WO2003007569A1 - Structure de reseau pour crypter un terminal de systeme de communication mobile et procede de realisation de cette structure - Google Patents
Structure de reseau pour crypter un terminal de systeme de communication mobile et procede de realisation de cette structure Download PDFInfo
- Publication number
- WO2003007569A1 WO2003007569A1 PCT/CN2002/000330 CN0200330W WO03007569A1 WO 2003007569 A1 WO2003007569 A1 WO 2003007569A1 CN 0200330 W CN0200330 W CN 0200330W WO 03007569 A1 WO03007569 A1 WO 03007569A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- layer
- user
- information
- encryption
- application layer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
Definitions
- Network structure suitable for terminal encryption of mobile communication system and implementation method thereof is
- the present invention relates to a network structure for implementing information encryption in a WCDMA mobile communication system and a method for implementing the same. Specifically, the present invention relates to a network structure suitable for terminal encryption in a mobile communication system and a method for implementing the same. Based on the symmetric encryption from the terminal to the access network side, but instead providing the encryption of the information from the terminal, it belongs to the technical field of secure or secure communication devices in the mobile communication system. Background of the invention
- the encryption functions currently used are implemented in the user terminal equipment (UE: User Equipment) on the user side and the radio network controller (RNC: Radio Network Controller) on the network side, that is, It is the security and confidentiality of the information transmitted over the air in the access part of the system, and does not provide the information encryption and security guarantees transmitted by the core network part.
- the information encryption of the core network part needs to be considered separately.
- the third generation mobile communication system standardization organization (3GPP: Third Generation Partnership Project) has not yet defined the information encryption method and standard of the core network part.
- FIG. 1 is a schematic diagram of a location where data is currently encrypted in a 3GPP network system, which is a data information encryption mode of the network architecture recommended by 3GPP.
- the data confidentiality DC UE (DC: Data confidentiality) 11 and the data confidentiality (DCRNC) 12 of the wireless network controller 13 respectively represent the symmetric encryption of data performed by the user terminal device 10 on the user side and the wireless network controller 13 on the network side, that is, only the terminal is now provided
- the encryption function with the base station does not provide the end-to-end encryption function between the terminals.
- the specific implementation of the encryption system can also be analyzed from a hierarchical perspective. See FIG.
- the access layer includes the physical layer (PHY) 27, that is, L1, the media access layer (MAC) 26, and the data link layer (RLC) 25. That is, L2, the radio resource management control layer (RRC) 24 is L3; the non-access layer mainly includes an application layer 22, a call control (CC), and a mobile management layer (MM) 23.
- PHY physical layer
- MAC media access layer
- RLC data link layer
- the non-access layer mainly includes an application layer 22, a call control (CC), and a mobile management layer (MM) 23.
- U-Plane user plane
- C-Plane control plane
- the current encryption function is implemented on the use plane 21 and the control plane 20 at the same time in a vertical direction. In the horizontal direction, it is implemented at the second layer L2 of the network, that is, at the data link layer 25 or the media access layer 26.
- the specific process of implementing encryption at the data link layer 25 or the media access layer 26 is shown in Figure 3, and the steps are as follows:
- Step 301 The upper layer information is transmitted to the data link layer, and the data link layer determines whether the mode in which the information is located is a transparent mode or a non-transparent mode.
- step 302 is performed to encrypt the protocol data units (PDUs) at the data link layer and transmitted to the media access layer, and step 303 is performed. After the media access layer undergoes non-encryption processing, it is transmitted to Physical layer
- step 304 is performed, and the information is not processed at the data link layer, and is transmitted to the media access layer.
- Step 305 is performed, and the service data unit is performed at the media access layer.
- the encrypted information is transmitted to the physical layer, and after processing, it is sent to the receiver;
- the receiver performs corresponding decryption according to the inverse process of the above processing process.
- the encryption functions used are limited to the information part of the access link, that is, the user terminal equipment and It is implemented in the wireless network controller on the network side without considering the end-to-end encryption technology.
- This situation will cause certain security flaws in the mobile communication system, that is, the current security protection scope of user information cannot be extended to the core network part, and user information is completely transparently transmitted in the core network. This information can be easily transmitted. Intercepted or eavesdropped by others. In order to ensure the security of this information, it is required that the core network must consider additional security technologies.
- the object of the present invention is to provide a network structure suitable for terminal encryption of a mobile communication system, so as to solve the problem of end-to-end communication encryption that cannot be realized at present.
- Another object of the present invention is to provide a method for implementing terminal encryption in a mobile communication system, that is, to provide an end-to-end encryption method through the above network structure.
- a network structure suitable for encryption of a mobile communication system terminal is divided into two major planes in the vertical direction: a user plane and a control plane, where the hierarchical structure of the control plane includes: The application layer, call control and mobile management layer as the non-access layer, and the radio resource management control layer, data link layer, media access layer, and physical layer as the access layer;
- the hierarchical structure of the user plane includes: Application Layer, data link layer, media access layer, physical layer; characterized in that: a security application layer that encrypts user information in the application layer is added below the application layer in the user plane, and the security application layer is only applicable to users End, while the hierarchical structure of the network end remains unchanged.
- the security application layer has an encryption algorithm and a key for encrypting user information.
- the implementation method of the present invention applicable to terminal encryption of a mobile communication system is as follows: A method for implementing terminal encryption suitable for a mobile communication system, which is characterized in that it includes the following steps:
- the user's business information is encrypted by a preset security application layer, and the security application layer provides the encryption algorithm and key encryption security method used;
- the user service information is decrypted by the security application layer to restore its original information content.
- the encryption and decryption operation described in step B may further include:
- the network-side wireless network controller corresponding to the transmitting side uses the wireless network controller data confidentiality (DC RNC ) encryption protection at the media access layer or data link layer to decrypt;
- DC RNC wireless network controller data confidentiality
- the user service information and the control plane control information are transmitted through the core network to the network-side radio network controller corresponding to the receiving side.
- the user service information in the encrypted state is encrypted by using wireless network controller data confidentiality (DC RNC ) encryption protection, and sent to the corresponding receiving side;
- DC RNC wireless network controller data confidentiality
- the terminal on the receiving side uses the user terminal data confidentiality (DC UE ) encryption protection to decrypt the control plane control information and the user service information in the encrypted state at the data link layer or the media access layer.
- DC UE user terminal data confidentiality
- the present invention is directed to a network layered structure defined by the 3GPP at present, and proposes a network structure suitable for terminal encryption and an implementation method thereof.
- the technical key point is to add a security application layer to the user plane network hierarchy; This layer is only carried out on the terminal side The division of the secondary structure without changing the original hierarchical structure on the network side, so that the application of the present invention will not affect the basic network structure.
- the present invention adds a security application layer to the hierarchical structure of the user plane.
- the network hierarchy structure of the increased security application layer is only applicable to the terminal side, and not applicable to the terminal side.
- the network side and it has no impact on the implementation of the network encryption function and the control plane encryption function.
- the present invention provides a basic operation platform for implementing terminal encryption, so that the data always exists in cipher text during the entire transmission process from the source point to the destination point. In this way, the information is transmitted during the transmission. The whole process can be protected, and even when some nodes are damaged, the information will not be leaked, and the secure transmission and application of information can be reliably guaranteed.
- the invention is particularly suitable for
- Figure 1 is a schematic diagram of the location where data encryption is currently performed in the 3GPP network system.
- Figure 2 is a schematic diagram of the current 3GPP network layered structure.
- Figure 3 is a flowchart of data encryption currently performed by the media access layer and / or data link layer in the 3GPP network system.
- FIG. 4 is a schematic diagram of a layered network structure that can implement terminal encryption according to the present invention.
- FIG. 5 is a schematic diagram of a location where the present invention implements terminal encryption and data encryption in a 3GPP network system.
- FIG. 6 is a schematic diagram showing an implementation process of implementing end-to-end encryption according to the present invention. Mode of Carrying Out the Invention
- the present invention is a network structure suitable for terminal encryption of a mobile communication system. It is divided into two major planes in the vertical direction: the user plane 41 and the control plane 40, where the hierarchical structure of the control plane 40 includes: an application layer 42 as a non-access layer, a call control and mobile management layer 43, and as The radio resource management control layer 44 of the access layer is L3, the data link layer 45 and the media access layer 46 are L2, and the physical layer 47 is L1.
- the hierarchical structure of the user plane 41 includes: an application layer 42, a data link layer 45 and the media access layer 46, that is, L2, and the physical layer 47, that is, L1; its characteristics are: a security application layer (SAL) 48 for encrypting the user information of the application layer 42 is added below the application layer 42 of the user plane 41;
- the security application layer 48 provides an encryption algorithm and a key for encrypting user information; and the security application layer 48 is only applicable to the user side, and the hierarchical structure of the network side remains unchanged.
- FIG. 5 shows a schematic diagram of a location where the present invention implements terminal encryption and data encryption in a 3GPP network system.
- the user terminal device 50 provides user information encryption at the same time.
- UC UE user information encryption function 51 and user data confidentiality (DC UE ) encryption function 52, but the user information encryption function is implemented at the security application layer, and the data encryption function is implemented at the data link layer or the media access layer.
- Wireless network controller 54 only implements wireless network controller data confidentiality
- DC RNC (DC RNC ) encryption function 53, which is implemented in the data link layer or the media access layer.
- the method for implementing encryption of a mobile communication system terminal is as follows: When a user sends information, the method includes the following steps:
- the user information encryption function is provided to the user at the user terminal device.
- the sender 60 encrypts the user's service information through the security application layer 601, and the security application layer 601 provides the encryption algorithm and key used. security strategy;
- the encrypted information is processed by a series of physical layers 603 and then sent to the network side.
- the wireless network controller 610 of the network side 61 corresponding to the sending side 60 uses the wireless network controller data confidentiality encryption protection DCRNC for decryption at the media access layer / data link layer 612, and thereafter, the control of the control plane controls The information has been completely decrypted, but the user service information of the user plane is still encrypted;
- the user service information and control plane control information are transmitted through the core network 614 to the wireless network controller 611 corresponding to the network side 61 of the receiving side 62, and the wireless network controller 611 pairs the data link layer / media access layer 613 with
- the control information of the control plane and the user service information that is still in an encrypted state are encrypted by the wireless network controller data confidentiality encryption protection, that is, DCRNC, and sent to the corresponding receiving side 62;
- the terminal on the receiving side 62 decrypts the control plane control information and the user service information in the encrypted state at the data link layer / media access layer 622 using the user terminal ’s data confidentiality encryption protection, that is, the DC UE .
- the control information of the plane is completely decrypted, but the user service information of the user plane is still not decrypted;
- the user service information is decrypted by the application security layer 621, and the original information content is restored.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE60225557T DE60225557T2 (de) | 2001-07-12 | 2002-05-14 | Netzwerkstruktur zum verschlüsseln eines mobilkommunikationssystemendgeräts und verfahren zu ihrer realisierung |
EP02784821A EP1406423B1 (en) | 2001-07-12 | 2002-05-14 | Network structure for encrypting of mobile communication system terminal and the method of realizing it |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB011202602A CN1138366C (zh) | 2001-07-12 | 2001-07-12 | 适用于移动通信系统终端加密的网络及其实现方法 |
CN01120260.2 | 2001-07-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003007569A1 true WO2003007569A1 (fr) | 2003-01-23 |
Family
ID=4664021
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2002/000330 WO2003007569A1 (fr) | 2001-07-12 | 2002-05-14 | Structure de reseau pour crypter un terminal de systeme de communication mobile et procede de realisation de cette structure |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1406423B1 (zh) |
CN (1) | CN1138366C (zh) |
AT (1) | ATE389289T1 (zh) |
DE (1) | DE60225557T2 (zh) |
WO (1) | WO2003007569A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2402583A (en) * | 2003-05-19 | 2004-12-08 | Nec Corp | Cryptographic initialisation wherein RNC server instructs one communication partner to add an encryption flag to and begin encrypting its communications |
JP2009527233A (ja) * | 2006-02-24 | 2009-07-30 | セーホーエル.ハンセン アクティーゼルスカブ | 発酵乳製品に改良された舌ざわり(texture)を提供する乳酸菌 |
GB2535749B (en) * | 2015-02-26 | 2021-10-20 | Eseye Ltd | Authentication module |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7711948B2 (en) * | 2003-09-30 | 2010-05-04 | Cisco Technology, Inc. | Method and apparatus of communicating security/encryption information to a physical layer transceiver |
KR20080046129A (ko) * | 2006-11-21 | 2008-05-26 | 이노베이티브 소닉 리미티드 | 무선통신시스템에서 안전검증 에러를 복구하는 방법 및장치 |
CN101179595B (zh) * | 2007-12-10 | 2011-05-04 | 中国科学院计算技术研究所 | 一种无线通信数据收发设备和系统及数据处理方法 |
EP2235977B1 (en) * | 2008-01-21 | 2018-02-28 | Telefonaktiebolaget LM Ericsson (publ) | Abstraction function for mobile handsets |
CN101594374B (zh) * | 2008-05-29 | 2013-07-10 | 上海贝尔股份有限公司 | 无线通信系统中的新的l2结构及相应的通信方法和系统 |
US10009287B2 (en) | 2013-12-26 | 2018-06-26 | Huawei Technologies Co., Ltd. | Hierarchical software-defined network traffic engineering controller |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4408035A1 (de) * | 1994-03-10 | 1995-09-14 | Sel Alcatel Ag | Kommunikationsrechner |
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
CN1275744A (zh) * | 2000-07-20 | 2000-12-06 | 成都久力信息技术有限公司 | 计算机应用层网络安全控管系统及其相关程序方法 |
WO2001001644A1 (en) * | 1999-06-29 | 2001-01-04 | Samsung Electronics Co., Ltd. | Apparatus for securing user's information in a mobile communication system connected to the internet and method thereof |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100452700C (zh) * | 1998-07-03 | 2009-01-14 | 诺基亚公司 | 用于建立保密连接的存储卡和无线通信设备 |
KR100319256B1 (ko) * | 1999-12-30 | 2002-01-05 | 서평원 | 통신 프로토콜 운용 방법 |
-
2001
- 2001-07-12 CN CNB011202602A patent/CN1138366C/zh not_active Expired - Lifetime
-
2002
- 2002-05-14 EP EP02784821A patent/EP1406423B1/en not_active Expired - Lifetime
- 2002-05-14 AT AT02784821T patent/ATE389289T1/de not_active IP Right Cessation
- 2002-05-14 DE DE60225557T patent/DE60225557T2/de not_active Expired - Lifetime
- 2002-05-14 WO PCT/CN2002/000330 patent/WO2003007569A1/zh active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4408035A1 (de) * | 1994-03-10 | 1995-09-14 | Sel Alcatel Ag | Kommunikationsrechner |
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
WO2001001644A1 (en) * | 1999-06-29 | 2001-01-04 | Samsung Electronics Co., Ltd. | Apparatus for securing user's information in a mobile communication system connected to the internet and method thereof |
CN1275744A (zh) * | 2000-07-20 | 2000-12-06 | 成都久力信息技术有限公司 | 计算机应用层网络安全控管系统及其相关程序方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2402583A (en) * | 2003-05-19 | 2004-12-08 | Nec Corp | Cryptographic initialisation wherein RNC server instructs one communication partner to add an encryption flag to and begin encrypting its communications |
GB2402583B (en) * | 2003-05-19 | 2005-07-27 | Nec Corp | Cryptographic communication method in communication system |
US7400730B2 (en) | 2003-05-19 | 2008-07-15 | Nec Corporation | Cryptographic communication method in communication system |
JP2009527233A (ja) * | 2006-02-24 | 2009-07-30 | セーホーエル.ハンセン アクティーゼルスカブ | 発酵乳製品に改良された舌ざわり(texture)を提供する乳酸菌 |
GB2535749B (en) * | 2015-02-26 | 2021-10-20 | Eseye Ltd | Authentication module |
Also Published As
Publication number | Publication date |
---|---|
EP1406423A1 (en) | 2004-04-07 |
DE60225557T2 (de) | 2009-04-02 |
CN1396731A (zh) | 2003-02-12 |
ATE389289T1 (de) | 2008-03-15 |
EP1406423B1 (en) | 2008-03-12 |
CN1138366C (zh) | 2004-02-11 |
DE60225557D1 (de) | 2008-04-24 |
EP1406423A4 (en) | 2006-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101507482B1 (ko) | Lte 모바일 유닛에서의 비접속 계층(nas) 보안을 가능하게 하는 방법 및 장치 | |
US7613920B2 (en) | Mechanism to avoid expensive double-encryption in mobile networks | |
CN101335740B (zh) | 发送、接收数据的方法和系统 | |
US7107051B1 (en) | Technique to establish wireless session keys suitable for roaming | |
CA2443688A1 (en) | Authentication and encryption method and apparatus for a wireless local access network | |
EP1943812A1 (en) | Method, system and readable medium for setting up secure direct links between wireless network stations using direct link set-up (dls) protocol | |
US20120272310A1 (en) | Systems and methods for secure communication over a wireless network | |
CN102144371A (zh) | 选择性地加密控制信号的方法 | |
KR20080013906A (ko) | 키이 물질의 교환 | |
EP1156694A1 (en) | Radio communication device and radio communication method | |
JP2012010254A (ja) | 通信装置、通信方法及び通信システム | |
WO2017092092A1 (zh) | 一种端加密传输的密钥管理的方法及装置 | |
WO2003007569A1 (fr) | Structure de reseau pour crypter un terminal de systeme de communication mobile et procede de realisation de cette structure | |
CN108966217B (zh) | 一种保密通信方法、移动终端及保密网关 | |
CN102083062B (zh) | 业务流加密处理方法及系统 | |
CN105827601A (zh) | 移动设备数据加密应用方法及系统 | |
KR20030050881A (ko) | 무선랜 시스템에서의 암호키 관리 방법 | |
JPH11203222A (ja) | 暗号通信方法 | |
KR100594022B1 (ko) | 무선 네트워크 시스템의 무선링크제어 계층에서 데이터암호화방법 및 암호해제방법 | |
CN117201200B (zh) | 基于协议栈的数据安全传输方法 | |
JP2004349775A (ja) | 秘密保持通信機能を有する携帯端末及びその携帯端末を用いた情報処理システム | |
KR970056178A (ko) | Time Quantum 키 분배방식을 이용한 SP2 LAN 정보보호 프로토콜 | |
JP2004186939A (ja) | 暗号処理装置及び方法 | |
CN118200920A (zh) | 一种5g增强型安全架构 | |
Hajji et al. | Confidentiality in the UMTS radio access network simulation approach under OPNET |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002784821 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002784821 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002784821 Country of ref document: EP |