US20170085570A1 - Update of security for group based feature in m2m - Google Patents

Update of security for group based feature in m2m Download PDF

Info

Publication number
US20170085570A1
US20170085570A1 US15/370,782 US201615370782A US2017085570A1 US 20170085570 A1 US20170085570 A1 US 20170085570A1 US 201615370782 A US201615370782 A US 201615370782A US 2017085570 A1 US2017085570 A1 US 2017085570A1
Authority
US
United States
Prior art keywords
group
node
scs
message
mtc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/370,782
Inventor
Xiaowei Zhang
Anand Raghawa Prasad
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to US15/370,782 priority Critical patent/US20170085570A1/en
Publication of US20170085570A1 publication Critical patent/US20170085570A1/en
Priority to US16/560,348 priority patent/US11070955B2/en
Priority to US17/101,630 priority patent/US11659359B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W4/005
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices
    • H04W88/184Messaging devices, e.g. message centre
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Definitions

  • the present invention relates to a security solution for group based Machine-Type Communication (MTC) with the architecture newly provided in NPL 1.
  • the solution can support MTC-IWF (MTC-Interworking Function) to perform proper authorization to SCS (Services Capability Server) when a group message is sent from it.
  • MTC-IWF MTC-Interworking Function
  • SCS Services Capability Server
  • the present invention also relates to a mechanism to deliver and broadcast the group message securely.
  • SCS sends group message to network node of MTC-IWF and MTC-IWF will forward the group message to the target group of MTC devices.
  • the message is targeted to more than one MTC devices and may trigger these devices to communicate with network.
  • NPL 1 3GPP TS 23.682, “Architecture enhancements to facilitate communications with packet data networks and applications (Release 11)”, v11.1.0, 2012-06
  • NPL 2 3GPP TR 23.8xy, “Machine-Type and other Mobile Data Applications Communications Enhancements; (Release 12)”, V0.1.0, 2012-05
  • NPL 3 3GPP TR 33.868, “Security aspects of Machine-Type Communications; (Release 11)”, v0.8.0
  • MTC-IWF should perform SCS authorization to see if it can send a group message, especially when the message contains trigger.
  • a network node is placed within a core network.
  • This network node includes a reception means for receiving a message from a transmission source placed outside the core network, the message including an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network; and a determination means for determining to authorize the transmission source, when the indicator indicates that the message is addressed to the group.
  • a method provides a method of controlling a network node that is placed within a core network. This method includes receiving a message from a transmission source placed outside the core network, the message including an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network; and determining to authorize the transmission source, when the indicator indicates that the message is addressed to the group.
  • a MTC device includes a reception means for receiving a message from the core network, the message including an ID (identifier) for identifying whether or not the message is addressed to a group of one or more MTC devices; and a determination means for determining to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself.
  • ID identifier
  • determination means for determining to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself.
  • a method according to fourth exemplary aspect of the present invention provides a method of controlling a MTC device attached to a core network. This method includes receiving a message from the core network, the message including an ID for identifying whether or not the message is addressed to a group of one or more MTC devices; and determining to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself.
  • a gateway relays a message from a transmission source of the message placed outside a core network to a group of one or more MTC devices attached to the core network.
  • This gateway includes an acquisition means for acquiring a pair of group keys for the group of MTC devices to securely conduct communication with the transmission source; and a relaying means for relaying the message by use of the group keys.
  • a MTC device includes an acquisition means for acquire a pair of group keys for securely conducting communication with a transmission source that is placed outside the core network and transmits a message addressed to a group of one or more MTC devices; and a communication means for communicate with the transmission source by use of the group keys.
  • a method according to seventh exemplary aspect of the present invention provides a method of controlling gateway that relays a message from a transmission source of the message placed outside a core network to a group of one or more MTC devices attached to the core network.
  • This method includes acquiring a pair of group keys for the group of MTC devices to securely conduct communication with the transmission source; and relaying the message by use of the group keys.
  • a method according to eighth exemplary aspect of the present invention provides a method of controlling a MTC (Machine-Type-Communication) device attached to a core network.
  • This method includes acquiring a pair of group keys for securely conducting communication with a transmission source that is placed outside the core network and transmits a message addressed to a group of one or more MTC devices; and communicating with the transmission source by use of the group keys.
  • MTC Machine-Type-Communication
  • FIG. 1 is a block diagram showing an example of system architecture according to an exemplary embodiment of the present invention.
  • FIG. 2 is a sequence diagram showing an example of group message terminated at MTC device in a system according to the exemplary embodiment of the present invention.
  • FIG. 3 is a block diagram showing a configuration example of a network node placed according to the exemplary embodiment of the present invention.
  • FIG. 4 is a block diagram showing a configuration example of a MTC device according to the exemplary embodiment of the present invention.
  • FIG. 5 is a block diagram showing a configuration example of a gateway according to the exemplary embodiment of the present invention.
  • SA2 has started study on group based feature in TR 23.8xy v0.1.0 “Machine-Type and other Mobile Data Applications Communications Enhancements (Release 12)”.
  • SA3 should study security issue for release 12 according to the architectural requirements that SA2 provided.
  • the network shall provide a mechanism to distribute a group message from an SCS to those members of an MTC group located in a particular geographic area.
  • the group based messaging feature shall not require additional new functionality for UEs that do not use this feature.
  • the system shall support a mechanism where a UE that uses the group based messaging feature can efficiently recognize distributed group messages addressed to the UE.
  • the system shall provide an interface for the SCS to send a group message.
  • This interface shall be able to carry the following information:
  • the system shall be protected against overload resulting from devices responding to the distributed group message.
  • Group based messaging shall be supported in GERAN, UTRAN, and E-UTRAN access.
  • MTC-IWF receives a group message from SCS and forwards it to the target group of MTC devices.
  • MTC-IWF should be able to distinguish the group message from other messages.
  • the group message should have confidentiality and integrity protection and MTC devices which receive the message should be able to verify it.
  • Network should provide a means for SCS, which is located outside of 3GPP network, to communicate with the target group.
  • the group identification is used when SCS sends the group message. Similar with the UE identification, the group identification used in 3GPP network should not be sent over an external interface, and not be known by a node outside of 3GPP network. This applies for a SCS which is located outside of 3GPP network.
  • MTC-IWF should verify if the SCS is authorized to send group message to a given MTC group.
  • MTC-IWF should be able to distinguish group (trigger) message from other messages.
  • Group message that are distributed to the group of MTC devices should have confidentiality, integrity protection and replay protection.
  • MTC device which receives the group message should be able to verify if the group message is sent from an authorized SCS.
  • Group ID should not to be exposed to a node that is located outside of 3GPP network. This includes the SCS which is outside of 3GPP network as well.
  • MTC-IWF receives a group message from SCS and forwards it to the target group of MTC devices.
  • MTC-IWF should verify if the SCS is authorized to send group message to a given MTC group.
  • MTC-IWF should be able to distinguish group (trigger) message from other messages.
  • Group message that are distributed to the group of MTC devices should have confidentiality, integrity protection and replay protection.
  • MTC device which receives the group message should be able to verify if the group message is sent from an authorized SCS.
  • Group ID should not to be exposed to a node that is located outside of 3GPP network. This includes the SCS which is outside of 3GPP network as well.
  • FIGS. 1 to 5 An exemplary embodiment of the present invention will be described with reference to FIGS. 1 to 5 .
  • a system includes a core network (3GPP network), a plurality of MTC devices 10 which connect to the core network through a RAN (Radio Access Network), and an SCS 30 and an SME (Short Message Entity) 40 which serve as group message or group trigger sources placed outside the core network.
  • the RAN is formed by a plurality of base stations (i.e., eNBs (evolved Node Bs)).
  • each MTC device 10 is a UE for MTC connecting to the core network via the Um/Uu/LTE-Uu interface.
  • the UE can host one or multiple MTC Applications.
  • the corresponding MTC Applications in the external network are hosted on one or multiple as—(Application Servers).
  • the SCS 30 and the SME 40 connect to the core network to communicate with the MTC devices 10 .
  • the core network includes an MTC-IWF 21 and an HSS (Home Subscriber Server) 22 in the HPLMN (Home Public Land Mobile Network).
  • the MTC-IWF 21 serves as a network node which receives a group message or group trigger from its transmission source.
  • the MTC-IWF 21 receives a group message which can be also be a group trigger from the SCS 30 via Tsp interface or from the SME 40 via T 4 and Tsms interfaces, and forwards the group message to the MME (Mobility Management Entity), SGSN (Serving GPRS (General Packet Radio Service) Support Node) or MSC (Mobile Switching Centre), which serves as a network element forwarding the group message to the MTC device 10 , via T 5 b /T 5 a /T 5 c interface, so that the group message or group trigger can be routed to the MTC device 10 .
  • MME Mobility Management Entity
  • SGSN Serving GPRS (General Packet Radio Service) Support Node)
  • MSC Mobile Switching Centre
  • the HSS 22 or the MTC-IWF 21 can create and stores a mapping of an internal and external group IDs, and the HSS 22 generates a pair of group keys (which will be described later). One of the group keys is generated for encryption and decryption, another one is generated for integrity protection.
  • FIG. 2 shows the message sequence of group message sending to a group of MTC devices. There are more than one device in the MTC device group.
  • a gateway was proposed in a separate invention of PTL 1 which is responsible of receiving group message and send it to MTC devices, and send concatenated messages for MTC device communicating with network or SCS.
  • This exemplary embodiment proposes some new functions for the gateway and it can be either deployed in a network node or be an independent node.
  • (A) SCS 30 sends a group message over Tsp interface to MTC-IWF 21 (Step S 8 ).
  • the group message contains group ID and geography area information (this is described in NPL 2).
  • the message includes an indicator indicating whether the message is a group message or a non-group message. Therefore, the MTC-IWF 21 can distinguish the group message from the non-group message, thereby being able to perform a proper authorization to the SCS 30 as described at the following (B). Further, the indicator may indicate whether or not the group message contains trigger. In this case, the MTC-IWF 21 can also distinguish the group trigger from the group message or the non-group message.
  • MTC-IWF 21 performs authorization to SCS 30 , to see if it can send group message to the target group (Step S 9 ). This should be the same authorization procedure when MTC-IWF 21 sends a non-group message.
  • the authorization is based on the group information of group ID, geography area information received from SCS 30 and authorization data retrieved by MTC-IWF 21 from HSS 22 .
  • the group GW 50 can own more than one group. It can be a virtual function that deployed on any network node like eNB/MME/MTC-MF, or an independent node.
  • the group GW 50 broadcasts the group message to the target group of MTC devices (Step S 12 ).
  • the group message is broadcast only between the eNB and the MTC devices. Therefore, it is possible to avoid congestion of the core network.
  • the group GW 50 is deployed on the MME which serves as one of network elements connected to one or more base stations, it is possible to broadcast the group message over a plurality of areas while partly reducing the congestion of the core network.
  • HSS 22 generates a unique group ID for the group of MTC devices (Steps S 1 and S 3 ).
  • the HSS 22 can generate the group keys.
  • the group ID should not be exposed to SCS 30 thus HSS 22 will have a mapping of the group IDs and external use group IDs.
  • Internal use Group ID can be sent to MTC devices 10 , group GW 50 within the existing NAS or AS messages (Step S 4 ).
  • HSS 22 There can be two ways of generating an external group ID. It can be created by HSS 22 and provided to SCS 30 . Alternatively it can be created by SCS 30 and provided to HSS 22 (Step S 2 ). Either way, HSS will create the mapping of both group IDs.
  • the MTC-IWF 21 downloads the mapping from the HSS 22 (Step S 5 ), and stores it locally (Step S 6 ). Further, upon forwarding the group message to the group GW 50 at the above-mentioned Step S 10 , the MTC-IWF 21 refers to the mapping, thereby mapping the external group ID to the corresponding internal group ID in the group message.
  • the internal group ID shall be hidden from outside the core network. Therefore, it is possible to prevent a fraud group message from causing attack to the core network. Further, the external group ID is made effective only after the source authorization. Therefore, even if the external group ID is revealed to attackers, it is possible to prevent attack.
  • This exemplary embodiment proposes to use a pair of group keys for the group message confidentiality and integrity protection.
  • the group key is for all the MTC devices in a MTC group to have group key. This group key is the same for all the MTC devices in the group, and it is shared by them with group GW 50 and optionally with the other end where the group message is sent.
  • the group message transferring between group GW 50 and SCS 30 can be protected by IPsec or other existing network security solution.
  • Group GW 50 uses the group key to protect the group message and broadcasts it to the target group MTC devices.
  • the MTC devices and the group GW 50 acquire the group keys from the HSS 22 , so that the group keys are shared between the MTC devices and the group GW 50 .
  • group GW 50 will forward the group message and broadcast it as it is.
  • the MTC devices acquire the group keys as with the above-mentioned (A).
  • the SCS 30 acquire the group keys from the HSS 22 through the MTC-IWF 21 , so that the group keys are shared between the MTC devices and the SCS 30 . Therefore, it is possible to provide end-to-end security between MTC devices and SCS 30 .
  • MTC device can perform authorization to SCS 30 .
  • group GW 50 can perform authorization to SCS 30 with the group key and MTC device do not need to perform authorization.
  • group keys are shared between the MTC devices, the group GW 50 and the SCS 30 . Further, the group GW verifies the group message (decryption and integrity check) with the shared group key, thereby discarding the group message upon failing the verification. In this case, it is possible to avoid the broadcasting itself.
  • MTC device listens to the message but will only receive the message which contains the same group ID it has, then the MTC device will perform integrity check and decrypt the message with the shared group key (Steps S 13 and S 14 ).
  • the MTC device discards the group message. In this case, the MTC device does not need to verify the group message. Therefore, it is possible to reduce processing load on the MTC device.
  • the MTC device will listen to all the broadcasts and perform integrity check and decryption and only respond to the ones it can verify.
  • the MTC-IWF 21 includes at least a reception unit 211 and a determination unit 212 .
  • the reception unit 211 receives from the SCS 30 or the SME 40 the group message or group trigger including the above-mentioned indicator.
  • the determination unit 211 determines to authorize the SCS 30 or the SME 40 , when the indicator indicates the group message or group trigger.
  • the MTC-IWF 21 can include a storage unit 213 , a mapping unit 214 , and a forwarding unit 215 .
  • the storage unit 213 stores the above-mentioned mapping.
  • the mapping unit 214 maps the external group ID to the corresponding internal group ID in the group message or group trigger, by use of the mapping.
  • the forwarding unit 215 forwards the group message or group trigger to one of the MME/SGSN/MSC, so that the group message or group trigger is broadcast to the MTC devices. Note that these units 211 to 215 are mutually connected with each other thorough a bus or the like.
  • These units 211 to 215 can be configured by, for example, transceivers which respectively conduct communication with the HSS 22 , the MME/SGSN/MSC. the SCS 30 and the SME 40 , and a controller which controls these transceivers to execute the processes shown at Steps S 5 , S 6 and S 8 to S 10 in FIG. 2 or processes equivalent thereto.
  • each of the MTC devices 10 includes at least a reception unit 101 and a determination unit 102 .
  • the reception unit 101 receives from the core network the group message or group trigger including the above-mentioned group ID.
  • the determination unit 102 determines to discard the group message or group trigger, when the group ID does not coincides with a group ID for each of the MTC devices 10 itself.
  • each of the MTC devices 10 can include an acquisition unit 103 and a communication unit 104 .
  • the acquisition unit 103 acquires the group keys from e.g. the HSS 20 .
  • the communication unit 104 communicates with the SCS 30 or the SME 40 by use of the group keys. Note that these units 101 to 104 are mutually connected with each other thorough a bus or the like.
  • These units 101 to 104 can be configured by, for example, a transceiver which wirelessly conducts communication with the core network through the RAN, and a controller which controls this transceiver to execute the processes shown at Steps S 4 and S 12 to S 14 in FIG. 2 or processes equivalent thereto.
  • the group GW 50 includes at least an acquisition unit 501 and a relaying unit 502 .
  • the acquisition unit 501 acquires the group keys from e.g. the HSS 20 .
  • the relaying unit 502 relays the group message or group trigger by use of the group keys. Note that these units 501 and 502 are mutually connected with each other thorough a bus or the like.
  • These units 501 and 502 can be configured by, for example, transceivers which respectively conduct communication with the MTC-IWF 21 , the HSS 22 and the MME/SGSN/MSC/RAN, and a controller which controls these transceivers to execute the processes shown at Steps S 4 and S 10 to S 12 in FIG. 2 or processes equivalent thereto.
  • each of the SCS 30 and the SME 40 includes, in addition to functions mounted on each of typical SCS and SME, at least one of a function of including the above-mentioned indicator in the group message or group trigger, a function of including the above-mentioned group ID in the group message or group trigger, and a function of communicating with the group of MTC devices by use of the above-mentioned group keys.
  • Network node such as HSS creates a unique internal use group ID for each group.
  • the HSS sends the group ID to all the group member of MTC devices and the group GW.
  • the group GW can be a function deployed in a network node or be an independent node.
  • HSS keeps a mapping of the external group ID and unique group ID which is only used in the network.
  • the external group ID can be either allocated by HSS or by SCS to which the group subscribes to.
  • MTC-IWF downloads the group ID mapping via interface S 6 m and stores it locally. Novelty is modification of the interface.
  • a pair of group keys for encryption and integrity protection is generated.
  • the pair of group keys is the same for all the MTC devices within the group.
  • Group GW and/or SCS can have the same group key.
  • Indicator in a group message such that network entities e.g. MTC-IWF can distinguish it from other non-group messages.
  • the group GW broadcasts the group message to the group of MTC devices, it is protected by a pair of group keys, such that only the proper MTC devices can receive and read the group message.
  • the group message can be broadcasted in one of the two ways shown below:
  • (A) Contains the group ID: MTC device will check the group ID in the broadcast, if it is the same with the group ID it holds, it will perform integrity check and decrypt the message with using the (group ID related) group key.

Abstract

A network node (21), which is placed within a core network, receives a message from a transmission source (30) placed outside the core network. The message includes an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network. The network node (21) determines to authorize the transmission source (30), when the indicator indicates that the message is addressed to the group. Further, the message includes an ID for identifying whether or not the message is addressed to the group. The MTC device determines to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself. Furthermore, the MTC device communicates with the transmission source (30) by use of a pair of group keys shared therewith.

Description

    TECHNICAL FIELD
  • The present invention relates to a security solution for group based Machine-Type Communication (MTC) with the architecture newly provided in NPL 1. The solution can support MTC-IWF (MTC-Interworking Function) to perform proper authorization to SCS (Services Capability Server) when a group message is sent from it. The present invention also relates to a mechanism to deliver and broadcast the group message securely.
  • BACKGROUND ART
  • Study of group based feature is initiated in 3GPP for release (see e.g. NPL 2), and new architecture has been studied in NPL 1. With the concept of group gateway (GW) that the inventors of this application proposed in PTL 1, this invention extends it in the new architecture.
  • SCS sends group message to network node of MTC-IWF and MTC-IWF will forward the group message to the target group of MTC devices. The message is targeted to more than one MTC devices and may trigger these devices to communicate with network.
  • CITATION LIST Patent Literature
  • PTL 1: International Patent Publication No. WO 2012/018130
  • Non Patent Literature
  • NPL 1: 3GPP TS 23.682, “Architecture enhancements to facilitate communications with packet data networks and applications (Release 11)”, v11.1.0, 2012-06
  • NPL 2: 3GPP TR 23.8xy, “Machine-Type and other Mobile Data Applications Communications Enhancements; (Release 12)”, V0.1.0, 2012-05
  • NPL 3: 3GPP TR 33.868, “Security aspects of Machine-Type Communications; (Release 11)”, v0.8.0
  • SUMMARY OF INVENTION Technical Problem
  • However, the inventors of this application have found a problem that a fraud group message can cause DoS (Denial of Service) attack to the network. Note that the attacks to MTC device described in NPL 3 also valid here.
  • Thus MTC-IWF should perform SCS authorization to see if it can send a group message, especially when the message contains trigger.
  • Solution to Problem
  • In order to solve the above-mentioned problems, a network node according to first exemplary aspect of the present invention is placed within a core network. This network node includes a reception means for receiving a message from a transmission source placed outside the core network, the message including an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network; and a determination means for determining to authorize the transmission source, when the indicator indicates that the message is addressed to the group.
  • Further, a method according to second exemplary aspect of the present invention provides a method of controlling a network node that is placed within a core network. This method includes receiving a message from a transmission source placed outside the core network, the message including an indicator indicating whether or not the message is addressed to a group of one or more MTC devices attached to the core network; and determining to authorize the transmission source, when the indicator indicates that the message is addressed to the group.
  • Further, a MTC device according to third exemplary aspect of the present invention includes a reception means for receiving a message from the core network, the message including an ID (identifier) for identifying whether or not the message is addressed to a group of one or more MTC devices; and a determination means for determining to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself.
  • Further, a method according to fourth exemplary aspect of the present invention provides a method of controlling a MTC device attached to a core network. This method includes receiving a message from the core network, the message including an ID for identifying whether or not the message is addressed to a group of one or more MTC devices; and determining to discard the message, when the ID does not coincide with an ID allocated for the MTC device itself.
  • Further, a gateway according to fifth exemplary aspect of the present invention relays a message from a transmission source of the message placed outside a core network to a group of one or more MTC devices attached to the core network. This gateway includes an acquisition means for acquiring a pair of group keys for the group of MTC devices to securely conduct communication with the transmission source; and a relaying means for relaying the message by use of the group keys.
  • Further, a MTC device according to sixth exemplary aspect of the present invention includes an acquisition means for acquire a pair of group keys for securely conducting communication with a transmission source that is placed outside the core network and transmits a message addressed to a group of one or more MTC devices; and a communication means for communicate with the transmission source by use of the group keys.
  • Further, a method according to seventh exemplary aspect of the present invention provides a method of controlling gateway that relays a message from a transmission source of the message placed outside a core network to a group of one or more MTC devices attached to the core network. This method includes acquiring a pair of group keys for the group of MTC devices to securely conduct communication with the transmission source; and relaying the message by use of the group keys.
  • Furthermore, a method according to eighth exemplary aspect of the present invention provides a method of controlling a MTC (Machine-Type-Communication) device attached to a core network. This method includes acquiring a pair of group keys for securely conducting communication with a transmission source that is placed outside the core network and transmits a message addressed to a group of one or more MTC devices; and communicating with the transmission source by use of the group keys.
  • Advantageous Effects of Invention
  • According to the present invention, it is possible to perform SCS authorization to see if it can send a group message, especially when the message contains trigger.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing an example of system architecture according to an exemplary embodiment of the present invention.
  • FIG. 2 is a sequence diagram showing an example of group message terminated at MTC device in a system according to the exemplary embodiment of the present invention.
  • FIG. 3 is a block diagram showing a configuration example of a network node placed according to the exemplary embodiment of the present invention.
  • FIG. 4 is a block diagram showing a configuration example of a MTC device according to the exemplary embodiment of the present invention.
  • FIG. 5 is a block diagram showing a configuration example of a gateway according to the exemplary embodiment of the present invention.
  • DESCRIPTION OF EMBODIMENTS 1. Discussion
  • SA2 has started study on group based feature in TR 23.8xy v0.1.0 “Machine-Type and other Mobile Data Applications Communications Enhancements (Release 12)”. SA3 should study security issue for release 12 according to the architectural requirements that SA2 provided.
  • The architectural requirements for group based messaging from SA2 are given below:
  • The network shall provide a mechanism to distribute a group message from an SCS to those members of an MTC group located in a particular geographic area.
  • The group based messaging feature shall not require additional new functionality for UEs that do not use this feature.
  • The system shall support a mechanism where a UE that uses the group based messaging feature can efficiently recognize distributed group messages addressed to the UE.
  • The system shall provide an interface for the SCS to send a group message. This interface shall be able to carry the following information:
  • the application layer content of the group message,
  • the group identification for which the group message is intended, and
  • the geographical area and RAT(s) in which the group message shall be distributed.
  • The system shall be protected against overload resulting from devices responding to the distributed group message.
  • Group based messaging shall be supported in GERAN, UTRAN, and E-UTRAN access.
  • According to the current architecture, one can assume that MTC-IWF receives a group message from SCS and forwards it to the target group of MTC devices.
  • With a group message multiple MTC devices can be triggered to respond. Therefore an unauthorized group message may cause much more severe problem compared to what a trigger to a single MTC device can cause. Other threats like MitM attack and replay attack which were considered for non-group message also apply here with amplified effect. Therefore
  • Network should perform authorization of whether the SCS can send group message to the target group. To do that, MTC-IWF should be able to distinguish the group message from other messages.
  • The group message should have confidentiality and integrity protection and MTC devices which receive the message should be able to verify it.
  • Network should provide a means for SCS, which is located outside of 3GPP network, to communicate with the target group. The group identification is used when SCS sends the group message. Similar with the UE identification, the group identification used in 3GPP network should not be sent over an external interface, and not be known by a node outside of 3GPP network. This applies for a SCS which is located outside of 3GPP network.
  • With the above analysis, the security requirements for MTC group based feature are concluded as below:
  • MTC-IWF should verify if the SCS is authorized to send group message to a given MTC group.
  • MTC-IWF should be able to distinguish group (trigger) message from other messages.
  • Group message that are distributed to the group of MTC devices should have confidentiality, integrity protection and replay protection.
  • MTC device which receives the group message should be able to verify if the group message is sent from an authorized SCS.
  • Group ID should not to be exposed to a node that is located outside of 3GPP network. This includes the SCS which is outside of 3GPP network as well.
  • 2. Proposal
  • We propose SA3 to
  • 1) Study the threats and security requirements for group based feature
  • 2) Include the analysis and security requirements above in TR 33.868 for release 12, given in a separate pCR as follows.
  • 5.x Key Issue—Group Based Messaging 5.x.1 Issue Details
  • SA2 has started study for group based feature in TR 23.8xy (release 12). According to the current architecture, one can assume that MTC-IWF receives a group message from SCS and forwards it to the target group of MTC devices.
  • 5.x.2 Threats
  • With a group message multiple MTC devices can be triggered to respond. Therefore an unauthorized group message may cause much more severe problem compared to what a trigger to a single MTC device can cause. Other threats like MitM attack and replay attack which were considered for non-group message also apply here with amplified effect.
  • 5.x.3 Security Requirements
  • MTC-IWF should verify if the SCS is authorized to send group message to a given MTC group.
  • MTC-IWF should be able to distinguish group (trigger) message from other messages.
  • Group message that are distributed to the group of MTC devices should have confidentiality, integrity protection and replay protection.
  • MTC device which receives the group message should be able to verify if the group message is sent from an authorized SCS.
  • Group ID should not to be exposed to a node that is located outside of 3GPP network. This includes the SCS which is outside of 3GPP network as well.
  • Hereinafter, an exemplary embodiment of the present invention will be described with reference to FIGS. 1 to 5.
  • As shown in FIG. 1, a system according to this exemplary embodiment includes a core network (3GPP network), a plurality of MTC devices 10 which connect to the core network through a RAN (Radio Access Network), and an SCS 30 and an SME (Short Message Entity) 40 which serve as group message or group trigger sources placed outside the core network. Note that the RAN is formed by a plurality of base stations (i.e., eNBs (evolved Node Bs)).
  • Among them, each MTC device 10 is a UE for MTC connecting to the core network via the Um/Uu/LTE-Uu interface. The UE can host one or multiple MTC Applications. The corresponding MTC Applications in the external network are hosted on one or multiple as—(Application Servers).
  • Further, the SCS 30 and the SME 40 connect to the core network to communicate with the MTC devices 10.
  • Furthermore, the core network includes an MTC-IWF 21 and an HSS (Home Subscriber Server) 22 in the HPLMN (Home Public Land Mobile Network). In the core network, the MTC-IWF 21 serves as a network node which receives a group message or group trigger from its transmission source. Typically, the MTC-IWF 21 receives a group message which can be also be a group trigger from the SCS 30 via Tsp interface or from the SME 40 via T4 and Tsms interfaces, and forwards the group message to the MME (Mobility Management Entity), SGSN (Serving GPRS (General Packet Radio Service) Support Node) or MSC (Mobile Switching Centre), which serves as a network element forwarding the group message to the MTC device 10, via T5 b/T5 a/T5 c interface, so that the group message or group trigger can be routed to the MTC device 10. The HSS 22 or the MTC-IWF 21 can create and stores a mapping of an internal and external group IDs, and the HSS 22 generates a pair of group keys (which will be described later). One of the group keys is generated for encryption and decryption, another one is generated for integrity protection.
  • Next, operation examples of this exemplary embodiment will be described in detail with reference to FIG. 2. FIG. 2 shows the message sequence of group message sending to a group of MTC devices. There are more than one device in the MTC device group.
  • In this exemplary embodiment, assume that mutual authentication has been performed between group GW (which will be described later) and network and group GW and MTC devices 10. Note that a gateway was proposed in a separate invention of PTL 1 which is responsible of receiving group message and send it to MTC devices, and send concatenated messages for MTC device communicating with network or SCS. This exemplary embodiment proposes some new functions for the gateway and it can be either deployed in a network node or be an independent node.
  • (1) Group Message Sending and $eceiving
  • (A) SCS 30 sends a group message over Tsp interface to MTC-IWF 21 (Step S8). The group message contains group ID and geography area information (this is described in NPL 2). In addition, the message includes an indicator indicating whether the message is a group message or a non-group message. Therefore, the MTC-IWF 21 can distinguish the group message from the non-group message, thereby being able to perform a proper authorization to the SCS 30 as described at the following (B). Further, the indicator may indicate whether or not the group message contains trigger. In this case, the MTC-IWF 21 can also distinguish the group trigger from the group message or the non-group message.
  • (B) MTC-IWF 21 performs authorization to SCS 30, to see if it can send group message to the target group (Step S9). This should be the same authorization procedure when MTC-IWF 21 sends a non-group message. The authorization is based on the group information of group ID, geography area information received from SCS 30 and authorization data retrieved by MTC-IWF 21 from HSS 22.
  • (C) MTC-IWF 21 forwards the group message to a group GW 50 (Step S10). The group GW 50 can own more than one group. It can be a virtual function that deployed on any network node like eNB/MME/MTC-MF, or an independent node.
  • (D) The group GW 50 broadcasts the group message to the target group of MTC devices (Step S12). In the case where the group GW 50 is deployed on the eNB, the group message is broadcast only between the eNB and the MTC devices. Therefore, it is possible to avoid congestion of the core network. On the other hand, in the case where the group GW 50 is deployed on the MME which serves as one of network elements connected to one or more base stations, it is possible to broadcast the group message over a plurality of areas while partly reducing the congestion of the core network.
  • (2) Group ID, Group Key Management and Group Message Security
  • HSS 22 generates a unique group ID for the group of MTC devices (Steps S1 and S3). At Step S3, the HSS 22 can generate the group keys. For the SCS 30 which is located outside of the core network (3GPP network domain), the group ID should not be exposed to SCS 30 thus HSS 22 will have a mapping of the group IDs and external use group IDs. Internal use Group ID can be sent to MTC devices 10, group GW 50 within the existing NAS or AS messages (Step S4).
  • There can be two ways of generating an external group ID. It can be created by HSS 22 and provided to SCS 30. Alternatively it can be created by SCS 30 and provided to HSS 22 (Step S2). Either way, HSS will create the mapping of both group IDs.
  • The MTC-IWF 21 downloads the mapping from the HSS 22 (Step S5), and stores it locally (Step S6). Further, upon forwarding the group message to the group GW 50 at the above-mentioned Step S10, the MTC-IWF 21 refers to the mapping, thereby mapping the external group ID to the corresponding internal group ID in the group message.
  • Thus, in this exemplary embodiment, the internal group ID shall be hidden from outside the core network. Therefore, it is possible to prevent a fraud group message from causing attack to the core network. Further, the external group ID is made effective only after the source authorization. Therefore, even if the external group ID is revealed to attackers, it is possible to prevent attack.
  • Security is needed when a group message is broadcasted to the group of MTC devices. This exemplary embodiment proposes to use a pair of group keys for the group message confidentiality and integrity protection.
  • After MTC devices and group GW are mutually authenticated with network, the group key management and security activation should be performed (Step S4). The group key is for all the MTC devices in a MTC group to have group key. This group key is the same for all the MTC devices in the group, and it is shared by them with group GW 50 and optionally with the other end where the group message is sent.
  • There are few options of which network node can have the same group key and how the group message is sent:
  • (A) MTC Device—Group GW
  • The group message transferring between group GW 50 and SCS 30 can be protected by IPsec or other existing network security solution. Group GW 50 uses the group key to protect the group message and broadcasts it to the target group MTC devices. At Step S4, the MTC devices and the group GW 50 acquire the group keys from the HSS 22, so that the group keys are shared between the MTC devices and the group GW 50.
  • (B) MTC Device—SCS (Step S7)
  • In this case, group GW 50 will forward the group message and broadcast it as it is. On the other hand, the MTC devices acquire the group keys as with the above-mentioned (A). Further, after the authorization, the SCS 30 acquire the group keys from the HSS 22 through the MTC-IWF 21, so that the group keys are shared between the MTC devices and the SCS 30. Therefore, it is possible to provide end-to-end security between MTC devices and SCS 30. MTC device can perform authorization to SCS 30.
  • (C) MTC Device—Group GW—SCS (Step S11)
  • In this case, the communication between group GW 50 and SCS 30 can be protected by the group key. Group GW 50 can perform authorization to SCS 30 with the group key and MTC device do not need to perform authorization. As with the above-mentioned (A) and (B), the group keys are shared between the MTC devices, the group GW 50 and the SCS 30. Further, the group GW verifies the group message (decryption and integrity check) with the shared group key, thereby discarding the group message upon failing the verification. In this case, it is possible to avoid the broadcasting itself.
  • (3) The Group Message that can be Broadcasted with or without Group ID
  • When the group ID is included in the group message, MTC device listens to the message but will only receive the message which contains the same group ID it has, then the MTC device will perform integrity check and decrypt the message with the shared group key (Steps S13 and S14). When the group ID does not coincide with the group ID allocated for the MTC device itself, the MTC device discards the group message. In this case, the MTC device does not need to verify the group message. Therefore, it is possible to reduce processing load on the MTC device.
  • On the other hand, when the group ID is not included, the MTC device will listen to all the broadcasts and perform integrity check and decryption and only respond to the ones it can verify.
  • As shown in FIG. 3, the MTC-IWF 21 includes at least a reception unit 211 and a determination unit 212. The reception unit 211 receives from the SCS 30 or the SME 40 the group message or group trigger including the above-mentioned indicator. The determination unit 211 determines to authorize the SCS 30 or the SME 40, when the indicator indicates the group message or group trigger. In addition to these units 211 and 212, the MTC-IWF 21 can include a storage unit 213, a mapping unit 214, and a forwarding unit 215. The storage unit 213 stores the above-mentioned mapping. The mapping unit 214 maps the external group ID to the corresponding internal group ID in the group message or group trigger, by use of the mapping. The forwarding unit 215 forwards the group message or group trigger to one of the MME/SGSN/MSC, so that the group message or group trigger is broadcast to the MTC devices. Note that these units 211 to 215 are mutually connected with each other thorough a bus or the like.
  • These units 211 to 215 can be configured by, for example, transceivers which respectively conduct communication with the HSS 22, the MME/SGSN/MSC. the SCS 30 and the SME 40, and a controller which controls these transceivers to execute the processes shown at Steps S5, S6 and S8 to S10 in FIG. 2 or processes equivalent thereto.
  • Further, as shown in FIG. 4, each of the MTC devices 10 includes at least a reception unit 101 and a determination unit 102. The reception unit 101 receives from the core network the group message or group trigger including the above-mentioned group ID. The determination unit 102 determines to discard the group message or group trigger, when the group ID does not coincides with a group ID for each of the MTC devices 10 itself. As substitutes for or in addition to these units 101 and 102, each of the MTC devices 10 can include an acquisition unit 103 and a communication unit 104. The acquisition unit 103 acquires the group keys from e.g. the HSS 20. The communication unit 104 communicates with the SCS 30 or the SME 40 by use of the group keys. Note that these units 101 to 104 are mutually connected with each other thorough a bus or the like.
  • These units 101 to 104 can be configured by, for example, a transceiver which wirelessly conducts communication with the core network through the RAN, and a controller which controls this transceiver to execute the processes shown at Steps S4 and S12 to S14 in FIG. 2 or processes equivalent thereto.
  • Furthermore, as shown in FIG. 5, in the case of deploying the group GW 50 as an independent node, the group GW 50 includes at least an acquisition unit 501 and a relaying unit 502. The acquisition unit 501 acquires the group keys from e.g. the HSS 20. The relaying unit 502 relays the group message or group trigger by use of the group keys. Note that these units 501 and 502 are mutually connected with each other thorough a bus or the like.
  • These units 501 and 502 can be configured by, for example, transceivers which respectively conduct communication with the MTC-IWF 21, the HSS 22 and the MME/SGSN/MSC/RAN, and a controller which controls these transceivers to execute the processes shown at Steps S4 and S10 to S12 in FIG. 2 or processes equivalent thereto.
  • Although the illustration is omitted, each of the SCS 30 and the SME 40 includes, in addition to functions mounted on each of typical SCS and SME, at least one of a function of including the above-mentioned indicator in the group message or group trigger, a function of including the above-mentioned group ID in the group message or group trigger, and a function of communicating with the group of MTC devices by use of the above-mentioned group keys.
  • Note that the present invention is not limited to the above-mentioned exemplary embodiment, and it is obvious that various modifications can be made by those of ordinary skill in the art based on the recitation of the claims.
  • The whole or part of the exemplary embodiment disclosed above can be described as, but not limited to, the following supplementary notes.
  • (Supplementary Note 1)
  • Network node such as HSS creates a unique internal use group ID for each group.
  • (Supplementary Note 2)
  • HSS sends the group ID to all the group member of MTC devices and the group GW. The group GW can be a function deployed in a network node or be an independent node.
  • (Supplementary Note 3)
  • External group ID and its mapping to the unique internal use group ID:
  • HSS keeps a mapping of the external group ID and unique group ID which is only used in the network. The external group ID can be either allocated by HSS or by SCS to which the group subscribes to.
  • (Supplementary Note 4)
  • MTC-IWF downloads the group ID mapping via interface S6m and stores it locally. Novelty is modification of the interface.
  • (Supplementary Note 5)
  • A pair of group keys for encryption and integrity protection is generated. The pair of group keys is the same for all the MTC devices within the group. Group GW and/or SCS can have the same group key.
  • (Supplementary Note 6)
  • Indicator in a group message such that network entities e.g. MTC-IWF can distinguish it from other non-group messages. An indicator for IWF to distinguish group trigger message from non-trigger group message. This helps MTC-IWF to perform proper authorization.
  • (Supplementary Note 7)
  • The group GW broadcasts the group message to the group of MTC devices, it is protected by a pair of group keys, such that only the proper MTC devices can receive and read the group message.
  • (Supplementary Note 8)
  • The group message can be broadcasted in one of the two ways shown below:
  • (A) Contains the group ID: MTC device will check the group ID in the broadcast, if it is the same with the group ID it holds, it will perform integrity check and decrypt the message with using the (group ID related) group key.
  • (B) Do not contain the group ID: MTC device just check all the broadcast messages with its group key.
  • This application is based upon and claims the benefit of priority from Japanese patent application No. 2012-147983, filed on Jun. 29, 2012, the disclosure of which is incorporated herein in its entirety by reference.
  • REFERENCE SIGNS LIST
    • 10 MTC DEVICE
    • 21 MTC-IWF
    • 22 HSS
    • 30 SCS
    • 40 SME
    • 50 GROUP GW
    • 101, 211 RECEPTION UNIT
    • 102, 212 DETERMINATION UNIT
    • 103, 501 ACQUISITION UNIT
    • 104 COMMUNICATION UNIT
    • 213 STORAGE UNIT
    • 214 MAPPING UNIT
    • 215 FORWARDING UNIT
    • 502 RELAYING UNIT

Claims (7)

1-23. (canceled)
24. A system for an MTC (Machine-Type-Communication), comprising:
a plurality of MTC devices that form a group;
a RAN (Radio Access Network);
an SCS (Services Capability Server) which serves a group message;
a first node that connects to the SCS; and
a second node that broadcasts the group message to the plurality of MTC devices;
wherein the SCS sends the group message including an external group ID and geography area information to the first node;
the first node checks that the SCS is authorized to send the group message;
the SCS sends the group message to the second node; and
the second node broadcasts the group message via the RAN to the plurality of MTC devices located in a particular geographical area.
25. A delivery method of a system for an MTC (Machine-Type-Communication) including a plurality of MTC devices that form a group, a RAN (Radio Access Network), an SCS (Services Capability Server) which serves a group message, a first node that connects to the SCS, and a second node that broadcasts the group message to the plurality of MTC devices, comprising:
sending, by the SCS, the group message including an external group ID and geography area information to the first node;
checking, by the first node, that the SCS is authorized to send the group message;
sending, by the SCS, the group message to the second node;
broadcasting, by the second node, the group message via the RAN to the plurality of MTC devices located in a particular geographical area.
26. A plurality of network nodes in a system for an MTC (Machine-Type-Communication), comprising:
an SCS (Services Capability Server) which serves a group message;
a first node that connects to the SCS; and
a second node that broadcasts the group message to a plurality of MTC devices that form a group;
wherein the SCS sends a group message including an external group ID and geography area information to the first node;
the first node checks that the SCS is authorized to send the group message;
the SCS sends the group message to the second node; and
the second node broadcasts the group message via a RAN (Radio Access Network) to the plurality of MTC devices located in a particular geographical area.
27. A delivery method of a plurality of network nodes in a system for an MTC (Machine-Type-Communication) including an SCS (Services Capability Server) which serves a group message, a first node that connects to the SCS, and a second node that broadcasts the group message to a plurality of MTC devices that form a group, comprising;
sending, by the SCS, the group message including an external group ID and geography area information to the first node;
checking, by the first node, that the SCS is authorized to send the group message;
sending, by the SCS, the group message to the second node;
broadcasting, by the second node, the group message via a RAN (Radio Access Network) to the plurality of MTC devices located in a particular geographical area.
28. A plurality of MTC (Machine-Type-Communication) devices in a system for the MTC including an SCS (Services Capability Server) which serves a group message, a first node that connects to the SCS, and a second node that broadcasts the group message to the MTC devices, comprising:
a controller configured to form a group; and
a receiver for receiving the group messages from the second node;
wherein the SCS sends the group message including an external group ID and geography area information to the first node;
the first node checks that the SCS is authorized to send the group message;
the SCS sends the group message to the second node; and
the second node broadcasts the group message via a RAN (Radio Access Network) to the plurality of MTC devices located in a particular geographical area.
29. A delivery method of a plurality of MTC (Machine-Type-Communication) devices in a system for the MTC including an SCS (Services Capability Server) which serves a group message, a first node that connects to the SCS, and a second node that broadcasts the group message to the plurality of MTC devices, comprising;
forming a group; and
receiving the group messages from the second node;
wherein the SCS sends the group message including an external group ID and geography area information to the first node;
the first node checks that the SCS is authorized to send the group message;
the SCS sends the group message to the second node; and
the second node broadcasts the group message via a RAN (Radio Access Network) to the plurality of MTC devices located in a particular geographical area.
US15/370,782 2012-06-29 2016-12-06 Update of security for group based feature in m2m Abandoned US20170085570A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US15/370,782 US20170085570A1 (en) 2012-06-29 2016-12-06 Update of security for group based feature in m2m
US16/560,348 US11070955B2 (en) 2012-06-29 2019-09-04 Update of security for group based feature in M2M
US17/101,630 US11659359B2 (en) 2012-06-29 2020-11-23 Update of security for group based feature in M2M

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2012-147983 2012-06-29
JP2012147983 2012-06-29
PCT/JP2013/002661 WO2014002351A1 (en) 2012-06-29 2013-04-19 Update of security for group based feature in m2m
US201414409646A 2014-12-19 2014-12-19
US15/370,782 US20170085570A1 (en) 2012-06-29 2016-12-06 Update of security for group based feature in m2m

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US14/409,646 Continuation US20150200942A1 (en) 2012-06-29 2013-04-19 Update of security for group based feature in m2m
PCT/JP2013/002661 Continuation WO2014002351A1 (en) 2012-06-29 2013-04-19 Update of security for group based feature in m2m

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/560,348 Continuation US11070955B2 (en) 2012-06-29 2019-09-04 Update of security for group based feature in M2M

Publications (1)

Publication Number Publication Date
US20170085570A1 true US20170085570A1 (en) 2017-03-23

Family

ID=48521382

Family Applications (4)

Application Number Title Priority Date Filing Date
US14/409,646 Abandoned US20150200942A1 (en) 2012-06-29 2013-04-19 Update of security for group based feature in m2m
US15/370,782 Abandoned US20170085570A1 (en) 2012-06-29 2016-12-06 Update of security for group based feature in m2m
US16/560,348 Active US11070955B2 (en) 2012-06-29 2019-09-04 Update of security for group based feature in M2M
US17/101,630 Active 2033-12-13 US11659359B2 (en) 2012-06-29 2020-11-23 Update of security for group based feature in M2M

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/409,646 Abandoned US20150200942A1 (en) 2012-06-29 2013-04-19 Update of security for group based feature in m2m

Family Applications After (2)

Application Number Title Priority Date Filing Date
US16/560,348 Active US11070955B2 (en) 2012-06-29 2019-09-04 Update of security for group based feature in M2M
US17/101,630 Active 2033-12-13 US11659359B2 (en) 2012-06-29 2020-11-23 Update of security for group based feature in M2M

Country Status (8)

Country Link
US (4) US20150200942A1 (en)
EP (3) EP3755026B1 (en)
JP (1) JP5983785B2 (en)
KR (1) KR20150021079A (en)
CN (2) CN104396283A (en)
BR (1) BR112014032353A2 (en)
IN (1) IN2014DN10696A (en)
WO (1) WO2014002351A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301673A1 (en) * 2013-10-25 2016-10-13 Zte Corporation Method for Realizing Secure Communications among Machine Type Communication Devices and Network Entity
US20180220332A1 (en) * 2015-08-05 2018-08-02 Nec Corporation Communication system, communication control apparatus, communication control method, and communication program
RU2737962C1 (en) * 2017-12-11 2020-12-07 Телефонактиеболагет Лм Эрикссон (Пабл) Methods, network objects, network exposure object and machine-readable data medium for data delivery configuration

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6065124B2 (en) * 2013-01-10 2017-01-25 日本電気株式会社 Group authentication in broadcast for MTC group of UE
US11570161B2 (en) * 2013-07-31 2023-01-31 Nec Corporation Devices and method for MTC group key management
CN104936306B (en) * 2014-03-17 2020-01-14 中兴通讯股份有限公司 MTC device group small data secure transmission connection establishment method, HSS and system
CN106465046B (en) * 2014-05-07 2020-05-01 交互数字专利控股公司 System, method and tool for enabling group communication for machine type communication group communication
US9693205B2 (en) * 2014-07-03 2017-06-27 Cisco Technology, Inc. System and method for providing message delivery and paging to a group of users in a network environment
CN106664516B (en) * 2014-07-07 2020-03-27 康维达无线有限责任公司 Coordinated grouping for machine type communication group based services
US10455414B2 (en) 2014-10-29 2019-10-22 Qualcomm Incorporated User-plane security for next generation cellular networks
US10757149B2 (en) 2014-12-08 2020-08-25 Nokia Of America Corporation Usage authorization control for group communications in a communication network
JPWO2017022643A1 (en) * 2015-08-05 2018-06-21 日本電気株式会社 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
WO2017051667A1 (en) * 2015-09-24 2017-03-30 日本電気株式会社 Communication processing system, group message processing method, communication processing device, and control method and control program therefor
CN107580290B (en) * 2016-06-30 2021-04-06 阿尔卡特朗讯公司 Method and equipment for realizing MTC group message transmission
US10887295B2 (en) * 2016-10-26 2021-01-05 Futurewei Technologies, Inc. System and method for massive IoT group authentication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040029596A1 (en) * 2002-06-20 2004-02-12 Samsung Electronics Co., Ltd. Paging apparatus and method for MBMS service in a mobile communication system
US20070162968A1 (en) * 2005-12-30 2007-07-12 Andrew Ferreira Rule-based network address translation
US20110020136A1 (en) * 2008-06-10 2011-01-27 Mitsubishi Heavy Industries, Ltd. Blade pitch-angle control apparatus and wind turbine generator
US20110134841A1 (en) * 2009-11-25 2011-06-09 Interdigital Patent Holdings, Inc. Machine type communication preregistration
US20110307694A1 (en) * 2010-06-10 2011-12-15 Ioannis Broustis Secure Registration of Group of Clients Using Single Registration Procedure

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6262985B1 (en) * 1998-03-30 2001-07-17 Nortel Networks Limited Method and apparatus for full range translation of large external identifier to small internal identifier
US6606706B1 (en) * 1999-02-08 2003-08-12 Nortel Networks Limited Hierarchical multicast traffic security system in an internetwork
US6567857B1 (en) * 1999-07-29 2003-05-20 Sun Microsystems, Inc. Method and apparatus for dynamic proxy insertion in network traffic flow
US6684331B1 (en) * 1999-12-22 2004-01-27 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
JP3805610B2 (en) * 2000-09-28 2006-08-02 株式会社日立製作所 Closed group communication method and communication terminal device
US7325143B2 (en) * 2001-10-15 2008-01-29 Linux Foundation Digital identity creation and coalescence for service authorization
US20050036623A1 (en) * 2003-08-15 2005-02-17 Ming-Jye Sheu Methods and apparatus for distribution of global encryption key in a wireless transport network
WO2005062919A2 (en) * 2003-12-22 2005-07-14 Wachovia Corporation Public key encryption for groups
ATE405082T1 (en) * 2003-12-23 2008-08-15 Motorola Inc KEY UPDATE IN SECURE MULTICAST COMMUNICATION
WO2005109735A1 (en) * 2004-05-12 2005-11-17 Telefonaktiebolaget Lm Ericsson (Publ) Key management messages for secure broadcast
US7313575B2 (en) * 2004-06-14 2007-12-25 Hewlett-Packard Development Company, L.P. Data services handler
US7813510B2 (en) * 2005-02-28 2010-10-12 Motorola, Inc Key management for group communications
ES2436184T3 (en) * 2006-05-23 2013-12-27 Nokia Solutions And Networks Gmbh & Co. Kg Procedure and equipment for dynamic establishment and for the control of short-term communication groups with secured transmission
CN101690126B (en) * 2007-06-26 2013-12-18 艾利森电话股份有限公司 Method and apparatuses for influencing invoking of service provided by application server to user equipment
US8458462B1 (en) * 2008-08-14 2013-06-04 Juniper Networks, Inc. Verifying integrity of network devices for secure multicast communications
US9031876B2 (en) * 2009-06-19 2015-05-12 Hewlett-Packard Development Company, L.P. Managing keys for encrypted shared documents
US8452014B2 (en) * 2009-06-24 2013-05-28 Cisco Technology, Inc. Group key management for mobile ad-hoc networks
CN102036242B (en) * 2009-09-29 2014-11-05 中兴通讯股份有限公司 Access authentication method and system in mobile communication network
KR101754447B1 (en) * 2009-12-22 2017-07-05 인터디지탈 패튼 홀딩스, 인크 Group-based machine to machine communication
US9246763B2 (en) * 2010-02-11 2016-01-26 Nokia Solutions And Networks Oy Device management
US20110201365A1 (en) * 2010-02-15 2011-08-18 Telefonaktiebolaget L M Ericsson (Publ) M2m group based addressing using cell broadcast service
US9191966B2 (en) * 2010-03-30 2015-11-17 Intel Mobile Communications GmbH Communication device and method for communicating in a communication mode using a frequency range according to a frame structure
US8971535B2 (en) * 2010-05-27 2015-03-03 Bladelogic, Inc. Multi-level key management
US20110317684A1 (en) * 2010-06-24 2011-12-29 Lazzaro Nicholas P Systems and methods for terminating communication requests
WO2012018130A1 (en) 2010-08-05 2012-02-09 Nec Corporation Group security in machine-type communication
US8712459B2 (en) * 2010-09-13 2014-04-29 Electronics And Telecommunications Research Institute Group control method for machine type communication and mobile communication system using the method
EP2638294B1 (en) * 2010-11-10 2019-07-17 Emerson Climate Technologies, Inc. Compressor and enclosure assembly for electrical components
US8467536B2 (en) * 2010-12-08 2013-06-18 Motorola Solutions, Inc. Binding keys to secure media streams
JP5555187B2 (en) 2011-01-20 2014-07-23 日立アプライアンス株式会社 Washing and drying machine
JP2014523672A (en) * 2011-07-11 2014-09-11 エルジー エレクトロニクス インコーポレイティド Traffic encryption key management for M2M multicast groups
US10587551B1 (en) * 2017-07-13 2020-03-10 Whatsapp Inc. Techniques for multi-agent messaging

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040029596A1 (en) * 2002-06-20 2004-02-12 Samsung Electronics Co., Ltd. Paging apparatus and method for MBMS service in a mobile communication system
US20070162968A1 (en) * 2005-12-30 2007-07-12 Andrew Ferreira Rule-based network address translation
US20110020136A1 (en) * 2008-06-10 2011-01-27 Mitsubishi Heavy Industries, Ltd. Blade pitch-angle control apparatus and wind turbine generator
US20110134841A1 (en) * 2009-11-25 2011-06-09 Interdigital Patent Holdings, Inc. Machine type communication preregistration
US20110307694A1 (en) * 2010-06-10 2011-12-15 Ioannis Broustis Secure Registration of Group of Clients Using Single Registration Procedure

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160301673A1 (en) * 2013-10-25 2016-10-13 Zte Corporation Method for Realizing Secure Communications among Machine Type Communication Devices and Network Entity
US20180220332A1 (en) * 2015-08-05 2018-08-02 Nec Corporation Communication system, communication control apparatus, communication control method, and communication program
US11129053B2 (en) * 2015-08-05 2021-09-21 Nec Corporation Communication system, communication control apparatus, communication control method, and communication program
RU2737962C1 (en) * 2017-12-11 2020-12-07 Телефонактиеболагет Лм Эрикссон (Пабл) Methods, network objects, network exposure object and machine-readable data medium for data delivery configuration

Also Published As

Publication number Publication date
IN2014DN10696A (en) 2015-08-28
EP3396984A1 (en) 2018-10-31
JP5983785B2 (en) 2016-09-06
CN104396283A (en) 2015-03-04
CN107786966B (en) 2020-11-03
JP2015526914A (en) 2015-09-10
US11659359B2 (en) 2023-05-23
US20210076168A1 (en) 2021-03-11
BR112014032353A2 (en) 2017-06-27
EP3755026A1 (en) 2020-12-23
EP3755026B1 (en) 2022-03-30
CN107786966A (en) 2018-03-09
EP2868120A1 (en) 2015-05-06
US20190394201A1 (en) 2019-12-26
US20150200942A1 (en) 2015-07-16
KR20150021079A (en) 2015-02-27
WO2014002351A1 (en) 2014-01-03
US11070955B2 (en) 2021-07-20
EP3396984B1 (en) 2020-10-07

Similar Documents

Publication Publication Date Title
US11659359B2 (en) Update of security for group based feature in M2M
US11496496B2 (en) Method and system for user plane traffic characteristics and network security
US20150319172A1 (en) Group authentication and key management for mtc
US11122405B2 (en) MTC key management for key derivation at both UE and network
US9674219B2 (en) Authenticating public land mobile networks to mobile stations
US9681261B2 (en) Method and apparatus of providing integrity protection for proximity-based service discovery with extended discovery range
KR101877733B1 (en) Method and system of securing group communication in a machine-to-machine communication environment
US10548005B2 (en) Method for security of user equipment connection identifier in wireless communication system and apparatus therefor
CN113016202A (en) Protection of initial non-access stratum protocol messages in 5G systems
JP2022527109A (en) Methods and devices for secure access control in wireless communication
US20200169877A1 (en) Method for securing connection identifier of user equipment in wireless communication system and apparatus therefor
KR20230054421A (en) Privacy of Repeater Selection in Cellular Sliced Networks
US20220407846A1 (en) Devices and method for mtc group key management
US20150358816A1 (en) Group authentication in broadcasting for mtc group of ues
CN104871579A (en) Security management method and apparatus for group communication in mobile communication system
US20150229620A1 (en) Key management in machine type communication system
KR20150084628A (en) Security supporting method and system for proximity based service group communication or public safety in mobile telecommunication system environment
JP2024507208A (en) How to make a cellular network work
EP3197192B1 (en) Mic verification method in d2d communications and d2d communications system
Angermeier et al. PAL-privacy augmented LTE: A privacy-preserving scheme for vehicular LTE communication
EP2785003A1 (en) Methods, apparatuses and computer program products enabling to improve public warning systems
CN116918300A (en) Method for operating a cellular network

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION