsec.
29. A base station, comprising: a transmitter and a processor;
the transmitter is used for transmitting the first anti-replay parameter to the user equipment;
the processor is configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
the processor is further configured to generate a first pre-shared key Kipsec according to the air interface key KeNB and the first anti-replay parameter, and generate first authentication information AUTH according to the first Kipsec;
the processor is further configured to determine IPsec tunnel establishment parameters, where the IPsec tunnel establishment parameters include a second AUTH, and the user equipment generates a second Kipsec according to the KeNB and the second playback resistance parameter, and generates the second AUTH according to the second Kipsec;
and the processor is further used for verifying the identity of the user equipment if the first AUTH is verified to be consistent with the second AUTH.
30. The base station of claim 29, wherein:
the transmitter is further configured to transmit an internet protocol, IP, address of the base station to the user equipment;
the base station further comprises: a receiver;
the receiver is further configured to receive an IP address of a wireless local area network to which the user equipment is connected, which is sent by the user equipment.
31. The base station of claim 30, wherein the IPsec tunnel establishment parameters further comprise IPsec tunnel transport parameters comprising a first security parameter and an identification TS identifying an ingress/egress port of an IPsec protected data flow, the first security parameter comprising a security algorithm, and the first Kipsec or the second Kipsec.
32. The base station of claim 31, wherein:
the receiver is further configured to receive a first internet key exchange protocol version 2IKEv2 message sent by the user equipment, the first IKEv2 message including second security parameters;
the transmitter is further configured to transmit a response message to the user equipment to the first IKEv2 message;
the receiver is further configured to receive a second IKEv2 message sent by the user equipment in accordance with the second security parameter encryption, the second IKEv2 message including the IPsec tunnel establishment parameter;
the transmitter is further configured to transmit a response message to the user equipment for the second IKEv2 message;
the IPsec tunnel establishment parameters further include an identity of the user equipment and an Internet key exchange protocol header HDR, and the HDR includes an identification SPI for identifying an IPsec tunnel establishment process; the security algorithm is a security algorithm with a security algorithm level.
33. The base station of claim 32, wherein the processor is further configured to:
and verifying whether the identity of the user equipment is consistent with the identity of the user equipment acquired by the core network side.
34. The base station of claim 31, wherein:
the receiver is further configured to receive at least one radio resource control, RRC, message sent by the user equipment;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
35. The base station of claim 31, wherein:
the receiver is further configured to receive the second AUTH and a list of security algorithms supported by the user equipment, which are sent by the user equipment through a radio resource control, RRC, message;
the processor is further configured to determine a security algorithm level of the first security parameter according to a security algorithm level list of the processor and a security algorithm list supported by the user equipment, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the sender is further configured to send the IPsec tunnel establishment parameter to the user equipment.
36. The base station of claim 31, wherein:
the transmitter is further configured to send the second AUTH and the security algorithm level list of the base station to the user equipment through an RRC message, so that the user equipment determines the security algorithm level of the first security parameter according to a security algorithm list supported by the user equipment and the security algorithm level list of the base station, where the security algorithm level list includes a plurality of security algorithms and corresponding relationships between security algorithm levels;
the receiver is further configured to receive the IPsec tunnel establishment parameter sent by the user equipment.
37. A user device, comprising: a processor, a transmitter and a receiver; wherein the content of the first and second substances,
the processor is configured to determine a second anti-replay parameter of the user equipment, where the first anti-replay parameter and the second anti-replay parameter are respectively used to prevent a key generated by the base station and the user equipment each time from being the same;
the processor is further configured to generate a second pre-shared key Kipsec according to the air interface key KeNB and the second anti-replay parameter, and generate second authentication information AUTH according to the second Kipsec;
a transmitter, configured to transmit the second AUTH to the base station;
the receiver is configured to receive IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters include a first AUTH, the base station generates a first Kipsec according to the KeNB and the first anti-replay parameter, and the base station generates the first AUTH according to the first Kipsec;
the processor is further configured to verify the first AUTH and the second AUTH.
38. The user equipment of claim 37, wherein:
the receiver is further used for receiving the internet protocol IP address of the base station sent by the base station;
the sending unit is further configured to send the IP address of the wireless local area network to which the user equipment is connected to the base station.
39. The user equipment of claim 37 or 38, wherein:
the transmitter is further configured to transmit a first IKEv2 message to the base station, the first IKEv2 message including second security parameters;
the receiver is also used for receiving a response message of the first IKEv2 message sent by the base station;
the sender is further configured to encrypt a second IKEv2 message according to the second security parameter, and send the encrypted second IKEv2 message to the base station, where the second IKEv2 message includes the IPsec tunnel establishment parameter, the IPsec tunnel establishment parameter further includes an IPsec tunnel transmission parameter, an identity of the user equipment, and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameter includes a first security parameter and an identification TS used to identify an ingress/egress port of an IPsec-protected data stream, the first security parameter includes a security algorithm, and the first Kipsec psec or the second Kipsec, and the security algorithm is a security algorithm with a security algorithm level set;
the receiver is also used for receiving a response message of the second IKEv2 message sent by the base station.
40. The user equipment of claim 39, wherein:
the transmitter is further configured to transmit at least one RRC message to the base station;
wherein the at least one RRC message encapsulates the first IKEv2 message, the response message to the first IKEv2 message, the second IKEv2 message, and the response message to the second IKEv2 message.
41. The user equipment of claim 37 or 38, wherein:
the transmitter is further configured to transmit a security algorithm list supported by the ue to the base station through an RRC message, so that the base station determines a security algorithm level of the first security parameter according to a security algorithm level list of the base station and the security algorithm list supported by the ue, where the security algorithm level list includes a plurality of security algorithms and a corresponding relationship between security algorithm levels;
the receiver is further configured to receive the IPsec tunnel establishment parameters sent by the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
42. The user equipment of claim 37 or 38, wherein:
the receiver is further configured to receive a security algorithm level list of the base station sent by the base station through an RRC message, where the security algorithm level list includes a plurality of security algorithms and security algorithm levels;
the processor is further configured to determine a security algorithm level of the first security parameter according to a security algorithm list supported by the processor and a security algorithm level list of the base station;
the sender is further configured to send the IPsec tunnel establishment parameters to the base station, where the IPsec tunnel establishment parameters further include IPsec tunnel transmission parameters and an internet key exchange protocol header HDR, the HDR includes an identification SPI used to identify an IPsec tunnel establishment procedure, the IPsec tunnel transmission parameters include first security parameters and a TS, and the first security parameters include a security algorithm for determining the level and the first Kipsec or the second Kipsec.
CN201580035366.5A 2015-10-31 2015-10-31 Internet protocol security tunnel establishment method, user equipment and base station Active CN107005410B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/093536 WO2017070973A1 (en) 2015-10-31 2015-10-31 Internet protocol security tunnel establishing method, user equipment and base station

Publications (2)

Publication Number Publication Date
CN107005410A CN107005410A (en) 2017-08-01
CN107005410B true CN107005410B (en) 2020-06-26

Family

ID=58629757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580035366.5A Active CN107005410B (en) 2015-10-31 2015-10-31 Internet protocol security tunnel establishment method, user equipment and base station

Country Status (2)

Country Link
CN (1) CN107005410B (en)
WO (1) WO2017070973A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422205B (en) * 2021-12-30 2024-03-01 广西电网有限责任公司电力科学研究院 Method for establishing network layer data tunnel of special CPU chip for electric power

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7159242B2 (en) * 2002-05-09 2007-01-02 International Business Machines Corporation Secure IPsec tunnels with a background system accessible via a gateway implementing NAT
CN101272251A (en) * 2007-03-22 2008-09-24 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101945387A (en) * 2010-09-17 2011-01-12 中兴通讯股份有限公司 Method and system of binding access layer secret key and device
CN103312668A (en) * 2012-03-09 2013-09-18 中兴通讯股份有限公司 Message transmission method and device based on link management protocol security alliance
JP5319575B2 (en) * 2010-02-23 2013-10-16 日本電信電話株式会社 Communication method and communication system
CN104184675A (en) * 2014-09-12 2014-12-03 成都卫士通信息产业股份有限公司 Load-balanced IPSec VPN device trunking system and working method of load-balanced IPSec VPN device trunking system
CN104969578A (en) * 2013-04-17 2015-10-07 华为技术有限公司 Data transmission method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013206185A1 (en) * 2013-04-09 2014-10-09 Robert Bosch Gmbh Method for detecting a manipulation of a sensor and / or sensor data of the sensor
US10389714B2 (en) * 2014-03-31 2019-08-20 Idaax Technologies Private Limited Increased communication security

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7159242B2 (en) * 2002-05-09 2007-01-02 International Business Machines Corporation Secure IPsec tunnels with a background system accessible via a gateway implementing NAT
CN101272251A (en) * 2007-03-22 2008-09-24 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
JP5319575B2 (en) * 2010-02-23 2013-10-16 日本電信電話株式会社 Communication method and communication system
CN101945387A (en) * 2010-09-17 2011-01-12 中兴通讯股份有限公司 Method and system of binding access layer secret key and device
CN103312668A (en) * 2012-03-09 2013-09-18 中兴通讯股份有限公司 Message transmission method and device based on link management protocol security alliance
CN104969578A (en) * 2013-04-17 2015-10-07 华为技术有限公司 Data transmission method, device and system
CN104184675A (en) * 2014-09-12 2014-12-03 成都卫士通信息产业股份有限公司 Load-balanced IPSec VPN device trunking system and working method of load-balanced IPSec VPN device trunking system

Also Published As

Publication number Publication date
WO2017070973A1 (en) 2017-05-04
CN107005410A (en) 2017-08-01

Similar Documents

Publication Publication Date Title
US11695742B2 (en) Security implementation method, device, and system
US10455414B2 (en) User-plane security for next generation cellular networks
KR101554396B1 (en) Method and apparatus for binding subscriber authentication and device authentication in communication systems
KR101688266B1 (en) Enhanced security for direct link communications
US8295488B2 (en) Exchange of key material
US9667413B2 (en) Encryption realization method and system
US11228908B2 (en) Data transmission method and related device and system
KR20230054421A (en) Privacy of Repeater Selection in Cellular Sliced Networks
EP3231151B1 (en) Commissioning of devices in a network
US11722890B2 (en) Methods and systems for deriving cu-up security keys for disaggregated gNB architecture
CN107005410B (en) Internet protocol security tunnel establishment method, user equipment and base station
CN114245372B (en) Authentication method, device and system
WO2016176902A1 (en) Terminal authentication method, management terminal and application terminal
KR101094057B1 (en) Method and apparatus for processing an initial signalling message in a mobile communication system
CN110169128B (en) Communication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200601

Address after: Room 208, floor 2, East distribution building, Dongsheng science and Technology Park, Zhongguancun, No.18, Xueqing Road, Haidian District, Beijing 100080

Applicant after: GRABLAN (BEIJING) SOFTWARE ENGINEERING Co.,Ltd.

Applicant after: HUAWEI TECHNOLOGIES Co.,Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Applicant before: HUAWEI TECHNOLOGIES Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200709

Address after: Room 208, floor 2, East distribution building, Dongsheng science and Technology Park, Zhongguancun, No.18, Xueqing Road, Haidian District, Beijing 100080

Patentee after: GRABLAN (BEIJING) SOFTWARE ENGINEERING Co.,Ltd.

Address before: Room 208, floor 2, East distribution building, Dongsheng science and Technology Park, Zhongguancun, No.18, Xueqing Road, Haidian District, Beijing 100080

Co-patentee before: HUAWEI TECHNOLOGIES Co.,Ltd.

Patentee before: GRABLAN (BEIJING) SOFTWARE ENGINEERING Co.,Ltd.

TR01 Transfer of patent right