CN116569516A - Method for preventing leakage of authentication serial number of mobile terminal - Google Patents
Method for preventing leakage of authentication serial number of mobile terminal Download PDFInfo
- Publication number
- CN116569516A CN116569516A CN202080104240.XA CN202080104240A CN116569516A CN 116569516 A CN116569516 A CN 116569516A CN 202080104240 A CN202080104240 A CN 202080104240A CN 116569516 A CN116569516 A CN 116569516A
- Authority
- CN
- China
- Prior art keywords
- authentication
- network
- network element
- sequence number
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 104
- 238000004891 communication Methods 0.000 claims abstract description 53
- 230000004044 response Effects 0.000 claims description 38
- DJGAAPFSPWAYTJ-UHFFFAOYSA-M metamizole sodium Chemical compound [Na+].O=C1C(N(CS([O-])(=O)=O)C)=C(C)N(C)N1C1=CC=CC=C1 DJGAAPFSPWAYTJ-UHFFFAOYSA-M 0.000 claims description 35
- 239000013598 vector Substances 0.000 claims description 29
- 238000012545 processing Methods 0.000 claims description 10
- 238000013523 data management Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 3
- 239000002131 composite material Substances 0.000 claims 8
- 230000008569 process Effects 0.000 abstract description 51
- 230000007246 mechanism Effects 0.000 abstract description 3
- 230000001360 synchronised effect Effects 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 34
- 238000007726 management method Methods 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 10
- 238000004846 x-ray emission Methods 0.000 description 9
- 230000008901 benefit Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 7
- 230000015654 memory Effects 0.000 description 5
- 230000011664 signaling Effects 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本公开总体上涉及无线终端和核心网络之间的注册和认证过程,具体地,涉及在注册和认证过程期间,当经由无线通信接口发送无线终端的认证序列号时,保护无线终端的认证序列号不被泄漏。具体地,递增的认证序列号由无线终端维护,并与网络侧维护的另一认证序列号同步使用(在正常网络操作下),以跟踪终端装置的注册和认证活动,并帮助检测经由无线通信接口对无线终端的某些类型的恶意攻击(例如,注册重放)。通过与无线终端的永久用户标识的隐藏机制相类似的隐藏机制将终端侧序列号发送到网络,以减少其暴露到无线接口,并且通过在成功认证或重新认证时跟踪和更新终端侧和网络侧的序列号,得以将无线终端的认证序列号与网络侧认证序列号同步。
The present disclosure relates generally to the registration and authentication process between a wireless terminal and a core network, and in particular, to protecting the authentication serial number of a wireless terminal when it is transmitted via a wireless communication interface during the registration and authentication process not to be leaked. Specifically, an incremented authentication serial number is maintained by the wireless terminal and used synchronously with another authentication serial number maintained by the network side (under normal network operation) to track the registration and authentication activities of the terminal device, and to help detect Interface certain types of malicious attacks on wireless endpoints (for example, registration replay). The terminal-side serial number is sent to the network through a concealment mechanism similar to that of the permanent user identity of the wireless terminal to reduce its exposure to the wireless interface, and by tracking and updating the terminal-side and network-side serial numbers upon successful authentication or re-authentication The serial number of the wireless terminal can be synchronized with the authentication serial number of the network side.
Description
技术领域technical field
本公开总体上涉及移动终端和核心网络之间的注册和认证过程,具体地,涉及防止认证序列号泄露的技术。The present disclosure generally relates to a registration and authentication process between a mobile terminal and a core network, and in particular, relates to a technique for preventing leakage of an authentication serial number.
背景技术Background technique
无线终端装置可以经由服务网络与其归属核心网络通信。在接入归属核心网络之前,无线终端可以发起注册和认证过程。无线终端、服务网络和归属核心网络彼此交互,以将无线终端认证到网络,并将网络认证到无线终端。在成功注册和认证后,生成接入凭证,以实现无线终端和网络之间的进一步通信。UE和网络之间经由无线接口传输的通信消息(无论是加密的还是未加密的)都可能受到黑客的攻击。黑客可能经由这种攻击获得关于无线终端的机密信息。A wireless end device can communicate with its home core network via the serving network. Before accessing the home core network, the wireless terminal can initiate a registration and authentication process. The wireless terminal, serving network, and home core network interact with each other to authenticate the wireless terminal to the network and to authenticate the network to the wireless terminal. After successful registration and authentication, access credentials are generated to enable further communication between the wireless terminal and the network. Communication messages (whether encrypted or unencrypted) transmitted between the UE and the network via the wireless interface can be attacked by hackers. A hacker may obtain confidential information about a wireless terminal via such an attack.
发明内容Contents of the invention
本公开总体上涉及无线终端和核心网络之间的注册和认证过程,具体地,涉及在注册和认证过程期间,当经由无线通信接口发送无线终端的认证序列号时,保护无线终端的认证序列号不被泄漏。具体地,递增的认证序列号由无线终端维护,并与网络侧维护的另一认证序列号同步使用(在正常网络操作下),以跟踪终端装置的注册和认证活动,并帮助检测经由无线通信接口对无线终端的某些类型的恶意攻击(例如,注册重放)。通过与无线终端的永久用户标识的隐藏机制相类似的隐藏机制将终端侧序列号发送到网络,以减少其暴露到无线接口,并且通过在成功认证或重新认证时跟踪和更新终端侧和网络侧的序列号,得以将无线终端的认证序列号与网络侧认证序列号同步。The present disclosure relates generally to the registration and authentication process between a wireless terminal and a core network, and in particular, to protecting the authentication serial number of a wireless terminal when it is transmitted via a wireless communication interface during the registration and authentication process not to be leaked. Specifically, an incremented authentication serial number is maintained by the wireless terminal and used synchronously with another authentication serial number maintained by the network side (under normal network operation) to track the registration and authentication activities of the terminal device, and to help detect Interface certain types of malicious attacks on wireless endpoints (for example, registration replay). The terminal-side serial number is sent to the network by a concealment mechanism similar to that of the permanent user identity of the wireless terminal to reduce its exposure to the wireless interface, and by tracking and updating the terminal-side and network-side serial numbers upon successful authentication or re-authentication The serial number of the wireless terminal can be synchronized with the authentication serial number of the network side.
在一些示例性实现方式中,公开了一种由通信网络的第一网元执行的用于认证第二网元以接入所述通信网络的方法。该方法可以包括:接收从所述第二网元发起的认证消息;去隐藏所述认证消息,以获得由所述第一网元维护的去隐藏序列号以及所述第二网元的去隐藏用户标识;将所述去隐藏序列号存储在所述第一网元中;生成新的序列号,并且基于所述新的序列号生成认证向量;向所述第二网元发送所述认证向量;以及当从所述第二网元接收到对所述认证向量的认证响应消息时,用所述新的序列号替换所述第一网元中存储的所述去隐藏序列号。In some example implementations, a method performed by a first network element of a communication network for authenticating a second network element to access the communication network is disclosed. The method may include: receiving an authentication message initiated from the second network element; de-concealing the authentication message to obtain the de-concealment sequence number maintained by the first network element and the de-concealment of the second network element User identification; storing the de-hidden serial number in the first network element; generating a new serial number, and generating an authentication vector based on the new serial number; sending the authentication vector to the second network element ; and when receiving an authentication response message for the authentication vector from the second network element, replacing the de-hidden sequence number stored in the first network element with the new sequence number.
在一些其他实现方式中,公开了另一种由通信网络的第一网元执行的用于认证第二网元以接入所述通信网络的方法。该方法可以包括:接收从所述第二网元发起的认证消息,其中,所述认证消息包含所述第二网元的去隐藏用户标识;生成新的序列号,并且基于所述新的序列号生成认证向量;向所述第二网元发送所述认证向量;以及当从所述第二网元接收到对所述认证向量的认证响应消息时,用新的序列号替换先前存储的与第一网元相关联的序列号。In some other implementations, another method performed by a first network element of a communication network for authenticating a second network element to access the communication network is disclosed. The method may include: receiving an authentication message initiated from the second network element, wherein the authentication message includes the de-hidden user identity of the second network element; generating a new serial number, and based on the new serial number Generate an authentication vector with a serial number; send the authentication vector to the second network element; and when receiving an authentication response message to the authentication vector from the second network element, replace the previously stored serial number with the new serial number The serial number associated with the first network element.
在一些其他实现方式中,公开了一种网络装置。所述网络装置主要包括一个或多个处理器和一个或多个存储器,其中,一个或多个处理器被配置为从一个或多个存储器读取计算机代码,以实现由第一网元执行的上述方法。In some other implementations, a network device is disclosed. The network device mainly includes one or more processors and one or more memories, wherein the one or more processors are configured to read computer codes from the one or more memories to implement the the above method.
在又一些其他实现方式中,公开了一种计算机程序产品。该计算机程序产品可以包括其上存储有计算机代码的非暂时性计算机可读程序介质,当由一个或多个处理器执行时,该计算机代码使得一个或多个处理器实现上述方法。In still other implementations, a computer program product is disclosed. The computer program product may include a non-transitory computer-readable program medium having stored thereon computer code which, when executed by one or more processors, causes the one or more processors to implement the method described above.
在下面的附图、说明书和权利要求中更详细地解释了上述实施例及其实现方式的其他方面和替代方案。Other aspects and alternatives of the above-described embodiments and their implementations are explained in more detail in the following figures, description and claims.
附图说明Description of drawings
图1示出了包括终端装置、载波网络、数据网络和服务应用的示例性通信网络。Figure 1 shows an exemplary communication network comprising terminal devices, a carrier network, a data network and service applications.
图2示出了通信网络中的示例性网络功能或网络节点。Fig. 2 shows exemplary network functions or network nodes in a communication network.
图3示出了无线通信网络中的示例性网络功能或网络节点。Fig. 3 shows exemplary network functions or network nodes in a wireless communication network.
图4示出了用于无线终端的网络注册和认证的用户隐藏标识的示例性数据结构。FIG. 4 shows an exemplary data structure of a user concealed identity for network registration and authentication of a wireless terminal.
图5示出了基于无线终端的用户隐藏标识和隐藏认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的主网络注册/认证的示例性数据和逻辑流程。FIG. 5 shows an exemplary data and logic flow for primary network registration/authentication between a wireless terminal (User Equipment (User Equipment, UE)) and a core network based on the wireless terminal's user concealed identity and concealed authentication serial number .
图6示出了在无线终端(用户设备(User Equipment,UE))检测到认证序列号去同步时用于重新认证的示例性数据和逻辑流程。FIG. 6 illustrates an exemplary data and logic flow for re-authentication when a wireless terminal (User Equipment (UE)) detects desynchronization of an authentication sequence number.
图7示出了基于不能验证的无线终端的网络分配的临时身份和认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的注册/认证的示例性数据和逻辑流程。7 shows exemplary data and data for registration/authentication between a wireless terminal (User Equipment (User Equipment, UE)) and a core network based on a network-assigned temporary identity and an authentication serial number of a wireless terminal that cannot be verified. logical flow.
图8示出了基于无线终端的成功验证的网络分配的临时身份和认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的注册/认证的示例性数据和逻辑流程。8 shows exemplary data and data for registration/authentication between a wireless terminal (User Equipment (User Equipment, UE)) and a core network based on a network-assigned temporary identity and an authentication serial number based on successful verification of the wireless terminal. logical flow.
图9示出了检测到来自网络侧的认证序列号去同步时基于无线终端的用户隐藏标识和隐藏认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的主网络注册/认证的示例性数据和逻辑流程。Fig. 9 shows that when the desynchronization of the authentication sequence number from the network side is detected, the wireless terminal (user equipment (User Equipment, UE)) and the core network are used based on the user hidden identity of the wireless terminal and the hidden authentication sequence number. Exemplary data and logic flow for main network registration/authentication.
图10示出了在从网络侧检测到认证序列号不同步时基于不能验证的无线终端的网络分配的临时身份和认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的注册/认证的示例性数据和逻辑流程。FIG. 10 shows the temporary identity and authentication serial number assigned by the network based on the wireless terminal that cannot be verified when the authentication serial number is detected from the network side. Exemplary data and logic flow for registration/authentication between networks.
图11示出了检测到来自网络侧的认证序列号去同步时基于无线终端的成功验证的网络分配的临时身份和认证序列号的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的注册/认证的示例性数据和逻辑流程。Figure 11 shows the temporary identity and authentication serial number assigned by the network based on the successful verification of the wireless terminal when the authentication serial number desynchronization from the network side is detected for the wireless terminal (User Equipment (User Equipment, UE)) and the core Exemplary data and logic flow for registration/authentication between networks.
图12示出了检测到来自网络侧的经由注册消息时间戳的注册重放攻击时基于对应注册消息的用户隐藏标识和隐藏时间戳的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的主网络注册/认证的示例性数据和逻辑流程。Fig. 12 shows that when a registration replay attack via a registration message time stamp from the network side is detected, a user concealment identifier and a concealment time stamp based on a corresponding registration message are used for wireless terminals (user equipment (User Equipment, UE)) and Exemplary data and logic flow for main network registration/authentication between core networks.
图13示出了检测到来自网络侧的经由注册消息时间戳的注册重放攻击时基于不能验证的无线终端的网络分配的临时身份和对应的注册消息的隐藏时间戳的用于无线终端(用户设备(User Equipment,UE))和核心网络之间的注册/认证的示例性数据和逻辑流程。FIG. 13 shows the detection of a registration replay attack from the network side via a registration message timestamp based on the network-assigned temporary identity of the wireless terminal that cannot be verified and the hidden timestamp of the corresponding registration message for a wireless terminal (user). Exemplary data and logic flow of registration/authentication between a device (User Equipment, UE) and a core network.
具体实施方式Detailed ways
示例性通信网络Exemplary communication network
如图1中的100所示,示例性通信网络可以包括终端装置110和112、载波网络102、各种服务应用140和其他数据网络150。例如,载波网络102可以包括接入网络120和核心网络130。载波网络102可以被配置为在终端装置110和112之间、在终端装置110和112与服务应用140之间、或者在终端装置110和112与其他数据网络150之间传输语音、数据和其他信息(统称为数据业务)。在下面进一步详细描述的认证过程之后,可以为这种数据传输建立和配置通信会话和对应的数据路径。As shown at 100 in FIG. 1 , an exemplary communication network may include terminal devices 110 and 112 , carrier network 102 , various service applications 140 and other data network 150 . For example, carrier network 102 may include access network 120 and core network 130 . Carrier network 102 may be configured to transport voice, data, and other information between end devices 110 and 112 , between end devices 110 and 112 and service application 140 , or between end devices 110 and 112 and other data networks 150 (collectively referred to as data services). Following the authentication process described in further detail below, a communication session and corresponding data path may be established and configured for such data transfer.
接入网络120可以被配置为向终端装置110和112提供对核心网络130的网络接入。核心网络130可以包括各种网络节点或网络功能,其被配置为控制通信会话并执行网络接入管理和数据业务路由。服务应用140可以由终端装置110和112通过载波网络102的核心网络130可访问的各种应用服务器来托管。服务应用140可以被部署为核心网络130外部的数据网络。同样,终端装置110和112可以通过核心网络130访问其他数据网络150,并且其他数据网络可以作为在载波网络102中实例化的特定通信会话的数据目的地或数据源出现。Access network 120 may be configured to provide end devices 110 and 112 with network access to core network 130 . Core network 130 may include various network nodes or network functions configured to control communication sessions and perform network access management and data traffic routing. Service applications 140 may be hosted by various application servers accessible by end devices 110 and 112 through core network 130 of carrier network 102 . The service application 140 may be deployed as a data network external to the core network 130 . Likewise, end devices 110 and 112 may access other data networks 150 through core network 130 and other data networks may appear as data destinations or data sources for particular communication sessions instantiated in carrier network 102 .
图1的核心网络130可以包括地理上分布和互连的各种网络节点或功能,以提供载波网络102的服务区域的网络覆盖。这些网络节点或功能可以被实现为专用硬件网元。或者,这些网络节点或功能可以被虚拟化并实现为虚拟机或软件实体。每个网络节点可以配置有一种或多种类型的网络功能。这些网络节点或网络功能可以共同提供核心网络130的供应和路由功能。术语“网络节点”和“网络功能”在本公开中可互换使用。The core network 130 of FIG. 1 may include various network nodes or functions that are geographically distributed and interconnected to provide network coverage of the service area of the carrier network 102 . These network nodes or functions may be implemented as dedicated hardware network elements. Alternatively, these network nodes or functions can be virtualized and implemented as virtual machines or software entities. Each network node can be configured with one or more types of network functions. These network nodes or network functions may collectively provide the provisioning and routing functions of the core network 130 . The terms "network node" and "network function" are used interchangeably in this disclosure.
图2进一步示出了通信网络200的核心网络130中网络功能的示例性划分。虽然在图2中仅示出了网络节点或功能的单个实例,但是本领域普通技术人员可以理解,这些网络节点或功能中的每一个都可以被实例化为分布在整个核心网络130中的网络节点的多个实例。如图2所示,核心网络130可以包括但不限于网络节点,例如,接入管理网络节点(AccessManagement Network Node,AMNN)230、认证网络节点(Authentication Network Node,AUNN)260、网络数据管理网络节点(Network Data Management Network Node,NDMNN)270、会话管理网络节点(Session Management Network Node,SMNN)240、数据路由网络节点(Data Routing Network Node,DRNN)250、策略控制网络节点(Policy Control NetworkNode,PCNN)220和应用数据管理网络节点(Application Data Management Network Node,ADMNN)210。通过各种通信接口在各种类型的网络节点之间的示例性信令和数据交换由图2中的各种实线连接线表示。可以由遵循预定格式或协议的信令或数据消息来承载这种信令和数据交换。FIG. 2 further shows an exemplary division of network functions in the core network 130 of the communication network 200 . Although only a single instance of a network node or function is shown in FIG. 2 , those of ordinary skill in the art will understand that each of these network nodes or functions can be instantiated as a network distributed throughout the core network 130 Multiple instances of a node. As shown in FIG. 2, the core network 130 may include but not limited to network nodes, for example, an access management network node (AccessManagement Network Node, AMNN) 230, an authentication network node (Authentication Network Node, AUNN) 260, a network data management network node (Network Data Management Network Node, NDMNN) 270, session management network node (Session Management Network Node, SMNN) 240, data routing network node (Data Routing Network Node, DRNN) 250, policy control network node (Policy Control NetworkNode, PCNN) 220 and an application data management network node (Application Data Management Network Node, ADMNN) 210. Exemplary signaling and data exchanges between various types of network nodes over various communication interfaces are represented by various solid connecting lines in FIG. 2 . Such signaling and data exchanges may be carried by signaling or data messages following a predetermined format or protocol.
上面在图1和2中描述的实现方式可以应用于无线和有线通信系统。图3示出了基于图2的通信网络200的一般实现方式的示例性蜂窝无线通信网络300。图3示出了无线通信网络300可以包括无线终端或用户设备(User Equipment,UE)310(用作图2的终端装置110)、无线接入网络(Radio Access Network,RAN)320(用作图2的接入网络120)、服务应用140、数据网络(Data Network,DN)150和核心网络130,核心网络包括接入和移动性管理功能(Access and Mobility Management Function,AMF)330(用作图2的AMNN 230)、会话管理功能(Session Management Function,SMF)340(用作图2的SMNN 240)、应用功能(Application Function,AF)390(用作图2的ADMNN 210)、用户面管理功能(User PlaneFunction,UPF)350(用作图2的DRNN 250)、策略控制功能322(用作图2的PCNN 220)、认证服务器功能(Authentication Server Function,AUSF)360(用作图2的AUNN 260)、以及统一数据管理/认证凭证储存库和处理功能(Unified Data Management/AuthenticationCredential Repository and Processing Function,UDM/ARPF)370(用作图2的UDMNN270)。此外,虽然在图3中仅示出了无线通信网络300(特别是核心网络130)的一些网络功能或节点的单个实例,但是本领域普通技术人员可以理解,这些网络节点或功能中的每一个都可以具有分布在整个无线通信网络300中的多个实例。The implementations described above in Figures 1 and 2 can be applied to both wireless and wired communication systems. FIG. 3 shows an exemplary cellular wireless communication network 300 based on a general implementation of the communication network 200 of FIG. 2 . 3 shows that a wireless communication network 300 may include a wireless terminal or user equipment (User Equipment, UE) 310 (used as the terminal device 110 in FIG. 2 ), a radio access network (Radio Access Network, RAN) 320 (used as the terminal device 110 in FIG. 2’s access network 120), service application 140, data network (Data Network, DN) 150 and core network 130, the core network includes access and mobility management function (Access and Mobility Management Function, AMF) 330 (used as FIG. 2 AMNN 230), session management function (Session Management Function, SMF) 340 (used as SMNN 240 of Fig. 2), application function (Application Function, AF) 390 (used as ADMNN 210 of Fig. 2), user plane management function (User PlaneFunction, UPF) 350 (used as DRNN 250 in FIG. 2), policy control function 322 (used as PCNN 220 in FIG. 2), authentication server function (Authentication Server Function, AUSF) 360 (used as AUNN 260 in FIG. ), and a unified data management/authentication credential repository and processing function (Unified Data Management/AuthenticationCredential Repository and Processing Function, UDM/ARPF) 370 (used as UDMNN 270 of FIG. 2). In addition, although only a single instance of some network functions or nodes of the wireless communication network 300 (especially the core network 130) is shown in FIG. There may be multiple instances of each distributed throughout the wireless communication network 300 .
在图3中,UE 310可以被实现为被配置为经由RAN 320接入核心网络130的各种类型的无线装置或终端。UE 310可以包括但不限于移动电话、膝上型计算机、平板电脑、物联网(Internet-of-Things,IoT)装置、分布式传感器网络节点、可穿戴装置等。UE 310可以包括移动站(Mobile Station,ME)和用户识别模块(Subscriber Identity Module,SIM)。SIM模块可以例如以通用无线通信系统用户识别模块(Universal Mobile TelecommunicationSystem SIM,USIM)的形式实现,其包括用于网络注册和认证的一些计算能力。执行网络注册和认证所需的计算可以由USIM或UE中的ME来执行。例如,RAN 320可以包括分布在载波网络的服务区域中的多个无线基站。UE 310和RAN 320之间的通信可以在空中(over-the-air,OTA)无线接口中承载,如图3中的311所示。In FIG. 3 , UE 310 may be implemented as various types of wireless devices or terminals configured to access core network 130 via RAN 320 . The UE 310 may include, but is not limited to, a mobile phone, a laptop computer, a tablet computer, an Internet-of-Things (IoT) device, a distributed sensor network node, a wearable device, and the like. UE 310 may include a mobile station (Mobile Station, ME) and a subscriber identity module (Subscriber Identity Module, SIM). A SIM module may eg be implemented in the form of a Universal Mobile Telecommunications System SIM (USIM), which includes some computing capabilities for network registration and authentication. Computations required to perform network registration and authentication can be performed by the USIM or by the ME in the UE. For example, RAN 320 may include a number of radio base stations distributed in the service area of a carrier network. The communication between UE 310 and RAN 320 may be carried in an over-the-air (OTA) radio interface, as shown by 311 in FIG. 3 .
继续图3,UDM 370可以构成用于用户合同和订阅配置文件和数据的永久存储或数据库。UDM还可以包括认证凭证储存库和处理功能(ARPF,如图3的370中所示),用于存储用户认证的长期安全凭证,并且用于使用这样的长期安全凭证作为输入,来执行认证向量和加密密钥的计算,如下面更详细描述的。为了防止UDM/ARPF数据的未授权暴露,UDM/ARPF370可以位于网络运营商或第三方的安全网络环境中。Continuing with FIG. 3, UDM 370 may constitute a persistent store or database for user contracts and subscription profiles and data. The UDM may also include an Authentication Credential Repository and Processing Function (ARPF, shown at 370 in FIG. 3 ) for storing long-term security credentials for user authentication, and for executing authentication vectors using such long-term security credentials as input and the computation of the encryption key, as described in more detail below. To prevent unauthorized exposure of UDM/ARPF data, UDM/ARPF 370 may be located in a secure network environment of a network operator or a third party.
AMF/SEAF 330可以经由由连接这些网络节点或功能的各种实线指示的通信接口与RAN320、SMF 340、AUSF 360、UDM/ARPF 370和PCF 322通信。AMF/SEAF 330可以负责UE到非接入层(Non-Access Stratum,NAS)的信令管理,并且负责UE 310到核心网络130的供应注册和接入,以及SMF 340的分配,以支持特定UE的通信需求。AMF/SEAF 330可以进一步负责UE移动性管理。AMF还可以包括安全锚点功能(Security Anchor Function,SEAF,如图3的330中所示),如下文更详细描述的,该安全锚点功能与AUSF 360和UE 310交互,用于用户认证和各种级别的加密/解密密钥的管理。AUSF 360可以终止来自AMF/SEAF 330的用户注册/认证/密钥生成请求,并与UDM/ARPF 370交互,以完成这样的用户注册/认证/密钥生成。AMF/SEAF 330 may communicate with RAN 320, SMF 340, AUSF 360, UDM/ARPF 370, and PCF 322 via communication interfaces indicated by various solid lines connecting these network nodes or functions. AMF/SEAF 330 may be responsible for signaling management from UE to Non-Access Stratum (Non-Access Stratum, NAS), and responsible for provisioning registration and access of UE 310 to core network 130, and allocation of SMF 340 to support a specific UE communication needs. AMF/SEAF 330 may further be responsible for UE mobility management. The AMF may also include a security anchor function (Security Anchor Function, SEAF, shown in 330 of Figure 3), as described in more detail below, the security anchor function interacts with the AUSF 360 and the UE 310 for user authentication and Management of encryption/decryption keys at various levels. AUSF 360 may terminate user registration/authentication/key generation requests from AMF/SEAF 330 and interact with UDM/ARPF 370 to complete such user registration/authentication/key generation.
SMF 340可以由AMF/SEAF 330分配,用于在无线通信网络300中实例化的特定通信会话。SMF 340可以负责分配UPF 350,以支持用户数据面中的通信会话和其中的数据流,并且负责供应/调节所分配的UPF 350(例如,用于为分配的UPF 350制定分组检测和转发规则)。作为由SMF 340分配的替代,UPF 350可以由AMF/SEAF 330分配,用于特定的通信会话和数据流。由SMF 340和AMF/SEAF 330分配和供应的UPF 350可以负责数据路由和转发,并且负责报告特定通信会话的网络使用。例如,UPF 350可以负责在UE 310和DN 150之间、在UE 310和服务应用140之间路由端到端数据流。DN 150和服务应用140可以包括但不限于由无线通信网络300的运营商或者由第三方数据网络和服务提供商提供的数据网络和服务。SMF 340 may be allocated by AMF/SEAF 330 for a particular communication session instantiated in wireless communication network 300 . SMF 340 may be responsible for allocating UPF 350 to support communication sessions in the user data plane and data flows therein, and for provisioning/regulating the allocated UPF 350 (e.g., for formulating packet detection and forwarding rules for the allocated UPF 350) . Instead of being assigned by SMF 340, UPF 350 may be assigned by AMF/SEAF 330 for specific communication sessions and data flows. UPF 350 allocated and provisioned by SMF 340 and AMF/SEAF 330 may be responsible for data routing and forwarding, and for reporting network usage for a particular communication session. For example, UPF 350 may be responsible for routing end-to-end data flows between UE 310 and DN 150 , and between UE 310 and service application 140 . DN 150 and service applications 140 may include, but are not limited to, data networks and services provided by the operator of wireless communication network 300 or by third party data network and service providers.
服务应用140可以由AF 390经由例如由核心网络130提供的网络暴露功能(在图3中未示出,但是在下面描述的图7中示出)来管理和供应。在管理涉及服务应用140的特定通信会话(例如,在UE 310和服务应用140之间)时,SMF 340可以经由通信接口313与和服务应用140相关联的AF 390进行交互。Service applications 140 may be managed and provisioned by AF 390 via, for example, network exposure functionality provided by core network 130 (not shown in FIG. 3 but shown in FIG. 7 described below). SMF 340 may interact with AF 390 associated with service application 140 via communication interface 313 in managing a particular communication session involving service application 140 (eg, between UE 310 and service application 140 ).
PCF 322可以负责管理并向AMF/SEAF 330和SMF 340提供适用于与UE 310相关联的通信会话的各种级别的策略和规则。这样,例如,AMF/SEAF 330可以根据与UE 310相关联并且从PCF 322获得的策略和规则,为通信会话分配SMF 340。同样,SMF 340可以根据从PCF322获得的策略和规则,分配UPF 350,来处理通信会话的数据路由和转发。PCF 322 may be responsible for managing and providing to AMF/SEAF 330 and SMF 340 various levels of policies and rules applicable to communication sessions associated with UE 310 . Thus, for example, AMF/SEAF 330 may assign SMF 340 to a communication session according to policies and rules associated with UE 310 and obtained from PCF 322 . Likewise, SMF 340 may assign UPF 350 to handle data routing and forwarding for communication sessions according to policies and rules obtained from PCF 322 .
为了使UE 310接入其订阅的归属载波网络的核心网络,可以首先与可用的RAN320和与RAN 320相关联的AMF/SEAF 330进行通信。RAN 320和AMF/SEAF 330可以属于也可以不属于归属载波网络(例如,可以与UE 310没有订阅的另一载波网络相关联,并且可以被称为服务网络,并且术语“服务网络”可以用来泛指具有属于另一载波网络或者属于同一归属核心载波网络的AMF/SEAF的接入网络)。服务网络的AMF/SEAF 330可以与UE 310的归属载波网络的AUSF 360和UDM/ARPF 370通信,以进行认证,然后与归属载波网络的SMF 340和PCF 322通信,以在成功认证后建立通信会话。In order for the UE 310 to access the core network of its subscribed home carrier network, it may first communicate with the available RAN 320 and the AMF/SEAF 330 associated with the RAN 320 . RAN 320 and AMF/SEAF 330 may or may not belong to a home carrier network (e.g., may be associated with another carrier network to which UE 310 is not subscribed, and may be referred to as a serving network, and the term "serving network" may be used Generally refers to an access network with an AMF/SEAF belonging to another carrier network or belonging to the same home core carrier network). AMF/SEAF 330 of the serving network may communicate with AUSF 360 and UDM/ARPF 370 of the home carrier network of UE 310 for authentication, and then communicate with SMF 340 and PCF 322 of the home carrier network to establish a communication session after successful authentication .
上述各种装置、终端和网络节点可以包括计算和通信组件,例如,处理器、存储器、各种通信接口、各种用户显示/操作接口、操作系统和被配置为实现本公开中描述的各种实施例的应用程序。The various devices, terminals, and network nodes described above may include computing and communication components, such as processors, memories, various communication interfaces, various user display/operation interfaces, operating systems, and configured to implement various Example application.
认证过程、可链接性和拒绝服务(Denial-of-Service,DoS)攻击Authentication process, linkability and Denial-of-Service (DoS) attacks
注册和认证过程可以包括UE 310经由服务RAN 320、服务AMF/SEAF 330、归属AUSF360和归属UDM/ARPF与其归属UDM/ARPF 370进行通信,如下面更详细描述的。在注册和认证过程期间,UE 310验证其是否正在与合法网络通信,并且网络同样验证UE 310是否被授权接入网络。在UE 310和核心网络300之间成功认证后,可以向UE 310分配临时接入身份,用于与核心网络的进一步通信。这种临时访问标识符可以被频繁地修改/替换,以减少用户身份、位置和通信内容对攻击者的危害。可以通过UE 310向服务的AMF/SEAF 330发送注册请求来发起认证,该注册请求包含其隐藏或加密的唯一永久身份,例如,用户隐藏标识(Subscriber Concealed Identity,SUCI)。而且,在成功注册后,诸如全球唯一临时用户标识(Global Unique Temporary Identity,GUTI)等临时用户标识可以由AMF/SEAF 330分配给UE 310,用于进一步接入网络。The registration and authentication process may involve UE 310 communicating with its Home UDM/ARPF 370 via Serving RAN 320, Serving AMF/SEAF 330, Home AUSF 360 and Home UDM/ARPF, as described in more detail below. During the registration and authentication process, UE 310 verifies that it is communicating with a legitimate network, and the network also verifies that UE 310 is authorized to access the network. After successful authentication between the UE 310 and the core network 300, a temporary access identity may be assigned to the UE 310 for further communication with the core network. Such temporary access identifiers can be frequently modified/replaced to reduce the compromise of user identity, location, and communication content to attackers. Authentication can be initiated by the UE 310 sending a registration request to the serving AMF/SEAF 330, the registration request containing its concealed or encrypted unique permanent identity, eg Subscriber Concealed Identity (SUCI). Moreover, after successful registration, a temporary user identity such as a Global Unique Temporary Identity (GUTI) can be allocated to the UE 310 by the AMF/SEAF 330 for further access to the network.
由于经由无线接口的外部攻击果,所以用户的身份、位置或通信内容可能泄露。攻击的示例包括但不限于可链接性攻击和拒绝服务(Denial-of-Service,DoS)攻击。例如,攻击者经由无线接口截获的SUCI可用于可链接性攻击,其中,攻击者有可能确定在某个位置/时间X观察到的UE是否与在某个其他位置/时间Y观察到的UE相同,从而跟踪该UE。例如,攻击者可以记录UE A已经通过无线接口使用的SUCI。在UE A使用GUTI而不是SUCI进行认证的情况下,攻击者也可以执行主动攻击来获得SUCI,例如,通过在由UE A发送时破坏GUTI,这很可能导致AMF/SEAF 330的SUCI请求以及作为响应的来自UE的SUCI传输。当稍后某个UE B向由同一攻击者作为中继站操作的虚假基站发出注册请求时,攻击者可以通过与UE A的先前捕捉的SUCI交换其SUCI或GUTI来修改UE B的注册请求,并将修改后的请求转发给网络。然后,攻击者监控网络和UE B之间的响应,以确定UE B是否与UE A相同,从而可能跟踪这个UE。例如,随后,攻击者通过监视无线接口来观察是否执行了成功的认证和密钥协商(Authentication and Key Agreement,AKA)运行,并且网络是否接受注册请求,如果是,则UE A和UE B将被攻击者确定为相同的UE。As a result of an external attack via the wireless interface, the user's identity, location or communication content may be compromised. Examples of attacks include, but are not limited to, linkability attacks and Denial-of-Service (DoS) attacks. For example, a SUCI intercepted by an attacker via a wireless interface can be used in a linkability attack, where it is possible for an attacker to determine whether a UE observed at a certain location/time X is the same as a UE observed at some other location/time Y , so as to track the UE. For example, an attacker can record the SUCI already used by UE A over the radio interface. In the case that UE A uses GUTI instead of SUCI for authentication, an attacker can also perform an active attack to obtain SUCI, e.g. by destroying GUTI when sent by UE A, which would likely result in a SUCI request by AMF/SEAF 330 and as Responsive SUCI transmission from UE. When some UE B later issues a registration request to a fake base station operated by the same attacker as a relay station, the attacker can modify UE B's registration request by exchanging its SUCI or GUTI with UE A's previously captured SUCI, and transfer The modified request is forwarded to the network. The attacker then monitors the responses between the network and UE B to determine if UE B is the same as UE A and thus potentially track this UE. For example, the attacker then monitors the radio interface to observe whether a successful Authentication and Key Agreement (AKA) run is performed and whether the network accepts the registration request, and if so, UE A and UE B will be The attacker identified as the same UE.
这种可链接性攻击不能通过仅隐藏AKA响应的内容来减轻,因为攻击者可以从在无线接口中截取的各种后续消息中检测AKA运行是否成功,而无需知道AKA响应的内容。在AKA响应的内容没有被隐藏的情况下,攻击者可以直接使用这样的内容来确定受到攻击的UE是否出现在伪基站附近。This linkability attack cannot be mitigated by merely hiding the content of the AKA response, since an attacker can detect whether the AKA run was successful from various subsequent messages intercepted in the wireless interface without knowing the content of the AKA response. In the case that the content of the AKA response is not concealed, the attacker can directly use such content to determine whether the attacked UE is present near the fake base station.
因此,通过重放SUCI,攻击者观察使用重放的SUCI是否能成功执行AKA,即,重放的注册请求是否被网络接受。如果是这样,攻击者可以将在一个位置观察到的UE与在另一个位置观察到的UE链接起来(重放其SUCI)。当攻击者在几个位置执行时,即使被攻击的UE可能仍然是匿名的,也可能在不同的位置跟踪匿名UE,其隐私和不可跟踪性受到损害。Therefore, by replaying the SUCI, the attacker observes whether AKA can be successfully performed using the replayed SUCI, that is, whether the replayed registration request is accepted by the network. If so, an attacker could link a UE observed at one location with a UE observed at another location (replay its SUCI). When the attacker executes in several locations, even though the attacked UE may remain anonymous, it is possible to track the anonymous UE in different locations, and its privacy and untraceability are compromised.
再如,网络可能会受到攻击者通过重放SUCI进行的DoS攻击。具体而言,攻击者可以重放SUCI,以使得网络和/或UE执行频繁且重复的过程(例如,SUCI去隐藏过程和认证过程)。当去隐藏方案(例如,椭圆曲线集成加密方案(Elliptical Curve IntegratedEncryption Scheme,ECIES))不具有任何机制来检测或调整所接收的SUCI是否是UE先前发送给网络的SUCI时,尤其可能发生这种情况。As another example, the network may be subject to a DoS attack by an attacker by replaying SUCI. Specifically, an attacker may replay SUCI to cause the network and/or UE to perform frequent and repetitive procedures (eg, SUCI de-hiding procedure and authentication procedure). This can especially happen when the de-concealment scheme (e.g. Elliptical Curve Integrated Encryption Scheme (ECIES)) does not have any mechanism to detect or adjust whether the received SUCI is the one previously sent by the UE to the network .
这样,如果攻击者多次发起SUCI重放攻击,UDM和UE可能被迫花费大量资源来分别处理重放的SUCI和认证请求消息,因为这些消息看起来是合法的。这引发了对UDM和UE的DoS攻击。对UE的DoS攻击可能导致UE的处理能力下降和电池的快速耗尽。对UDM的DoS攻击可能导致UDM的处理能力下降,并延迟对合法注册请求和其他类型请求的响应。In this way, if an attacker launches a SUCI replay attack many times, the UDM and UE may be forced to spend a lot of resources to process the replayed SUCI and authentication request messages separately, since these messages appear to be legitimate. This triggers a DoS attack on UDM and UE. The DoS attack on the UE may cause the UE's processing capability to decrease and the battery to be drained rapidly. A DoS attack on the UDM can cause the UDM to degrade its processing capabilities and delay responses to legitimate registration requests and other types of requests.
隐藏的认证序列号Hidden authentication serial number
在一些实现方式中,为了对抗上述可链接性和DoS攻击,UE 310和载波网络可以维护一对序列号(或者称为认证序列号)来跟踪UE的认证和重新认证。这些序列号可以被称为SQNMS(在UE侧)和SQNHE(在载波网络侧)。例如,SQNHE可以由UDM/ARPF 370在家庭环境(HomeEnvironment,HE)中维护。只允许这些序列号随着UE被认证和重新认证而增加。在正常网络接入条件下,UE 310和载波网络可以保持SQNMS和SQNHE之间的同步。例如,在认证或重新认证过程期间,UE 310或网络对去同步的检测可以指示潜在的攻击和其他问题。In some implementations, to combat the aforementioned linkability and DoS attacks, UE 310 and the carrier network can maintain a pair of sequence numbers (or called authentication sequence numbers) to track authentication and re-authentication of UEs. These sequence numbers may be referred to as SQN MS (on the UE side) and SQN HE (on the carrier network side). For example, the SQN HE may be maintained by the UDM/ARPF 370 in a home environment (HomeEnvironment, HE). These sequence numbers are only allowed to increase as the UE is authenticated and re-authenticated. Under normal network access conditions, the UE 310 and the carrier network can maintain synchronization between the SQN MS and the SQN HE . For example, detection of desynchronization by the UE 310 or the network during an authentication or re-authentication process may indicate potential attacks and other problems.
在序列号同步的一些实现方式中,由UE 310维护的SQNMS可以在一些认证过程期间被传送到载波网络。同样,由UDM/ARPF维护的SQNHE也可以被传送给UE。然而,为了保护这些序列号不被泄露,其传输可以最小化,并且当传输是必要的时,可以以被认为是安全的加密形式传输。在下面更详细描述的一个示例性实现方式中,在认证过程期间,SQNMS可以与用户永久标识(Subscription Permanent Identifier,SUPI)从UE 310到服务网络的AMF/SEAF330的传输一起并且以相同的方式传输。而且,来自UDM/ARPF侧的SQNHE被嵌入和加密在认证向量中,从而被传送给UE,如下面进一步详细描述的。In some implementations of sequence number synchronization, the SQN MS maintained by UE 310 may be communicated to the carrier network during some authentication procedures. Likewise, the SQN HE maintained by UDM/ARPF can also be transmitted to the UE. However, in order to protect these serial numbers from being compromised, their transmission can be minimized and, when transmission is necessary, can be transmitted in an encrypted form which is considered secure. In one exemplary implementation described in more detail below, during the authentication process, the SQN MS may be together with and in the same manner the transmission of the Subscription Permanent Identifier (SUPI) from the UE 310 to the AMF/SEAF 330 of the serving network transmission. Also, the SQN HE from the UDM/ARPF side is embedded and encrypted in the authentication vector to be transmitted to the UE, as described in further detail below.
具体而言,可以通过在基于例如椭圆曲线集成加密方案(Elliptical CurveIntegrated Encryption Scheme,ECIES)的加密之后经由无线接口发送到AMF/SEAF 330,来保护SQNMS。换言之,在认证过程期间用于隐藏SUPI的ECIES的使用可以扩展到适应SQNMS和SUPI。在一些实现方式中,SUPI可以与SQNMS相结合,并作为一个纯文本块用于在ECIES下对称加密。SQNMS和SUPI的组合可以具有串联、交织等形式。例如,在国际移动用户识别码(International Mobile Subscriber Identity,IMSI)代替SUPI用于认证的情况下,移动用户识别号码(Mobile Subscription Identification Number,MSIN)(例如,9到10位)和SQNMS可以由UE组合并加密/隐藏。相应地,在归属网络中,基于ECIES的对称解密可以用于去隐藏SUPI(或MSIN)和SQNMS。Specifically, the SQN MS may be secured by sending to the AMF/SEAF 330 via a wireless interface after encryption based on, for example, an Elliptical Curve Integrated Encryption Scheme (ECIES). In other words, the use of ECIES to hide SUPI during the authentication process can be extended to accommodate SQN MS and SUPI. In some implementations, SUPI can be combined with SQN MS and used as a plaintext block for symmetric encryption under ECIES. The combination of SQN MS and SUPI can have the forms of concatenation, interleaving, and the like. For example, in the case where the International Mobile Subscriber Identity (IMSI) replaces the SUPI for authentication, the Mobile Subscriber Identification Number (MSIN) (for example, 9 to 10 digits) and the SQN MS can be identified by UE combines and encrypts/conceals. Correspondingly, in the home network, ECIES-based symmetric decryption can be used to hide SUPI (or MSIN) and SQN MS .
隐藏的注册时间戳Hidden Registration Timestamp
在对抗上述SUCI重放攻击的一些其他实现方式中,UE 310可以在注册或认证请求消息中将时间戳与SUCI一起传送给网络。网络可以依赖这样的时间戳来检测SUCI重放攻击。类似于上述认证序列号,时间戳可以与SUPI组合,随后对该组合执行ECIES加密。SUPI和时间戳的组合可以基于其他形式的串联、交织。In some other implementations against the SUCI replay attack described above, the UE 310 may transmit the timestamp to the network along with the SUCI in a registration or authentication request message. Networks can rely on such timestamps to detect SUCI replay attacks. Similar to the authentication serial number described above, the timestamp can be combined with SUPI, and ECIES encryption is then performed on the combination. Combinations of SUPI and timestamps can be based on other forms of concatenation, interleaving.
注册/认证请求的时间戳的隐藏可以作为上述认证序列号的隐藏的替代或补充来执行。例如,SUPI、序列号和/或时间戳可以组合(例如,串联或交织),随后使用ECIES方案进行加密。The concealment of the time stamp of the registration/authentication request can be performed as an alternative or in addition to the concealment of the authentication serial number described above. For example, SUPI, serial number, and/or timestamp can be combined (eg, concatenated or interleaved) and then encrypted using the ECIES scheme.
SUCI数据结构SUCI data structure
SUPI(或MSIN)和SQNMS和/或时间戳的隐藏串联可以作为SUCI数据结构的一部分发送到服务网络的AMF/SEAF 330。图4中示出了SUCI数据结构400的示例。SUCI结构400包含SUPI类型字段402,其值的范围例如从0到7,用于标识隐藏在“方案输出”字段412以及SUCI结构400的其他字段中的标识符的类型。例如,可以在字段402中使用各种值来指示以下SUPI类型:The hidden concatenation of SUPI (or MSIN) and SQN MS and/or timestamp can be sent to the AMF/SEAF 330 of the serving network as part of the SUCI data structure. An example of a SUCI data structure 400 is shown in FIG. 4 . The SUCI structure 400 includes a SUPI type field 402 , whose value ranges, for example, from 0 to 7, for identifying the type of identifier hidden in the “scheme output” field 412 and other fields of the SUCI structure 400 . For example, various values may be used in field 402 to indicate the following SUPI types:
-0:IMSI-0: IMSI
-1:网络特定标识符-1: Network specific identifier
-2:全球线路标识符(Global Line Identifier,GLI)-2: Global Line Identifier (GLI)
-3:全球电缆标识符(Global Cable Identifier,GCI)-3: Global Cable Identifier (GCI)
-4:SUPI与SQNMS和/或消息时间戳组合(例如,串联)-4: SUPI combined (eg, concatenated) with SQN MS and/or message timestamps
-5至7:其他指标的保留值。-5 to 7: Reserved values for other indicators.
上面列出的SUPI类型值和类型对应关系仅用于说明目的。可以使用其他对应关系。例如,包括保留值的其他值可以用于指示隐藏与SQNMS和/或注册消息时间戳组合的SUPI。SUCI结构400的其他字段包括例如归属网络标识符404、路由指示符406、保护方案标识符408和归属网络公钥标识符410。The SUPI type values and type correspondences listed above are for illustration purposes only. Other correspondences may be used. For example, other values including reserved values may be used to indicate that SUPI is hidden in combination with SQN MS and/or registration message timestamps. Other fields of SUCI structure 400 include, for example, home network identifier 404 , routing indicator 406 , protection scheme identifier 408 , and home network public key identifier 410 .
基于隐藏的SUPI和认证序列号的认证Authentication based on hidden SUPI and authentication serial number
图5示出了使用包含SQNMS的隐藏SUCI经由服务网络AMF/SEAF 330在UE 310和归属核心网络AUSF 360和UDM/ARPF 370之间进行主网络注册/认证的示例性数据和逻辑流程500,假设UE 310和网络之间的认证成功。逻辑和数据流500可以包括以下示例性步骤,其具有图5中相应的步骤编号。Figure 5 shows an exemplary data and logic flow 500 for primary network registration/authentication between UE 310 and home core network AUSF 360 and UDM/ARPF 370 via serving network AMF/SEAF 330 using hidden SUCI with SQN MS , Assume that the authentication between UE 310 and the network is successful. Logic and data flow 500 may include the following exemplary steps, which have corresponding step numbers in FIG. 5 .
1.在主认证过程500期间,USIM和ME经由例如串联或交织来组合UE 310的SUPI和由USIM或ME维护的当前SQNMS。SUPI和SQNMS的组合(例如,串联或交织)纯文本块可以在USIM或ME中使用ECIES方法加密。遵循图4的SUCI数据结构可以被构建为包括SUPI和SQNMS的加密组合。SUCI结构(图4的402)的“SUPI类型”字段可以被设置为指示SUCI结构包含SUPI和SQNMS的隐藏组合。例如,可以在SUCI结构的“SUPI类型”字段中设置值为“4”。1. During the main authentication process 500, the USIM and ME combine the SUPI of the UE 310 and the current SQN MS maintained by the USIM or ME via eg concatenation or interleaving. The combined (eg, concatenated or interleaved) plaintext blocks of SUPI and SQN MS can be encrypted using the ECIES method in the USIM or ME. The SUCI data structure following Figure 4 can be constructed to include a cryptographic combination of SUPI and SQN MS . The "SUPI Type" field of the SUCI structure (402 of FIG. 4 ) may be set to indicate that the SUCI structure contains a hidden combination of SUPI and SQN MS . For example, a value of "4" may be set in the "SUPI Type" field of the SUCI structure.
2.UE可以在从UE 310发送到服务AMF/SEAF 330的注册请求消息中使用包含隐藏SQNMS的SUCI数据结构。2. The UE may use the SUCI data structure containing the hidden SQN MS in the Registration Request message sent from the UE 310 to the Serving AMF/SEAF 330 .
3.一旦从UE 310接收到注册请求消息,每当服务的AMF/SEAF 330希望发起认证,服务的AMF/SEAF 330可以通过向归属AUSF 360发送AUSF服务请求消息(表示为Nausf_UEAuthentication_Authenticate请求消息)来调用AUSF服务(表示为Nausf_UEAuthentication服务)。例如,Nausf_UEAuthentication_Authenticate请求消息可以包含嵌入了隐藏的SUPI和SQNMS的SUCI以及服务网络名称。3. Once the Registration Request message is received from the UE 310, whenever the serving AMF/SEAF 330 wishes to initiate authentication, the serving AMF/SEAF 330 may invoke AUSF service (indicated as Nausf_UEAuthentication service). For example, the Nausf_UEAuthentication_Authenticate request message may contain SUCI and service network name embedded with hidden SUPI and SQN MS .
4.一旦接收到Nausf_UEAuthentication_Authenticate请求消息,归属AUSF 360可以通过将接收到的服务网络名称与预期的服务网络名称进行比较,来检查服务网络中的请求AMF/SEAF 330是否有权使用包含在Nausf_UEAuthentication_Authenticate请求中的服务网络名称。归属AUSF 360可以临时存储接收到的服务网络名称。如果服务网络未被授权使用接收到的服务网络名称,则AUSF 360可以在表示为Nausf_UEAuthentication_Authenticate响应的响应消息中向UE 310做出响应,指示服务网络未被授权。如果服务网络被授权使用接收到的服务网络名称,则可以从归属AUSF 360向归属UDM/ARPF 370发送表示为Nudm_UEAuthentication_Get请求的UDM认证请求消息。Nudm_UEAuthentication_Get请求可能包含以下信息:4. Once the Nausf_UEAuthentication_Authenticate request message is received, the home AUSF 360 can check whether the requesting AMF/SEAF 330 in the serving network is authorized to use the The service network name for . Home AUSF 360 may temporarily store the received service network name. If the serving network is not authorized to use the received serving network name, AUSF 360 may respond to UE 310 in a response message denoted Nausf_UEAuthentication_Authenticate response indicating that the serving network is not authorized. If the serving network is authorized to use the received serving network name, a UDM authentication request message denoted Nudm_UEAuthentication_Get request may be sent from home AUSF 360 to home UDM/ARPF 370 . A Nudm_UEAuthentication_Get request may contain the following information:
-包含隐藏的SUPI和SQNMS的SUPI;以及- SUPI containing hidden SUPI and SQN MS ; and
-服务网络名称。- service network name.
5.一旦接收到Nudm_UEAuthentication_Get请求,如果归属UDM/ARPF 370根据接收到的SUCI数据结构的SUPI类型字段确定SUPI类型是与SQNMS组合的SUPI,则UDM/ARPF370可以调用用户标识去隐藏功能(De-concealment Function,SIDF)。因此,在UDM 370能够处理该请求之前,SIDF可以去隐藏所接收的SUCI,以获得SUPI和SQNMS。基于SUPI,UDM/ARPF370可以执行其认证过程。去隐藏的SQNMS可以存储在UDM 370中,以供将来使用(如下面参考图6更详细描述的)。UDM 370还可以生成新的SQNHE,其大于由UDM维护的当前SQNHE。然后,当前的SQNHE被更新的SQNHE替换。还基于更新的SQNHE和其他信息生成认证向量(认证向量的组件在下面的步骤6中)。5. Once the Nudm_UEAuthentication_Get request is received, if the home UDM/ARPF 370 determines that the SUPI type is the SUPI combined with the SQN MS according to the SUPI type field of the received SUCI data structure, the UDM/ARPF 370 can call the user identification de-hiding function (De- concealment Function, SIDF). Therefore, before the UDM 370 is able to process the request, the SIDF can de-conceal the received SUCI to obtain SUPI and SQN MS . Based on SUPI, UDM/ARPF 370 can perform its authentication process. The de-concealed SQN MS may be stored in UDM 370 for future use (as described in more detail below with reference to FIG. 6). UDM 370 can also generate a new SQN HE that is larger than the current SQN HE maintained by the UDM. Then, the current SQN HE is replaced by the updated SQN HE . An authentication vector is also generated based on the updated SQN HE and other information (the components of the authentication vector are in step 6 below).
6.对于每个Nudm_Authenticate_Get请求,UDM/ARPF 370可以创建家庭环境认证向量(Home Environment Authentication Vector,HE AV)。更具体地,UDM/ARPF 370通过生成认证向量(AV)来做到这一点,认证管理字段(Authentication Management Field,AMF)分隔位被设置为“1”。UDM/ARPF 370然后可以导出AUSF密钥KAUSF,并计算由XRES*表示的eXpected RESponse。最后,UDM/ARPF 370可以根据由RAND表示的随机数、由AUTN表示的认证密钥、XRES*和KAUSF来创建HE AV。例如,AUTN包含SQNHE的信息。UDM/ARPF370然后可以在对AUSF 360的由Nudm_UEAuthentication_Get响应表示的响应中,将HE AV连同HE AV将用于AKA的指示一起返回给AUSF 360。UDM/ARPF 370可以在Nudm_UEAuthentication_Get响应中包括去隐藏的SUPI。6. For each Nudm_Authenticate_Get request, UDM/ARPF 370 may create a Home Environment Authentication Vector (HEAV). More specifically, UDM/ARPF 370 does this by generating an Authentication Vector (AV) with the Authentication Management Field (AMF) break bit set to "1". UDM/ARPF 370 can then derive the AUSF key K AUSF and compute the eXpected RESponse represented by XRES*. Finally, UDM/ARPF 370 can create the HE AV from the random number represented by RAND, the authentication key represented by AUTN, XRES* and K AUSF . For example, AUTN contains information of SQN HE . UDM/ARPF 370 may then return the HE AV to AUSF 360 in a response to AUSF 360 represented by the Nudm_UEAuthentication_Get response, along with an indication that the HE AV is to be used for AKA. UDM/ARPF 370 may include the de-hidden SUPI in the Nudm_UEAuthentication_Get response.
7.AUSF 360可以将XRES*与从UDM/ARPF 370接收的SUPI一起临时存储。7. The AUSF 360 can temporarily store the XRES* along with the SUPI received from the UDM/ARPF 370 .
8.然后,AUSF 360可以通过以下方式基于从UDM/ARPF 370接收的HE AV生成AV:计算来自XRES*的由HXRES*表示的散列XRES和来自KAUSF的由KSEAF表示的SEAF密钥,并在HE AV中用HXRES*替换XRES*和用KSEAF替换KAUSF。8. The AUSF 360 can then generate an AV based on the HE AV received from the UDM/ARPF 370 by computing the hash XRES denoted HXRES* from XRES* and the SEAF key denoted K SEAF from K AUSF , And replace XRES* with HXRES* and K AUSF with K SEAF in HE AV.
9.AUSF 360然后可以移除KSEAF,并在表示为Nausf_UEAuthentication_Authenticate响应的响应消息中向SEAF 330返回表示为SE AV的服务环境认证向量(包括RAND、AUTN和HXRES*)9. AUSF 360 may then remove K SEAF and return to SEAF 330 the Service Context Authentication Vector (comprising RAND, AUTN, and HXRES*) denoted SE AV in a Response message denoted Nausf_UEAuthentication_Authenticate Response
10.SEAF 330可以在非接入层(Non-Access Stratum,NAS)消息认证请求中将包括在AV中的RAND、AUTN发送给UE。该消息还可以包括ngKSI,UE和AMF将使用该ngKSI来识别KAMF和在认证成功的情况下创建的部分本地安全上下文。ME可以将在NAS消息认证请求中接收的RAND和AUTN转发给USIM。10. The SEAF 330 may send the RAND and AUTN included in the AV to the UE in a non-access stratum (Non-Access Stratum, NAS) message authentication request. The message may also include the ngKSI that the UE and the AMF will use to identify the K AMF and part of the local security context created in case of successful authentication. The ME may forward the RAND and AUTN received in the NAS message authentication request to the USIM.
11.在接收到RAND和AUTN时,UE(例如,USIM或ME)可以通过检查是否可以接受AUTN来验证AV的新鲜度。例如,UE可以提取AUTN中包含的SQNHE,并与本地SQNMS进行比较。如果SQNHE不小于SQNMS,则UE可以确定序列号同步成功。否则,UE确定序列号同步失败。当UE确定序列号SQNMS和SQNHE同步时,UE执行图5中的剩余步骤,如下所述。如果确认了序列号同步,则USIM可以计算由RES表示的响应。USIM可以向ME返回RES、CK、IK。如果USIM使用转换函数c3基于CK和IK计算Kc(即GPRS Kc),并将其发送给ME,则ME可以忽略这种GPRS Kc,并且不将GPRS Kc存储在USIM上或ME中。ME然后可以基于RES计算RES*。ME可以基于CK||IK计算KAUSF。ME可以基于KAUSF计算KSEAF。接入网络的ME可以在认证期间检查AUTN的AMF字段中的“分隔位”是否被设置为1。“分隔位”是AUTN的AMF字段的第0位。一旦确定了SQNMS和SQNHE之间的序列号同步,UE就用提取的SQNHE来更新(或替换)其SQNMS,以用于将来的同步目的。11. Upon receiving RAND and AUTN, the UE (eg USIM or ME) can verify the freshness of the AV by checking if AUTN is acceptable. For example, the UE can extract the SQN HE contained in the AUTN and compare it with the local SQN MS . If SQN HE is not less than SQN MS , the UE may determine that the sequence number synchronization is successful. Otherwise, the UE determines that the sequence number synchronization fails. When the UE determines that the sequence numbers SQN MS and SQN HE are synchronized, the UE performs the remaining steps in Figure 5, as described below. If sequence number synchronization is confirmed, the USIM may compute a response denoted by RES. USIM can return RES, CK, IK to ME. If USIM calculates Kc based on CK and IK using conversion function c3 (ie GPRS Kc) and sends it to ME, ME can ignore this GPRS Kc and not store GPRS Kc on USIM or in ME. The ME may then calculate RES* based on RES. The ME may calculate K AUSF based on CK||IK. The ME may calculate K SEAF based on K AUSF . The ME accessing the network can check whether the "separation bit" in the AMF field of the AUTN is set to 1 during authentication. The "break bit" is bit 0 of the AMF field of AUTN. Once the sequence number synchronization between the SQN MS and SQN HE is determined, the UE updates (or replaces) its SQN MS with the extracted SQN HE for future synchronization purposes.
12.UE 310可以在NAS消息认证响应中将RES*返回给SEAF。12. UE 310 may return RES* to SEAF in a NAS message Authentication Response.
13.SEAF 330然后可以基于RES*计算HRES*,并且SEAF 330可以比较HRES*和HXRES*。如果一致,则从服务网络的角度来看,SEAF 330可以认为UE 310的认证成功。当认证成功时,遵循下面图5的剩余步骤。如果不成功,SEAF 330可以通过例如发送具有故障代码的响应消息和/或丢弃/停止/退出认证来通知网络认证失败。如果没有联系到UE(例如,没有从UE获得响应),并且SEAF 330从未接收到RES*,则SEAF可以认为认证失败,并且向AUSF 360指示失败。13. SEAF 330 can then calculate HRES* based on RES*, and SEAF 330 can compare HRES* and HXRES*. If they are consistent, from the perspective of the serving network, SEAF 330 may consider that the authentication of UE 310 is successful. When authentication is successful, follow the remaining steps in Figure 5 below. If unsuccessful, SEAF 330 may notify the network of authentication failure by, for example, sending a response message with a failure code and/or discarding/stopping/exiting authentication. If the UE is not contacted (eg, no response is obtained from the UE), and SEAF 330 never receives a RES*, SEAF may consider authentication to have failed and indicate failure to AUSF 360 .
14.SEAF 330可以在由Nausf_UEAuthentication_Authenticate请求消息表示的消息中向AUSF 360发送从UE 310接收的RES*。14. SEAF 330 may send the RES* received from UE 310 to AUSF 360 in a message denoted by a Nausf_UEAuthentication_Authenticate request message.
15.当AUSF 360接收到作为认证确认的包括RES*的Nausf_UEAuthentication_Authenticate请求消息时,可以验证AV是否已经到期。如果AV已经到期,则从归属网络的角度来看,AUSF 360可以认为UE 310的认证不成功。在成功认证后,AUSF 360可以存储KAUSF。AUSF 360可以将接收到的RES*与存储的XRES*进行比较。如果RES*和XRES*相等,则从归属网络的角度来看,AUSF 360可以认为UE 310的认证是成功的,并且遵循下面图5的剩余步骤。AUSF 360可以向UDM 370通知认证结果。在失败时(RES*和XRES*不相等),AUSF 360可以通过例如发送具有故障代码的响应消息和/或丢弃/停止/退出认证来通知网络认证失败。15. When AUSF 360 receives the Nausf_UEAuthentication_Authenticate request message including RES* as authentication confirmation, it can verify whether the AV has expired. If the AV has expired, the AUSF 360 may consider the authentication of the UE 310 to be unsuccessful from the perspective of the home network. After successful authentication, AUSF 360 may store K AUSF . AUSF 360 may compare the received RES* to the stored XRES*. If RES* and XRES* are equal, AUSF 360 may consider UE 310's authentication successful from the home network perspective and follow the remaining steps of Figure 5 below. AUSF 360 may notify UDM 370 of the authentication result. On failure (RES* and XRES* are not equal), AUSF 360 may notify the network of authentication failure by, for example, sending a response message with a failure code and/or discarding/stopping/exiting authentication.
16.AUSF 360可以在表示为Nausf_UEAuthentication_Authenticate响应的响应消息中向SEAF 330指示从归属网络的角度来看认证是否成功。如果认证成功,则可以在Nausf_UEAuthentication_Authenticate响应中将KSEAF发送给SEAF 330。如果认证成功,则AUSF 360还可以在Nausf_UEAuthentication_Authenticate响应消息中包括SUPI。16. The AUSF 360 may indicate to the SEAF 330 in a response message denoted Nausf_UEAuthentication_Authenticate response whether the authentication was successful from the perspective of the home network. If authentication is successful, K SEAF may be sent to SEAF 330 in the Nausf_UEAuthentication_Authenticate response. If authentication is successful, AUSF 360 may also include SUPI in the Nausf_UEAuthentication_Authenticate response message.
17.AUSF 360可以使用表示为Nudm_UEAuthentication_ResultConfirmation请求的请求消息向UDM 370通知与UE 310的认证过程的结果和时间。该请求可以包括SUPI、认证的时间戳、认证类型(例如,EAP方法或AKA)以及服务网络名称。17. The AUSF 360 may inform the UDM 370 of the result and time of the authentication procedure with the UE 310 using a request message denoted Nudm_UEAuthentication_ResultConfirmation request. The request may include the SUPI, the timestamp of the authentication, the authentication type (eg, EAP method or AKA), and the serving network name.
18.UDM 370可以存储UE 310的认证状态(SUPI、认证结果、时间戳和服务网络名称),并且用当前的SQNHE更新其先前存储的SQNMS,以供将来的认证序列号同步目的。18. UDM 370 can store UE 310 authentication status (SUPI, authentication result, time stamp and serving network name) and update its previously stored SQN MS with current SQN HE for future authentication serial number synchronization purposes.
19.UDM 370可以用表示为Nudm_UEAuthentication_ResultConfirmation响应的响应消息来回复AUSF 360。19. UDM 370 may reply to AUSF 360 with a response message denoted Nudm_UEAuthentication_ResultConfirmation response.
20.在接收到后续的UE相关过程(例如,来自AMF 330的Nudm_UECM_Registration_Request)时,UDM 370可以根据归属运营商的策略来应用动作,以检测和实现针对某些类型的欺诈的保护。20. Upon receipt of subsequent UE related procedures (eg Nudm_UECM_Registration_Request from AMF 330), UDM 370 may apply actions according to the home operator's policies to detect and enable protection against certain types of fraud.
21.最后,AMF 330向UE 310分配GUTI,用于进一步认证。21. Finally, AMF 330 allocates a GUTI to UE 310 for further authentication.
验证步骤13和15可能失败,指示不能认证UE。在这些情况下,故障消息可以以串联方式发送到UDM 370。类似于上面的步骤18,UDM 370仍然可以存储认证状态并用当前SQNHE更新存储的SQNMS。Authentication steps 13 and 15 may fail, indicating that the UE cannot be authenticated. In these cases, fault messages may be sent to UDM 370 in series. Similar to step 18 above, UDM 370 may still store the authentication status and update the stored SQN MS with the current SQN HE .
序列号同步失败处理Serial number synchronization failure processing
在如图5所示和如上所述的步骤11中,当从AMF 310接收的AUTN中提取的SQNHE小于本地SQNMS时,UE 310可以确定序列号同步失败。图6示出了在这种序列号同步失败之后进行重新认证(RA)的示例性逻辑和数据流600。In step 11 as shown in FIG. 5 and described above, when the SQN HE extracted from the AUTN received by the AMF 310 is smaller than the local SQN MS , the UE 310 may determine that the sequence number synchronization fails. FIG. 6 illustrates an example logic and data flow 600 for re-authentication (RA) following such a sequence number synchronization failure.
在RA0中,如图6所示,UE 310可以不计算嵌入有SQNMS的用于传输到AMF 330的任何认证失败信息(例如,AUTS),以避免SQNMS在无线接口中的另一次暴露。相反,UE 310仅向AMF330发送响应消息,指示失败的原因是序列号去同步。例如,当UE 310和网络受到SUCI重放攻击时,可能发生这种去同步。作为RA1的示例,UE 310可以仅用原因值来对NAS消息认证失败做出响应,该原因值将失败的原因指示为SQN失败/不匹配,无需计算AUTS并无需与网络共享该AUTS。In RA0, as shown in FIG. 6, the UE 310 may not calculate any authentication failure information (eg, AUTS) embedded with the SQN MS for transmission to the AMF 330 to avoid another exposure of the SQN MS in the radio interface. Instead, UE 310 simply sends a response message to AMF 330 indicating that the reason for the failure was sequence number desynchronization. Such desynchronization may occur, for example, when the UE 310 and the network are under a SUCI replay attack. As an example of RA1, UE 310 may respond to NAS message authentication failure with only a cause value indicating the reason for failure as SQN failure/mismatch, without computing and sharing the AUTS with the network.
在RA2中,当从UE 310接收到认证失败消息时,SEAF 330可以向AUSF 360发送表示为Nausf_UEAuthentication_Authenticate请求消息的请求消息。In RA2, when receiving an authentication failure message from UE 310, SEAF 330 may send a request message denoted Nausf_UEAuthentication_Authenticate request message to AUSF 360 .
在RA3中,一旦从AMF 330接收到Nausf_UEAuthentication_Authenticate请求消息,AUSF360就向UDM/ARPF 370发送表示为Nudm_UEAuthentication_Get请求消息的请求消息。In RA3, upon receiving a Nausf_UEAuthentication_Authenticate request message from AMF 330 , AUSF 360 sends a request message denoted Nudm_UEAuthentication_Get request message to UDM/ARPF 370 .
在RA4中,当UDM/ARPF 370从AUSF 360接收到Nudm_UEAuthentication_Get请求消息时,ARPF 370可以被映射到HE/AuC。UDM/ARPF 370可以发送由Nudm_UEAuthentication_Get响应消息表示的响应消息,用于通过使用存储在UDM 370中的SQNMS(例如,在图5的步骤5或18中)而不是更新的SQNHE,利用新的认证向量进行UE重新认证。AUSF 360遵循图5的步骤6-11的原理运行与UE 310的新认证过程。In RA4, when UDM/ARPF 370 receives a Nudm_UEAuthentication_Get request message from AUSF 360, ARPF 370 may be mapped to HE/AuC. UDM/ARPF 370 may send a response message represented by a Nudm_UEAuthentication_Get response message for utilizing the new SQN MS stored in UDM 370 (for example, in step 5 or 18 of FIG . Authentication vector for UE re-authentication. AUSF 360 runs the new authentication process with UE 310 following the principles of steps 6-11 of FIG. 5 .
SUPI失败的GUTI身份验证SUPI failed GUTI authentication
图7示出了用于注册/认证过程的逻辑和数据流700,该注册/认证过程由UE 310使用网络分配的临时标识符发起,例如,经由先前的注册和认证过程(例如,从图5所示的SUCI注册过程中的步骤21)获得的GUTI。下面描述图7中的步骤0-2。FIG. 7 shows a logic and data flow 700 for a registration/authentication process initiated by a UE 310 using a network-assigned temporary identifier, e.g., via a previous registration and authentication process (e.g., from FIG. 5 GUTI obtained in step 21) of the SUCI registration process shown. Steps 0-2 in Fig. 7 are described below.
0.UE 310可以使用诸如GUTI等临时身份来发起注册过程。0. The UE 310 can use a temporary identity such as a GUTI to initiate the registration process.
1.UE 310可以在注册请求消息中使用临时身份GUTI,该注册请求消息被发送到服务AMF/SEAF 330。1. The UE 310 may use the temporary identity GUTI in the Registration Request message, which is sent to the Serving AMF/SEAF 330 .
2.服务AMF/SEAF 330可以尝试从例如在注册消息中所标识的旧的AMF/SEAF702获得UE的SUPI,并且如果服务AMF/SEAF 330未能从旧的AMF/SEAF702获得UE上下文(图7的步骤2a),则服务AMF/SEAF 330可以向UE 310发送具有身份类型的身份请求消息(图7的步骤2b)。当接收到身份请求消息时,UE 310可以向AMF/SEAF 330发送身份响应消息,其中,SUCI嵌入了当前SQNMS(图7的步骤2c)。2. The Serving AMF/SEAF 330 may try to obtain the UE's SUPI from the old AMF/SEAF 702, e.g. Step 2a), then the serving AMF/SEAF 330 may send an identity request message with an identity type to the UE 310 (step 2b of FIG. 7 ). When receiving the Identity Request message, UE 310 may send an Identity Response message to AMF/SEAF 330, wherein the SUCI is embedded in the current SQN MS (step 2c of FIG. 7).
逻辑和数据流700中的剩余步骤3-21实质上使用SUCI来执行认证过程,并对应于图5的逻辑和数据流500中的步骤3-21。这些步骤在图7中示出,并在上面关于图5进行了解释,此处不再重复描述。The remaining step 3-21 in logic and data flow 700 essentially uses SUCI to perform the authentication process and corresponds to step 3-21 in logic and data flow 500 of FIG. 5 . These steps are shown in FIG. 7 and explained above with respect to FIG. 5 and will not be repeated here.
另外,如果在图7的步骤11中在UE 310处SQN同步检查失败,则可以遵循图6的逻辑和数据流600来执行重新认证过程,如上面更详细描述的。Additionally, if the SQN synchronization check fails at UE 310 in step 11 of FIG. 7, the logic and data flow 600 of FIG. 6 may be followed to perform a re-authentication procedure, as described in more detail above.
此外,验证步骤13和15可能失败,指示UE 310不能被网络认证。在那些情况下,如以上针对图5所描述的,故障消息可以以串联方式被发送到UDM 370。类似于图7中的步骤18以及以上对图5的步骤18的描述,UDM仍然可以存储认证状态并用当前SQNHE更新存储的SQNMS。Furthermore, authentication steps 13 and 15 may fail, indicating that UE 310 cannot be authenticated by the network. In those cases, fault messages may be sent to UDM 370 in a serial fashion as described above for FIG. 5 . Similar to step 18 in Fig. 7 and the above description for step 18 in Fig. 5, the UDM can still store the authentication status and update the stored SQN MS with the current SQN HE .
成功获取SUPI的GUTI认证Successfully obtained SUPI's GUTI certification
图8示出了用于由UE 310使用网络分配的临时标识符发起的注册/认证过程的逻辑和数据流800,例如,经由先前的注册和认证过程(例如,从图5或图7所示的SUCI注册过程中的步骤21)获得的GUTI,其中,服务网络成功地识别了UE的SUPI。除了步骤0-5之外,图8的逻辑和数据流800类似于图5的逻辑和数据流500,这将在下面更详细地描述。FIG. 8 shows a logic and data flow 800 for a registration/authentication process initiated by a UE 310 using a network-assigned temporary identifier, e.g., via a previous registration and authentication process (e.g., from FIG. The GUTI obtained in step 21) of the SUCI registration process, wherein the serving network has successfully identified the SUPI of the UE. The logic and data flow 800 of FIG. 8 is similar to the logic and data flow 500 of FIG. 5 except for steps 0-5, which will be described in more detail below.
0.归属UDM 370先前已经存储了UE 310的SQNMS。0. The home UDM 370 has previously stored the SQN MS of the UE 310 .
1a.UE 310可以向GUTI发起注册过程。1a. The UE 310 may initiate a registration procedure with the GUTI.
1b.UE 310可以在注册请求消息中使用GUTI,而不是发送给AMF/SEAF 330的SUCI。1b. UE 310 may use GUTI in Registration Request message instead of SUCI sent to AMF/SEAF 330 .
2.服务AMF/SEAF 330成功地从旧的AMF/SEAF702获得具有SUPI的UE上下文。2. Serving AMF/SEAF 330 successfully obtains UE context with SUPI from old AMF/SEAF 702 .
3.每当服务的AMF/SEAF 330希望发起认证时,服务的AMF/SEAF 330可以通过向AUSF360发送Nausf_UEAuthentication_Authenticate请求消息来调用AUSF认证服务。Nausf_UEAuthentication_Authenticate请求消息可以包含SUPI和服务网络名称。3. Whenever the serving AMF/SEAF 330 wishes to initiate authentication, the serving AMF/SEAF 330 can invoke the AUSF authentication service by sending a Nausf_UEAuthentication_Authenticate request message to the AUSF 360 . The Nausf_UEAuthentication_Authenticate request message may contain SUPI and the service network name.
4.一旦接收到Nausf_UEAuthentication_Authenticate请求消息,归属AUSF 360可以通过将接收到的服务网络名称与预期的服务网络名称进行比较,来检查服务网络中的请求AMF/SEAF 330是否有权使用包含在Nausf_UEAuthentication_Authenticate请求中的服务网络名称。归属AUSF 360可以临时存储接收到的服务网络名称。如果服务网络未被授权使用服务网络名称,则归属AUSF 360可以通过在由Nausf_UEAuthentication_Authenticate响应表示的响应消息中指示服务网络未被授权来进行响应。AUSF 360然后可以向归属UDM/ARPF 370发送表示为Nudm_UEAuthentication_Get请求的请求消息。Nudm_UEAuthentication_Get请求可以包括UE的SUPI和服务网络名称。4. Once the Nausf_UEAuthentication_Authenticate request message is received, the home AUSF 360 can check whether the requesting AMF/SEAF 330 in the serving network is authorized to use the The service network name for . Home AUSF 360 may temporarily store the received service network name. If the serving network is not authorized to use the serving network name, the home AUSF 360 may respond by indicating that the serving network is not authorized in the response message represented by the Nausf_UEAuthentication_Authenticate response. AUSF 360 may then send a request message to home UDM/ARPF 370 denoted Nudm_UEAuthentication_Get request. The Nudm_UEAuthentication_Get request may include UE's SUPI and serving network name.
5.一旦从归属AUSF 360接收到Nudm_UEAuthentication_Get请求,归属UDM/ARPF370可以基于SUPI选择认证方法。在归属UDM 370处,使用大于用于UE 310的先前序列号的更新的SQNHE来生成归属环境AV向量。5. Upon receiving the Nudm_UEAuthentication_Get request from the home AUSF 360, the home UDM/ARPF 370 may select an authentication method based on SUPI. At the home UDM 370, an updated SQN HE greater than the previous sequence number for the UE 310 is used to generate the home environment AV vector.
图8的逻辑和数据流800的上述步骤与图5的逻辑和数据流500中的相应步骤之间的区别在于,在认证过程期间,从服务网络向归属网络传递SUPI而不是SUCI。这样,UE的SQNMS将不会被发送到归属UDM/ARPF 370,并且如图8的步骤0中所指示的,先前存储在归属UDM的SQNMS将不会用当前的SQNMS来更新。The difference between the above-described steps of the logic and data flow 800 of FIG. 8 and the corresponding steps in the logic and data flow 500 of FIG. 5 is that during the authentication process, SUPI is passed from the serving network to the home network instead of SUCI. In this way, the UE's SQN MS will not be sent to the home UDM/ARPF 370, and the SQN MS previously stored in the home UDM will not be updated with the current SQN MS as indicated in step 0 of Figure 8 .
图8的逻辑和数据流800中的剩余步骤6-21实质上执行认证过程,该认证过程对应于图5的逻辑和数据流500中的步骤6-21。这些步骤在图8中进行了总结,并在上面结合图5进行了解释,此处不再重复描述。The remaining steps 6-21 in the logic and data flow 800 of FIG. 8 essentially perform an authentication process that corresponds to steps 6-21 in the logic and data flow 500 of FIG. 5 . These steps are summarized in Figure 8 and explained above in conjunction with Figure 5 and will not be repeated here.
此外,如果在图8的步骤11中在UE处SQN同步检查失败,则可以遵循图6的逻辑和数据流600来执行重新认证过程,如上面更详细描述的。在重新认证逻辑和数据流600中,归属UDM 370在步骤RA4生成的新认证向量可以基于先前存储的SQNMS。任何成功的认证(在图8的逻辑和数据流800、图7的500和图7的700中)都会使在UDM 370处维护的SQNMS更新(或同步),这是在这些逻辑和数据流的步骤18处用当前SQNHE替换存储的SQNMS的结果,基于此,在逻辑和数据流800中的GUTI认证步骤1-5中缺少更新,所以在UDM 370处维护的SQNMS不会变得不同步。Furthermore, if the SQN synchronization check fails at the UE in step 11 of FIG. 8, the logic and data flow 600 of FIG. 6 may be followed to perform a re-authentication procedure, as described in more detail above. In the re-authentication logic and data flow 600, the new authentication vector generated by the home UDM 370 at step RA4 may be based on the previously stored SQN MS . Any successful authentication (in logic and data flow 800 of FIG. 8, 500 of FIG. 7, and 700 of FIG. 7) will update (or synchronize) the SQN MS maintained at UDM 370, which is Based on the result of replacing the stored SQN MS with the current SQN HE at step 18 of , the update is missing in the GUTI authentication steps 1-5 in the logic and data flow 800, so the SQN MS maintained at the UDM 370 does not become out of sync.
此外,图8的逻辑和数据流800的验证步骤13和15可能失败,指示UE 310不能被网络认证。在那些情况下,如以上针对图5所描述的,故障消息可以以串联方式被发送到UDM370。类似于图8中的步骤18以及以上对图5的步骤18的描述,UDM 370仍然可以存储认证状态并用当前SQNHE更新存储的SQNMS。Furthermore, authentication steps 13 and 15 of the logic and data flow 800 of FIG. 8 may fail, indicating that the UE 310 cannot be authenticated by the network. In those cases, the fault message may be sent in series to UDM 370 as described above for FIG. 5 . Similar to step 18 in FIG. 8 and the above description for step 18 in FIG. 5, UDM 370 may still store the authentication status and update the stored SQN MS with the current SQN HE .
利用SQN对抗网络侧的SUCI重放攻击Using SQN to counter SUCI replay attack on the network side
在一些实现方式中,可以基于UE侧序列号SQNMS和HE侧序列号SQNHE在网络侧检测SUCI重放攻击。由于在图5和图7所示的步骤1-5中传输嵌入了隐藏的永久UE身份和隐藏的SQNMS的SUCI,所以SQNMS变得对网络侧可用。In some implementations, a SUCI replay attack may be detected at the network side based on the UE-side sequence number SQN MS and the HE-side sequence number SQN HE . The SQN MS becomes available to the network side due to the transmission of the SUCI embedding the hidden permanent UE identity and the hidden SQN MS in steps 1-5 shown in Fig. 5 and Fig. 7 .
图9示出了由UE 310使用具有隐藏网络身份的SUCI(例如,SUPI)和SQNMS发起的注册/认证过程的示例性逻辑和数据流900。逻辑和数据流900类似于图5的逻辑和数据流500,除了在步骤5中,由归属UDM 370执行SUCI重放攻击检测过程。9 illustrates an example logic and data flow 900 for a registration/authentication process initiated by a UE 310 using SUCI (eg, SUPI) and SQN MS with concealed network identity. The logic and data flow 900 is similar to the logic and data flow 500 of FIG. 5 , except that in step 5, the SUCI replay attack detection procedure is performed by the home UDM 370 .
具体地,在逻辑和数据流900的步骤5中,在接收到从归属AUSF 360发送的Nudm_UEAuthentication_Get请求时,如果SUPI类型是与SQNMS组合的SUPI,归属UDM 370可以调用SIDF,则SIDF过程可以在归属UDM 370可以处理该请求之前,去隐藏所接收的SUCI,以获得与UE 310相关联的SUPI和SQNMS。Specifically, in step 5 of the logic and data flow 900, upon receiving the Nudm_UEAuthentication_Get request sent from the home AUSF 360, if the SUPI type is SUPI combined with the SQN MS , the home UDM 370 can invoke SIDF, and the SIDF process can be performed in Home UDM 370 may de-conceal the received SUCI to obtain SUPI and SQN MS associated with UE 310 before processing the request.
对于图9的逻辑和数据流900的步骤5中来自网络侧的SUCI重放攻击检测,归属UDM370做出以下示例性确定过程:For the SUCI replay attack detection from the network side in step 5 of the logic and data flow 900 of FIG. 9 , the home UDM 370 makes the following exemplary determination process:
-如果归属UDM 370还没有UE 310的本地存储的SQNMS,则可以存储通过SUCI接收的SQNMS,进一步基于SUPI选择认证方法,并且基于更新和增加的SQNHE生成AV。- If the home UDM 370 does not have a locally stored SQN MS of the UE 310, it may store the SQN MS received through the SUCI, further select an authentication method based on the SUPI, and generate an AV based on the updated and added SQN HE .
-如果归属UDM 370具有针对UE 310的先前存储的SQNMS,则可以被配置为将接收到的SQNMS与先前存储的SQNMS进行比较。- If the home UDM 370 has a previously stored SQN MS for the UE 310, it may be configured to compare the received SQN MS with the previously stored SQN MS .
如果比较显示接收到的SQNMS小于或等于先前存储的SQNMS,则归属UDM 370确定已经发生了SUCI重放攻击,并以故障代码进行响应或丢弃该消息,以停止认证过程。If the comparison shows that the received SQN MS is less than or equal to the previously stored SQN MS , the home UDM 370 determines that a SUCI replay attack has occurred and either responds with a fault code or discards the message to stop the authentication process.
然而,如果比较显示接收到的SQNMS大于存储的SQNMS,则归属UDM 370可以替代地被配置为选择基于SUPI的认证方法,生成基于更新和增加的SQNHE的AV,并且继续图9中的剩余认证过程。However, if the comparison shows that the received SQN MS is larger than the stored SQN MS , the home UDM 370 may instead be configured to select a SUPI based authentication method, generate an AV based on the updated and added SQN HE , and continue with remaining authentication process.
如果SQNHE小于或等于存储的SQNMS,则归属UDM 370丢弃AV和SQNHE,并生成具有更新的SQNHE的新AV。If SQN HE is less than or equal to the stored SQN MS , the home UDM 370 discards the AV and SQN HE , and generates a new AV with an updated SQN HE .
图9的逻辑和数据流900中除了步骤5之外的其余步骤实质上执行了认证过程,该认证过程对应于图5的逻辑和数据流500中的相应步骤。这些步骤在图9中进行了总结,并在上面结合图5进行了解释,此处不再重复描述。The remaining steps in the logic and data flow 900 of FIG. 9 , except step 5, essentially execute an authentication process corresponding to the corresponding steps in the logic and data flow 500 of FIG. 5 . These steps are summarized in Figure 9 and explained above in conjunction with Figure 5 and will not be repeated here.
类似地,图10示出了用于注册/认证过程的逻辑和数据流1000,该注册/认证过程由UE 310使用网络分配的临时标识符发起,例如,经由先前的注册和认证过程(例如,从图9所示的SUCI注册过程中的步骤21)获得的GUTI。除了步骤5包括用于检测SUCI重放攻击的过程之外,图10的各个步骤类似于图7的步骤。图10的逻辑和数据流1000中的步骤5类似于图9所示的逻辑和数据流900中的步骤5,并在上面详细描述。这样,图10中总结的步骤在此不再重复描述。Similarly, FIG. 10 shows a logic and data flow 1000 for a registration/authentication process initiated by a UE 310 using a network-assigned temporary identifier, e.g., via a previous registration and authentication process (e.g., GUTI obtained from step 21) in the SUCI registration process shown in Figure 9. The steps in FIG. 10 are similar to those in FIG. 7 except that step 5 includes a process for detecting SUCI replay attacks. Step 5 in the logic and data flow 1000 of FIG. 10 is similar to step 5 in the logic and data flow 900 shown in FIG. 9 and described in detail above. As such, the steps summarized in FIG. 10 will not be described again here.
此外,图11示出了由UE 310使用网络分配的临时标识符发起的注册/认证过程,例如,经由先前的注册和认证过程(例如,从图9或图11所示的SUCI注册过程中的步骤21)获得的GUTI,其中,服务网络成功地识别了UE的SUPI。图11的各个步骤类似于图8的步骤,除了在步骤5中,UDM 370可以基于SUPI选择认证方法,并且基于SQNHE生成AV,如果SQNHE小于或等于SQNMS,则UDM 370可以丢弃AV和SQNHE,并且生成新的AV和SQNHE。Furthermore, FIG. 11 shows a registration/authentication process initiated by the UE 310 using a network-assigned temporary identifier, e.g., via a previous registration and authentication process (e.g., from the SUCI registration process shown in FIG. 9 or FIG. Step 21) The obtained GUTI, wherein the serving network has successfully identified the UE's SUPI. The steps in Figure 11 are similar to those in Figure 8, except that in step 5, UDM 370 can select an authentication method based on SUPI, and generate an AV based on SQN HE , and if SQN HE is less than or equal to SQN MS , UDM 370 can discard the AV and SQN HE , and generate new AV and SQN HE .
此外,如果在图9、10和11的步骤11中在UE处SQN同步检查失败,则可以遵循图6的逻辑和数据流600来执行重新认证过程,如上面更详细描述的。在重新认证逻辑和数据流600中,归属UDM 370在步骤RA4生成的新认证向量可以基于先前存储的SQNMS。Furthermore, if the SQN synchronization check fails at the UE in step 11 of Figures 9, 10 and 11, the logic and data flow 600 of Figure 6 may be followed to perform a re-authentication procedure, as described in more detail above. In the re-authentication logic and data flow 600, the new authentication vector generated by the home UDM 370 at step RA4 may be based on the previously stored SQN MS .
利用注册请求消息时间戳对抗网络侧的SUCI重放攻击Counter SUCI replay attack on the network side by using registration request message timestamp
在一些实现方式中,可以基于UE注册请求时间戳在网络侧检测到SUCI重放攻击。由于传输如上所述嵌入了隐藏的UE身份和隐藏的时间戳的SUCI,所以注册时间戳变得对网络侧可用。In some implementations, a SUCI replay attack can be detected on the network side based on the UE registration request timestamp. The registration time stamp becomes available to the network side due to the transmission of SUCI embedding the concealed UE identity and the concealed time stamp as described above.
图12示出了由UE 310使用具有隐藏的网络身份(例如,SUPI)和隐藏的注册请求时间戳的SUCI发起的注册/认证过程的示例性逻辑和数据流1200。逻辑和数据流1200类似于图9的逻辑和数据流900,除了SUCI中隐藏的信息包括UE身份和注册请求时间戳,而不是UE身份和SQNMS,并且在步骤5中,归属UDM 370基于注册请求时间戳而不是认证序列号来执行SUCI重放攻击检测过程。12 illustrates an example logic and data flow 1200 for a registration/authentication process initiated by UE 310 using SUCI with concealed network identity (eg, SUPI) and concealed registration request timestamp. The logic and data flow 1200 is similar to the logic and data flow 900 of Figure 9, except that the hidden information in SUCI includes UE identity and registration request timestamp instead of UE identity and SQN MS , and in step 5, the home UDM 370 is based on the registration A timestamp is requested instead of an authentication sequence number to perform the SUCI replay attack detection process.
下面更详细地描述如图12所示的逻辑和数据流1200的示例性步骤1-5。Exemplary steps 1-5 of the logic and data flow 1200 shown in FIG. 12 are described in more detail below.
1.在主认证过程期间,UE 310(例如,USIM)通过串联、交织或其他组合方式来组合SUPI和注册请求或表示为MESSAGE_TIME的消息时间戳。例如,MESSAGE_TIME可以表示发送消息(例如,注册或认证消息)时基于UTC的时间。遵循图4的SUCI数据结构可以被构造成包括SUPI和MESSAGE_TIME的加密组合。SUCI结构(图4的402)的“SUPI类型”字段可以被设置为指示SUCI结构包含SUPI和MESSAGE_TIME的隐藏组合。例如,可以在SUCI结构的“SUPI类型”字段中设置值为“4”。1. During the main authentication procedure, UE 310 (eg USIM) combines SUPI and Registration Request or message timestamp denoted as MESSAGE_TIME by concatenation, interleaving or other combination. For example, MESSAGE_TIME may represent the UTC-based time when a message (eg, a registration or authentication message) was sent. The SUCI data structure following Figure 4 can be structured to include an encrypted combination of SUPI and MESSAGE_TIME. The "SUPI Type" field of the SUCI structure (402 of FIG. 4 ) may be set to indicate that the SUCI structure contains a hidden combination of SUPI and MESSAGE_TIME. For example, a value of "4" may be set in the "SUPI Type" field of the SUCI structure.
2.UE可以在注册请求消息中使用包含隐藏的MESSAGE_TIME的SUCI,该消息从UE310发送到服务AMF/SEAF 330。2. The UE may use the SUCI containing the hidden MESSAGE_TIME in the Registration Request message sent from the UE 310 to the Serving AMF/SEAF 330 .
3.当从UE 310接收到注册请求消息时,每当AMF/SEAF 330希望发起认证,服务AMF/SEAF 330可以通过向AUSF 360发送AUSF服务请求消息(表示为Nausf_UEAuthentication_Authenticate请求消息)来调用AUSF服务(表示为Nausf_UEAuthentication服务)。例如,Nausf_UEAuthentication_Authenticate请求消息可以包含嵌入了隐藏的SUPI和MESSAGE_TIME的SUCI以及服务网络名称。3. When a Registration Request message is received from UE 310, whenever AMF/SEAF 330 wishes to initiate an authentication, serving AMF/SEAF 330 may invoke the AUSF service by sending an AUSF Service Request message (denoted as Nausf_UEAuthentication_Authenticate request message) to AUSF 360 ( Indicated as Nausf_UEAuthentication service). For example, the Nausf_UEAuthentication_Authenticate request message may contain SUCI embedded with hidden SUPI and MESSAGE_TIME and service network name.
4.一旦接收到Nausf_UEAuthentication_Authenticate请求消息,归属AUSF 360可以通过将接收到的服务网络名称与预期的服务网络名称进行比较,来检查服务网络中的请求AMF/SEAF 330是否有权使用包含在Nausf_UEAuthentication_Authenticate请求中的服务网络名称。AUSF 360可以临时存储接收到的服务网络名称。如果服务网络未被授权使用接收到的服务网络名称,则AUSF 360可以在表示为Nausf_UEAuthentication_Authenticate响应的响应消息中向UE 310做出响应,指示服务网络未被授权。如果服务网络被授权使用接收到的服务网络名称,则可以从归属AUSF 360向归属UDM/ARPF 370发送表示为Nudm_UEAuthentication_Get请求的UDM认证请求消息。从AUSF 360发送到UDM 370的Nudm_UEAuthentication_Get请求可以包括以下信息:4. Once the Nausf_UEAuthentication_Authenticate request message is received, the home AUSF 360 can check whether the requesting AMF/SEAF 330 in the serving network is authorized to use the The service network name for . AUSF 360 may temporarily store the received service network name. If the serving network is not authorized to use the received serving network name, AUSF 360 may respond to UE 310 in a response message denoted Nausf_UEAuthentication_Authenticate response indicating that the serving network is not authorized. If the serving network is authorized to use the received serving network name, a UDM authentication request message denoted Nudm_UEAuthentication_Get request may be sent from home AUSF 360 to home UDM/ARPF 370 . The Nudm_UEAuthentication_Get request sent from AUSF 360 to UDM 370 may include the following information:
-包含隐藏的SUPI和MESSAGE_TIME的SUPI;以及- SUPI containing hidden SUPI and MESSAGE_TIME; and
-服务网络名称。- service network name.
5.在从归属AUSF 360接收到Nudm_UEAuthentication_Get请求时,归属UDM 370可以调用SIDF,如果SUPI类型是与MESSAGE_TIME组合的SUPI,则SIDF过程可以在归属UDM 370可以处理该请求之前去隐藏所接收的SUCI,以获得SUPI和MESSAGE_TIME。对于步骤5中来自网络侧的SUCI重放攻击检测,归属UDM 370可以将接收到的MESSAGE_TIME与当前基于UTC的时间进行比较,并做出以下示例性确定过程:5. Upon receiving a Nudm_UEAuthentication_Get request from the home AUSF 360, the home UDM 370 can invoke SIDF, if the SUPI type is SUPI combined with MESSAGE_TIME, the SIDF process can hide the received SUCI before the home UDM 370 can process the request, to get SUPI and MESSAGE_TIME. For the SUCI replay attack detection from the network side in step 5, the home UDM 370 can compare the received MESSAGE_TIME with the current UTC-based time, and make the following exemplary determination process:
-如果接收到的MESSAGE_TIME小于当前基于UTC的时间减去预定的最大延迟时间(表示为MAX_DELAY),则归属UDM 370可以用故障代码来响应,或者丢弃并停止处理该消息。MAX_DELAY表示例如最大传输时间阈值。例如,可以根据UE 310和UDM 370之间的估计数据传输速度来预先确定MAX_DELAY。可以根据需要进一步调整MAX_DELAY。- If the received MESSAGE_TIME is less than the current UTC-based time minus a predetermined maximum delay time (denoted MAX_DELAY), the home UDM 370 may respond with a fault code, or discard and stop processing the message. MAX_DELAY represents, for example, a maximum transmission time threshold. For example, MAX_DELAY may be predetermined according to an estimated data transmission speed between UE 310 and UDM 370 . MAX_DELAY can be further adjusted as needed.
-如果接收到的MESSAGE_TIME大于或等于当前基于UTC的时间减去MAX_DELAY,并且小于当前基于UTC的时间,则归属UDM 370可以被配置为选择基于SUPI的认证方法,生成AV,并且继续图12的其余认证步骤。- If the received MESSAGE_TIME is greater than or equal to the current UTC-based time minus MAX_DELAY, and less than the current UTC-based time, the home UDM 370 may be configured to select a SUPI-based authentication method, generate an AV, and continue with the remainder of FIG. 12 Authentication steps.
图12的逻辑和数据流1200中除了步骤1-5之外的其余步骤基本上执行认证过程,该认证过程对应于图5的逻辑和数据流500中的相应步骤,除了在步骤11中可能不需要涉及UE侧的SQNMS更新以及在步骤18中可能不需要不涉及网络侧的SQNMS更新。这些步骤在图12中进行了总结,并在上面结合图5进行了解释,此处不再重复描述。The remaining steps in the logic and data flow 1200 of FIG. 12 , except for steps 1-5, essentially perform an authentication process that corresponds to the corresponding steps in the logic and data flow 500 of FIG. A SQN MS update involving the UE side is required and a SQN MS update not involving the network side may not be required in step 18 . These steps are summarized in Figure 12 and explained above in conjunction with Figure 5 and will not be repeated here.
类似地,图13示出了由UE 310使用网络分配的临时标识符发起的注册/认证过程的逻辑和数据流1300,例如,经由先前的注册和认证过程(例如,从图12所示的SUCI注册过程中的步骤21)获得的GUTI。图13的各个步骤类似于图7的步骤,除了步骤1-5使用隐藏时间戳而不是SQNMS(如在图12的步骤1-5中所描述的),步骤5包括用于检测SUCI重放攻击的过程,类似于图12所示的逻辑和数据流1200中的步骤5并在上面详细描述,在步骤11中,可能不需要涉及UE侧的SQNMS更新,并且在步骤18中,可能不需要不涉及网络侧的SQNMS更新。这样,图13中总结的步骤在此不再重复描述。Similarly, FIG. 13 shows a logic and data flow 1300 for a registration/authentication process initiated by a UE 310 using a network-assigned temporary identifier, e.g., via a previous registration and authentication process (e.g., from the SUCI GUTI obtained in step 21) of the registration process. The individual steps of Figure 13 are similar to those of Figure 7, except that Steps 1-5 use hidden timestamps instead of SQN MSs (as described in Steps 1-5 of Figure 12), and Step 5 includes a method for detecting SUCI replay The process of the attack is similar to step 5 in the logic and data flow 1200 shown in FIG. A SQN MS update that does not involve the network side is required. As such, the steps summarized in FIG. 13 will not be described again here.
隐藏的SQNMS和隐藏的注册请求消息时间戳的组合Combination of hidden SQN MS and hidden registration request message timestamps
在一些其他实现方式中,可以同时使用SQNMS和注册消息时间戳。换言之,SQNMS和注册消息时间戳都可以与SUPI组合,并且被隐藏,以生成用于注册和认证的SUCI。这样,图5、7、9、10和11中的各种逻辑数据流可以与图12和13中的逻辑和数据流相结合,以形成其他逻辑和数据流。例如,SQNMS和注册消息时间戳都可以传输到存储SQNMS的归属UDM370,并且序列号和时间戳都可以用于检测和响应于SUCI重放攻击。In some other implementations, both SQN MS and registration message timestamps may be used. In other words, both the SQN MS and the registration message timestamp can be combined with SUPI and concealed to generate SUCI for registration and authentication. As such, the various logical data flows in Figures 5, 7, 9, 10, and 11 can be combined with the logic and data flows in Figures 12 and 13 to form other logical and data flows. For example, both the SQN MS and the registration message timestamp can be transmitted to the home UDM 370 where the SQN MS is stored, and both the sequence number and the timestamp can be used to detect and respond to SUCI replay attacks.
以上附图和描述提供了具体的示例性实施例和实现方式。然而,所描述的主题可以以各种不同的形式来体现,因此,所覆盖或要求保护的主题旨在被解释为不限于本文阐述的任何示例性实施例。旨在为要求保护或覆盖的主题提供合理宽泛的范围。此外,例如,主题可以体现为用于存储计算机代码的方法、装置、组件、系统或非暂时性计算机可读介质。因此,实施例可以例如采取硬件、软件、固件、存储介质或其任意组合的形式。例如,上述方法实施例可以由包括存储器和处理器的组件、装置或系统通过执行存储在存储器中的计算机代码来实现。The above figures and description provide specific exemplary embodiments and implementations. The described subject matter may, however, be embodied in a variety of different forms, therefore, it is intended that the subject matter covered or claimed should not be construed as limited to any of the exemplary embodiments set forth herein. It is intended to provide a reasonably broad scope for the subject matter claimed or covered. Also, for example, the subject matter can be embodied as a method, apparatus, component, system, or non-transitory computer-readable medium for storing computer code. Thus, embodiments may, for example, take the form of hardware, software, firmware, storage media or any combination thereof. For example, the above-mentioned method embodiments may be implemented by components, devices or systems including a memory and a processor by executing computer codes stored in the memory.
在整个说明书和权利要求书中,除了明确陈述的含义之外,术语在上下文中可能具有暗示或隐含的细微差别的含义。同样,本文使用的短语“在一个实施例/实现方式中”不一定指相同的实施例,本文使用的短语“在另一个实施例/实现方式中”不一定指不同的实施例。例如,要求保护的主题旨在整体或部分包括示例性实施例的组合。Throughout the specification and claims, terms may have implied or implied nuanced meanings from context to context, in addition to the expressly stated meaning. Likewise, the phrase "in one embodiment/implementation" as used herein does not necessarily refer to the same embodiment, and the phrase "in another embodiment/implementation" as used herein does not necessarily refer to a different embodiment. For example, it is intended that the claimed subject matter comprises, in whole or in part, combinations of the exemplary embodiments.
一般而言,术语可以至少部分地从上下文中的使用来理解。例如,本文使用的术语“和”、“或”、“和/或”可以包括多种含义,这些含义可以至少部分取决于使用这些术语的上下文。通常,“或”(如果用于关联一个列表,例如,A、B或C)旨在表示:A、B和C,在此处用于包含的意义;以及A、B或C,在此处用于排他的意义。此外,本文使用的术语“一个或多个”至少部分取决于上下文,可以用来描述单数意义上的任何特征、结构或特性,或者可以用来描述复数意义上的特征、结构或特性的组合。类似地,术语“a”、“an”或“the”可以被理解为传达单数用法或传达复数用法,这至少部分取决于上下文。此外,术语“基于”可以被理解为不一定旨在传达一组排他的因素,而是可以允许存在不一定明确描述的额外因素,这同样至少部分取决于上下文。In general, a term can be understood at least in part from its usage in context. For example, the terms "and", "or", "and/or" as used herein can include multiple meanings that can depend at least in part on the context in which these terms are used. In general, "or" (if used to associate a list, e.g., A, B, or C) is intended to mean: A, B, and C, here in an inclusive sense; and A, B, or C, here used in an exclusive sense. In addition, the term "one or more", as used herein, may be used to describe any feature, structure or characteristic in the singular, or may be used to describe a combination of features, structures or characteristics in the plural, depending at least in part on the context. Similarly, the terms "a", "an" or "the" may be read to convey singular usage or to convey plural usage, depending at least in part on the context. Furthermore, the term "based on" may be understood as not necessarily intended to convey an exclusive set of factors, but rather may allow for the presence of additional factors not necessarily explicitly described, again depending at least in part on context.
在整个说明书中,对特征、优点或类似语言的引用并不意味着可以用本方案实现的所有特征和优点应该是其任何单个实现方式或包括在其任何单个实现方式中。相反,涉及特征和优点的语言被理解为意指结合实施例描述的特定特征、优点或特性包括在本方案的至少一个实施例中。因此,在整个说明书中,对特征和优点的讨论以及类似的语言可以但不一定指同一实施例。Throughout this specification, references to features, advantages, or similar language do not imply that all features and advantages that may be realized with the present solution should be or included in any single implementation thereof. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussion of the features and advantages, and similar language, throughout this specification may, but do not necessarily, refer to the same embodiment.
此外,在一个或多个实施例中,可以以任何合适的方式组合本方案的所述特征、优点和特性。相关领域的普通技术人员将认识到,根据本文的描述,本方案可以在没有特定实施例的一个或多个具体特征或优点的情况下实施。在其他情况下,在某些实施例中可以认识到可能不存在于本方案的所有实施例中的额外特征和优点。Furthermore, the described features, advantages, and characteristics of the present solutions may be combined in any suitable manner in one or more embodiments. Those of ordinary skill in the relevant art will recognize, from the description herein, that the present aspects can be practiced without one or more of the specific features or advantages of a particular embodiment. In other cases, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present invention.
Claims (20)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/119263 WO2022067627A1 (en) | 2020-09-30 | 2020-09-30 | A method for preventing leakage of authentication sequence number of a mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116569516A true CN116569516A (en) | 2023-08-08 |
Family
ID=80951117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202080104240.XA Pending CN116569516A (en) | 2020-09-30 | 2020-09-30 | Method for preventing leakage of authentication serial number of mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116569516A (en) |
WO (1) | WO2022067627A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023193927A1 (en) * | 2022-04-08 | 2023-10-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Freshness indication of a suci, and verification thereof |
CN115278664A (en) * | 2022-07-14 | 2022-11-01 | 中国信息通信研究院 | A wireless device authentication instruction method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1767429A (en) * | 2004-10-29 | 2006-05-03 | 大唐移动通信设备有限公司 | Mobile communication user certification and key negotiation method |
WO2006064359A1 (en) * | 2004-12-17 | 2006-06-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Clone-resistant mutual authentication in a radio communication network |
CN110536292A (en) * | 2019-04-28 | 2019-12-03 | 中兴通讯股份有限公司 | The method and apparatus and authentication method and device of transmission terminal serial number |
CN111669276A (en) * | 2019-03-07 | 2020-09-15 | 华为技术有限公司 | A network verification method, device and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756460B (en) * | 2017-11-06 | 2021-07-09 | 中移(杭州)信息技术有限公司 | A kind of anti-replay attack method and device |
-
2020
- 2020-09-30 WO PCT/CN2020/119263 patent/WO2022067627A1/en active Application Filing
- 2020-09-30 CN CN202080104240.XA patent/CN116569516A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1767429A (en) * | 2004-10-29 | 2006-05-03 | 大唐移动通信设备有限公司 | Mobile communication user certification and key negotiation method |
WO2006064359A1 (en) * | 2004-12-17 | 2006-06-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Clone-resistant mutual authentication in a radio communication network |
CN111669276A (en) * | 2019-03-07 | 2020-09-15 | 华为技术有限公司 | A network verification method, device and system |
CN110536292A (en) * | 2019-04-28 | 2019-12-03 | 中兴通讯股份有限公司 | The method and apparatus and authentication method and device of transmission terminal serial number |
Non-Patent Citations (1)
Title |
---|
3GPP: "Technical Specification Group Services and SystemAspects;Study on authentication enhancements in 5G System(Release17)", 《3GPP TR 33.846 V0.7.0》, 1 September 2020 (2020-09-01), pages 3 - 2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2022067627A1 (en) | 2022-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11863982B2 (en) | Subscriber identity privacy protection against fake base stations | |
US8397071B2 (en) | Generation method and update method of authorization key for mobile communication | |
Liu et al. | Toward a secure access to 5G network | |
CN108880813B (en) | A method and device for realizing an attachment process | |
US11159940B2 (en) | Method for mutual authentication between user equipment and a communication network | |
US11909869B2 (en) | Communication method and related product based on key agreement and authentication | |
Khan et al. | Defeating the downgrade attack on identity privacy in 5G | |
EP2932676A1 (en) | Authenticating public land mobile networks to mobile stations | |
CN108012266A (en) | A kind of data transmission method and relevant device | |
CN101237444A (en) | Key processing method, system and device | |
TWI878539B (en) | A method for preventing encrypted user identity from replay attacks | |
CN116569516A (en) | Method for preventing leakage of authentication serial number of mobile terminal | |
Saxena et al. | BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users | |
Ginzboorg et al. | Privacy of the long-term identities in cellular networks | |
US10700854B2 (en) | Resource management in a cellular network | |
US20170078288A1 (en) | Method for accessing communications network by terminal, apparatus, and communications system | |
CN115699672B (en) | Method for protecting encrypted user identities from replay attacks | |
CN112865975B (en) | Message security interaction method and system and signaling security gateway device | |
WO2022183427A1 (en) | Method, device, and system for protecting sequence number in wireless network | |
US20250063364A1 (en) | Communication method and network element device | |
US20250119475A1 (en) | Communication method and apparatus | |
Akman et al. | Providing Identity Privacy in 5G Networks by Using Pseudonyms | |
Ji et al. | A Scheme for Authentication and Traceability of 5G Mobile Terminal Based on IPv6 and Blockchain | |
Fidelis et al. | ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |