CN116669024A - Communication method and communication device - Google Patents

Communication method and communication device Download PDF

Info

Publication number
CN116669024A
CN116669024A CN202210151704.3A CN202210151704A CN116669024A CN 116669024 A CN116669024 A CN 116669024A CN 202210151704 A CN202210151704 A CN 202210151704A CN 116669024 A CN116669024 A CN 116669024A
Authority
CN
China
Prior art keywords
information
parameter
rule
key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210151704.3A
Other languages
Chinese (zh)
Inventor
王文会
熊晓春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202210151704.3A priority Critical patent/CN116669024A/en
Priority to PCT/CN2023/077260 priority patent/WO2023155911A1/en
Publication of CN116669024A publication Critical patent/CN116669024A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)

Abstract

The application provides a communication method and a communication device, which can be applied to various communication systems, such as a 4G system, a 5G system, a WiFi system and the like. The method comprises the following steps: and obtaining and using the periodically updated first encryption parameter and second encryption parameter to generate a dynamic key, and using the dynamic key to encrypt and decrypt the bottom layer signaling in a physical layer so as to reduce the risk of the attack of the bottom layer signaling, thereby improving the security of the bottom layer signaling.

Description

Communication method and communication device
Technical Field
The present application relates to the field of communications, and in particular, to a communication method and a communication device.
Background
Currently, higher layer signaling may be encrypted to ensure communication security. In other words, the underlying signaling generally does not perform encryption operations, and there is still a significant information security risk. Taking the protocol architecture diagram of a communication system shown in fig. 1 as an example, the present ciphering operation is limited to ciphering non-access stratum (NAS) and higher layer signaling such as radio resource control (radio resource control, RRC) layer, packet data convergence protocol (packet data convergence protocol, PDCP), and the like, and to radio link control (radio link control, RLC), medium access control (media access control, MAC) layer, and physical layer (PHY) without any ciphering measures, resulting in poor security of the underlying signaling.
Disclosure of Invention
The embodiment of the application provides a communication method and a communication device, which can solve the problem that a certain information security risk still exists due to the fact that a bottom signaling does not have encryption measures, and can improve the security of the bottom signaling.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, a communication method is provided. The method comprises the following steps: sending first information to terminal equipment and receiving second information from the terminal equipment; the second information indicates that the first information was received successfully. And generating a key based on a preset rule, and encrypting or decrypting the physical layer by using the key.
In a second aspect, a communication method is provided. The method comprises the following steps: receiving first information from access network equipment and sending second information to the access network equipment; the second information indicates that the first information was received successfully. And generating a key based on a preset rule, and encrypting or decrypting the physical layer by using the key.
Wherein the first information and the second information may be carried in an RRC message.
Based on the communication methods of the first and second aspects, the access network device and the terminal device may simultaneously start the key generated based on the same rule (such as a preset rule) by means of exchanging handshake information (such as the first information and the second information), and perform physical layer encryption and decryption operation on the bottom signaling, so as to solve the problem that the existing encryption scheme cannot encrypt the bottom signaling, thereby improving the communication security of the bottom signaling.
In a third aspect, a communication method is provided. The method comprises the following steps: and sending third information to the terminal equipment, wherein the third information is used for transmitting the first data. Determining that the first data transmission is successful, and sending fourth information to the terminal equipment; the fourth information is used for transmitting second data, and the second data is different from the first data. And generating a key based on a preset rule, and encrypting or decrypting the second data by using the key in a physical layer.
In a fourth aspect, a communication method is provided. The method comprises the following steps: receiving third information from the access network device, the third information being used for transmitting the first data, and receiving fourth information from the access network device; the fourth information is used for transmitting second data, and the second data is different from the first data. And generating a key based on a preset rule, and decrypting or encrypting the second data by using the key in a physical layer.
Wherein the third information and the fourth information may be carried in a new data indication (new data indicator, NDI) field of the downlink control information.
Based on the communication methods of the third and fourth aspects, the access network device and the terminal device may simultaneously start the key generated based on the same rule (such as a preset rule) by means of exchanging handshake information (such as third information and fourth information), and perform physical layer encryption and decryption operation on the bottom signaling, so as to solve the problem that the existing encryption scheme cannot encrypt the bottom signaling, thereby improving the security of the bottom signaling.
Further, the communication methods described in the first and second aspects and the communication methods described in the third and fourth aspects may further perform encryption and decryption operations on higher layer signaling, such as NAS signaling, RRC signaling, and data, in the physical layer, so as to further improve the difficulty of cracking the higher layer signaling and data that have been encrypted in the higher layer, thereby further improving the security of the higher layer signaling and data.
The preset rules comprise a first rule, a second rule and a third rule. Correspondingly, the key generation method based on the preset rule specifically comprises the following steps: based on the first rule, a first encryption parameter is obtained. Acquiring a second encryption parameter based on a second rule; the update period of the first encryption parameter is greater than the update period of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter. Based on the third rule, key generation parameters of the key algorithm model are generated using the first encryption parameter and the second encryption parameter. And inputting the key generation parameters into a key algorithm model to generate the key. Wherein the first rule comprises: selecting a plurality of first fields in a plurality of first messages based on a first selection rule, and combining the plurality of first fields based on a first combination rule to obtain a first encryption parameter; the second rule includes: selecting a plurality of second fields in the plurality of second messages based on a second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain a second encryption parameter; the third rule includes: and selecting a plurality of third fields in the first encryption parameter and/or a plurality of fourth fields in the second encryption parameter based on a third selection rule, and combining the plurality of third fields and/or the plurality of fourth fields by adopting a third combination rule to obtain a key generation parameter of the key algorithm model.
The key algorithm model can adopt a Latin array-based chaotic key generation algorithm model, such as a chaotic logic (chaos logic) model, a chaotic Chebyshev (chaos Chebyshev) model and the like, and the comparison of the application is not limited.
That is, the access network device and the terminal device generate the 2 encryption parameters based on the same rule, and obtain the key generation parameter generation key of the same key algorithm model based on the 2 encryption parameters, so as to ensure that the physical layer keys generated by the access network device and the terminal device are the same, thereby ensuring the consistency of the encryption and decryption operations of the physical layer.
And the key generation parameters of the key algorithm model are generated by the access network equipment and the terminal equipment according to the 2 encryption parameter generation based on the same rule, and transmission between the access network equipment and the terminal equipment is not needed, so that the leakage risk of the key generation parameters is avoided, and the safety of the bottom signaling can be further improved.
In addition, since the update period of the first encryption parameter is greater than the update period of the second encryption parameter, for example, the first encryption parameter may be determined according to a higher layer signaling parameter with a longer update period, and the second encryption parameter may be determined according to a physical layer measurement value and/or an RRC measurement value with a shorter update period, so as to further improve the randomness of the physical layer key, thereby further improving the security of the underlying signaling.
Specifically, the key generation parameter may include an initial parameter and a forking parameter, the initial parameter is determined according to the first encryption parameter and/or the second encryption parameter, the forking parameter may also be determined according to the first encryption parameter and/or the second encryption parameter, and the initial parameter is different from the forking parameter. For example, the initial parameter and the bifurcation parameter may be generated based on different generation rules, so as to ensure that the initial parameter is different from the bifurcation parameter, and further ensure randomness of the generated key, so as to increase cracking difficulty and further improve security of the underlying signaling.
Optionally, the first encryption parameter is determined according to one or more of: higher layer signaling parameters, or first random numbers. The second encryption parameter includes one or more of: a measured value, or a second random number. In other words, the first encryption parameter and the second encryption parameter can be determined together according to a plurality of periodically updated parameters, for example, the combination of different bit fields of the plurality of parameters can enable the generated key to have unpredictability and randomness, so that cracking difficulty is increased, and security is further improved.
Wherein the higher layer signaling parameters include one or more of the following: RRC layer signaling parameters, or NAS layer signaling parameters. The measurements include one or more of the following: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
Further, the RRC layer signaling parameters include: user level physical channel configuration parameters.
In one possible design, the physical layer encryption or decryption using a key includes: as a transmitting device, a key may be used to perform one or more of the following operations on constellation points of signaling and/or data to be transmitted: phase rotation, or rearrangement. Or, as a receiving end device, using the key, performing one or more of the following operations on received signaling and/or constellation points of data: phase inverse rotation, or re-ordering inverse transformation. In other words, the sending and receiving end devices of the signaling and/or the data can generate the first encryption parameter and the second encryption parameter based on the same rule and generate the key based on the same key generation algorithm, so that the sending and receiving end devices can use the same key to perform smooth communication, the key does not need to be transmitted between the sending and receiving end devices, the risk of key leakage can be avoided, and therefore safety is further improved.
In a fifth aspect, a communication device is provided. The device comprises: the device comprises a processing module and a receiving and transmitting module. The receiving and transmitting module is used for sending the first information to the terminal equipment and receiving the second information from the terminal equipment; the second information indicates that the first information was received successfully. And the processing module is used for generating a key based on a preset rule and performing physical layer encryption or decryption by using the key.
In a sixth aspect, a communication device is provided. The device comprises: the device comprises a processing module and a receiving and transmitting module. The receiving and transmitting module is used for receiving the first information from the access network equipment and transmitting the second information to the access network equipment; the second information indicates that the first information was received successfully. And the processing module is used for generating a key based on a preset rule and performing physical layer encryption or decryption by using the key.
Wherein the first information and the second information may be carried in an RRC message.
In a seventh aspect, a communication device is provided. The device comprises: the device comprises a processing module and a receiving and transmitting module. The receiving and transmitting module is used for sending third information to the terminal equipment, and the third information is used for transmitting the first data. And the processing module is used for determining that the first data transmission is successful. The receiving and transmitting module is also used for transmitting fourth information to the terminal equipment; the fourth information is used for transmitting second data, and the second data is different from the first data. And the processing module is also used for generating a key based on a preset rule, and encrypting or decrypting the second data by using the key in the physical layer.
In an eighth aspect, a communication device is provided. The device comprises: the device comprises a processing module and a receiving and transmitting module. The receiving and transmitting module is used for receiving third information from the access network equipment, and the third information is used for transmitting the first data. The transceiver module is also used for receiving fourth information from the access network equipment; the fourth information is used for transmitting second data, and the second data is different from the first data. And the processing module is used for generating a key based on a preset rule, and decrypting or encrypting the second data by using the key in a physical layer.
Wherein, the third information and the fourth information are carried in the new data indication NDI field of the downlink control information.
In one possible embodiment, the preset rules include a first rule, a second rule, and a third rule. Correspondingly, the processing module is further configured to perform the following steps: acquiring a first encryption parameter based on a first rule; acquiring a second encryption parameter based on a second rule; the updating period of the first encryption parameter is larger than that of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter; generating a key generation parameter of the key algorithm model based on the third rule using the first encryption parameter and the second encryption parameter; and inputting the key generation parameters into a key algorithm model to generate the key. Wherein the first rule comprises: selecting a plurality of first fields in a plurality of first messages based on a first selection rule, and combining the plurality of first fields based on a first combination rule to obtain a first encryption parameter; the second rule includes: selecting a plurality of second fields in the plurality of second messages based on a second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain a second encryption parameter; the third rule includes: and selecting a plurality of third fields in the first encryption parameter and/or a plurality of fourth fields in the second encryption parameter based on a third selection rule, and combining the plurality of third fields and/or the plurality of fourth fields by adopting a third combination rule to obtain a key generation parameter of the key algorithm model.
The key algorithm model can adopt a Latin array-based chaotic key generation algorithm model, such as a chaotic logic model, a chaotic chebyshev model and the like, and the comparison of the method is not limited.
Specifically, the key generation parameter includes an initial parameter and a bifurcation parameter, the initial parameter is determined according to the first encryption parameter and/or the second encryption parameter, the bifurcation parameter is determined according to the first encryption parameter and/or the second encryption parameter, and the initial parameter is different from the bifurcation parameter.
Optionally, the first encryption parameter is determined according to one or more of: higher layer signaling parameters, or first random numbers. The second encryption parameter includes one or more of: a measured value, or a second random number.
Wherein the higher layer signaling parameters include one or more of the following: RRC layer signaling parameters, or NAS layer signaling parameters. The measurements include one or more of the following: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
Further, the RRC layer signaling parameters include: user level physical channel configuration parameters.
In one possible embodiment, the processing module is specifically configured to perform the following steps: using the key, performing one or more of the following on constellation points of signaling and/or data to be transmitted: phase rotation, or rearrangement. Alternatively, the key is used to perform one or more of the following operations on received signaling and/or constellation points of data: phase inverse rotation, or re-ordering inverse transformation.
Optionally, the transceiver module may further include a transmitting module and a receiving module. Wherein the transmitting module is configured to implement the transmitting function of the communication device according to any one of the fifth to eighth aspects, and the receiving module is configured to implement the receiving function of the communication device according to any one of the fifth to eighth aspects.
Optionally, the communication device according to any one of the fifth to eighth aspects may further include a storage module, where the storage module stores a program or instructions. The program or instructions, when executed by the processing module, enable the communication device to perform the communication method of any one of the first to fourth aspects.
The communication device according to the fifth or seventh aspect may be an access network device, or may be a chip (system) or other components or assemblies that may be disposed in the access network device, or may be a device or system or network that includes the access network device, which is not limited in this aspect of the present application.
Similarly, the communication apparatus according to the sixth aspect or the eighth aspect may be a terminal device, or may be a chip (system) or other parts or components that may be disposed in the terminal device, or may include the terminal device, the system, or the network, which is not limited in this aspect of the present application.
Further, the technical effects of the communication apparatus according to the fifth aspect to the eighth aspect may refer to the technical effects of the communication method according to the first aspect to the fourth aspect, and are not repeated here.
In a ninth aspect, a communication apparatus is provided. The communication device includes: a processor coupled to the memory, the processor configured to execute a computer program stored in the memory, to cause the communication device to perform the communication method of any one of the first to fourth aspects.
In a tenth aspect, there is provided a communication apparatus comprising: a processor and a memory; the memory is configured to store a computer program which, when executed by the processor, causes the communication apparatus to perform the communication method according to any one of the first to fourth aspects.
In an eleventh aspect, there is provided a communication apparatus comprising: a processor; the processor is configured to execute the communication method according to any one of the first to fourth aspects according to a computer program in a memory after being coupled to the memory and reading the computer program.
In a possible implementation form of the communication device according to any of the ninth to eleventh aspects, the communication device may further comprise a transceiver. The transceiver may be a transceiver circuit or an interface circuit. The transceiver may be used for the communication device to communicate with other communication devices. Alternatively, the transceiver may include a receiver and a transmitter. Wherein the receiver is configured to implement a receiving function of the communication device, and the transmitter is configured to implement a transmitting function of the communication device.
In the present application, the communication apparatus according to any one of the ninth to eleventh aspects may be a terminal device or an access network device, or a chip (system) or other parts or components that may be disposed in the terminal device or the access network device, or an apparatus including the terminal device or the access network device.
Further, the technical effects of the communication apparatus according to the ninth aspect to the eleventh aspect may refer to the technical effects of the communication method according to the first aspect to the fourth aspect, and are not described here again.
In a twelfth aspect, a communication system is provided. The communication system comprises a terminal device and an access network device.
In a thirteenth aspect, there is provided a computer-readable storage medium comprising: computer programs or instructions; the computer program or instructions, when run on a computer, cause the computer to perform the communication method of any of the first to fourth aspects.
In a fourteenth aspect, there is provided a computer program product comprising a computer program or instructions which, when run on a computer, cause the computer to perform the communication method of any of the first to fourth aspects.
Drawings
FIG. 1 is a schematic diagram of a protocol architecture of a communication system;
FIG. 2 is a schematic diagram of higher layer signaling with encryption measures;
FIG. 3 is a flow diagram of physical layer scrambling of payloads;
FIG. 4 is a flow chart of another physical layer scrambling of payloads;
fig. 5 is a schematic diagram of a communication system according to an embodiment of the present application;
fig. 6 is a schematic flow chart of a communication method according to an embodiment of the present application;
fig. 7 is a schematic diagram of phase rotation of constellation points according to an embodiment of the present application;
fig. 8 is a schematic diagram of reordering constellation points according to an embodiment of the present application;
fig. 9 is a second schematic flow chart of a communication method according to an embodiment of the present application;
fig. 10 is a flowchart of a communication method according to an embodiment of the present application;
FIG. 11 is an example of a first rule provided by an embodiment of the present application;
fig. 12 is a flow chart of a communication method according to an embodiment of the present application;
fig. 13 is a flow chart of a communication method according to an embodiment of the present application;
fig. 14 is a flowchart of a communication method according to an embodiment of the present application;
fig. 15 is a flow chart of a communication method according to an embodiment of the present application;
Fig. 16 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 17 is a schematic diagram of a second structure of a communication device according to an embodiment of the present application.
Detailed Description
As described in the background, the existing ciphering measures are only for higher layer signaling, and ciphering measures are not taken for each protocol layer signaling below the PDCP layer, resulting in low security of the lower layer signaling. Further description is provided below in connection with fig. 1 and 2.
Illustratively, fig. 1 is a schematic diagram of a protocol architecture of a communication system. As shown in fig. 1, the communication system includes a terminal device, an access network device, and a core network device, and the terminal device includes a NAS layer, an RRC layer, a PDCP layer, an RLC layer, a MAC layer, and a physical layer from top to bottom. Wherein the NAS layer is used for the terminal device to communicate with the NAS layer of the core network device, and the RRC layer, the PDCP layer, the RLC layer, the MAC layer and the physical layer are used for communicating with the protocol layers having the same names in the access network device.
It should be noted that, protocol layer entities disposed in 2 devices and used for executing the same name are generally referred to as peer-to-peer protocol layer entities, that is, peer-to-peer protocol layer entities. For example, the NAS layer entity in the terminal device and the NAS layer entity in the core network device are a pair of peer protocol layer entities. For another example, the RRC layer entity in the terminal device and the RRC layer entity in the access network device are another pair of peer-to-peer protocol layer entities.
It should be appreciated that when a certain protocol layer entity of the sender device encrypts the signaling, a peer protocol layer entity in the receiver device needs to decrypt the signaling, and the peer may recover the original content of the signaling, i.e. the payload (payload). The sending end device and the receiving end device can be terminal devices, one can be terminal devices, the other can be access network devices, and the other can be access network devices. For example, one of the terminal device and the access network device is a transmitting end device, and the other is a receiving end device. For another example, one of the terminal device and the core network device is a transmitting end device, and the other is a receiving end device. For another example, one of the two terminal devices is a transmitting-end device, and the other is a receiving-end device.
The transmitting device and the receiving device are described with respect to a transmission direction of a certain signaling or data to be transmitted. Thus, the sender device and the receiver device for different signaling or data may be different. For example, device 1 sends signaling to device 2, for which signaling device 1 is the transmitting end device and device 2 is the receiving end device. For another example, device 2 sends data to device 1, for which device 2 is the transmitting device and device 1 is the receiving device.
It should be understood that, in addition to sending signaling and/or data, the sending end device may also receive signaling and/or data from other devices, and similarly, the receiving end device may also send signaling and/or data to other devices, so as to implement communication or bidirectional communication with multiple devices.
The following describes the encrypted transmission procedure of the higher layer signaling with reference to fig. 1. For the transmitting end equipment, the RRC layer adds RRC layer encapsulation information to the original content (payload+check bit) of the RRC signaling, generates RRC signaling plaintext, and transmits the RRC signaling plaintext and the RRC key to the PDCP layer. The PDCP layer encrypts a payload (RRC signaling plain text) of the RRC signaling using the RRC key to generate an RRC signaling plain text, and then adds PDCP encapsulation information to generate PDCP protocol data units (protocol data unit, PDUs) (PDCP encapsulation information+rrc signaling plain text), and issues the PDCP PDUs to the RLC layer. Then, the RLC layer adds RLC encapsulation information to the PDCP PDU to generate an RLC PDU and sends the RLC PDU to the MAC layer, and the MAC layer adds MAC encapsulation information to the RLC PDU to generate an MAC PDU and sends the MAC PDU to the physical layer. The physical layer performs operations such as channel coding, modulation, up-conversion and the like on the MAC PDU, and sends out the MAC PDU through a radio frequency antenna.
For the receiving end equipment, the physical layer performs down-conversion, demodulation and decoding on the received signal containing the MAC PDU, recovers the MAC PDU, and sends the MAC PDU to the MAC layer. The MAC layer removes the MAC layer encapsulation information in the MAC PDU, restores the RLC PDU (decapsulation) and sends the RLC PDU to the RLC layer, and the RLC layer removes the RLC layer encapsulation information in the RLC PDU, restores the PDCP PDU and sends the PDCP PDU to the PDCP layer. The PDCP layer removes PDCP layer encapsulation information in the PDCP PDU, restores the RRC signaling ciphertext, decrypts the RRC signaling ciphertext by using an RRC layer key issued by the RRC layer, and accordingly restores the RRC signaling plaintext and sends the RRC signaling plaintext to the RRC layer. The RRC layer removes the RRC encapsulation information in the RRC PDU, and obtains the original content (payload+check bit) of the RRC signaling. In other words, the decryption operation at the receiving end is the inverse of the encryption operation at the transmitting end.
It is easy to understand that the RRC key used by the transmitting end device to encrypt and the RRC key used by the receiving end device to decrypt are typically generated based on the same key generation algorithm and key generation parameters to ensure that the receiving end uses the same key to encrypt or decrypt.
Similarly, for NAS signaling, encryption and decryption operations at the receiving and transmitting ends are similar to those of RRC signaling, and the difference is that the higher layer signaling targeted by the encryption and decryption operations is different. Specifically, for the transmitting end device, using the NAS key, encrypting the payload (NAS layer plaintext) of the NAS signaling to obtain the NAS layer ciphertext, then adding NAS layer encapsulation information to generate a PDU (including the NAS layer encapsulation information and the NAS layer ciphertext), and issuing the NAS PDU to the RRC layer. Similarly, for the receiving end device, receiving the NAS PDU recovered from the RRC layer, removing NAS layer encapsulation information to obtain NAS layer ciphertext, and then decrypting the NAS ciphertext by using the NAS key, thereby recovering NAS plaintext.
Note that, the encryption and decryption operations of each protocol layer from the RRC layer to the physical layer may refer to the encryption and decryption operations of the RRC signaling. For example, for NAS PDUs issued by the NAS layer, the RRC layer may directly add/remove RRC encapsulation information, or perform an RRC layer encryption/decryption operation on the NAS PDU, so as to further improve NAS signaling security.
Illustratively, fig. 2 is a schematic diagram of higher layer signaling with encryption measures. As shown in fig. 2, taking each flow of terminal equipment after power-up as an example, higher layer signaling involved in cell selection, random access, RRC connection establishment, authentication, NAS security, initial bearer establishment, initial context establishment, etc. all have encryption measures. The signaling involved in cell selection mainly includes a primary synchronization (primary synchronization signal, PSS), a secondary synchronization (secondary synchronization signal, SSS), a primary information block (main information block, MIB), a system information block (system information block, SIB) 1, the signaling involved in random access mainly includes a random access preamble (random access preamble, RAP) and a random access response (random access response, RAR), RRC connection establishment mainly includes a registration request (registration request), an RRC connection establishment request (rrcsetrequest), an RRC connection establishment (RRCSetup) and an RRC connection establishment completion (rrcsetcomplete), the signaling involved in authentication mainly includes an authentication request (AuthenticationRequest) and an authentication response (AuthenticationRequest), the signaling involved in NAS security mainly includes a security mode command (security modecond) and a security mode completion (security modecomplement), the signaling involved in AS security mainly includes an AS security mode command (AS SecurityModeCommand) and an AS security mode completion (AS SecurityModeComplete), and the signaling involved in RRC bearer establishment mainly includes an RRC connection establishment (rrcsetjuction) and an initial establishment (RRC connection establishment) respectively.
It should be noted that, the encryption measures of the above-mentioned higher layer signaling relate to encryption, integrity protection and anti-replay, and the above-mentioned higher layer signaling is only a part of the higher layer signaling related to the existing encryption measures, and may also relate to other higher layer signaling, which is not described herein again.
In connection with fig. 1 and 2, it can be known that the existing ciphering measures are limited to be implemented at a higher layer, specifically, RRC signaling and NAS signaling, and no ciphering measures are available for the underlying signaling, such as signaling of each protocol layer below the RLC layer, resulting in poor security of the underlying signaling.
In order to solve the problem that the security of the underlying signaling is poor because encryption measures are not taken by all protocol layers below the RLC layer, the prior art introduces a technical scheme for encrypting the payload by using a scrambling key at the physical layer. Two examples shown in fig. 3 and 4 are specifically described below.
Illustratively, fig. 3 and 4 are two examples of physical layer scrambling of payloads.
As shown in fig. 3, the transmitting device may generate a scrambling key based on a private shared key or the latest parameter, and use the scrambling key to perform a scrambling operation on a payload (also referred to as a payload), that is, bit field encryption, before channel coding of the physical layer.
Alternatively, the transmitting device may also phase rotate and reflect constellation points of quadrature phase shift keying (quadrature phase shift keying, QPSK) or quadrature amplitude modulation (quadrature amplitude modulation, QAM) based on an aggregate scrambling key, such as complex multiplication of the modulated payload and the modulated scrambling key, i.e. complex domain encryption.
As shown in fig. 4, the transmitting device may aggregate the payloads into K-bit sequences using a K (K Σ 2,K is a positive integer) bit aggregator, aggregate the scrambling sequences into M-bit reorder indexes (permutation index) using an M (M > K, M is a positive integer) bit aggregator, then input the K-bit sequences and the M-bit reorder indexes into a transformer (permutator), and replace the K-bit payload sequences with the M-bit scrambling indexes by the transformer, thereby implementing bit field encryption.
The physical layer scrambling method shown in fig. 3 and fig. 4 can use the scrambling key to scramble the bit field before the payload is encoded, and/or scramble the complex field after the payload is encoded, so as to achieve the effect of scrambling the payload, increase the cracking difficulty, and can be regarded as realizing the physical layer encryption.
However, the physical layer scrambling methods shown in fig. 3 and 4 do not specifically describe a specific generation method of the scrambling key, nor how the shared key or the latest parameters are obtained.
For this reason, a physical layer communication method based on a chaotic system (chaos system) and a latin array is also introduced. The specific flow is as follows: and converting the binary information sequence of the payload into a complex vector C through serial-parallel conversion and constellation mapping to obtain plaintext data (plain_data) C of the information to be encrypted. Then, generating a key set { K1, K2, latin array }, and phase adding (phase rotating) K1 and plaintext data to obtain ciphertext E1; multiplying (amplitude modulation) the corresponding element of the ciphertext E1 by K2 to obtain a ciphertext E2; and finally, rearranging and transforming the ciphertext E2 according to the element values in the Latin array to obtain final ciphertext data E.
Specifically, the key set { K1, K2, latin array } generation process is as follows:
selecting a chaotic system and initial parameters to generate a chaotic sequence x i
An extraction (Extract) function and a latin array are introduced:
D xi =mod(Extract(x i ,12,13,14),256)/512;
wherein the extraction function is to extract the input value x i The multi-bit fraction of the fractional part, e.g. 12, 13, 14 bit fraction, is used as a 3 bit integer to obtain unpredictability of the key. According to the above formula, a set of random data D between [0,0.5 ] can be obtained xi . Then, from k1=d xi X 4 pi gives the key K1 (0.ltoreq.k1.ltoreq.2pi) for phase rotation, from k2=d xi +0.75 yields the key K2 for amplitude conversion (0.75.ltoreq.K2.ltoreq.1.25).
For x i The following process is performed to obtain a sequence y i
y i =10 6 x i -floor(10 6 x i ),i=1,2,…,n;
For y i Ascending order arrangement is carried out to obtain y i Ordering information corresponding to the sequence number i, and constructing a Latin array based on the ordering information for constellation point index transformation (constellation point rearrangement).
However, the physical layer encryption key used in the physical layer communication method based on the chaotic system and the latin array is generated based on the chaotic system, but does not describe how the initial parameters and the bifurcation parameters of the chaotic system are obtained. Furthermore, the initial parameters need to be kept secret to ensure that the attacker cannot obtain the physical layer key. If the initial value is kept unchanged for a long time, the physical layer key generated based on the chaotic system is fixed, and an attacker can acquire the physical layer key and develop the attack in a known plaintext attack mode, namely the method still has a certain security risk.
In order to solve the problems of acquisition and confidentiality of initial parameters, the embodiment of the application provides a communication method, which can generate a dynamic key by using a first encryption parameter and a second encryption parameter which are updated periodically, does not need to transmit the key between receiving and transmitting end equipment, and encrypts and decrypts the bottom signaling and data in a physical layer by using the dynamic key, thereby reducing the leakage risk of the bottom signaling and improving the security of the bottom signaling.
It should be noted that, in the communication method provided by the embodiment of the present application, the physical layer encryption may be performed on the higher layer signaling and data again, so as to further improve the security of the higher layer signaling and data.
The technical scheme of the application will be described below with reference to the accompanying drawings.
The technical solution of the embodiment of the present application may be applied to various communication systems, such as a wireless fidelity (wireless fidelity, wiFi) system, a vehicle-to-object (vehicle to everything, V2X) communication system, an inter-device (D2D) communication system, a vehicle networking communication system, a 4th generation (4th generation,4G) mobile communication system, such as a long term evolution (long term evolution, LTE) system, a worldwide interoperability for microwave access (worldwide interoperability for microwave access, wiMAX) communication system, a fifth generation (5th generation,5G) mobile communication system, such as a new radio, NR) system, and future communication systems, such as a sixth generation (6th generation,6G) mobile communication system, and the like.
The present application will present various aspects, embodiments, or features about a system that may include a plurality of devices, components, modules, etc. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, combinations of these schemes may also be used.
In addition, in the embodiments of the present application, words such as "exemplary," "for example," and the like are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
In the embodiment of the present application, "information", "signal", "message", "channel", and "signaling" may be used in a mixed manner, and it should be noted that the meaning of the expression is consistent when the distinction is not emphasized. "of", "corresponding" and "corresponding" are sometimes used in combination, and it should be noted that the meaning of the expression is consistent when the distinction is not emphasized.
In the embodiment of the application, sometimes the subscript is W 1 May be misidentified as a non-subscripted form such as W1, the meaning it is intended to express being consistent when de-emphasizing the distinction.
The network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of the network architecture and the appearance of the new service scenario, the technical solution provided by the embodiments of the present application is applicable to similar technical problems.
To facilitate an understanding of embodiments of the present application, a communication system suitable for use in embodiments of the present application will be described in detail first.
Fig. 5 is a schematic diagram of a communication system to which the communication method according to the embodiment of the present application is applicable. As shown in fig. 5, the communication system includes an access network device and a terminal device.
The terminal equipment is a terminal which is accessed to the communication system and has a wireless receiving and transmitting function or a chip system which can be arranged on the terminal. The terminal device may also be referred to as a user equipment, access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, user terminal, wireless communication device, user agent, or user equipment. The terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), a vehicle-mounted terminal, an RSU with a terminal function, or the like. The terminal device of the present application may be a vehicle-mounted module, a vehicle-mounted component, a vehicle-mounted chip, or a vehicle-mounted unit that is built in a vehicle as one or more components or units, and the vehicle may implement the communication method provided by the present application through the built-in vehicle-mounted module, vehicle-mounted component, vehicle-mounted chip, or vehicle-mounted unit.
The access network device is a device located at the network side of the communication system and having a wireless transceiver function, or a chip system that can be disposed in the device. The access network device includes, but is not limited to: an Access Point (AP) in a wireless fidelity (wireless fidelity, wiFi) system, such as a home gateway, a router, a server, a switch, a bridge, etc., an evolved Node B (eNB), a radio network controller (radio network controller, RNC), a Node B (Node B, NB), a base station controller (base station controller, BSC), a base transceiver station (base transceiver station, BTS), a home base station (e.g., home evolved NodeB, or home Node B, HNB), a baseband unit (BBU), a wireless relay Node, a wireless backhaul Node, a transmission point (transmission and reception point, TRP, transmission point, TP), etc., may also be a 5G, such as a gbb in a new air interface (NR) system, or a transmission point (TRP, TP), one or a group of base stations (including multiple antenna panels) antenna panels in a 5G system, or may also be network nodes constituting a gbb or transmission point, such as a baseband unit (BBU), or a distributed base station unit (base station unit), a distributed unit (rsdu), etc., a base station unit (rsdu), etc.
The core network device may include one or more of the following devices in the core network: a mobility management entity (moblity management entity, MME), an access and mobility management function (access and mobility management function, AMF) network element, or other device.
It should be noted that, the communication method provided in the embodiment of the present application may be applicable to the communication between the access network device and the terminal device shown in fig. 5, and specific implementation may refer to the following method embodiments, which are not described herein.
It should be noted that the solution in the embodiment of the present application may also be applied to other communication systems, and the corresponding names may also be replaced by names of corresponding functions in other communication systems.
It should be appreciated that fig. 5 is a simplified schematic diagram that is merely illustrative for ease of understanding, and that other devices may be included in the communication system, not shown in fig. 5.
The communication method provided by the embodiment of the present application will be specifically described with reference to fig. 6 to 15.
In some embodiments, the access network device and the terminal device may initiate physical layer encryption based on the trigger mechanism shown in fig. 6.
Fig. 6 is a schematic flow chart of a communication method according to an embodiment of the present application. The communication method can be applied to the communication system shown in fig. 5, and the communication between the access network device and the terminal device is performed.
As shown in fig. 6, the method includes the steps of:
s601, the access network equipment sends first information to the terminal equipment, and the terminal equipment receives the first information from the access network equipment.
The first information is used for indicating the terminal equipment to start physical layer encryption.
In one possible design, the first information may include higher layer signaling parameters, and the first information may be carried in an RRC message. In view of the fact that the existing encryption scheme has encryption measures for the high-level signaling, the first information can be ensured to be transmitted in an encryption mode, so that leakage risk is reduced, and safety is further improved.
Illustratively, the RRC message carrying the first information may include a higher layer signaling such as a radio resource control (radio resource control, RRC) reconfiguration message or other downlink RRC message, without limitation.
In another possible design, the first information may also be carried in configuration information of a downlink hybrid automatic repeat request (hybrid automatic repeat reQuest, HARQ), such as may be transmitted in a new data indicator (new data indicator, NDI) field in downlink control information (downlink control information, DCI).
Specifically, the access network device may send the first information (e.g., ndi=0) to the terminal device in a physical downlink control channel (physical downlink control channel, PDCCH). The PDCCH is used for indicating and scheduling configuration information of a physical downlink shared channel (physical downlink shared channel, PDSCH) carrying a user specific parameter (UE-specific parameters) of the terminal device, such as a time-frequency resource, a demodulation decoding parameter, and the like. Then, the access network device sends a PDSCH carrying the user-specific parameters to the terminal device.
S602, the terminal equipment sends second information to the access network equipment, and the access network equipment receives the second information from the terminal equipment.
Wherein the second information indicates that the first information and the user-specific parameter were received successfully.
In one possible design, the second information may also be carried in an RRC message similar to the first information described above. Similarly, in view of the fact that in the existing encryption scheme, the high-level signaling is provided with encryption measures, the fact that the second information is transmitted in an encryption mode can be guaranteed, the leakage risk is reduced, and therefore safety is further improved.
Illustratively, the RRC message carrying the second information may include: RRC reconfiguration complete (rrcrecon complete) or other uplink RRC complete (RRCComplete) message, without limitation.
It should be noted that, the second information may be understood as response information or feedback information of the first information, through interaction between the first information and the second information, the access network device and the terminal device agree on a time for starting the operation procedure of physical layer encryption, generate the same key based on a preset rule as described in S603 below, and encrypt or decrypt the underlying signaling based on the same key, so that the problem of transmission failure of the underlying signaling caused by inconsistent understanding of the encryption time, the key used for encryption and the encryption object by the access network device and the terminal device can be avoided, and reliability and security of transmission of the underlying signaling can be improved.
In another possible embodiment, the terminal device may send the second information to the access network device, provided that the terminal device has received the first information and the user-specific parameter from the access network device. The second information may be downlink HARQ feedback information, such as acknowledgement (ACKnowledgement, ACK), and may be carried for transmission in a physical uplink control channel (physical uplink control channel, PUCCH).
It should be noted that, in the process of exchanging the first information and the second information based on the downlink HARQ process mechanism in S601-S602, the same downlink HARQ process may be used to simplify the operation flow, thereby improving the efficiency.
Thus, after the terminal device successfully receives the first information and the user-specific parameter from the access network device, the second information may be sent to the access network device, and S603 described below may be performed to generate or update the key. Accordingly, after the access network device receives the second information from the terminal device, it may be known that the terminal device has successfully received the first information and the user-specific parameter, and then the access network device may flip the value of NDI, for example, to ndi=1, and perform S603 described below to generate or update the key.
S603, the access network device and the terminal device generate a key based on a preset rule.
Specifically, the access network device and the terminal device may generate the first encryption parameter and the second encryption parameter based on the same rule, generate the key generation parameter based on the first encryption parameter and/or the second encryption parameter, and input the key generation parameter into the same key generation model, so as to generate the same key, and for specific implementation, reference may be made to a method embodiment shown in fig. 10 below, which is not described herein.
S604, the access network device and the terminal device use the secret key to encrypt or decrypt the physical layer.
Specifically, the access network device and the terminal device may perform physical layer encryption or decryption on the same underlying signaling using the key generated in S603.
Taking downlink signaling and/or data as an example, the access network device is a sending end device, the terminal device is a receiving end device, and physical layer encryption is performed by using a key, which may include: the access network device uses the key to execute one or more of the following operations on the constellation points of the downlink signaling and/or data to be sent: phase rotation, or rearrangement.
For phase rotation of constellation points, the phase encryption keys K1, k1=x×2pi, k1 e (-2pi, 2pi) of constellation points may be calculated first. Then, according to K1, constellation phase rotation is carried out, S' =S×e jK1 Wherein S is the constellation point before phase rotation and S' is the constellation point after phase rotation.
Fig. 7 is a schematic diagram of phase rotation of constellation points according to an embodiment of the present application. As shown in fig. 7, 4 black points represent QPSK constellation points without phase rotation, 4 circles represent QPSK constellation points with phase rotation, and two points in the first quadrant in the IQ plane are taken as an example, and the phase deviation between the two sets of constellation points is K1. Thus, the attacker does not know the phase rotation amount, so that the attack difficulty can be increased, and the safety is improved.
For the rearrangement of the constellation point indexes, the random sequence x can be firstly arranged (ascending or descending) to obtain a random sequence z m , z m =x n . Wherein N is more than or equal to 1 and less than or equal to N, m is more than or equal to 1 and less than or equal to N, N, m and N are positive integers, and at least one N and m exist, so that N is not equal to m. Then, extract [ x ] 1 ,…,x N ]And the rearranged indexes serve as a physical layer encryption key K, and the indexes of the constellation points of the effective information are rearranged and scrambled.
Fig. 8 is a schematic diagram of constellation point reordering according to an embodiment of the present application. As shown in fig. 8, taking n=8 as an example, each element in the random sequence x before sorting is s in turn 1 ,s 2 ,s 3 ,s 4 ,s 5 ,s 6 ,s 7 ,s 8 Each element in the ordered random sequence z is s in turn 5 ,s 2 ,s 3 ,s 4 ,s 1 ,s 8 ,s 7 ,s 6 The index values before and after the ordering are changed from 1,2,3,4,5,6,7 and 8 to 5,2,3,4,1,8,7,6, so that the arrangement sequence of each constellation point is disturbed, and the method can be used for reassigning sub-carriers (sub-carriers) for each constellation point, namely, the mapping relation between the constellation point and the frequency domain resource is disturbed, thereby improving the attack difficulty and the security.
It should be noted that, the sorted index values may also be represented by a latin array or other data structures, which is not limited in the embodiments of the present application. In addition, for the specific implementation of the latin array for physical layer encryption, reference may be made to the existing implementation, and details are omitted here.
The access network device then sends the physical layer encrypted instructions and/or data to the terminal device.
The access network device may send the physical layer encrypted instruction and/or data to the terminal device through the Uu port, and the specific implementation may refer to the existing implementation, which is not described in detail in the embodiments of the present application.
The terminal device then uses the key to perform physical layer decryption.
In one possible design, the physical layer decryption using a key includes: the terminal device uses the key to perform one or more of the following operations on the received signaling and/or constellation points of the data: phase inverse rotation, or re-ordering inverse transformation. The phase inverse rotation or rearrangement inverse transformation is the inverse process of the phase rotation and rearrangement, respectively, and will not be described herein.
In other words, the access network device and the terminal device can generate the first encryption parameter and the second encryption parameter based on the same rule, and generate the key based on the same key generation algorithm, so that the access network device and the terminal device can be ensured to use the same key for smooth communication, the key does not need to be transmitted between the access network device and the terminal device, and the risk of key leakage can be avoided, thereby further improving the security.
It should be noted that, the above example is described by taking physical layer encryption and decryption of downlink signaling and/or data as an example, and the operation is also applicable to physical layer encryption and decryption of uplink signaling and/or data, which are not described herein again.
In addition, the communication method shown in fig. 6 may further encrypt and decrypt the higher layer signaling, such as NAS signaling, RRC signaling, and data, in the physical layer, so as to further improve the difficulty of cracking the higher layer signaling and data that have been encrypted in the higher layer, thereby further improving the security of the higher layer signaling and data.
Further, the uplink and downlink signaling and/or data may exist alone or may exist in both directions. When at least two of the uplink and downlink signaling and/or data exist, dynamic keys can be customized for various signaling or data respectively, so that the security is further improved. For example, dynamic keys can be customized for uplink signaling, uplink data, downlink signaling, and downlink data, respectively, so as to independently perform physical layer encryption and decryption.
Based on the communication method shown in fig. 6, the access network device and the terminal device can start to generate a key based on the same rule (such as a preset rule) simultaneously in a manner of exchanging handshake information (such as first information and second information), and use the key to perform physical layer encryption and decryption operation on the bottom layer signaling, so that the problem that the conventional encryption scheme does not encrypt the bottom layer signaling can be solved, and the communication security of the bottom layer signaling is improved.
In other embodiments, the access network device and the terminal device may also initiate the physical layer encryption flow based on the trigger mechanism shown in fig. 9.
Fig. 9 is a schematic flow chart of a communication method according to an embodiment of the present application. The communication method can be applied to the communication system shown in fig. 5, and the communication between the access network device and the terminal device is performed.
As shown in fig. 9, the method includes the steps of:
s901, the access network equipment sends third information to the terminal equipment, and the terminal equipment receives the third information from the access network equipment.
The third information is used to instruct the terminal device to transmit first data, where the first data may be a user specific parameter sent by the terminal device to the access network device, and the third information may be carried in a new data indication (new data indicator, NDI) field of the DCI.
For example, the access network device may send the third information to the terminal device in an NDI field of DCI carrying configuration information of an uplink HARQ process, where the DCI is used to indicate configuration information of an uplink physical shared channel (physical uplink shared channel, PUSCH) for the terminal device to send the user-specific parameter to the access network device, as ndi=0 may be used to represent the third information.
S902, the access network equipment determines that the first data transmission is successful.
Specifically, if the access network device receives the user specific parameter from the terminal device on the PUSCH configured in S901, it may be determined that the terminal device has successfully received the third information, and the access network device may generate fourth information, for example, may flip the value of NDI, i.e., ndi=1, to notify the terminal device to start physical layer encryption.
S903, the access network device sends fourth information to the terminal device, and the terminal device receives the fourth information from the access network device.
The fourth information is used for transmitting second data, and the second data is different from the first data. In other words, when the next data needs to be transmitted, the access network device instructs the terminal device to update the key, so as to further improve security.
Specifically, similar to the third information, the fourth information may also be carried in the NDI field of the DCI.
Thus, after the access network device successfully receives the user-specific parameters from the terminal device, the fourth information may be sent to the terminal device, and S904 described below may be performed to update the key. Accordingly, when the terminal device detects that the values of the third information and the fourth information are different, it can be known that the access network device has successfully received the user-specific parameter from the terminal device, and the terminal device can execute S904 described below to update the key.
S904, the access network device and the terminal device generate a key based on a preset rule.
Specifically, the access network device and the terminal device may generate the first encryption parameter and the second encryption parameter based on the same rule, generate the key generation parameter based on the first encryption parameter and/or the second encryption parameter, and input the key generation parameter into the same key generation model to generate the same key, and the specific implementation may refer to a method embodiment shown in fig. 8 below, which is not described herein again.
S905, the access network device and the terminal device perform physical layer encryption or decryption on the second data using the key.
The access network device and the terminal device may perform physical layer encryption or decryption operation on the same underlying signaling using the key generated in S904.
It should be noted that, the first data and the second data may be data agreed by the access network device and the terminal device, may be signaling, or may be data, which is not limited herein.
Based on the communication method shown in fig. 9, the access network device and the terminal device can start to generate a key based on the same rule (such as a preset rule) simultaneously in a manner of exchanging handshake information (such as third information and fourth information), and use the key to perform physical layer encryption and decryption operation on the bottom layer signaling, so that the problem that the conventional encryption scheme does not encrypt the bottom layer signaling can be solved, and the security of the bottom layer signaling is improved.
In some embodiments, the preset rule may include a first rule, a second rule, and a third rule. Accordingly, the generation of the key based on the preset rule may be embodied as the communication method shown in fig. 10.
As shown in fig. 10, the method includes the steps of:
s1001, the access network device and the terminal device acquire a first encryption parameter based on a first rule.
Wherein the first rule comprises: a plurality of first fields in the plurality of first messages are selected based on a first selection rule, and the plurality of first fields are combined based on a first combination rule to obtain a first encryption parameter. Wherein the first message may include one or more of the following: RRC signaling, or NAS signaling. The first message may be provided by the terminal device to the access network device when the first message comprises NAS signaling.
Optionally, the first encryption parameter is determined according to one or more of: higher layer signaling parameters, or first random numbers.
Wherein the higher layer signaling parameters include one or more of the following: RRC layer signaling parameters, or NAS layer signaling parameters.
The RRC layer signaling parameters may include one or more of the following: downlink RRC layer signaling parameters, or uplink RRC layer signaling parameters. Illustratively, the downlink RRC layer signaling may include downlink signaling related to the procedures of cell selection, random access, RRC connection establishment, default bearer establishment, AS security, etc. shown in fig. 2, and the uplink RRC layer signaling may include uplink signaling related to the procedures of cell selection, random access, RRC connection establishment, default bearer establishment, AS security, etc. shown in fig. 2.
Optionally, the downlink RRC layer signaling parameters include: user level physical channel configuration parameters. Illustratively, the user-level physical channel configuration parameters may include configuration parameters for one or more of the following physical channels: the specific parameters may include a start and length indicator value (start and length indicator, SLIV), a control-resource set (CORESET), a UE-specific search space (UE specific search space, USS), etc.
The NAS layer signaling parameters described above may include one or more of the following: downlink NAS layer signaling parameters, or uplink NAS layer signaling parameters. Illustratively, the downlink NAS layer signaling may include downlink signaling related to the flows of authentication, NAS security, registration, initial context setup, etc. shown in fig. 2, and the uplink NAS layer signaling may include uplink signaling related to the flows of authentication, NAS security, registration, initial context setup, etc. shown in fig. 2.
Correspondingly, the NAS layer signaling parameters may include an uplink NAS layer signaling parameter and a downlink NAS layer signaling parameter, and the terminal device may send the uplink NAS layer signaling parameter to the access network device after determining the uplink NAS layer signaling parameter, and/or the terminal device may obtain the downlink NAS layer signaling parameter after analyzing the downlink NAS layer signaling, and send the downlink NAS layer signaling parameter to the access network device. For example, the terminal device may send NAS layer signaling parameters to the access network device using uplink RRC layer signaling and/or uplink data channels.
The first random number may be provided by the access network device and/or the terminal device, for example, may be a random parameter defined in the protocol, or a newly added random parameter, which is not limited herein.
It should be noted that the first encryption parameter may be provided by the access network device (see S1201 and S1401 described below), or may be provided by the access network device (see S1301 and S1501 described below), which is not limited herein.
How to generate the first ciphering parameter according to the following first rule based on the unpredictable parameter in the RRC signaling message is described below in connection with one example.
Based on a first selection rule, 2 unpredictable parameters x and y of 16 bits (or 4 8 bits) are selected, such as scrambling code identification (PDCCH-DMRS-scrambling id,0,1, …, 65535) of demodulation reference signals (demodulation reference signal, DMRS) of PDCCH in control resource set (control resource set), scrambling code identification 0 (scrambling id0, 1, …, 65535) in DMRS-downlink configuration (DMRS-downlink config) or scrambling code identification 1 (scrambling id1,0,1, …, 65535), scrambling code identification 0 (scrambling id0, 1, …, 65535) or scrambling code identification 1 (scrambling id1,0,1, …, 65535) in DMRS-uplink configuration (DMRS-uplink config), and so on.
Based on the first combination rule, please refer to fig. 11, let the last output bit length n=32, the single bit combination length m= 1/2/4/8/16, then x and y of 16 bits are split into k=n/M (16/8/4/2/1) bit combinations according to M bits, the K bit combinations of x and the K combinations of y are stored in a crossing manner, and the 32-bit random number first encryption parameters z, z e (0, …,2 ζ 32-1) are output.
It should be noted that the foregoing examples are merely illustrative examples of generating the first ciphering parameter, and the access network device and the terminal device may also generate the first ciphering parameter based on other RRC signaling and/or NAS signaling by using other combination rules, which is not limited in the embodiments of the present application.
S1002, acquiring a second encryption parameter based on a second rule.
Wherein the update period of the first encryption parameter is greater than the update period of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter, and the second rule includes: and selecting a plurality of second fields in the plurality of second messages based on the second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain a second encryption parameter.
Wherein the second encryption parameter comprises one or more of: a measurement, or a second random number, the measurement comprising one or more of: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
Specifically, the downlink physical layer measurement value, or the downlink RRC layer measurement value, may be provided by the terminal device (see S1202 and S1302, described below), and the uplink physical layer measurement value may be provided by the access network device (see S1402 and S1502, described below).
The downlink physical layer measurements may include one or more of: channel measurements and beam measurements of the serving cell.
Illustratively, the channel measurements may include: precoding matrix indication (precoding matrix indicator, PMI), channel quality indication (chanel quality indicator, CQI), rank Indication (RI), etc., the beam measurements may include beam identity and corresponding reference signal received power (reference signal receiving power, RSRP), reference signal received power (reference signal receiving quality, RSRQ), received signal strength indication (received signal strength indicator, RSSI), etc.
Illustratively, the downlink RRC layer measurements may include one or more of the following: beam measurements of the serving cell and neighbor cells. The beam measurements may include, among other things, beam identifications and corresponding RSRP, RSRQ, RSSI.
Illustratively, the uplink physical layer measurements may include one or more of the following: RSRP, signal-to-interference-and-noise ratio (signal to interference plus noise ratio, SINR), subband (sub-band) singular value decomposition (singular value decomposition, SVD) may be obtained based on measurements of uplink signals, such as sounding reference signals (sounding reference signal, SRS), DMRS.
The second random number may be provided by the access network device and/or the terminal device, and may be a random parameter defined in a protocol or a newly added random parameter, which is not limited in the present application.
It should be noted that, the first encryption parameter and the second encryption parameter may be generated by the terminal device and the access network device, using the above related parameters provided by the terminal device and the access network device, based on the same rule. Wherein the same rule may be to select the same bit field of the same parameter and combine it into the first encryption parameter and the second encryption parameter in the same order.
In addition, the first encryption parameter and the second encryption parameter may both adopt high-precision floating point numbers, and when generating the key in S1003 below, part or all of bits of the first encryption parameter and the second encryption parameter are selected as key generation parameters based on another same rule, so as to improve randomness of the key generation parameters, thereby further improving security.
Wherein, the update period T1 of the first encryption parameter is greater than the update period T2 of the second encryption parameter. For example, the update period T1 of the first encryption parameter may be on the order of seconds, such as 5 seconds, 10 seconds, 20 seconds, etc., and the update period T2 of the second encryption parameter may be on the order of milliseconds, such as 40 milliseconds, 80 milliseconds, 160 milliseconds, etc.
For ease of operation, the update period T1 of the first encryption parameter may be an integer multiple of the update period T2 of the second encryption parameter. In this way, the time boundary of the update period T1 of the first encryption parameter and the time boundary of the update period T2 of the second encryption parameter can be aligned, and the sending and receiving end device can update the key based on the same key update period, so that the problem of inconsistent keys used by the sending and receiving end device can be avoided, and the reliability can be improved. For example, the start time T1 of the update period T1 of the first encryption parameter may be aligned with the start time T2 of the first period in the update period T2 of the second encryption parameter, that is, t1=t2. As another example, the end time T3 of the update period T1 of the first encryption parameter may be aligned with the end time T4 of the last period in the update period T2 of the second encryption parameter, that is, t3=t4.
In other words, the first encryption parameter and the second encryption parameter can be determined together according to a plurality of periodically updated parameters, so that the generated secret key has unpredictability and randomness, and therefore cracking difficulty is increased, and security is further improved.
For specific implementation of the second selection rule and the second combination rule in the second rule, reference may be made to the content related to the first selection rule and the first combination rule in the first rule, which are not described herein.
Those skilled in the art will appreciate that in generating the first encryption parameter and the second encryption parameter, the sources of the messages for the two are different and that there may also be one or more of the following differences: the field selection rules are different, or the field combination rules are different, so that randomness of the first encryption parameter and the second encryption parameter is ensured, and the security is further improved.
S1003, based on the third rule, generating a key generation parameter of the key algorithm model using the first encryption parameter and the second encryption parameter.
Wherein the third rule comprises: and selecting a plurality of third fields in the first encryption parameter based on a third selection rule, and/or a plurality of fourth fields in the second encryption parameter, and combining the plurality of third fields by adopting a third combination rule, and/or the plurality of fourth fields to obtain the key generation parameter of the key algorithm model.
For the specific implementation of the third selection rule and the third combination rule in the third rule, reference may be made to the content related to the first selection rule and the first combination rule in the first rule, which are not described herein.
The key algorithm model may be a chaotic key generation algorithm model based on a latin array, such as a chaotic logic (chaos logic) model, a chaotic Chebyshev (chaos Chebyshev) model, and the like, which are not limited herein.
Specifically, the key generation parameter includes an initial parameter and a bifurcation parameter, the initial parameter is determined according to a first encryption parameter and/or a second encryption parameter, the bifurcation parameter may also be determined according to the first encryption parameter and/or the second encryption parameter, and the first encryption parameter is different from the second encryption parameter.
With continued reference to the example in S1001, assuming that a chaotic logic model is adopted, the initial parameters y_0=z/2≡32, y∈ (0.0, 1.0) may be selectively set, and the chaotic bifurcation parameters μ=3.569945672+z/2≡32 (4-3.569945672), 3.569945672< μ is less than or equal to 4.0.
It should be noted that, when the initial parameter of the key algorithm model is determined by the first encryption parameter, the bifurcation parameter of the key algorithm model may be determined by the second encryption parameter, or when the initial parameter of the key algorithm model is determined by the second encryption parameter, the bifurcation parameter of the key algorithm model may be determined by the first encryption parameter, or although the initial parameter and the bifurcation parameter are both determined by the first encryption parameter and the second encryption parameter together, the generation rule is different, such as the first rule is different from the second rule, so as to ensure randomness of the initial parameter and the bifurcation parameter, thereby further improving security.
S1004, inputting the key generation parameters into a key algorithm model to generate a key.
Specifically, the method comprises the following steps:
step 1, determining initial parameters and bifurcation parameters of a chaotic model, and inputting the initial parameters and bifurcation parameters into the chaotic model to obtain a random sequence y.
The first encryption parameter is denoted by P and the second encryption parameter is denoted by Q, and will be described in connection with 3 examples.
Example 1, a chaotic logic model is adopted, and an initial parameter (initial chaotic value) y of the chaotic logic model is set 0 =p, the bifurcation parameter (chaotic bifurcation parameter) μ=q, or the initial parameter y of the chaotic logic model is set 0 =q, the bifurcation parameter μ=p, and then the initial parameter and the bifurcation parameter are input into the chaotic logic model to obtain the random sequence y. The mathematical expression formula of the chaotic logic model is as follows:
y n+1 =μ*y n (1-y n ),y∈(0.0,1.0),3.569945672<μ≤4.0。
example 2, a chaotic chebyshev model is adopted, and an initial parameter y of the chaotic chebyshev model is set 0 =p, bifurcation parameter μ=q, or initial parameter y of chaotic chebyshev model is set 0 =q, the bifurcation parameter μ=p, and then the initial parameter and bifurcation parameter are input into the following chaotic chebyshev model, resulting in a random sequence y. The mathematical expression formula of the chaotic chebyshev model is as follows:
y n+1 =cos(μ*cos -1 (y n )),y∈(-1.0,1.0),2.0<μ。
Example 3, a two-stage chaotic model including a chaotic logic model and a chaotic chebyshev model is adopted, the generation method of the initial parameter and the bifurcation parameter of the former-stage chaotic model can refer to the above examples 1 and 2, one of the initial parameter and the bifurcation parameter of the latter-stage chaotic model can be determined according to the output of the former-stage chaotic model, and the others can still be determined by adopting the examples 1 and 2, so as to further improve the randomness of the random sequence y, thereby further improving the safety.
Step 2, a random sequence x is obtained by the following calculation. Wherein x is a high-precision floating point sequence, and the value range is from-1 to 1:
x=1-2*y,x∈(-1.0,1.0)。
and step 3, taking the time sequence x as a chaotic sequence to generate a key matrix, wherein the specific implementation can refer to the physical layer communication method based on the chaotic system (chaos system) and the Latin array, and the description is omitted here.
It should be noted that, the above steps 1 to 3 are only examples, and other types of key generation models may be used to generate the key, which is not limited by the present application.
In addition, the first encryption parameter and the second encryption parameter can be high-precision floating point numbers which are updated periodically (the updating period is T1 and T2 respectively, and T1 is greater than T2), the length of a random sequence generated by the chaotic model is very large, and a key sequence generated at one time is very long, so that each signaling and/or data in a period with the time length of T2 can be encrypted by using different keys, and the cracking difficulty and the cracking safety are further improved.
The length of the chaotic sequence may support a physical layer key for each signaling and data to be different for a period of time T2. For example, assuming that the update period T2 of the second encryption parameter is 20 ms, there are 40 slots in total, and the constellation points of each slot requiring physical layer encryption are 5000, the length of the generated chaotic sequence may be 40×5000=200000, so that the physical layer encryption keys used in each slot are different, so as to further improve security.
It should be noted that, the operations of generating the first encryption parameter and the second encryption parameter and generating the key based on the first encryption parameter and the second encryption parameter are independently executed by the access network device and the terminal device based on the same rule, and the key generation parameter and the key are not required to be transmitted, only various messages for determining the first encryption parameter and the second encryption parameter are required to be transmitted, so that the risk of key leakage can be further reduced.
And, the higher-layer parameters of the various parameters for determining the first encryption parameter and the second encryption parameter may be transmitted after encryption (by adopting the existing higher-layer encryption measures), so as to further improve the security.
In addition, physical layer parameters among various parameters for determining the first encryption parameter and the second encryption parameter are not encrypted, but since the update period of these parameters is very short (usually in the order of milliseconds, such as measurement period), and the specific rules for determining the first encryption parameter and the second encryption parameter according to these physical layer parameters later, and the key generation algorithm are built in the access network device and the terminal device, respectively, and transmission is not required. Therefore, it is difficult for an attacker to acquire a correct key and perform a valid attack in such a short time, thereby further improving security.
The first encryption parameter and the second encryption parameter may be provided by the terminal device alone, by the access network device alone, or by both the terminal device and the access network device, as will be described below in connection with several examples shown in fig. 12-15.
Fig. 12 is a schematic diagram illustrating an exemplary flow chart of a communication method according to an embodiment of the present application. As shown in fig. 12, the method specifically includes the following steps:
s1201, the access network device sends the first encryption parameter to the terminal device.
Specifically, after the access network device determines the first encryption parameter, the access network device may send the first encryption parameter to the terminal device through the Uu port. Wherein the first encryption parameter may include one or more of: a downlink RRC layer signaling parameter, or a first random number.
For specific contents and determining methods of the downlink RRC layer signaling parameter and the first random number, reference may be made to S1001, which is not described herein.
S1202, the terminal equipment sends a second encryption parameter to the access network equipment.
Specifically, after determining the second encryption parameter, the terminal device may send the second encryption parameter to the access network device through the Uu port. Wherein the second encryption parameter may include one or more of: downlink physical layer measurements, downlink RRC layer measurements, or a second random number.
For specific content and determination methods of the downlink physical layer measurement value, the downlink RRC layer measurement value, or the second random number, reference may be made to S1002, which is not described herein.
It should be noted that, both S1201 and S1202 may be steps that are periodically performed, and the execution period of S1201 is greater than that of S1202. In other words, S1202 may be performed a plurality of times within one execution period of S1201 so as to realize that the update period T1 of the first encryption parameter is larger than the update period T2 of the second encryption period.
S1203, the terminal device and the access network device generate a key based on the first encryption parameter and the second encryption parameter.
For a specific implementation of the key generation, reference may be made to S1003, which will not be described here.
S1204, the terminal device and/or the access network device performs physical layer encryption on the signaling and/or data based on the key.
Wherein, S1204, the terminal device and/or the access network device performs physical layer encryption on the signaling and/or the data based on the key, which may be specifically implemented as one or more of the following:
S1204A, the terminal equipment encrypts the uplink signaling and/or data on the basis of the key; or,
and S1204B, the access network equipment performs physical layer encryption on the downlink signaling and/or data based on the key.
For the specific implementation of the physical layer encryption, reference may be made to S604, which is not described herein.
S1205, transmitting the signaling and/or data encrypted by the physical layer between the terminal equipment and the access network equipment.
Wherein, S1205, signaling and/or data encrypted by the physical layer are transmitted between the terminal device and the access network device, which may be specifically implemented as one or more of the following:
S1205A, the terminal equipment sends the uplink signaling and/or data encrypted by the physical layer to the access network equipment; or,
S1205B, the access network device sends the downlink signaling and/or data encrypted by the physical layer to the terminal device.
S1206, the access network device and/or the terminal device decrypts the signaling and/or data encrypted by the physical layer based on the key.
Wherein, S1206, the access network device and/or the terminal device decrypts the signaling and/or data encrypted by the physical layer based on the key, which may be specifically implemented as one or more of the following:
S1206A, the access network device decrypts the uplink signaling and/or data encrypted by the physical layer based on the key; or alternatively, the first and second heat exchangers may be,
S1206B, the terminal device decrypts the physical layer encrypted downlink signaling and/or data based on the key.
For a specific implementation of the physical layer decryption, reference may be made to S604, which is not described herein.
S1207, the above-described S1202 to S1206 are repeatedly performed in the update period T2 of each second decryption parameter.
S1208, the above-described S1201 to S1207 are repeatedly performed in the update period T1 of each first decryption parameter.
Fig. 13 is a schematic diagram showing an exemplary flow of a communication method according to an embodiment of the present application. As shown in fig. 13, the method specifically includes the steps of:
s1301, the terminal equipment sends a first encryption parameter to the access network equipment.
Specifically, after determining the first encryption parameter, the terminal device may send the first encryption parameter to the access network device through the Uu port. Wherein the first encryption parameter may include one or more of: an uplink RRC layer signaling parameter, a NAS layer signaling parameter, or a first random number.
For specific content and determining method of the uplink RRC layer signaling parameter, the NAS layer signaling parameter, or the first random number, reference may be made to S1001, which is not described herein.
S1302, the terminal equipment sends a second encryption parameter to the access network equipment.
Specifically, after the terminal device obtains the second encryption parameter, the second encryption parameter may be sent to the access network device through the Uu port. Wherein the second encryption parameter may include one or more of: downlink physical layer measurements, downlink RRC layer measurements, or a second random number.
For specific content and determination methods of the downlink physical layer measurement value, the downlink RRC layer measurement value, or the second random number, reference may be made to S1002, which is not described herein.
It should be noted that, S1301 and S1302 may be steps that are periodically performed, and the execution period of S1301 is greater than the execution period of S1302. In other words, S1302 may be performed a plurality of times within the execution period of S1301 in order to realize that the update period T1 of the first encryption parameter is greater than the update period T2 of the second encryption period.
S1303, the terminal device and the access network device generate a key based on the first encryption parameter and the second encryption parameter.
For a specific implementation of the key generation, reference may be made to S1003, which will not be described here.
S1304, the terminal device and/or the access network device performs physical layer encryption on the signaling and/or data based on the key.
S1305, signaling and/or data encrypted by the physical layer is transmitted between the terminal device and the access network device.
S1306, the access network device and/or the terminal device decrypts the signaling and/or data encrypted by the physical layer based on the key.
For the specific implementation of S1304-S1306, reference may be made to S1204-S1206, which will not be repeated here.
S1307, the above-described S1302-S1306 are repeatedly executed in each update period T2 of the second decryption parameter.
S1308, the above-described S1301-S1307 are repeatedly executed in the update period T1 of each first decryption parameter.
Fig. 14 is a schematic diagram illustrating an exemplary flow chart of a communication method according to an embodiment of the present application. As shown in fig. 14, the method specifically includes the steps of:
s1401, the access network device sends the first encryption parameter to the terminal device.
Specifically, after the access network device determines the first encryption parameter, the access network device may send the first encryption parameter to the terminal device through the Uu port. Wherein the first encryption parameter may include one or more of: a downlink RRC layer signaling parameter, or a first random number.
For the specific content and determining method of the downlink RRC layer signaling parameter, or the first random number, reference may be made to S1001, which is not described herein.
S1402, the access network device sends the second encryption parameter to the terminal device.
Specifically, after the access network device determines the second encryption parameter, the access network device may send the second encryption parameter to the terminal device through the Uu port. Wherein the second encryption parameter may include one or more of: an uplink physical layer measurement, or a second random number.
For the specific content and determination method of the uplink physical layer measurement value or the second random number, reference may be made to S1002, which is not described herein.
It should be noted that, both S1401 and S1402 may be steps that are periodically executed, and the execution period of S1401 is greater than the execution period of S1402. In other words, S1402 may be performed multiple times within the execution period of one S1401 in order to realize that the update period T1 of the first encryption parameter is greater than the update period T2 of the second encryption period.
S1403, the terminal device and the access network device generate a key based on the first encryption parameter and the second encryption parameter.
For a specific implementation of the key generation, reference may be made to S1003, which will not be described here.
S1404, the terminal device and/or the access network device performs physical layer encryption on the signaling and/or data based on the key.
And S1405, transmitting the signaling and/or data encrypted by the physical layer between the terminal equipment and the access network equipment.
S1406, the access network device and/or the terminal device decrypts the signaling and/or data encrypted by the physical layer based on the key.
For the specific implementation of S1404-S1406, reference may be made to S1204-S1206, which will not be repeated here.
S1407, the above-described S1402-S1406 are repeatedly executed in the update period T2 of each second decryption parameter.
S1408, the above-described S1401 to S1407 are repeatedly executed in the update period T1 of each first decryption parameter.
Fig. 15 is a schematic flow chart of a communication method according to an embodiment of the present application. As shown in fig. 15, the method specifically includes the steps of:
s1501, the terminal device sends the first encryption parameter to the access network device.
Specifically, after determining the first encryption parameter, the terminal device may send the first encryption parameter to the access network device through the Uu port. Wherein the first encryption parameter may include one or more of: an uplink RRC layer signaling parameter, a NAS layer signaling parameter, or a first random number.
For specific content and determining method of the uplink RRC layer signaling parameter, the NAS layer signaling parameter, or the first random number, reference may be made to S1001, which is not described herein.
S1502, the terminal device sends the second encryption parameter to the access network device.
Specifically, after determining the second encryption parameter, the terminal device may send the second encryption parameter to the access network device through the Uu port. Wherein the second encryption parameter may include one or more of: downlink physical layer measurements, downlink RRC layer measurements, or a second random number.
For specific content and determination methods of the downlink physical layer measurement value, the downlink RRC layer measurement value, or the second random number, reference may be made to S1002, which is not described herein.
It should be noted that, both S1501 and S1502 may be steps that are periodically executed, and the execution period of S1501 is greater than the execution period of S1502. In other words, S1502 may be performed multiple times within one execution period of S1501 in order to realize that the update period T1 of the first encryption parameter is greater than the update period T2 of the second encryption period.
S1503, the terminal device and the access network device generate a key based on the first encryption parameter and the second encryption parameter.
For a specific implementation of the key generation, reference may be made to S1003, which will not be described here.
S1504, the terminal device or the access network device performs physical layer encryption on the signaling and/or data based on the key.
S1505, signaling and/or data encrypted by the physical layer is transmitted between the terminal device and the access network device.
And S1506, the access network device and/or the terminal device decrypts the signaling and/or data encrypted by the physical layer based on the key.
For the specific implementation of S1504-S1506, reference may be made to S1204-S1206, which will not be repeated here.
S1507, the above-described S1502 to S1506 are repeatedly executed in the update period T2 of each second decryption parameter.
S1508, the above-described steps S1501 to S1507 are repeatedly performed in the update period T1 of each first decryption parameter.
Based on the communication method shown in any one of fig. 6, fig. 9, fig. 10, or fig. 12 to fig. 15, a dynamic key can be generated by using the periodically updated first encryption parameter and second encryption parameter, without transmitting a key between transceiver devices, and the physical layer encryption and decryption are performed on the bottom layer signaling by using the dynamic key, so that the leakage risk of the bottom layer signaling is reduced, and the security of the bottom layer signaling is improved.
Furthermore, the communication method provided by the embodiment of the application can encrypt and decrypt the higher layer signaling (NAS signaling, RRC signaling) and/or data at the physical layer again so as to further improve the difficulty of cracking the higher layer signaling and data which are encrypted at the higher layer, thereby further improving the security of the higher layer signaling and data.
The communication method provided by the embodiment of the application is described in detail above with reference to fig. 6 to 15. A communication apparatus for performing the communication method provided by the embodiment of the present application is described in detail below with reference to fig. 16 to 17.
Fig. 16 is a schematic structural diagram of a communication device according to an embodiment of the present application. As shown in fig. 16, the communication apparatus 1600 includes: a processing module 1601 and a transceiver module 1602. For convenience of explanation, fig. 16 shows only major components of the communication apparatus.
In some embodiments, the communication apparatus 1600 may be adapted to perform the functions of the access network device in the communication method shown in fig. 6 or fig. 8 in the communication system shown in fig. 5.
Wherein, the transceiver module 1602 is configured to send the first information to the terminal device and receive the second information from the terminal device; the second information indicates that the first information was received successfully. A processing module 1601, configured to generate a key based on a preset rule, and perform physical layer encryption or decryption using the key.
In other embodiments, the communication apparatus 1600 may be adapted to perform the functions of a terminal device in the communication method shown in fig. 6 or 8 in the communication system shown in fig. 5.
Wherein, the transceiver module 1602 is configured to receive the first information from the access network device and send the second information to the access network device; the second information indicates that the first information was received successfully. A processing module 1601, configured to generate a key based on a preset rule, and perform physical layer encryption or decryption using the key.
Wherein the first information and the second information may be carried in an RRC message.
In still other embodiments, the communication apparatus 1600 may be adapted for use in the communication system shown in fig. 5 to perform the functions of the access network device in the communication method shown in fig. 7 or fig. 8.
The transceiver module 1602 is configured to send third information to the terminal device, where the third information is used to transmit the first data. A processing module 1601, configured to determine that the first data transmission is successful. The transceiver module 1602 is further configured to send fourth information to the terminal device; the fourth information is used for transmitting second data, and the second data is different from the first data. The processing module 1601 is further configured to generate a key based on a preset rule, and encrypt or decrypt the second data using the key.
In still other embodiments, the communication apparatus 1600 may be adapted for use in the communication system shown in fig. 5 to perform the functions of a terminal device in the communication method shown in fig. 7 or 8.
The transceiver module 1602 is configured to receive third information from the access network device, where the third information is used to transmit the first data. A transceiver module 1602, configured to receive fourth information from the access network device; the fourth information is used for transmitting second data, and the second data is different from the first data. A processing module 1601, configured to generate a key based on a preset rule, and decrypt or encrypt the second data using the key in a physical layer.
Wherein, the third information and the fourth information are carried in the new data indication NDI field of the downlink control information.
In one possible embodiment, the preset rules include a first rule, a second rule, and a third rule. Accordingly, the processing module 1601 is further configured to perform the following steps: acquiring a first encryption parameter based on a first rule; acquiring a second encryption parameter based on a second rule; the updating period of the first encryption parameter is larger than that of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter; generating a key generation parameter of the key algorithm model based on the third rule using the first encryption parameter and the second encryption parameter; and inputting the key generation parameters into a key algorithm model to generate the key. Wherein the first rule comprises: selecting a plurality of first fields in a plurality of first messages based on a first selection rule, and combining the plurality of first fields based on a first combination rule to obtain a first encryption parameter; the second rule includes: selecting a plurality of second fields in the plurality of second messages based on a second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain a second encryption parameter; the third rule includes: and selecting a plurality of third fields in the first encryption parameter and/or a plurality of fourth fields in the second encryption parameter based on a third selection rule, and combining the plurality of third fields and/or the plurality of fourth fields by adopting a third combination rule to obtain a key generation parameter of the key algorithm model.
The key algorithm model can adopt a Latin array-based chaotic key generation algorithm model, such as a chaotic logic model, a chaotic chebyshev model and the like, and the comparison of the method is not limited.
Specifically, the key generation parameter includes an initial parameter and a bifurcation parameter, the initial parameter is determined according to the first encryption parameter and/or the second encryption parameter, the bifurcation parameter is determined according to the first encryption parameter and/or the second encryption parameter, and the initial parameter is different from the bifurcation parameter.
Optionally, the first encryption parameter is determined according to one or more of: higher layer signaling parameters, or first random numbers. The second encryption parameter includes one or more of: a measured value, or a second random number.
Wherein the higher layer signaling parameters include one or more of the following: RRC layer signaling parameters, or NAS layer signaling parameters. The measurements include one or more of the following: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
Further, the RRC layer signaling parameters include: user level physical channel configuration parameters.
In one possible design, the processing module 1601 is specifically configured to perform the following steps: using the key, performing one or more of the following on constellation points of signaling and/or data to be transmitted: phase rotation, or rearrangement. Alternatively, the key is used to perform one or more of the following operations on received signaling and/or constellation points of data: phase inverse rotation, or re-ordering inverse transformation.
Alternatively, the transceiver module 1602 may include a transmit module and a receive module (not shown in fig. 16). The transmitting module is configured to implement a transmitting function of the communication device 1600, and the receiving module is configured to implement a receiving function of the communication device 1600.
Optionally, the communication device 1600 may also include a memory module (not shown in fig. 16) in which programs or instructions are stored. The processing module 1601, when executing the program or instructions, enables the communication device 1600 to perform the communication method illustrated in any of fig. 6-8, or fig. 12-15.
The communication apparatus 1600 may be an access network device, a chip (system) or other components or assemblies that may be disposed in the access network device, or an apparatus including the access network device, which is not limited in this aspect of the present application.
In addition, the technical effects of the communication device 1600 may refer to the technical effects of the communication method described in the above method embodiments, which are not described herein.
Fig. 17 is a schematic diagram of a second configuration of a communication device according to an embodiment of the present application. The communication device may be a terminal device or an access network device, or may be a chip (system) or other part or component that may be provided in the terminal device or the access network device. As shown in fig. 17, the communication device 1700 may include a processor 1701. Optionally, the communication device 1700 may also include a memory 1702 and/or a transceiver 1703. The processor 1701 is coupled to the memory 1702 and the transceiver 1703, such as by a communication bus.
The following describes each constituent element of the communication apparatus 1700 in detail with reference to fig. 17:
the processor 1701 is a control center of the communication apparatus 1700, and may be one processor or a collective term of a plurality of processing elements. For example, the processor 1701 is one or more central processing units (central processing unit, CPU), but may also be an integrated circuit (application specific integrated circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present application, such as: one or more microprocessors (digital signal processor, DSPs), or one or more field programmable gate arrays (field programmable gate array, FPGAs).
Alternatively, the processor 1701 may perform various functions of the communications apparatus 1700 by running or executing software programs stored in the memory 1702 and invoking data stored in the memory 1702.
In a particular implementation, the processor 1701 may include one or more CPUs, such as CPU0 and CPU1 shown in fig. 17, as an embodiment.
In a particular implementation, as one embodiment, the communication device 1700 may also include a plurality of processors, such as the processor 1701 and the processor 1704 shown in FIG. 2. Each of these processors may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 1702 is configured to store a software program for executing the solution of the present application, and the processor 1701 controls the execution of the software program, and the specific implementation may refer to the above method embodiment, which is not described herein again.
Alternatively, memory 1702 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that can store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, but may also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), compact disc read-only memory (compact disc read-only memory) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 1702 may be integral to the processor 1701 or may exist separately and be coupled to the processor 1701 through interface circuitry (not shown in fig. 17) of the communication device 1700, as embodiments of the present application are not limited in detail.
A transceiver 1703 for communication with other communication devices. For example, the communication apparatus 1700 is a terminal device, and the transceiver 1703 may be used to communicate with an access network device, or with another terminal device. As another example, the communication apparatus 1700 is an access network device, and the transceiver 1703 may be configured to communicate with a terminal device or another access network device.
Optionally, the transceiver 1703 may include a receiver and a transmitter (not separately shown in fig. 17). The receiver is used for realizing the receiving function, and the transmitter is used for realizing the transmitting function.
Alternatively, the transceiver 1703 may be integrated with the processor 1701 or may exist separately and be coupled to the processor 1701 through an interface circuit (not shown in fig. 17) of the communication device 1700, which is not specifically limited by the embodiment of the present application.
It should be noted that the structure of the communication device 1700 shown in fig. 17 is not limited to the communication device, and an actual communication device may include more or less components than those shown, or may combine some components, or may be different in arrangement of components.
In addition, the technical effects of the communication apparatus 1700 may refer to the technical effects of the communication method described in the above method embodiment, and will not be described herein.
The embodiment of the application provides a communication system. The communication system comprises one or more terminal devices as described above, and one or more access network devices. Optionally, the communication system may further include: core network equipment.
It should be appreciated that the processor in embodiments of the application may be a central processing unit (central processing unit, CPU), which may also be other general purpose processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), off-the-shelf programmable gate arrays (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It should also be appreciated that the memory in embodiments of the present application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example but not limitation, many forms of random access memory (random access memory, RAM) are available, such as Static RAM (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. When the computer instructions or computer program are loaded or executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wired (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more sets of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: there are three cases, a alone, a and B together, and B alone, wherein a, B may be singular or plural. In addition, the character "/" herein generally indicates that the associated object is an "or" relationship, but may also indicate an "and/or" relationship, and may be understood by referring to the context.
In the present application, "at least one" means one or more, and "a plurality" means two or more. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or an access network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (27)

1. A method of communication, comprising:
sending first information to terminal equipment;
receiving second information from the terminal device; the second information indicates that the first information is successfully received;
generating a key based on a preset rule;
the physical layer encryption or decryption is performed using the key.
2. A method of communication, comprising:
receiving first information from an access network device;
sending second information to the access network equipment; the second information indicates that the first information is successfully received;
generating a key based on a preset rule;
the physical layer encryption or decryption is performed using the key.
3. The communication method according to claim 1 or 2, characterized in that the first information and the second information are carried in RRC messages.
4. A method of communication, comprising:
transmitting third information to the terminal equipment, wherein the third information is used for transmitting the first data;
determining that the first data transmission is successful;
transmitting fourth information to the terminal equipment; the fourth information is used for transmitting second data, and the second data is different from the first data;
generating a key based on a preset rule;
and carrying out physical layer encryption or decryption on the second data by using the key.
5. A method of communication, comprising:
receiving third information from access network equipment, wherein the third information is used for transmitting first data;
receiving fourth information from the access network device; the fourth information is used for transmitting second data, and the second data is different from the first data;
generating a key based on a preset rule;
and performing physical layer decryption or encryption on the second data by using the key.
6. The communication method according to claim 4 or 5, wherein the third information and the fourth information are carried in a new data indication NDI field of downlink control information.
7. The communication method according to any one of claims 1 to 6, wherein the preset rule includes a first rule, a second rule, and a third rule;
The key generation method based on the preset rule specifically comprises the following steps:
acquiring a first encryption parameter based on the first rule;
acquiring a second encryption parameter based on the second rule; the updating period of the first encryption parameter is larger than that of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter;
generating a key generation parameter of a key algorithm model using the first encryption parameter and the second encryption parameter based on the third rule;
inputting the key generation parameters into the key algorithm model to generate the key;
wherein, the preset rule comprises: a first rule and a second rule; wherein,,
the first rule includes: selecting a plurality of first fields in a plurality of first messages based on a first selection rule, and combining the plurality of first fields based on a first combination rule to obtain the first encryption parameter;
the second rule includes: selecting a plurality of second fields in a plurality of second messages based on a second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain the second encryption parameter;
the third rule includes: and selecting a plurality of third fields in the first encryption parameter and/or a plurality of fourth fields in the second encryption parameter based on a third selection rule, and combining the plurality of third fields by adopting a third combination rule, and/or obtaining the key generation parameter of the key algorithm model by the plurality of fourth fields.
8. The communication method according to claim 7, wherein the key generation parameters include an initial parameter and a bifurcation parameter;
the initial parameter is determined according to the first encryption parameter and/or the second encryption parameter, the bifurcation parameter is determined according to the first encryption parameter and/or the second encryption parameter, and the initial parameter is different from the bifurcation parameter.
9. A method of communicating according to claim 7 or 8, wherein the first encryption parameter comprises one or more of: a higher layer signaling parameter, or a first random number;
the second encryption parameter includes one or more of: a measured value, or a second random number.
10. The communication method according to claim 9, wherein the higher layer signaling parameters include one or more of the following: RRC layer signaling parameters, or NAS layer signaling parameters;
the measurements include one or more of the following: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
11. The communication method according to claim 10, wherein the RRC layer signaling parameters include: user level physical channel configuration parameters.
12. The communication method according to any one of claims 7-11, wherein the physical layer encryption or decryption using the key comprises:
using the key, performing one or more of the following operations on constellation points of signaling and/or data to be transmitted: phase rotation, or rearrangement; or,
using the key, performing one or more of the following on constellation points of the received signaling and/or data: phase inverse rotation, or re-ordering inverse transformation.
13. A communication device, comprising: a processing module and a receiving-transmitting module; wherein,,
the receiving and transmitting module is used for sending first information to the terminal equipment;
the receiving and transmitting module is also used for receiving second information from the terminal equipment; the second information indicates that the first information is successfully received;
the processing module is used for generating a secret key based on a preset rule;
the processing module is also used for carrying out physical layer encryption or decryption by using the secret key.
14. A communication device, comprising: a processing module and a receiving-transmitting module; wherein,,
the receiving and transmitting module is used for receiving first information from access network equipment;
the receiving and transmitting module is further used for sending second information to the access network equipment; the second information indicates that the first information is successfully received;
The processing module is used for generating a secret key based on a preset rule;
the processing module is also used for carrying out physical layer encryption or decryption by using the secret key.
15. The communication apparatus according to claim 13 or 14, wherein the first information and the second information are carried in an RRC message.
16. A communication device, comprising: a processing module and a receiving-transmitting module; wherein,,
the receiving and transmitting module is used for sending third information to the terminal equipment, wherein the third information is used for transmitting the first data;
the processing module is used for determining that the first data transmission is successful;
the transceiver module is further configured to send fourth information to the terminal device; the fourth information is used for transmitting second data, and the second data is different from the first data;
the processing module is further used for generating a secret key based on a preset rule;
and the processing module is also used for encrypting or decrypting the second data by using the key in a physical layer.
17. A communication device, comprising: a processing module and a receiving-transmitting module; wherein,,
the transceiver module is configured to receive third information from an access network device, where the third information is used to transmit first data;
The transceiver module is further configured to receive fourth information from the access network device; the fourth information is used for transmitting second data, and the second data is different from the first data;
the processing module is used for generating a secret key based on a preset rule;
and the processing module is also used for decrypting or encrypting the second data by using the key in a physical layer.
18. The communication apparatus according to claim 16 or 17, wherein the third information and the fourth information are carried in a new data indication NDI field of downlink control information.
19. The communication device according to any one of claims 13-18, wherein the preset rules comprise a first rule, a second rule and a third rule;
the processing module is further configured to perform the following steps:
acquiring a first encryption parameter based on the first rule;
acquiring a second encryption parameter based on the second rule; the updating period of the first encryption parameter is larger than that of the second encryption parameter, and the first encryption parameter is different from the second encryption parameter;
generating a key generation parameter of a key algorithm model using the first encryption parameter and the second encryption parameter based on the third rule;
Inputting the key generation parameters into the key algorithm model to generate the key;
wherein, the preset rule comprises: a first rule and a second rule, the first rule being different from the second rule; wherein,,
the first rule includes: selecting a plurality of first fields in a plurality of first messages based on a first selection rule, and combining the plurality of first fields based on a first combination rule to obtain the first encryption parameter;
the second rule includes: selecting a plurality of second fields in a plurality of second messages based on a second selection rule, and combining the plurality of second fields by adopting a second combination rule to obtain the second encryption parameter;
the third rule includes: and selecting a plurality of third fields in the first encryption parameter based on a third selection rule, and/or combining a plurality of fourth fields in the second encryption parameter by adopting a third combination rule, and/or obtaining key generation parameters of the key algorithm model by the plurality of fourth fields.
20. The communication apparatus according to claim 19, wherein the key generation parameters include an initial parameter and a bifurcation parameter;
The initial parameter is determined according to the first encryption parameter and/or the second encryption parameter, the bifurcation parameter is determined according to the first encryption parameter and/or the second encryption parameter, and the initial parameter is different from the bifurcation parameter.
21. The communication device according to any of claims 19-20, wherein the first encryption parameter comprises one or more of: a higher layer signaling parameter, or a first random number;
the second encryption parameter includes one or more of: a measured value, or a second random number.
22. The communication apparatus of claim 21, wherein the higher layer signaling parameters comprise one or more of: RRC layer signaling parameters, or NAS layer signaling parameters;
the measurements include one or more of the following: downlink physical layer measurements, uplink physical layer measurements, or downlink RRC layer measurements.
23. The communications apparatus of claim 22, wherein the RRC layer signaling parameters comprise: user level physical channel configuration parameters.
24. The communication device according to any of the claims 19-23, characterized in that,
the processing module is further configured to perform the following steps:
Using the key, performing one or more of the following operations on constellation points of signaling and/or data to be transmitted: phase rotation, or rearrangement; or,
using the key, performing one or more of the following on constellation points of the received signaling and/or data: phase inverse rotation, or re-ordering inverse transformation.
25. A communication device, comprising: a processor coupled to the memory;
the processor configured to execute a computer program stored in the memory, to cause the communication apparatus to perform the communication method according to any one of claims 1-12.
26. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a computer program or instructions which, when run on a computer, cause the computer to perform the communication method according to any one of claims 1-12.
27. A computer program product, the computer program product comprising: computer program or instructions which, when run on a computer, cause the computer to perform the communication method according to any of claims 1-12.
CN202210151704.3A 2022-02-18 2022-02-18 Communication method and communication device Pending CN116669024A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210151704.3A CN116669024A (en) 2022-02-18 2022-02-18 Communication method and communication device
PCT/CN2023/077260 WO2023155911A1 (en) 2022-02-18 2023-02-20 Communication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210151704.3A CN116669024A (en) 2022-02-18 2022-02-18 Communication method and communication device

Publications (1)

Publication Number Publication Date
CN116669024A true CN116669024A (en) 2023-08-29

Family

ID=87577621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210151704.3A Pending CN116669024A (en) 2022-02-18 2022-02-18 Communication method and communication device

Country Status (2)

Country Link
CN (1) CN116669024A (en)
WO (1) WO2023155911A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006186869A (en) * 2004-12-28 2006-07-13 Tata Consultancy Services Ltd Method for improving security of encrypted transmission of information in network communications system
CN103916850B (en) * 2014-04-08 2017-02-15 中国科学院微电子研究所 Safe wireless communication method and device
CN110247752B (en) * 2019-07-02 2021-09-07 中山大学 Elliptic curve encryption-based LoRa chaotic communication system and implementation method thereof
CN112202511B (en) * 2020-09-29 2023-09-22 中国人民解放军战略支援部队信息工程大学 Physical layer key generation method and system based on channel characteristics

Also Published As

Publication number Publication date
WO2023155911A1 (en) 2023-08-24

Similar Documents

Publication Publication Date Title
CN102625300B (en) Generation method and device for key
CN110493774B (en) Key configuration method, device and system
EP4061046A1 (en) Oam-based communication method, related device and storage medium
JP5338816B2 (en) TRANSMISSION DEVICE, RECEPTION DEVICE, TRANSMISSION METHOD, AND RECEPTION METHOD
JP2020523894A (en) Reference signal transmitting method, reference signal receiving method, and communication device
CN116195351A (en) Secure communication link establishment for UE-to-UE relay
CN115767629A (en) Method and apparatus for wireless communication in a wireless communication system
JP2018519741A (en) Data transmission method, radio network node, and communication system
CN108347778A (en) Communication means and device
TW201639327A (en) Method and apparatus for securing structured proximity service codes for restricted discovery
CN115413413A (en) Relay sidelink communication for secure link establishment
KR20200003108A (en) Key generation methods, user equipment, devices, computer readable storage media, and communication systems
CN115152257A (en) Using keys derived from network access authentication apparatus and method for generating application specific key
KR102425582B1 (en) Apparatus and method for security protection in wireless communication system
JP2021528914A (en) Methods and devices for dynamically updating routing identifiers
KR20170112756A (en) Apparatus and method for generating secure key
US11722890B2 (en) Methods and systems for deriving cu-up security keys for disaggregated gNB architecture
CN111567095A (en) Method and apparatus for wireless communication in a wireless communication system
CN113841366A (en) Communication method and device
CN109936444B (en) Key generation method and device
CN115004741B (en) Certificate-based application descriptor for network slice selection
US11444741B2 (en) Unified scrambling of reference signals
CN116669024A (en) Communication method and communication device
CN107925874B (en) Ultra-dense network security architecture and method
CN112825498B (en) Authentication vector generation method, authentication vector acquisition method and authentication vector acquisition equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication