CN108282775A - Dynamic Additional Verification method towards mobile ad hoc network and system - Google Patents

Dynamic Additional Verification method towards mobile ad hoc network and system Download PDF

Info

Publication number
CN108282775A
CN108282775A CN201711401758.6A CN201711401758A CN108282775A CN 108282775 A CN108282775 A CN 108282775A CN 201711401758 A CN201711401758 A CN 201711401758A CN 108282775 A CN108282775 A CN 108282775A
Authority
CN
China
Prior art keywords
sas
key
hss
access authentication
control plane
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711401758.6A
Other languages
Chinese (zh)
Other versions
CN108282775B (en
Inventor
张顺亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201711401758.6A priority Critical patent/CN108282775B/en
Publication of CN108282775A publication Critical patent/CN108282775A/en
Application granted granted Critical
Publication of CN108282775B publication Critical patent/CN108282775B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The step of present invention provides a kind of dynamic Additional Verification method and system towards mobile ad hoc network, this method include:UE judges whether to need to start access authentication, if desired, then initiating access authentication request to SAS;Judge whether to need to start the access authentication between SAS and UE alternatively, S/P GW receive the service request triggering that UE is sent out, if desired, then initiating access authentication request to SAS;After SAS receives access authentication request, it is determined whether start access authentication, if started, the IMSI information for sending User ID to HSS and being provided by S/P GW;After HSS is received, initial key is generated;SAS generates key according to initial key, protects its control plane interactive information between UE;UE generates initial key, generates key according to the initial key, protects its control plane interactive information between SAS;After UE receives the authentication command of SAS, the legitimacy of the special core net of certification, and notify SAS;The legitimacy of SAS certifications UE, and notify UE.

Description

Dynamic Additional Verification method towards mobile ad hoc network and system
Technical field
The present invention relates to Network Communicate Security technical fields, more particularly to user and equipment and specially in the mobile communication network With the inter-authentication method and system between network.
Background technology
Mobile communications network service has been widely used for daily life due to its mobility and convenience.With The large scale deployment of 4G mobile communications networks, more and more people begin to use 4G network services.Enjoying mobile communications network band Simultaneously, pseudo-base station, false network also bring new safety problem to the facility come to mobile application.Meanwhile mobile communications network also face Face to come from and more carrys out intelligent hand-held terminal equipment, it is more and more diversified, bear the illegal access that quantity has big internet-of-things terminal And attack.
During mobile ad hoc network user uses network service, due to the mobility and private network operator of user The limitation of the network coverage, in some cases, such as roaming scence, user may need through Public Mobile Network to roam Mode accesses special mobile core net.The public Mobile Access Network in roaming place is endless for private network user and special core net It is complete believable.In roaming situations, it needs to be authenticated when user accesses special core net, default identifying procedure is by unrestrained Trip ground core net MME executes and determines authentication result, then may have the wind of man-in-the-middle attack for special core net Danger.In addition, when private network user is in non-roaming state, at this point, user be directly accessed by believable overnet it is special Core net, then how the problem of above-mentioned non-fully credible MME acts as an intermediary for different scenes just without taking flexibly Efficient safety prevention measure is be worthy of consideration the problem of.
Disabled user accesses 3G and 4G networks in order to prevent, devises the authentication mechanism of AKA, utilizes network side HSS and end The shared security documents information and AKA algorithms at end allow network to authenticate the legitimacy of user, while subscriber terminal equipment The legitimacy of network can be authenticated.3GPP designs mobile network's security authentication mechanism hypothesis access net at present and core net institute is active Can all be safe and reliable.Existing 3G and 4G mobile networks assume that roaming place network and belonging area network are mutual in safety Believable, i.e., belonging area network always trusts roaming place network, therefore does not just account for during above-mentioned roaming place core net MME becomes Between people security risk.4G networks are completely believable it is assumed that also based on roaming place network to roaming user authentication method at present Not being directed to roaming place core net function becomes go-between's way to solve the problem.Existing roaming user authentication measure can not solve The new problem that certainly the new usage scenario of mobile ad hoc network faces.
Invention content
It is an object of the invention to propose a kind of dynamic Additional Verification method and system towards mobile ad hoc network, i.e., specially With mobile communications network and private network user's inter-authentication method, may be implemented under untrusted 3GPP access net environment or roaming environments Being securely and reliably mutually authenticated between lower private network user and dedicated network, to avoid private network user and equipment from accessing pseudo- private network Network accesses dedicated network prevented also from disabled user and equipment.
In order to achieve the above objectives, the technical solution adopted by the present invention is as follows:
A kind of dynamic Additional Verification method towards mobile ad hoc network, step include:
The user for having carried out two-way authentication with the mobile management nodes MME and server HSS positioned at special core net is whole End UE judges whether that needing to start dynamic adds access authentication, if desired, then the UE is to the secure accessing positioned at special core net Server S AS initiates access authentication request;Alternatively, the gateway S/P-GW of special core net receives the service request that the UE is sent out Triggering judges whether that the dynamic for needing to start between SAS and UE adds access authentication, if desired, then the S/P-GW is initiated to SAS Access authentication is asked;
After SAS receives the access authentication request, it is determined whether start access authentication, if started, SAS is sent out to HSS The user identity IMSI information sent User ID and provided by S/P-GW;
After HSS receives the User ID and IMSI information, the initial key that control plane safeguard protection needs is generated;
SAS generates the key that control plane safeguard protection needs according to the initial key, protects its control between UE Face interactive information;
UE generates the initial key that control plane safeguard protection needs, and control plane safeguard protection need are generated according to the initial key The key wanted protects its control plane interactive information between SAS;
After UE receives the authentication command of SAS, the legitimacy of the special core net of certification, and notify SAS;
The legitimacy of SAS certifications UE, and the authentication result is notified into UE.
Further, according to the current location of the UE, whether roam, access network security confidence level, access network class Whether the business that type, access network ID, UE are accessed is that the security strategy of private network related service and pre-configuration judges whether to start Dynamic adds access authentication.
Further, the security strategy is for judging that whether needing to start access between the UE and special core net recognizes Card, the policy definition need to start the condition of Additional Verification.Such as:If the UE is by untrusted 3GPP or in roaming shape Lead to public LTE nets (PLMN ID=A) under state and access special core net, then needs to start access authentication;If in non-roaming state Net (PLMN ID=B) is accessed by special LTE down and accesses special core net, then need not start access authentication.
Further, the access authentication request includes the current locations UE, hardware ID, access network type, access net ID And PLMN ID, IP address information.
Further, security documents information (including CK, IK and the sharing learning that the UE and HSS is shared according to UE and HSS Factor initial key) is generated.
Further, the generating algorithm of the initial key is (USIM is set on UE in figure) as shown in Figure 2, specially: With the CK, IK and sharing learning Factor, service network identification SN ID and sequence of the UE and HSS security documents information shared Number SQN exclusive or AK is input, passes through standard key and calculates function KDF operations and generates initial key Ks_init.
Further, security documents information (including the sharing learning that the UE and SAS is shared also according to UE and SAS Factor and shared time stamp T imestamp) and the shared security documents information of UE and HSS generate key;The shared packet Include the static information being pre-configured or transmitted by shared third party device.
Further, the key includes Confidentiality protection key and tegrity protection key;
The generating algorithm of the Confidentiality protection key is (USIM is set on UE in figure) as shown in Figure 3, specially:With first It is shared beginning key Ks_init, UE and HSS shared security documents information, UE and SAS security documents information, Alg-ID, new fixed The Confidentiality protection algorithm types identifier SA-init-enc-alg of the justice and algorithm mark 256-EEA4 AES newly defined Based algorithm (AES-CTR) generate Confidentiality protection key as input, through key calculation function KDF operations Kinit_enc;
The generating algorithm of the tegrity protection key is as shown in figure 3, be specially:With initial key Ks_init, UE and Shared security documents information, UE and SAS shared HSS security documents information, Alg-ID, the protection algorithm integrallty newly defined The type identifier SA-init-int-alg and algorithm mark 256-EIA4 AES based algorithm newly defined (AES-CMAC) as input, tegrity protection key Kinit_int is generated through key calculation function KDF operations;
It is specific as follows that the key calculates framework:
Algorithm type distinguishers
Expand definition:
SA-init-enc-alg=0x09,
SA-init-int-alg=0x10;
Alg-ID;
Expand definition:
" 0100 "=256-EEA4 AES based algorithm (AES-CTR),
" 0110 "=256-EIA4 AES based algorithm (AES-CMAC);
Confidentiality protection key:
Kinit_enc
=KDF (Factor, TIME, SA-init-enc-alg, 256-EEA4 AES based algorithm (AES- CTR),Ks_init);
Tegrity protection key:
Kinit_int
=KDF (Factor, TIME, SA-init-int-alg, 256-EIA4 AES based algorithm (AES- CMAC),Ks_init)。
Further, the authentication command includes the random parameter RAND and authentication token AUTN information that HSS is generated.
Further, the UE is according to the shared security documents information of the initial key, UE and SAS of its generation and AKA Algorithm carrys out the legitimacy of the special core net of certification.
Further, the SAS is generated according to HSS initial key, UE and SAS shared security documents information and AKA algorithms carry out the legitimacy of certification UE.
A kind of dynamic Additional Verification system towards mobile ad hoc network, including:
UE, for send access authentication request or service request, generate control plane safeguard protection need initial key and Key protects its control plane interactive information between SAS, and the legitimacy of the special core net of certification;
SAS is located at special core net, is used to determine whether that starting dynamic adds access authentication, generates control plane and protects safely The key needed is protected, its control plane interactive information between UE, and the legitimacy of certification UE are protected;
HSS is located at special core net, the initial key for generating control plane safeguard protection needs;
S/P-GW is located at special core net, for providing user identity IMSI information to SAS.
Further, if the UE sends access authentication request, first judge whether to need to start before transmitting dynamic State adds access authentication;If the UE sends service request, which triggers the S/P-GW and judges whether to need The dynamic started between SAS and UE adds access authentication.
The present invention proposes safe and reliable between a kind of Private Mobile Communication Network network user and Private Mobile Communication Network network The method being mutually authenticated.In order to avoid Creditability Problems caused by common core network control surface function MME under roaming condition, special Core net introduces SAS.This method generates calculation by using UE and special core net shared security documents information and according to key The key that method generates protects the interface message between UE to SAS.SAS according to the current location of UE, access network security is credible The information such as degree, user roaming state decide whether to add access authentication into Mobile state to the UE.It is authenticated if necessary, SAS The authentication data generated according to the security documents information that UE and HSS shares is obtained with HSS interactions, and uses the authentication data and UE Carry out access authentication.According to authentication result, determine whether the UE can access dedicated network.
In addition, the present invention, which passes through, enhances terminal function so that UE is utilized and HSS and SAS is shared security documents information and Initial key generating algorithm generates key, to protect the interface between UE and SAS.In addition it needs to enhance core net HSS functions, HSS needs the security documents information and initial key generating algorithm that utilize and UE is shared to generate initial key and transmits the key To SAS.UE or S/P-GW is determined according to access network ID, the network trusted degree of access, roaming state and the security strategy of pre-configuration Whether trigger SAS and starts additional independent authentication.
Fig. 1 show the calculation system of the control plane safeguard protection key on existing LTE keys calculation system basis. The relevant key calculation unit of USIM/AUC, UE/HSS, UE/MME and UE/ENB is divided into current current mechanism in figure.In order to solve Control plane safety protection problem between UE and newly-increased secure access server SAS, on existing LTE keys calculation system basis It is extended, introduces UE/SAS association keys calculation mechanism.The parameter that UE and HSS respectively uses IK, CK and newly introduces, such as Sharing learning Factor etc. generates initial key Ks_init by KDF functional calculus.HSS passes to the initial key of generation SAS.Then, UE and SAS respectively uses initial key Ks_init and other new defined parameters, including sharing learning Factor, time stamp T imestamp etc. generate Confidentiality protection key Kinit_enc and integrality using KDF functional calculus Key Kinit_int is protected, for protecting Signalling exchange safety between UE and secure access server SAS.
Description of the drawings
Fig. 1 is the key calculation system figure that control plane safeguard protection needs.
Fig. 2 is the initial key calculation schematic diagram that control plane safeguard protection needs.
Fig. 3 is the key calculation schematic diagram that control plane safeguard protection needs.
Fig. 4 is a kind of dynamic Additional Verification system construction drawing towards mobile ad hoc network of embodiment one.
Fig. 5 is a kind of dynamic Additional Verification method flow chart towards mobile ad hoc network of embodiment one.
Fig. 6 is a kind of dynamic Additional Verification system construction drawing towards mobile ad hoc network of embodiment two.
Fig. 7 is a kind of dynamic Additional Verification method flow chart towards mobile ad hoc network of embodiment two.
Specific implementation mode
Features described above and advantage to enable the present invention are clearer and more comprehensible, special embodiment below, and institute's attached drawing is coordinated to make Detailed description are as follows.
Based on the same technical concept of the present invention, it is contemplated that the Different Effects of existing terminal and network, the present invention proposes Two kinds of embodiments.
Embodiment one
The present embodiment is to enhance existing UE functions, and system architecture is as shown in Figure 4.UE according to roaming state, access network type, Access net confidence level etc., which judges whether to trigger SAS, to be started dynamic and adds access authentication, if it is desired, then report UE relevant informations and Net relevant information is accessed to SAS.In addition, introducing SAS in special core net, the current locations SAS root UE, access network security is credible Degree, access network type, access net ID, the PLMN ID of access net and the security strategy of pre-configuration determine whether to start to the UE Carry out access authentication.If SAS determines certification necessity, then UE is utilized and network side HSS is shared security documents information and initial close Key generating algorithm, generates the initial key of control plane safeguard protection needs between UE and SAS, and starts the letter between UE to SAS Enable message safeguard protection.SAS and HSS interactions simultaneously obtain HSS according to the authentication data of shared security documents information generation and The key that control plane safeguard protection needs.HSS needs the security documents information and initial key generating algorithm that utilize and UE is shared, It generates the initial key that control plane safeguard protection needs and the initial key and authentication data is passed into SAS.SAS is according to initial Key production key protects the interface message of SAS to UE according to the key and the security strategy of pre-configuration.Meanwhile SAS is used The authentication data that HSS is provided carries out access authentication by the interface and UE of safeguard protection according to AKA algorithms, and according to authentication result Determine whether UE can access dedicated network.UE can determine whether to access the network according to authentication result.
The method of the present embodiment is as shown in figure 5, key step is as follows:
(1) UE sends Attach Request message to the MME of core net function, and MME and HSS interactions obtain user authentication data, And the two-way authentication completed between user and network is interacted with UE using the authentication data.
(2) UE is according to its current location, access network security confidence level, access network type, access network ID, roaming shape State and the business (whether being private network related service) to be accessed judge whether that triggering dynamic adds access authentication.
(3) if necessary to triggering access authentication, UE initiates access authentication request message to SAS, which includes:UE is current The information such as position, hardware ID, access network type, access net ID and PLMN ID, IP address.
(4) SAS according to the current locations UE, roaming state, whether network credible for access, current location whether the letters such as safety Breath, and startup access authentication is determined whether according to the security strategy of pre-configuration.
Security strategy is for example:UE accesses net (PLMN ID=B) under non-roaming state, by special LTE and accesses specific core When heart net, access authentication need not be started;Under roaming state, when leading to public LTE nets (PLMN ID=A) access, need to start Access authentication.
(5) SAS sends message to S/P-GW, asks user identity IMSI information.
(6) S/P-GW finds corresponding IMSI information, and IMSI information is told to SAS by response message.
(7) if necessary to start access authentication, SAS sends message request user authentication data to HSS, which includes to use Family ID and IMSI information.
(8) HSS according to and the shared security documents information of UE generate Ciphering Key, generated according to initial key generating algorithm The initial key that control plane safeguard protection needs.
(9) HSS notifies the Ciphering Key and initial key of generation to SAS by response message.
(10) SAS replys UE response messages, and whether which includes access inspection result, i.e., need to start access authentication.
(11) if necessary to start access authentication, UE is generated with the security documents information shared with HSS using initial key Algorithm generates the initial key that control plane safeguard protection needs.
(12) UE is according to the safety initial key and HSS of its generation shared security documents information and shared with SAS Authority information generates the key that control plane safeguard protection needs as input, with key schedule, is protected using algorithm is pre-configured Protect the AKA authentication informations of the control plane interaction of SAS and UE.
(13) SAS is using the security documents information of initial key and UE shared security documents information, UE and HSS as defeated Enter, the key that control plane protection needs is generated according to key schedule.Using pre-configuration security strategy protection SAS and UE it Between control plane interaction AKA authentication informations.
(14) SAS sends Additional Verification command messages to UE, which includes that the random parameter RAND that HSS is generated and certification enable Board AUTN information.
(15) legitimacy of UE foundations and the shared security documents information and the special core net of AKA algorithm certifications of HSS.
(16) after the special core Netcom of certification, UE sends authentication request message, which believes comprising authority safe to use The authentication response result RES that breath and AKA algorithms generate.
(17) after the authentication response data for receiving UE, the legitimacy of SAS certifications UE.
(18) SAS replys UE Additional Verification response messages, which includes authentication result.
Embodiment two
The present embodiment introduces the secure access server SAS of new network function, is located at special core net, to avoid to existing The influence of the MME of network function, system architecture are as shown in Figure 6.Special core network gateway S/P-GW receives user's access service and asks After asking, according to access network ID, access network type, PLMN ID, the network trusted degree of access, roaming state (whether roaming), prewired Type of service/title that the security strategy set and user access decides whether that triggering dynamic adds access authentication.If necessary Triggering, S/P-GW report the current locations UE by the interface newly defined between SAS, access network type, access net confidence level, overflow The information such as free state.SAS is according to the current locations UE, access network security confidence level, access network type, access net ID, access The PLMN ID of net and the security strategy of pre-configuration, it is determined whether start and access authentication is carried out to the UE.If necessary, start UE Verification process between special core net.
The method flow of the present embodiment is as shown in fig. 7, key step is as follows:
(1) UE sends Attach Request message to core net function MME.MME and HSS interactions obtain user authentication data, make The two-way authentication between user and network is completed with the authentication data and UE interactions.
(2) UE is first received by S/P-GW to application server AF initiating business requests, such as HTTP request message.
(3) S/P-GW according to access network ID, access network type, PLMN ID, access it is network trusted degree, roaming state and Type of service/title that the security strategy of pre-configuration and user access decides whether that triggering dynamic adds access authentication.
(4) if necessary to triggering access authentication, S/P-GW sends access authentication request to SAS by the interface newly defined and disappears Breath, the message include following relevant information:The current locations UE, access network type, access network PLMN titles, access net is credible Degree, roaming state, user identity IMSI information etc..
(5) SAS is reported according to S/P-GW current locations UE, roaming state, whether access network is credible, the current locations UE Whether safety etc. information, according to the security strategy of pre-configuration determine whether start access authentication.
(6) if necessary to start access authentication, SAS sends message request user authentication data to HSS, which includes to use Family ID and IMSI information.
(7) HSS according to and the shared security documents information of UE generate Ciphering Key, generated according to initial key generating algorithm The initial key that control plane safeguard protection needs.
(8) HSS notifies the Ciphering Key and initial key of generation to SAS by response message.
(9) SAS replys UE response messages, and whether which includes access inspection result, i.e., need to start access authentication.
(10) if necessary to start access authentication, UE is generated with the security documents information shared with HSS using initial key Algorithm generates the initial key that control plane safeguard protection needs.
(11) UE is according to the safety initial key and HSS of its generation shared security documents information and shared with SAS Authority information generates the key that control plane safeguard protection needs as input, with key schedule, is protected using algorithm is pre-configured Protect the AKA authentication informations of the control plane interaction of SAS and UE.
(12) SAS is using the security documents information of initial key and UE shared security documents information, UE and HSS as defeated Enter, the key that control plane protection needs is generated according to key schedule.Using pre-configuration security strategy protection SAS and UE it Between control plane interaction AKA authentication informations.
(13) SAS sends Additional Verification command messages to UE, which includes that the random parameter RAND that HSS is generated and certification enable Board AUTN information.
(14) legitimacy of UE foundations and the shared security documents information and AKA algorithm certification dedicated networks of HSS.
(15) after the special core Netcom of certification, UE sends authentication request message, which believes comprising authority safe to use The authentication response result RES that breath and AKA algorithms generate.
(16) after the authentication response data for receiving UE, the legitimacy of SAS certifications UE.
(17) SAS replys UE Additional Verification response messages, which includes authentication result;Authentication notification message is sent to S/ P-GW, the message include user authentication result.
(18) P-GW replys SAS response messages.
(19) according to authentication result, S/P-GW decides whether to allow the service request of the UE to pass through.
(20) if certification passes through, the IP data packets (business request information) of the user are routed to positioned at private network by S/P-GW Service server AF later.
(21) UE and AF carries out service interaction.
The above embodiments are merely illustrative of the technical solutions of the present invention rather than is limited, the ordinary skill of this field Personnel can be modified or replaced equivalently technical scheme of the present invention, without departing from the spirit and scope of the present invention, this The protection domain of invention should be subject to described in claims.

Claims (10)

1. a kind of dynamic Additional Verification method towards mobile ad hoc network, step include:
The UE for having carried out two-way authentication with the MME and HSS positioned at special core net judges whether to need to start dynamically additional connect Enter certification, if desired, then the UE initiates access authentication request to the SAS positioned at special core net;Alternatively, the S/ of special core net P-GW receives the service request triggering that the UE is sent out and judges whether to need to start that the dynamic between the SAS and the UE is additional Access authentication, if desired, then the S/P-GW initiates access authentication request to the SAS;
After the SAS receives access authentication request, it is determined whether start access authentication, if started, the SAS is to institute State the IMSI information that HSS sends User ID and provided by the S/P-GW;
After the HSS receives the User ID and the IMSI information, the initial key that control plane safeguard protection needs is generated;
The SAS generates the key that control plane safeguard protection needs according to the initial key, protects it between the UE Control plane interactive information;
The UE generates the initial key that control plane safeguard protection needs, and control plane safeguard protection need are generated according to the initial key The key wanted protects its control plane interactive information between the SAS;
After the UE receives the authentication command of the SAS, the legitimacy of the special core net of certification, and notify the SAS;
The legitimacy of UE described in the SAS certifications, and notify the UE.
2. according to the method described in claim 1, it is characterized in that, according to the current location of the UE, whether roaming, accessing Whether business is private network business, access network security confidence level, access network type, access network ID and the safety of pre-configuration Strategy judges whether to start the access authentication.
3. according to the method described in claim 1, it is characterized in that, the access authentication request include the current locations UE, Hardware ID, access network type, access net ID and PLMN ID, IP address information.
4. according to the method described in claim 1, it is characterized in that, the UE and the HSS between share safety with It is believed that breath generates initial key.
5. according to the method described in claim 4, it is characterized in that, the generating algorithm of the initial key is:With the UE and The CK, IK and sharing learning Factor of security documents the information shared HSS, service network identification SN ID and sequence number SQN exclusive or AK is input, and calculating function KDF operations by standard key generates the initial key.
6. according to the method described in claim 1, it is characterized in that, the safety that the UE and the SAS are shared also according between The security documents information that authority information and the UE and the HSS share generates key.
7. according to the method described in claim 6, it is characterized in that, the key includes Confidentiality protection key and integrality guarantor Protect key;
The generating algorithm of the Confidentiality protection key is:The security documents letter shared with initial key, the UE and the HSS It ceases, the security documents information that the UE and the SAS are shared, Alg-ID, the Confidentiality protection algorithm types identifier newly defined The SA-init-enc-alg and algorithm mark 256-EEA4AES based algorithm (AES-CTR) newly defined is used as defeated Enter, the Confidentiality protection key is generated through key calculation function KDF operations;
The generating algorithm of the tegrity protection key is:The security documents letter shared with initial key, the UE and the HSS It ceases, the security documents information that the UE and the SAS are shared, Alg-ID, the protection algorithm integrallty type identifier newly defined SA-init-int-alg and algorithm mark 256-EIA4AES based algorithm (AES-CMAC) conduct newly defined Input generates the tegrity protection key through key calculation function KDF operations.
8. according to the method described in claim 1, it is characterized in that, the UE according to its generation initial key, itself and it is described Security documents information and AKA algorithms shared SAS carrys out the legitimacy of the special core net of certification;The SAS gives birth to according to the HSS At initial key, the shared security documents information and AKA algorithms of itself and the UE carry out the legitimacy of UE described in certification.
9. a kind of dynamic Additional Verification system towards mobile ad hoc network, including:
UE, for send access authentication request or service request, generate control plane safeguard protection need initial key and key, Protect its control plane interactive information between SAS, and the legitimacy of the special core net of certification;
SAS is located at special core net, is used to determine whether that starting dynamic adds access authentication, generating control plane safeguard protection needs The key wanted protects its control plane interactive information between the UE, and the legitimacy of UE described in certification;
HSS is located at special core net, the initial key for generating control plane safeguard protection needs;
S/P-GW is located at special core net, for providing IMSI information to the SAS.
10. system according to claim 9, which is characterized in that if the UE sends access authentication request, sending First judge whether that needing to start dynamic adds access authentication before;If the UE sends service request, which touches It sends out S/P-GW described and judges whether that the dynamic for needing to start between SAS and UE adds access authentication.
CN201711401758.6A 2017-12-22 2017-12-22 Dynamic additional authentication method and system for mobile private network Expired - Fee Related CN108282775B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711401758.6A CN108282775B (en) 2017-12-22 2017-12-22 Dynamic additional authentication method and system for mobile private network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711401758.6A CN108282775B (en) 2017-12-22 2017-12-22 Dynamic additional authentication method and system for mobile private network

Publications (2)

Publication Number Publication Date
CN108282775A true CN108282775A (en) 2018-07-13
CN108282775B CN108282775B (en) 2021-01-01

Family

ID=62801979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711401758.6A Expired - Fee Related CN108282775B (en) 2017-12-22 2017-12-22 Dynamic additional authentication method and system for mobile private network

Country Status (1)

Country Link
CN (1) CN108282775B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753346A (en) * 2019-10-30 2020-02-04 北京微智信业科技有限公司 Private mobile communication network key generation method, private mobile communication network key generation device and controller

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472263A (en) * 2008-05-04 2009-07-01 中兴通讯股份有限公司 Method for deciding network connection mode
US9060263B1 (en) * 2011-09-21 2015-06-16 Cellco Partnership Inbound LTE roaming footprint control
WO2017077441A1 (en) * 2015-11-03 2017-05-11 Telefonaktiebolaget Lm Ericsson (Publ) Selection of gateway node in a communication system
EP2276281A4 (en) * 2008-05-05 2017-07-12 China Academy of Telecommunications Technology Method, system and device for obtaining a trust type of a non-3gpp access system
WO2017143521A1 (en) * 2016-02-23 2017-08-31 华为技术有限公司 Secure communication method and core network node

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472263A (en) * 2008-05-04 2009-07-01 中兴通讯股份有限公司 Method for deciding network connection mode
EP2276281A4 (en) * 2008-05-05 2017-07-12 China Academy of Telecommunications Technology Method, system and device for obtaining a trust type of a non-3gpp access system
US9060263B1 (en) * 2011-09-21 2015-06-16 Cellco Partnership Inbound LTE roaming footprint control
WO2017077441A1 (en) * 2015-11-03 2017-05-11 Telefonaktiebolaget Lm Ericsson (Publ) Selection of gateway node in a communication system
WO2017143521A1 (en) * 2016-02-23 2017-08-31 华为技术有限公司 Secure communication method and core network node

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753346A (en) * 2019-10-30 2020-02-04 北京微智信业科技有限公司 Private mobile communication network key generation method, private mobile communication network key generation device and controller
CN110753346B (en) * 2019-10-30 2021-02-19 北京微智信业科技有限公司 Private mobile communication network key generation method, private mobile communication network key generation device and controller

Also Published As

Publication number Publication date
CN108282775B (en) 2021-01-01

Similar Documents

Publication Publication Date Title
Arapinis et al. New privacy issues in mobile telephony: fix and verification
KR101170191B1 (en) Improved subscriber authentication for unlicensed mobile access signaling
Golde et al. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
CN102415119B (en) Managing undesired service requests in a network
WO2020010515A1 (en) Identity-based message integrity protection and verification for wireless communication
US12089041B2 (en) Method for authentication a secure element cooperating with a mobile equipment within a terminal in a telecommunication network
CN103430582B (en) Prevention of eavesdropping type of attack in hybrid communication system
US10582378B2 (en) Message protection method, user equipment, and core network device
CN108235300B (en) Method and system for protecting user data security of mobile communication network
Koien Entity authentication and personal privacy in future cellular systems
CN108243416A (en) User equipment authority identification method, mobile management entity and user equipment
CN104244210A (en) Emergency communication method, mobile terminal, authentication server and wireless access point
CN108282775A (en) Dynamic Additional Verification method towards mobile ad hoc network and system
Escudero-Andreu et al. Analysis and design of security for next generation 4G cellular networks
Abdeljebbar et al. Fast authentication during handover in 4G LTE/SAE networks
Ouaissa et al. Group access authentication of machine to machine communications in LTE networks
JP5670926B2 (en) Wireless LAN access point terminal access control system and authorization server device
Bodhe et al. Wireless LAN security attacks and CCM protocol with some best practices in deployment of services
Singh et al. Security analysis of lte/sae networks with the possibilities of tampering e-utran on ns3
KR100968522B1 (en) Mobile Authentication Method for Strengthening the Mutual Authentication and Handover Security
KR20140055675A (en) Geography-based pre-authentication for wlan data offloading in umts-wlan networks
CN117692902B (en) Intelligent home interaction method and system based on embedded home gateway
Borgaonkar Security analysis of femtocell-enabled cellular network architecture
Odarchenko et al. RESEARCH OF CYBER SECURITY MECHANISMS IN MODERN 5G CELLULAR NETWORKS
Kim et al. Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210101