WO2006102821A1 - Procede de transmission par chiffrement d'information dans un systeme de communication sans fil - Google Patents

Procede de transmission par chiffrement d'information dans un systeme de communication sans fil Download PDF

Info

Publication number
WO2006102821A1
WO2006102821A1 PCT/CN2006/000074 CN2006000074W WO2006102821A1 WO 2006102821 A1 WO2006102821 A1 WO 2006102821A1 CN 2006000074 W CN2006000074 W CN 2006000074W WO 2006102821 A1 WO2006102821 A1 WO 2006102821A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence
encryption
trau
information
code stream
Prior art date
Application number
PCT/CN2006/000074
Other languages
English (en)
French (fr)
Inventor
Zhili Xia
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2006102821A1 publication Critical patent/WO2006102821A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to a method for implementing information encryption transmission in a wireless communication system.
  • the cluster communication network is developed by adopting the cluster private network construction idea.
  • Each group is independently constructed, which is easy to form a separate construction situation, resulting in low frequency utilization efficiency and network construction. Cost and network maintenance costs are high.
  • the cluster network construction shows the development from independent private network construction to cluster common network construction.
  • GSM-R can provide eMLPP with GSM communication technology as a service bearer.
  • Basic cluster voice dispatching communication services such as multi-level priority and preemptive services, VGCS (voice group call service) services and VBS (voice group call service) services; therefore, the development of GSM-based digital trunking systems not only conforms to the development trend of cluster systems , also has a good technical foundation.
  • the GSM public network and the GSM system-based cluster co-network differ greatly in service users and cell formats.
  • the GSM public network often adopts a cell system, and the coverage is small.
  • the cell coverage radius is even only About 0.5 km; and the cluster network uses large-area construction stations, the site coverage can reach tens of kilometers, usually a central station can meet the requirements of the cluster group users.
  • the GSM public network is open to the public, and the users of the GSM cluster system are cluster users, including public security, armed police, firefighting, national security and other key government departments, as well as large enterprise groups such as banks and finances. Due to the regional distribution characteristics of the cluster community, The location of the same cluster department personnel is relatively fixed, and the probability that a certain cluster department personnel mobile station is in a specific site-related cell is very large.
  • the Abis interface ie, the interface between the base station and the base station controller
  • the Abis interface is a standard interface, does not provide corresponding information encryption functions, various voice services and Data services are transmitted in standard formats on the Abis interface.
  • the GSM system public communication is difficult to track to a specific user, and the GSM-R system is mainly used for railway service scheduling, the confidentiality of communication is relatively low. Therefore, if the GSM system and the GSM-R system Abis interface do not provide encryption, there is no significant security risk for the GSM system public communication and railway system scheduling communication.
  • the Abis interface between the base station and the base station controller of the GSM-based cluster system and the Abis interface of the GSM system or the GSM-R system do not provide the encryption function, the call time between the cluster users may be monitored. The risk, there are great security risks.
  • the Abis interface of the cluster system under the GSM system does not adopt the encryption function, it will enable the various standard voice decoding devices supporting the Abis interface to monitor the voice on the interface.
  • the GSM network Abis interface commissioning device provided by many manufacturers can monitor the voice information on the Abis interface.
  • an object of the present invention is to provide a method for implementing information encryption transmission in a wireless communication system, so as to prevent information transmitted through the Abis interface in the GSM system from being monitored, and improving information in the GSM system. Security of the transmission.
  • the present invention provides a method for implementing information encryption transmission in a wireless communication system, including -
  • the information to be exchanged is encrypted by using the configured encryption mode information, and the encrypted information is exchanged between the base station side and the TRAU side.
  • the step A described includes: An encryption mode information table is respectively configured in the base station and the TRAU of the wireless communication system, and the encryption mode to be used for information encryption is recorded in the table.
  • the step A described further includes:
  • the base station controller sends the determined encryption mode information to the base station and the TRAU through the maintenance unit and the maintenance channel, and stores them in the base station and the TRAU, respectively.
  • the encryption mode information includes an XOR sequence encryption mode and/or an encryption mode of sequence chaos, and wherein: the XOR sequence encryption mode is: when the encryption process is performed, the service sequence code stream to be encrypted is different. Or encryption processing, and in the decryption process, the XOR decryption process is performed on the encrypted service sequence code stream again;
  • the sequence scrambling encryption mode is: when the encryption process is performed, the service sequence code stream to be encrypted is reordered according to a predetermined pattern, and when the decryption process is performed, the encrypted service sequence code stream is restored according to a predetermined mode. Initial sorting.
  • the entries recorded in the encryption mode information table include:
  • Each of the TRAUs corresponds to one entry in the encryption mode information table.
  • the step B described includes:
  • the base station controller When the TRAU performs channel activation processing and is connected to the base station channel baseband processing unit, the base station controller notifies the baseband processing unit of the entry information corresponding to the TRAU.
  • the TRAU In the downlink direction, the TRAU encrypts the service sequence code stream to be sent by using the encryption mode information recorded by the TRAU in the corresponding entry in the encryption mode information table, and sends the data to the baseband processing unit, and the baseband processing unit receives the After the encrypted service sequence code stream is decrypted, the corresponding encryption mode information is used to decrypt the service sequence code stream; in the uplink direction, when the baseband processing unit needs to send the service sequence code stream to be sent When it is sent to the corresponding TRAU, it is encrypted and processed by the encryption mode information of the corresponding entry in the encryption mode information table determined by the notification issued by the TRAU, and sent to the TRAU; After receiving the encrypted service sequence code stream, the TRAU decrypts the encrypted mode information corresponding to the TRAU to obtain the restored service sequence code stream.
  • the step B described includes:
  • the sequence sequence chaos and the XOR sequence mode pair are sequentially used at the service sequence stream receiving end. Receiving the service sequence code stream for decryption processing;
  • the sequence of the traffic sequence stream is sequentially encrypted by the sequence scrambling and the XOR sequence encryption mode
  • the XOR sequence and the sequence scrambling mode are sequentially used at the receiving end of the service sequence stream.
  • the received service sequence code stream is decrypted.
  • the step B described includes:
  • the service sequence code stream to be sent is encrypted by using the encryption mode information at the transmitting end of the service sequence code stream;
  • the service sequence code stream obtained after the de-frame processing is decrypted by using the corresponding encryption mode information to obtain a correct service sequence code stream.
  • the length of the XOR sequence in the XOR sequence is the common divisor of the number of bits of the service data that needs to be encrypted for transmission in the TRAU frame.
  • the method for implementing information encryption transmission in the wireless communication system further includes:
  • the base station controller updates the encryption mode information stored by the base station and the TRAU through the maintenance unit and the maintenance channel periodically or irregularly.
  • the implementation of the present invention can enable the digital trunking system of the GSM technical system to encrypt the voice service or data service code stream transmitted on the Abis interface during the voice service or the data service. Therefore, the voice service or the data service can be effectively prevented from being monitored on the Abis interface; that is, on the Abis interface, the present invention can encrypt the voice service or the data service, so that the security performance of the service transmission can be guaranteed, that is, The services transmitted by the Abis interface are difficult to decrypt in real time.
  • the method of the present invention not only achieves the above object, but also has the following advantages:
  • the encryption algorithm selected by the invention is simple, therefore, the TRAU and BTS on both sides of the Abis interface
  • the baseband processing unit has low processing capability requirements, and the implementation process has a low degree of recovery, and at the same time, changes to the original business process flow are small;
  • the invention is suitable for the encryption processing of the Abis interface of the GSM system, and is also suitable for the encryption processing of the cluster system based on the GSM system. At the same time, the invention can also be applied to the encryption processing of the corresponding interface information in other similar wireless communication systems.
  • FIG. 1 is a schematic structural diagram of a base station subsystem
  • FIG. 3 is a flowchart of a specific implementation of the method according to the present invention.
  • the core of the method of the present invention is to encrypt the service flow to be transmitted in a predetermined encryption mode on the TRAU and the base station channel baseband processing unit, and decrypt the received service flow to obtain the restored service flow. .
  • the voice or service data of the Abis interface of the digital cluster system based on the GSM system is encrypted, so as to effectively prevent the call between the cluster users in the cluster system from being monitored on the Abis interface.
  • the corresponding encryption processing is enabled to carry data carried by the TRAU frame transmitted between the specific TRAU and the specific base station channel baseband processing unit. Encryption is performed so that the voice service and the data service code stream transmitted on the Abis interface are encrypted and processed to avoid the voice service and the data service being monitored on the Abis interface, so that the listener can only be decrypted before decryption. Hear noise or garbled data.
  • the BSS Base Station Subsystem
  • BTS Base Transceiver Station
  • BSC Base Station Controller
  • TRAUs Code Transformation and Rate Adaptation Unit
  • Composition usually, to save transmission resources, although the TRAU is logically BSS, it is physically placed on the NSS (Network Subsystem) side, where:
  • each of the TRAUs performs voice codec and data service rate adaptation functions in the system, and the BTS implements an interface with a mobile station or a BSC to implement conversion between a wireless interface signal and a ground signal;
  • the BSC generally includes a maintenance unit and a control switching unit.
  • the maintenance unit performs management and maintenance or data configuration of the TRAU and the BTS through the maintenance channel, and implements a connection with the base station and the TRAU through the control switching unit; and when performing voice or data services.
  • the specific TRAU is connected to a specific baseband channel processing unit under the base station cell, and the base station implements a connection with the NASS through the A interface.
  • the present invention mainly adds encryption processing to the transmitted TRAU frame on the baseband processing unit and the TRAU, respectively.
  • the decryption process of the received TRAU frame so that the data transmitted by the Abis interface is encrypted data, which ensures the security of data transmission in the wireless communication system.
  • FIG. 3 specifically includes the following steps:
  • Step 301 The cluster network operation and maintenance personnel of the operator respectively configure encryption mode information on the base station side and the TRAU side, respectively, and perform encryption processing on the data to be sent on the base station and the TRAU, respectively, and decrypt the received data;
  • the encryption mode information includes: XOR sequence encryption and sequence scrambling encryption; and, the XOR sequence encryption mode is: when the encryption process is performed, the encrypted service sequence code stream is XOR-encrypted, and During the decryption process, the encrypted service sequence code stream is subjected to XOR decryption processing again; the sequence scrambling encryption mode is: when the encryption process is performed, the service sequence code streams to be encrypted are reordered according to a predetermined pattern. And during the decryption process, the encrypted service sequence code stream is restored to the initial order according to a predetermined mode;
  • the encryption mode information is stored in an encryption mode information table (abbreviated as an encryption table), and the information recorded in the entries in the table may be adjusted periodically or irregularly to ensure the confidentiality of the encryption table;
  • the maintenance unit of the BSC and the maintenance channel between it and the TRAU download the encryption table to the TRAU unit; the BSC operation and maintenance unit also downloads the same encryption mode information table to each cell under the BSC through the operation and maintenance channel between the BSC and the BTS.
  • Step 302 When performing service communication through the Abis interface, determine, in the TRAU and the base station channel baseband processing unit, an entry in the encryption table that needs to be enabled;
  • the specific processing includes:
  • the BSS receives the assignment message or the handover request message from the A interface, and the message includes the A interface CIC (circuit identification code) and the service description.
  • a interface CIC circuit identification code
  • the BSS system selects the TRAU unit according to the CIC circuit and related service description.
  • the selection of the TRAU unit is not required; at the same time, the traffic channel is also selected in the corresponding cell, and similarly, for the intra-BSC handover, the channel with the same channel type of the original cell is selected and switched in the target cell;
  • channel selection processing is performed on the selected channel.
  • the BSC notifies the channel baseband processing unit of the encrypted entry corresponding to the TRAU unit through the signaling link, and simultaneously implements the connection processing of the TRAU unit and the base station channel baseband processing unit.
  • the service sequence code stream exchanged between the base station and the TRAU can be correspondingly encrypted, that is, the uplink and downlink of the Abis interface are predefined by the encryption entry.
  • the encryption and decryption processing mode encrypts and decrypts the service sequence code stream transmitted on the Abis interface.
  • the TRAU and BTS channel baseband processing units use the same encryption entry to perform the addition and decryption operations, and the encrypted data is still transmitted on the Abis interface through the TRAU frame, if the Abis interface If there is no transmission error, the received data can be recovered intact. Of course, if there is a transmission error on the Abis interface, the recovered data also has an error, and the error characteristics are the same. That is, the encryption process provided by the present invention does not change the transmitted data content.
  • Step 303 Encrypt the voice service or the data service sequence code stream to be sent by using the encrypted entry in the determined encryption mode information table at the service sending end;
  • the service sending end may be a base station side or a TRAU side;
  • Step 304 After receiving the encrypted service sequence code stream, the service receiving end decrypts the received service sequence code stream by using the corresponding encryption entry to obtain the received service sequence code information.
  • the service receiving end may be the TRAU side or the base station side;
  • the same encryption table entry is used for encryption and decryption processing at the service receiving and transmitting end, thereby ensuring encryption and encryption.
  • the decryption process proceeds smoothly.
  • the core of the invention is the process of encrypting and decrypting the transmitted traffic.
  • the encryption mode information table referred to in the present invention and the specific encryption and decryption processing procedures using the encryption mode information table will be described in detail below.
  • the encryption mode information table may be composed of a plurality of encryption entries, and the number of the encryption entries may be set according to the size of the device.
  • each TRAU unit corresponds to a certain encryption entry, or may be a plurality of TRAUs.
  • the unit shares a certain encrypted entry;
  • the content that the encryption mode information table can include is as shown in Table 1:
  • Table index used to quickly obtain encrypted data of the entry according to the hook
  • Seq_ XOT Define a binary sequence Seq_ X or in the XOR sequence field, and use this binary sequence to encrypt and decrypt the service data in the system;
  • Sequence-discrimination domain Zl-trau The sequence in the chaotic domain is an integer less than or equal to AbisBitNum; the AbisBitNum is the number of BITs other than the frame synchronization BIT of the Abis interface TRAU frame; the encryption mode domain Mode; the information recorded according to the domain You can identify the use of XOR encryption or scrambling encryption, or both;
  • the four domains in the foregoing Table 1 are included, but are not limited to the above four domains, that is, more domains may be added to the encryption mode information table according to actual needs, and Define more information.
  • the TRAU unit and the channel baseband processing unit may perform the addition and decryption operations by using the XOR sequence field, the scramble sequence field, and the encryption mode field defined by the encryption entry corresponding to the TRAU unit.
  • the corresponding encryption and decryption processing in the method of the present invention will be described separately in several cases.
  • the TRAU unit uses the AbisBitNum BIT data (ie, the voice service or the data service sequence code sequence - AbisBitNum) carried by the TRAU frame on the Abis interface through the XOR sequence field to adopt the binary sequence Seq_ in the XOR sequence field in the encryption mode information table.
  • X or XOR is encrypted: XOR_Operation(SeqL_xor, Sequence—AbisBitNum); After corresponding XOR encryption, a new AbisBitNum BIT sequence is obtained, and the new sequence is encoded according to the TRAU frame format defined by the GSM0860 protocol. Forming a TRAU frame, and the TRAU frame is transmitted on the Abis interface;
  • the TRAU frame After receiving the TRAU frame on the BTS side, the TRAU frame is first de-framed to obtain the AbisBitNum BIT sequence. To decrypt the same, the same XOR sequence is used to perform the XOR decryption operation on the decoded sequence again. : XOR-Opemtion (Seq_xor, AbisBitNum BIT sequence), obtain the restored service sequence code stream;
  • the BTS side can decrypt the original compressed voice service or data service sequence code stream before the TRAU unit XOR encryption operation.
  • the BTS channel baseband processing unit performs XOR encryption processing on the AbisBitNumBIT data carried by the TRAU frame that needs to be transmitted on the Abis interface through the XOR sequence field in the encryption mode information table: XOR_Operation(Seq_xor, Sequence_AbisBitNum);
  • a new AbisBitNumBIT sequence is obtained, and the new sequence is encoded according to the TRAU frame format defined by the GSM0860 protocol to form a TRAU frame, and the TRAU frame is transmitted on the Abis interface;
  • the TRAU frame After receiving the TRAU frame at the TRAU end, the TRAU frame is deframed, and the decoded sequence is XORed again by the same XOR sequence, XOR_Operation (Seq_xor, AbisBitNum BIT sequence), so that the uplink TRAU unit side Can get BTS baseband channel list Membered XOR operation is processed before the original compressed voice traffic or data traffic stream sequence; the present invention, the heterologous sequence or Seq_ X or length is not limited, but for the convenience of calculation, the length is preferably selected to be encrypted is transmitted TRAU
  • Seq_ X or the GSM system may be composed of several air interface encryption algorithm to generate, directly or using encryption sequence generated therein taken as a partial sequence of the Sector; may also be employed to produce the corresponding random number generator Seq_ XO r;
  • the sequence of the ambiguous domain is used to scramble the AbisBitNum BIT data carried by the Abis interface TRAU. For example, if the sequence ambiguity field is 16, the BIT order of the original AbisBitNum BIT data before encoding is as follows:
  • sequence scrambling operation of the AbisBitNum BIT sequence in the Ij TRAU unit is expressed as: ZL- Operation (Zl_trau, Sequence—AbisBitNum), and ZL_Operation(Zl_trau, Sequence—AbisBitNum) is still a sequence of AbisBitNum BIT, and TRAU performs frame processing on ZL_Operation(Zl_trau, Sequence_AbisBitNum) and transmits on Abis interface;
  • the BTS unit receives the TRAU frame transmitted by Abis and de-frames the obtained AbisBitNum BIT sequence is ZL_Operation (Zl_trau, Sequence-AbisBitNum), and the AbisBitNum BIT sequence is used in the BTS to perform the scrambling operation: (AbisBitNum-Zl trau): ZL_Operation((AbisBitNum-Zl_trau), AbisBitNum BIT), which means:
  • the BTS side channel baseband processing unit can recover the data before the TRAU scrambling as it is.
  • the sequence of the BTS channel baseband processing is (AbisBitNum_Zl-trau), and the AbisBitNum BIT sequence carried by the TRAU frame is Sequence-AbisBitNum
  • the sequence of the AbisBitNum BIT sequence in the BTS channel baseband processing unit is performed.
  • the random operation is expressed as: ZL_Operation((AbisBitNum-Zl_trau), Sequence-AbisBitNum), and the ZL_Operation((AbisBitNum-Zl_trau), Sequence-AbisBitNum) is still a sequence of AbisBitNum BIT, and the BTS baseband channel processing unit After the sequence is framed, it is transmitted on the Abis interface;
  • the TRAU unit receives the TRAU frame transmitted by Abis and de-frames the obtained AbisBitNum BIT sequence, which is ZL_Operation((AbisBitNum-Zl_trau), Sequence-AbisBitNum).
  • the TRAU unit uses the Zl-traau field to perform the scrambling operation on the AbisBitNum BIT sequence: ZL_Operation(Zl_trau, AbisBitNum BIT), in this way, the TRAU unit can recover the data before the chaos of the BTS channel baseband processing unit can be recovered intact;
  • the Abis interface uses the XOR sequence field and the chaotic sequence field to perform the addition and decryption operations:
  • the TRAU unit performs XOR processing on the Sequence-AbisBitNum carried by the TRAU frame on the Abis interface according to the XOR sequence field in the encryption mode information table, XOR_Operation (Seq_xor, Sequence-AbisBitNum);
  • the chaotic sequence is encoded according to the TRAU frame format defined by the GSM0860 protocol to form a TRAU frame, and the TRAU frame is transmitted on the Abis interface;
  • the channel baseband processing unit After receiving the TRAU frame on the BTS side, it deframes it and obtains the corresponding sequence: ZL_ Operation (Zl-trau, XOR_Operation(Seq_xor, Sequence-AbisBitNum)); The channel baseband processing unit uses (AbisBitNum-Zl-trau) to perform a scrambling operation on the sequence to obtain XOR_Operation(Seq_xor, Sequence_AbisBitNum);
  • the XOR_Operation (Seq_xor, Sequence-AbisBitNum) is further processed by the Seq_xor XOR sequence, that is, XOR_Operation (Seq_xor, XOR_Operation(Seq_xor, Sequence-AbisBitNum)), then the channel baseband processing unit can recover the TRAU encryption.
  • the former Sequence - AbisBitNum.
  • the TRAU can also perform the sequence encryption domain encryption operation first, and then perform the XOR sequence domain encryption operation, and the channel baseband processing unit first performs the sequence domain chaotic domain decryption, and then performs the XOR sequence domain decryption; the Abis interface can also be implemented. Decryption function.
  • the Abis interface downlink uses the XOR sequence field and the scrambling sequence field to perform encryption and decryption operations:
  • the channel baseband processing unit performs XOR processing on the Sequence_AbisBitNum carried by the TRAU frame on the Abis interface through the XOR sequence field: XOR_Operation(Seq_xor, Sequence_AbisBitNum) , which is a new AbisBitNum BIT sequence;
  • the AbisBitNum BIT sequence is subjected to sequence scrambling operation: ZL-Operation (Zl-trau, XOR_Operation (Seq_xor, Sequence-AbisBitNum)), and then the sequence is encoded according to the TRAU frame format defined by the GSM0860 protocol to form a TRAU frame, and Transmitting the TRAU frame on an Abis interface;
  • the TRAU frame After receiving the TRAU frame on the TRAU side, the TRAU frame is deframed, and a sequence of ZL_Operation(Zl_traau, XOR_Operation(Seq_xor, Sequence-AbisBitNum)) is obtained;
  • the TRAU unit uses (AbisBitNum-Zl-trau) to sequence and decrypt the sequence, namely: ZL_Operation((AbisBitNum-Zl-trau), ZL_Operation(Zl_trau, XOR_Operation(S eq_xor , Sequence— AbisBitNum)) );
  • the channel baseband processing unit can also use the chaotic sequence domain for encryption operation. Encryption operation is performed by using the XOR sequence field.
  • the TRAU unit receives the encrypted service sequence code stream, it first uses the chaotic sequence domain to decrypt, and then uses the XOR sequence field to decrypt, so that the Abis interface can still be implemented. Add and decrypt functions.
  • a professional encryption algorithm can also be used to implement encryption of the Abis interface, so that the security effect of the corresponding service information is better, but the disadvantage is that the implementation complexity is high, and the impact on the original business implementation process is large.
  • the present invention implements the encryption processing of the service information transmitted between the interface between the BTS and the BSC and the interface between the BSC and the TRAU in FIG. 1, which effectively avoids illegally monitoring the effective voice on the corresponding interface. Or data.
  • the present invention can enable the digital trunking system of the GSM technical system to encrypt the voice service or the data service code stream transmitted on the Abis interface during the voice service or the data service, thereby preventing the voice service or the data service from being blocked on the Abis interface.
  • the purpose of the monitoring is not limited to the monitoring.
  • the method of the present invention has the advantages of simple implementation and low processing requirements for the TRAU unit and the BTS baseband processing unit on both sides of the Abis interface.

Description

无线通信系统中实现信息加密传输的方法 技术领域
本发明涉及网络通信技术领域, 尤其涉及一种无线通信系统中实现信息 加密传输的方法。
背景技术
目前, 由于集群专网采用的技术体制各不相同, 因此, 采用集群专网建 设思路发展集群通讯网络, 各集团均为各自独立建设, 容易形成各自为政的 建设局面, 导致频率利用效率低下, 网络建设成本和网络维护费用高等弊端。 为此, 随着集群通讯技术由模拟向数字发展, 集群网络建设呈现出由独立专 网建设向集群共网建设方向发展。
由于 GSM系统在全世界范围内具有最为广泛的用户基础,并且欧洲已制 定出一套用于铁路移动集群通信的国际标准 GSM-R, GSM-R以 GSM通信技 术作为业务承载, 能够提供 eMLPP (增强多级优先与抢占业务)业务、 VGCS (语音组呼业务) 业务和 VBS (语音群呼业务) 业务等基本集群语音调度通 信业务;因此,发展基于 GSM的数字集群系统不仅符合集群系统的发展趋势, 还具备良好的技术基础。
在实际的应用过程中, GSM公网和基于 GSM系统的集群共网在业务用 户和小区制式差别很大, GSM公网往往采用小区制, 覆盖范围较小, 对于热 点地区的小区覆盖半径甚至只有 0.5公里左右; 而集群共网采用大区制建站, 站点覆盖范围可达数十公里, 通常建一个中心站就可以满足对集群集团用户 覆盖的要求。
同时, GSM公网面向公众, 而 GSM集群系统所服务用户是集群用户, 包括公安、 武警、 消防、 国家安全等政府要害部门, 以及银行、 金融等大型 企业团体, 由于集群小区的区域分布特征, 同一集群部门人员其地点位置相 对固定集中, 某个特定集群部门人员移动台处于某个特定站点相关小区 的概率非常大。
目前, GSM系统的另一个特点是 Abis接口 (即基站与基站控制器之间 的接口) 是一个标准接口, 没有提供相应的信息加密功能, 各种话音业务和 数据业务在 Abis接口上均采用标准格式进行传输。
由于 GSM系统公众通信很难跟踪到特定用户, 而 GSM-R系统主要用于 铁路业务调度, 通信的保密性要求较低。 因此, 如果 GSM系统和 GSM-R系 统 Abis接口不提供加密功能, 对于 GSM系统公众通信和铁路系统调度通信 不会带来很大安全风险。
但是, 若基于 GSM体制的集群系统的基站和基站控制器之间的 Abis接 口和 GSM系统或 GSM-R系统的 Abis接口同样不提供加密功能, 将可能会 导致集群用户间的通话时刻存在被监听的风险, 存在很大安全隐患。
也就是说, 如果 GSM体制下的集群系统的 Abis接口如果未采用加密功 能, 则将使得支持 Abis接口的各种标准话音解码设备, 均可以对该接口上的 话音进行监听。 比如, 目前许多厂家提供的 GSM网络 Abis接口调测设备就 可以监听 Abis接口上的语音信息。
另外, 由于集群通信网络中, 基站和基站控制器间存在较长距离, 很难 禁止非法人员从 Abis接口物理接入; 这样, 势必造成特定集群用户间的通话 时刻存在被监听的风险, 存在很大安全隐患。
因此, 解决基于 GSM系统的集群系统 Abis接口加密问题是推广该系统 之前首先需要解决的一个问题, 但目前还没有相应的解决方案。
发明内容
鉴于上述现有技术所存在的问题, 本发明的目的是提供一种无线通信系 统中实现信息加密传输的方法, 以避免 GSM系统中经过 Abis接口进行传输 的信息被监听, 提高了 GSM系统中信息传输的安全性。
本发明的目的是通过以下技术方案实现的:
本发明提供了一种无线通信系统中实现信息加密传输的方法, 包括-
A、 在无线通信系统中的基站侧和码变换与速率适配单元 TRAU侧分别 配置加密模式信息;
B、 当基站侧与 TRAU侧间需要进行信息交互时, 则采用配置的加密模 式信息对需要交互的信息进行加密处理, 并将加密处理后的信息在基站侧与 TRAU侧间进行交互。
所述的步骤 A包括: 在无线通信系统的基站和 TRAU中分别配置加密模式信息表, 表中记录 着信息加密需要采用的加密模式。
所述的步骤 A还包括:
基站控制器通过维护单元及维护通道将确定的加密模式信息分别下发给 基站和 TRAU, 并分别保存于基站和 TRAU中。
所述的加密模式信息包括异或序列加密模式和 /或序列制乱的加密模式, 而且, 其中- 所述的异或序列加密模式为: 在加密处理时, 对待加密的业务序列码流 进行异或加密处理, 并在解密处理时, 再次对加密后的业务序列码流进行异 或解密处理;
所述的序列制乱加密模式为: 在加密处理时, 将待加密的业务序列码流 按照预定的模式进行重新排序, 并在解密处理时, 将加密后的业务序列码流 按照预定的模式恢复初始的排序。
所述的加密模式信息表中记录的表项包括:
记录表项序号信息的表项索引、 记录进行异或加密需要的信息的异或序 列域表项、 记录进行制乱加密需要的信息的序列制乱域表项, 以及记录采用 异或序列域和 /或序列制乱域的模式的加密模式表项,
所述的各个 TRAU分别与加密模式信息表中的一个表项对应。
所述的步骤 B包括:
当 TRAU进行信道激活处理, 并实现与基站信道基带处理单元接续时, 基站控制器将该 TRAU对应的表项信息通知所述基带处理单元。
所述的步骤 B具体包括:
在下行方向, TRAU将待发送的业务序列码流采用该 TRAU在加密模式 信息表中对应的表项记录的加密模式信息对其进行加密处理, 并发送给基带 处理单元, 基带处理单元接 所述经过加密处理后的业务序列码流后, 则采 用对应的加密模式信息对其进行解密处理, 获得还原后的业务序列码流; 在上行方向, 当基带处理单元需要将待发送的业务序列码流发送给相应 的 TRAU时,则采用根据所述 TRAU下发的通知确定的加密模式信息表中对 应的表项记录的加密模式信息对其进行加密处理, 并发送给所述 TRAU; TRAU接收所述经过加密处理后的业务序列码流后, 釆用该 TRAU对应的加 密模式信息对其进行解密处理, 获得还原后的业务序列码流。
所述的步骤 B包括:
当在业务序列码流的发送端依次采用异或序列和序列制乱加密模式对业 务序列码流进行加密处理时, 则在业务序列码流接收端需要依次采用序列制 乱和异或序列模式对接收的业务序列码流进行解密处理;
当在业务序列码流的发送端依次釆用序列制乱和异或序列加密模式对业 务序列码流进行加密处理时, 则在业务序列码流接收端需要依次采用异或序 列和序列制乱模式对接收的业务序列码流进行解密处理。
所述的步骤 B包括:
在业务序列码流的发送端将待发送的业务序列码流采用加密模式信息进 行加密处理;
将^]密处理后的业务序列码流编码为 TRAU帧, 并发送;
在业务序列码流的接收端对接收的 TRAU帧进行解帧处理;
将解帧处理后获得的业务序列码流采用相应的加密模式信息进行解密处 理, 获得正确的业务序列码流。
所述的异或序列域中异或序列的长度为 TRAU帧传输的需要加密处理的 业务数据的位数的公约数。
所述的无线通信系统中实现信息加密传输的方法还包括:
基站控制器通过维护单元及维护通道定时或不定时对基站和 TRAU保存 的加密模式信息进行更新。
由上述本发明提供的技术方案可以看出,本发明的实现可以使 GSM技术 体制的数字集群系统,对语音业务或数据业务进行过程中在 Abis接口传输的 语音业务或数据业务码流进行加密, 从而可以有效防止语音业务或数据业务 在 Abis接口被监听的目的; 也就是说, 在 Abis接口, 本发明可以对语音业 务或数据业务进行加密处理, 使得业务传输的保密性能可以得到保证, 即在 Abis接口传输的业务很难被实时解密。
本发明所述的方法不仅实现上述目的, 同时还具有以下优点:
本发明选择的加密算法简单, 因此, 对 Abis接口两侧的 TRAU和 BTS 基带处理单元处理能力要求低, 而且实现过程的复^ _度较低, 同时, 对原业 务处理流程的更改较小;
本发明既适合 GSM系统的 Abis接口的加密处理, 也适合基于 GSM体 制的集群系统的加密处理, 同时, 本发明还可以适用于其他类似无线通信系 统中相应接口信息的加密处理。
附图说明
图 1为基站子系统的结构示意图;
图 2为本发明的实现原理示意图;
图 3为本发明所述的方法的具体实现流程图。
具体实施方式
本发明所述的方法的核心是在 TRAU和基站信道基带处理单元上分别采 用预定的加密模式对待传输的业务流进行加密处理, 并可以对接收的业务流 进行解密处理,获得还原后的业务流。从而实现了对基于 GSM系统的数字集 群系统 Abis接口的语音或业务数据进行加密, 以有效防止集群系统中的集群 用户间的通话在 Abis接口被监听。
即, 在本发明中, 当需要在 Abis接口上进行话音或数据业务通信时, 则 启用相应的加密处理过程, 将具体的 TRAU和具体的基站信道基带处理单元 之间传输的 TRAU帧承载的数据进行加密,使得 Abis接口上传输的话音业务 和数据业务码流是经过加密处理后的码流, 以避免止话音业务和数据业务在 Abis接口上被监听, 这样, 在解密前, 监听者只能听到噪声或乱码数据。
在 GSM系统中, 基站子系统的结构如图 1所示, BSS (基站子系统) 由 BTS (基站收发信台)、 BSC (基站控制器)和若干个 TRAU (码变换与速率 适配单元) 组成, 通常, 为节省传输资源, 尽管 TRAU在逻辑上属于 BSS, 但在物理上通常置于 NSS (网络子系统)侧, 其中:
在图 1中, 所述的各个 TRAU在系统中进行语音编解码和数据业务速率 适配的功能, BTS实现与移动台或 BSC的接口, 从而实现无线接口信号与地 面信号之间的转换; 所述的 BSC通常包括维护单元和控制交换单元, 维护单 元通过维护通道进行 TRAU和 BTS的管理维护或数据配置,通过控制交换单 元实现与基站和 TRAU之间的连接; 并在进行话音或数据业务时, 实现各个 具体的 TRAU到基站小区下具体基带信道处理单元的接续, 同时基站实现通 过 A接口与 NASS的连接。
本发明所述的方法的具体实现方式参照图 2和图 3所示, 首先如图 2所 示,本发明主要是在基带处理单元和 TRAU上分别增加了对发送的 TRAU帧 的加密处理, 以及对接收的 TRAU帧的解密处理,从而使得 Abis接口传输的 数据是经过加密处理后的数据, 保证了无线通信系统中数据传输的安全性。
下面再结合图 3对本发明所述方法的具体实现过程进行说明, 所述方法 具体包括以下步骤:
步骤 301 : 运营商的集群网络操作维护人员分别在基站侧和 TRAU侧分 别配置加密模式信息, 并分别用于在基站和 TRAU上对待发送的数据进行加 密处理, 对接收的数据进行解密处理;
所述的加密模式信息包括: 异或序列加密和序列制乱加密; 而且, 所述 的异或序列加密模式为: 在加密处理时, 对待加密的业务序列码流进行异或 加密处理, 并在解密处理时, 再次对加密后的业务序列码流进行异或解密处 理; 所述的序列制乱加密模式为: 在加密处理时, 将待加密的业务序列码流 按照预定的模式进行重新排序, 并在解密处理时, 将加密后的业务序列码流 按照预定的模式恢复初始的排序;
所述的加密模式信息保存于加密模式信息表 (简称加密表) 中, 且表中 的表项记录的信息可以定期或不定期进行调整, 以保证加密表的保密性; 集群网络操作维护人员通过 BSC的维护单元,以及其与 TRAU之间的维 护通道给 TRAU单元下载加密表; BSC操作维护单元还通过 BSC和 BTS之 间的操作维护通道给该 BSC下各个小区下载同样的加密模式信息表。
步骤 302: 当需要通过 Abis接口开展业务通信时, 在 TRAU和基站信道 基带处理单元上确定需要启用的加密表中的表项;
具体的处理过程包括:
首先,在业务呼叫建立或移动台在 BSC间进行切换时, BSS从 A接口接 收 NSS发送过来指配消息或切换请求消息, 所述消息中包括 A接口 CIC (电 路识别码) 和业务描述;
然后, BSS系统根据 CIC电路及相关业务描述,选择 TRAU单元, 当然, 如果是 BSC内切换, 则无需进行 TRAU单元的选择; 同时, 还在相应小区选 择业务信道, 同样, 对于 BSC内切换, 则在目标小区选择和切换原小区信道 类型相同的信道;
最后, 对选择的信道进行信道激活处理, 信道激活时, BSC通过信令链 路将 TRAU单元对应的加密表项通知信道基带处理单元, 同时实现 TRAU单 元和该基站信道基带处理单元的接续处理。
经过了步骤 301和步骤 302的处理后, 基站和 TRAU间交互的业务序列 码流便可以进行相应的加密处理了, 即可以在 Abis接口的上、 下行链路将通 过该加密表项预定义的加、解密处理模式对在 Abis接口传输的业务序列码流 进行加密和解密处理。
而且, 在 GSM系统中, 话音业务或数据业务通信时, TRAU和 BTS信 道基带处理单元采用相同的加密表项进行加、 解密操作, 加密后的数据仍然 通过 TRAU帧在 Abis接口传输, 如果 Abis接口无传输误码, 则收到可以原 封不动恢复发端数据, 当然, 如果 Abis接口存在传输误码, 则恢复的数据同 样存在误码, 且误码特性相同。 即本发明提供的加密处理过程并不会改变传 输的数据内容。
接着前面描述的步骤 301和步骤 302, 下面将对本发明提供的具体的加 密及解密处理过程进行说明, 具体包括以下步骤:
步骤 303 : 在业务发送端采用确定的加密模式信息表中的加密表项对待 发送的语音业务或数据业务序列码流进行加密处理;
所述的业务发送端可以为基站侧, 也可以为 TRAU侧;
步骤 304: 业务接收端收到所述经过加密处理后的业务序列码流后, 采 用相应的加密表项对接收的业务序列码流进行解密处理, 获得接收的业务序 列码信息;
同样, 业务接收端可以为 TRAU侧, 也可以为基站侧;
由于在基站信道基带处理单元和 TRAU上已经确定了加密、 解密处理采 用的加密表项信息, 因此, 在业务收、 发端将会采用同样的加密表项进行加 密和解密处理, 从而保证了加密和解密处理过程的顺利进行。
本发明的核心就是对传输的业务的加密和解密处理过程。 为对本发明有 进一步的理解, 下面将对本发明中涉及的加密模式信息表, 以及利用所述加 密模式信息表的具体的加密和解密处理过程进行详细的说明。
所述的加密模式信息表可以由若干个加密表项组成, 加密表项的数量可 以根据设备容量的大小设置, 具体可以是每个 TRAU单元对应一个确定的加 密表项, 也可以是若干个 TRAU单元共用一个确定的加密表项;
所述加密模式信息表可以包括的内容如表 1所示:
表 1
Figure imgf000010_0001
在表 1中, 具体包括:
表索引: 用于根据该索弓 I可以快速获取该表项的加密数据;
异或序列域 Seq_XOT: 在异或序列域定义一个二进制序列 Seq_Xor, 禾 lj用 该二进制序列便可以对系统中的业务数据进行加密和解密处理;
序列制乱域 Zl— trau: 序列制乱域中为一个小于等于 AbisBitNum的整数; 所述的 AbisBitNum为 Abis接口 TRAU帧除帧同步 BIT以外的 BIT数量; 加密模式域 Mode;根据该域记录的信息可以标识使用异或加密或制乱加 密, 或者是两者都使用;
在所述的加密模式信息表中包括上述表 1中的 4个域, 但并不仅限于上 述 4个域, 也就是说, 根据实际需要还可以在加密模式信息表中增加更多的 域, 并定义更多的信息。
基于上述表 1中的加密模式信息表, TRAU单元和信道基带处理单元可 以通过 TRAU单元对应的加密表项定义的异或序列域、 制乱序列域以及加密 模式域完成加、 解密操作, 具体可以仅使用异或序列域进行加密, 或者仅使 用制乱序列域进行加密, 或者同时使用异或序列域和制乱序列域进行加密。 下面将对本发明所述的方法中相应的加密和解密处理过程分几种情况分 别进行说明。
(一)仅使用异或序列域加密
( 1 )在 Abis接口下行异或序列域加、 解密操作-
TRAU 单元通过该异或序列域对 Abis 接口上的 TRAU 帧承载的 AbisBitNum BIT数据 (即语音业务或数据业务序列码流 Sequence— AbisBitNum) 采用加密模式信息表中的异或序列域中的二进制序列 Seq_Xor进行异或加密 处理: XOR_Operation(SeqL_xor, Sequence— AbisBitNum); 通过相应异或加密处理后, 将得到的是一个新的 AbisBitNum BIT序列, 将新的序列按照 GSM0860协议定义的 TRAU帧格式进行编码形成 TRAU帧, TRAU帧在 Abis接口传输;
在 BTS侧收到 TRAU帧后, 首先对 TRAU帧进行解帧处理, 得到所述 AbisBitNum BIT序列; 为对其进行解密, 则需要采用同样的异或序列再次对 解码得到的序列进行异或解密操作: XOR—Opemtion(Seq_xor, AbisBitNum BIT序列), 获得还原后的业务序列码流;
因此, BTS侧可以解密得到 TRAU单元异或加密操作处理之前的原始压 缩语音业务或数据业务序列码流。
(2) Abis接口上行异或序列域加、 解密操作:
BTS 信道基带处理单元通过加密模式信息表中的异或序列域对需要在 Abis接口上传输的由 TRAU帧承载的 AbisBitNumBIT数据进行异或加密处 理: XOR_Operation(Seq_xor , Sequence— AbisBitNum);
通过异或序列加密处理操作后 ,得到的是一个新的 AbisBitNumBIT序列, 将新的序列按照 GSM0860协议定义的 TRAU帧格式进行编码形成 TRAU帧, TRAU帧在 Abis接口传输;
在 TRAU端对收到 TRAU帧后对 TRAU帧进行解帧,采用同样的异或序 列再次对解码得到的序列进行异或操作, XOR— Operation(Seq_xor, AbisBitNum BIT序列), 这样, 上行 TRAU单元侧可以得到 BTS基带信道单 元异或操作处理之前的原始压缩语音业务或数据业务序列码流; 本发明中, 对异或序列 Seq_Xor长度不作限制, 但为计算方便, 所述长 度最好选择为 TRAU传输的待加密业务序列码流的位数 AbisBitNum的公约 数; 这样, TRAU帧的 AbisBitNum BIT数据可以多次分段与该二进制序列进 行异或操作,在 Abis接口的接收端经过同样多次与该二进制序列进行异或操 作以后,可以原封不动地恢复其发送端异或操作以前的 AbisBitNum BIT二进 制数据。
所述的 Seq_Xor可以由 GSM系统空口几种加密算法生成,直接采用生成 的加密序列或者截取其中的部分序列作为所述的 Sector;也可以采用随机数 发生器产生相应的 Seq_XOr;
(二)仅使用序列制乱域加密
采用序列制乱域用来将 Abis接口 TRAU承载的 AbisBitNum BIT数据进 行位置打乱, 例如: 序列制乱域为 16时, 如果原来 AbisBitNum BIT数据在 编码之前的 BIT顺序如下:
B001B002B003B004B005B006B007B008B009B010B011B012B013B014B 015B016B017B018 BabisBitNum;
则通过序列制乱域为 16序列制乱后, 变成如下序列-
B017B018 BAbisBitNumB001B002B003B004B005B006B0
07B008B009B010B011B012B013B014B015B016;
( 1 ) Abis接口下行序列制乱域加、 解密操作:
如果在 TRAU端的序列制乱域值为 Zl— tmu, 并且一个 TRAU帧携带的 AbisBitNum BIT 序列为 Sequence— AbisBitNum, 贝 Ij TRAU 单元中对该 AbisBitNum BIT序列进行的序列制乱操作表达为: ZL— Operation(Zl—trau, Sequence— AbisBitNum), 且 ZL_Operation(Zl_trau , Sequence— AbisBitNum)仍 为一个 AbisBitNum BIT 的序列, TRAU 对 ZL_Operation(Zl_trau, Sequence_AbisBitNum)进行编帧处理后在 Abis接口传输;
BTS单元接收 Abis传送过来的 TRAU帧并解帧,得到的 AbisBitNum BIT 序列就是 ZL_Operation(Zl_trau , Sequence— AbisBitNum), BTS 中对该 AbisBitNum BIT 序列采用 ( AbisBitNum— Zl trau ) 进行制乱操作: ZL_Operation((AbisBitNum-Zl_trau), AbisBitNum BIT), 也就是说:
Sequence— AbisBitNum= ZL_Operation((AbisBitNum-Zl_trau) , ZL_Operation(Zl_trau, Sequence— AbisBitNum));
这样, BTS侧信道基带处理单元可以原封不动地恢复获得 TRAU制乱前 的数据。
(2) Abis接口上行序列制乱域加、 解密操作
如果在 BTS信道基带处理的序列制乱域值为 (AbisBitNum— Zl—trau), 并且 TRAU帧携带的 AbisBitNum BIT序列为 Sequence— AbisBitNum,则 BTS 信道基带处理单元中对该 AbisBitNum BIT序列进行的序列制乱操作表达为: ZL_Operation((AbisBitNum-Zl_trau), Sequence—AbisBitNum), 而且, 所述的 ZL_Operation((AbisBitNum-Zl_trau), Sequence—AbisBitNum)仍为一个 AbisBitNum BIT的序列, BTS基带信道处理单元对该序列进行编帧处理后, 在 Abis接口传输;
TRAU单元接收 Abis传送过来的 TRAU帧并解帧, 得到的 AbisBitNum BIT序列就是 ZL_Operation((AbisBitNum-Zl_trau), Sequence—AbisBitNum), TRAU单元 中对该 AbisBitNum BIT序列采用 Zl— trau域进行制乱操作: ZL_Operation(Zl_trau, AbisBitNum BIT), 这样, TRAU单元可以原封不动地 恢复获得 BTS信道基带处理单元制乱前的数据;
(三) 同时启用异或序列域和制乱序列域加密
( 1 ) Abis接口下行采用异或序列域和制乱序列域进行加、 解密操作:
TRAU单元根据加密模式信息表中的异或序列域对 Abis接口上的 TRAU 帧承载的 Sequence—AbisBitNum进行异或处理, XOR— Operation(Seq_xor, Sequence—AbisBitNum);
经过异或序列操作后, 将得到的是一个新的 AbisBitNum BIT序列, 再对 该序列进行制乱操作 ZL— Operation ( Zl— trau, XOR_Operation(Seq_xor, Sequence—AbisBitNum));
将该制乱处理后的序列按照 GSM0860协议定义的 TRAU帧格式进行编 码形成 TRAU帧, TRAU帧在 Abis接口传输;
在 BTS 侧收到 TRAU 帧后对其进行解帧, 获得相应的序列为: ZL— Operation(Zl— trau, XOR_Operation(Seq_xor, Sequence— AbisBitNum)); 信 道基带处理单元釆用 (AbisBitNum-Zl— trau)对该序列进行制乱操作, 以得到 XOR_Operation(Seq_xor, Sequence_AbisBitNum);
对 XOR_Operation(Seq_xor , Sequence— AbisBitNum)再采用 Seq_xor异或 序列进行异或解密处理操作 , 即 : XOR— Operation(Seq_xor, XOR_Operation(Seq_xor , Sequence— AbisBitNum)) , 则信道基带处理单元可 以恢复出 TRAU加密前的 Sequence— AbisBitNum。
当然, TRAU也可以先进行序列制乱域加密操作, 再进行异或序列域加 密操作, 信道基带处理单元先进行序列制乱域解密, 再进行异或序列域解密; 同样可以实现 Abis接口的加解密功能。
(2) Abis接口下行采用异或序列域和制乱序列域进行加、 解密操作: 信道基带处理单元通过该异或序列域对 Abis接口上的 TRAU帧承载的 Sequence_AbisBitNum 进行异或力 Π密处理: XOR_Operation(Seq_xor, Sequence_AbisBitNum) , 得到的是一个新的 AbisBitNum BIT序列;
再对该 AbisBitNum BIT序列进行序列制乱操作: ZL—Operation(Zl— trau, XOR_Operation(Seq_xor , Sequence— AbisBitNum)), 然后, 将该序列按照 GSM0860协议定义的 TRAU帧格式进行编码形成 TRAU帧, 并在 Abis接口 传输所述 TRAU帧;
在 TRAU 侧收到 TRAU 帧后, 对 TRAU 帧进行解帧处理, 并获得 ZL—Operation(Zl— trau, XOR_Operation(Seq_xor , Sequence— AbisBitNum))序列;
TRAU单元再采用 (AbisBitNum-Zl— trau)对该序列进行序列制乱解密处理 操作, 即: ZL— Operation((AbisBitNum-Zl— trau), ZL_Operation(Zl_trau, XOR_Operation(S eq_xor , Sequence— AbisBitNum)));
之后得到 XOR_Opemtion(Seq_xor, Sequence— AbisBitNum), 然后, 再对 XOR_Operation(Seq_xor , Sequence— AbisBitNum)再采用 Seq_xor进行异或解 密 处 理 , XOR— Operation(Seq_xor , XOR_Operation(Seq_xor , Sequence— AbisBitNum)), 这样, TRAU单元可以恢复出信道基带处理单元加 密前的 Sequence— AbisBitNum。
当然, 信道基带处理单元也可以先采用制乱序列域进行加密操作, 再采 用异或序列域进行加密操作, 当 TRAU单元收到加密后的业务序列码流时, 则首先采用制乱序列域进行解密, 再采用异或序列域进行解密, 这样, 仍然 可以实现 Abis接口的加、 解密功能。
本发明中, 也可以采用专业的加密算法实现 Abis接口的加密, 这样, 相 应的业务信息的保密效果会更好, 但缺点是实现复杂度较高, 而且, 对原业 务实现流程冲击大。
综上所述,本发明实现了图 1中 BTS到 BSC之间的接口和 BSC和 TRAU 之间的接口上传输的业务信息的加密处理, 有效地避免了在相应的接口上非 法监听有效的语音或数据。
因此,本发明可以使 GSM技术体制的数字集群系统,对语音业务或数据 业务进行过程中, 在 Abis接口传输的语音业务或数据业务码流进行加密, 达 到防止语音业务或数据业务在 Abis接口被监听的目的。
而且,本发明所述的方法具有实现简单,对 Abis接口两侧的 TRAU单元 和 BTS基带处理单元处理能力要求低的优点。
以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围并不 局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可 轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明 的保护范围应该以权利要求的保护范围为准。

Claims

权利 要 求 书
1.一种无线通信系统中实现信息加密传输的方法, 其特征在于, 包括:
A、在无线通信系统中的基站侧和码变换与速率适配单元 TRAU侧分别配 置加密模式信息;
B、 当基站侧与 TRAU侧间需要进行信息交互时, 则采用配置的加密模式 信息对需要交互的信息进行加密处理, 并将加密处理后的信息在基站侧与 TRAU侧间进行交互。
2. 根据权利要求 1所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 A包括:
在无线通信系统的基站和 TRAU中分别配置加密模式信息表, 表中记录 着信息加密需要采用的加密模式。
3.根据权利要求 1所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 A还包括:
基站控制器通过维护单元及维护通道将确定的加密模式信息分别下发给 基站和 TRAIL 并分别保存于基站和 TRAU中。
4.根据权利要求 1、 2或 3所述的无线通信系统中实现信息加密传输的方 法, 其特征在于, 所述的加密模式信息包括异或序列加密模式和 /或序列制乱 的加密模式, 而且, 其中:
所述的异或序列加密模式为: 在加密处理时, 对待加密的业务序列码流 进行异或加密处理, 并在解密处理时, 再次对加密后的业务序列码流进行异 或解密处理;
所述的序列制乱加密模式为: 在加密处理时, 将待加密的业务序列码流 按照预定的模式进行重新排序, 并在解密处理时, 将加密后的业务序列码流 按照预定的模式恢复初始的排序。
5. 根据权利要求 4所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的加密模式信息表中记录的表项包括:
记录表项序号信息的表项索引、 记录进行异或加密需要的信息的异或序 列域表项、 记录进行制乱加密需要的信息的序列制乱域表项, 以及记录采用 异或序列域和 /或序列制乱域的模式的加密模式表项。
6.根据权利要求 5所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的各个 TRAU分别与加密模式信息表中的一个表项对应。
7.根据权利要求 6所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 B包括:
当 TRAU进行信道激活处理, 并实现与基站信道基带处理单元接续时, 基站控制器将该 TRAU对应的表项信息通知所述基带处理单元。
8.根据权利要求 7所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 B具体包括:
在下行方向, TRAU将待发送的业务序列码流采用该 TRAU在加密模式信 息表中对应的表项记录的加密模式信息对其进行加密处理, 并发送给基带处 理单元, 基带处理单元接收所述经过加密处理后的业务序列码流后, 则采用 对应的加密模式信息对其进行解密处理, 获得还原后的业务序列码流;
在上行方向, 当基带处理单元需要将待发送的业务序列码流发送给相应 的 TRAU时,则采用根据所述 TRAU下发的通知确定的加密模式信息表中对应 的表项记录的加密模式信息对其进行加密处理, 并发送给所述 TRAU; TRAU 接收所述经过加密处理后的业务序列码流后, 采用该 TRAU对应的加密模式 信息对其进行解密处理, 获得还原后的业务序列码流。
9. 根据权利要求 8所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 B包括:
当在业务序列码流的发送端依次采用异或序列和序列制乱加密模式对业 务序列码流进行加密处理时, 则在业务序列码流接收端需要依次采用序列制 乱和异或序列模式对接收的业务序列码流进行解密处理;
当在业务序列码流的发送端依次采用序列制乱和异或序列加密模式对业 务序列码流进行加密处理时, 则在业务序列码流接收端需要依次采用异或序 列和序列制乱模式对接收的业务序列码流进行解密处理。
10.根据权利要求 7所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的步骤 B包括: 在业务序列码流的发送端将待发送的业务序列码流采用加密模式信息进 行加密处理;
将加密处理后的业务序列码流编码为 TRAU帧, 并发送;
在业务序列码流的接收端对接收的 TRAU帧进行解帧处理;
将解帧处理后获得的业务序列码流采用相应的加密模式信息进行解密处 理, 获得正确的业务序列码流。
11. 根据权利要求 4所述的无线通信系统中实现信息加密传输的方法, 其 特征在于, 所述的异或序列域中异或序列的长度为 TRAU帧传输的需要加密 处理的业务数据的位数的公约数。
12. 根据权利要求 1、 2或 3所述的无线通信系统中实现信息加密传输的方 法, 其特征在于, 该方法还包括:
基站控制器通过维护单元及维护通道定时或不定时对基站和 TRAU保存 的加密模式信息进行更新。
PCT/CN2006/000074 2005-03-31 2006-01-18 Procede de transmission par chiffrement d'information dans un systeme de communication sans fil WO2006102821A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510059806.9 2005-03-31
CNB2005100598069A CN100442881C (zh) 2005-03-31 2005-03-31 无线通信系统中实现信息加密传输的方法

Publications (1)

Publication Number Publication Date
WO2006102821A1 true WO2006102821A1 (fr) 2006-10-05

Family

ID=37031000

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/000074 WO2006102821A1 (fr) 2005-03-31 2006-01-18 Procede de transmission par chiffrement d'information dans un systeme de communication sans fil

Country Status (2)

Country Link
CN (1) CN100442881C (zh)
WO (1) WO2006102821A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8547900B2 (en) 2007-03-19 2013-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847233A (zh) * 2016-03-10 2016-08-10 浪潮集团有限公司 一种分字段加密传输的交换机

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349695A (zh) * 1999-03-08 2002-05-15 诺基亚移动电话有限公司 无线电系统中的加密数据传输的方法
JP2005039646A (ja) * 2003-07-17 2005-02-10 Victor Co Of Japan Ltd 無線ネットワーク装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7113600B1 (en) * 1999-11-12 2006-09-26 Telefonaktiebolaget Lm Ericsson (Publ) Base transceiver station automatic encryption handling
GB2365685A (en) * 2000-08-01 2002-02-20 Vodafone Ltd Communication system utilising encryption in a gsm network
CN100388659C (zh) * 2003-09-10 2008-05-14 中兴通讯股份有限公司 实现异种网络间加密通信的装置、系统及方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349695A (zh) * 1999-03-08 2002-05-15 诺基亚移动电话有限公司 无线电系统中的加密数据传输的方法
JP2005039646A (ja) * 2003-07-17 2005-02-10 Victor Co Of Japan Ltd 無線ネットワーク装置

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8547900B2 (en) 2007-03-19 2013-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
TWI427951B (zh) * 2007-03-19 2014-02-21 Lg Electronics Inc 在行動電信系統中執行無線電協定之方法以及行動電信之傳輸器
US8929298B2 (en) 2007-03-19 2015-01-06 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications systems and transmitter of mobile telecommunications
US9730104B2 (en) 2007-03-19 2017-08-08 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
US10244430B2 (en) 2007-03-19 2019-03-26 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
US10433206B2 (en) 2007-03-19 2019-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications

Also Published As

Publication number Publication date
CN1842182A (zh) 2006-10-04
CN100442881C (zh) 2008-12-10

Similar Documents

Publication Publication Date Title
JP6240233B2 (ja) Lteモバイル装置において非アクセス層(nas)セキュリティを可能にする方法および装置
CN102104870B (zh) 用于高吞吐量无线通信的在减少分组丢失情况下进行密钥重置的无线设备和方法
CN109246697B (zh) 基站、用户设备及其执行的方法
CN101366226B (zh) 用于在无线通信系统中实施数据安全以及自动重复请求的方法和设备
AU750597B2 (en) Method of ciphering data transmission and a cellular radio system employing the method
CN101420303B (zh) 一种语音数据的通信方法及其装置
CN101094065B (zh) 无线通信网络中的密钥分发方法和系统
CN106790281A (zh) 一种面向对讲系统的端到端语音加密装置和加密方法
CN101166177B (zh) 一种非接入层初始信令传送的方法及系统
CN103813272A (zh) 一种集群组呼下行传输的方法
TWI452887B (zh) 無線通訊系統之加密保護方法及其相關裝置
WO2006102821A1 (fr) Procede de transmission par chiffrement d'information dans un systeme de communication sans fil
CN100388659C (zh) 实现异种网络间加密通信的装置、系统及方法
WO2003024140A2 (en) Communications methods, systems and terminals
KR100594022B1 (ko) 무선 네트워크 시스템의 무선링크제어 계층에서 데이터암호화방법 및 암호해제방법
CN102510768A (zh) 一种支持加密通信的方法和装置
CN116017428A (zh) Gis数据加密同步方法和装置、基站、移动终端、基站密码机
CN104796397A (zh) 一种数据加密发送的方法
WO2002017655A2 (en) Method and apparatus for generating an unique encryption key stream for each data block in a frame

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06705495

Country of ref document: EP

Kind code of ref document: A1

WWW Wipo information: withdrawn in national office

Ref document number: 6705495

Country of ref document: EP