WO2016177107A1 - Method, user equipment, and node for implementing access stratum security - Google Patents

Method, user equipment, and node for implementing access stratum security Download PDF

Info

Publication number
WO2016177107A1
WO2016177107A1 PCT/CN2016/076290 CN2016076290W WO2016177107A1 WO 2016177107 A1 WO2016177107 A1 WO 2016177107A1 CN 2016076290 W CN2016076290 W CN 2016076290W WO 2016177107 A1 WO2016177107 A1 WO 2016177107A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
node
layer
wireless
link
Prior art date
Application number
PCT/CN2016/076290
Other languages
French (fr)
Chinese (zh)
Inventor
施小娟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016177107A1 publication Critical patent/WO2016177107A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present application relates to, but is not limited to, mobile communication technologies, and in particular, to a method for implementing access layer security, and user equipment and nodes.
  • FIG. 1 is a schematic diagram of the network topology of the traditional cellular wireless access network. As shown in Figure 1, each macro base station (MNB) The location of macro(e)NB is determined by the operator's plan. Each macro base station can reach wireless coverage of several hundred meters or even several kilometers, so that nearly continuous seamless coverage within the operator's operating area can be achieved.
  • MNB macro base station
  • Each macro base station can reach wireless coverage of several hundred meters or even several kilometers, so that nearly continuous seamless coverage within the operator's operating area can be achieved.
  • SRAN-node Small Radio Access Network node, which may be referred to as a small node in this paper
  • SRAN-node means that the transmit power is lower than that of the traditional macro base station, and the coverage is also larger than the traditional macro.
  • the base station has a small coverage area of the radio access network node. Therefore, the SRAN-node may also be referred to as a low power node (LPN), such as a Pico Node or a home base station (Femto/Home (e). NB), wireless relay access equipment (Relay), and any other access network equipment that may occur that is much lower than the traditional macro base station that can access the network through a wireless communication link.
  • LPN low power node
  • NB home base station
  • Relay wireless relay access equipment
  • UDN Ultra Dense Network
  • UDN can increase network capacity. While increasing network capacity, future networks do not want to increase network capital expenditure (CAPEX, Capital Expenditure) and operating expenses (OPEX, Operating Expense), which means that UDN deployment needs to reduce man-made
  • the planning, optimization, and management can be flexibly and rapidly deployed in indoor and outdoor hotspots or large traffic areas according to network topology, network load, and service requirements, and achieve self-configuration, self-optimization, and self-healing.
  • the industry generally believes that only a small part or a small number of SRAN-nodes in the UDN can access the core network equipment through wired backhaul (such as fiber, cable, etc.); other SRAN-nodes need to support wireless backhaul.
  • wireless backhaul utilizing the characteristics of dense short-distance deployment between SRAN-nodes, realizes interworking between SRAN-nodes through wireless backhaul links between SRAN-nodes, and passes two SRANs through wireless backhaul links.
  • a wireless connection (one hop) between nodes or a wireless connection (multi-hop) between multiple SRAN-nodes in turn accesses a core network device.
  • the communication data of the user equipment UE, User Equipment
  • the two air interfaces include the SRAN-node accessed by the UE and the UE.
  • Air interface wireless backhaul link Between the SRAN-node-x), the Radio Access Link (RAL), and between the SRAN-node-x and the SRAN-node with the wired backhaul (named SRAN-node-z) Air interface wireless backhaul link.
  • RAL Radio Access Link
  • SRAN-node-x In the case of more than two air ports, take three air ports as an example, including RAL, SRAN-node-x and some The air interface wireless backhaul link between the intermediate nodes (designated as SRAN-node-y) and the air interface wireless backhaul link between SRAN-node-y and SRAN-node-z.
  • the embodiments of the present invention provide a method for implementing access layer security, a user equipment, and a node, which can ensure the security of the communication data of the UE when two or more segments are transmitted.
  • An embodiment of the present invention provides a method for implementing access layer security, including: performing end-to-end wireless access link access layer security between a UE and an initial access node; and performing initial access node and gateway node End-to-end wireless backhaul link access layer security;
  • the UE communicates with the initial access node through a wireless access link, and the initial access node communicates with the gateway node through a wireless backhaul link.
  • the communication path further includes at least one intermediate routing node;
  • the initial access node communicates with the intermediate routing node through a wireless backhaul link, and the intermediate routing node and the gateway node pass a wireless backhaul chain.
  • Road communication
  • the intermediate route Nodes communicate over a wireless backhaul link.
  • the wireless access air interface Uu port is adopted between the UE and the initial access node;
  • a wireless backhaul interface Ub port is adopted between the initial access node and the gateway node.
  • a wireless backhaul interface Ub port is used between the intermediate routing node and the initial access node, and a wireless backhaul interface Ub port is used between the intermediate routing node and the gateway node;
  • a wireless backhaul interface Ub port is adopted between the intermediate routing nodes.
  • the initial access node is a wireless access small node that the UE accesses through a wireless access link
  • the gateway node is a wireless access small node or a macro base station capable of accessing the core network through a wired interface
  • the intermediate routing node provides wireless communication for relay transmission by implementing communication between the initial access node and the gateway node to finally implement communication between the UE accessing the initial access node and the core network.
  • Small node
  • the end-to-end wireless access link access layer security between the performing UE and the initial access node includes:
  • Performing the end-to-end wireless backhaul link access layer security between the initial access node and the gateway node includes: performing an end-to-end wireless backhaul link user plane between the initial access node and the gateway node Encryption and user plane integrity protection.
  • a packet convergence protocol security (PDCP-s) layer and a location at the initial access node The end-to-end wireless backhaul link access layer security is performed between the PDCP-s layers of the gateway node.
  • PDCP-s packet convergence protocol security
  • the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: a physical layer (L1) using Long Term Evolution (LTE) technology, and media access control from bottom to top Layer (MAC), Radio Link Control Layer (RLC), Packet Convergence Protocol Slimming Layer (PDCP-t), and Packet Convergence Protocol Security Layer (PDCP-s);
  • L1 physical layer
  • LTE Long Term Evolution
  • MAC Radio Link Control Layer
  • RLC Radio Link Control Layer
  • PDCP-t Packet Convergence Protocol Slimming Layer
  • PDCP-s Packet Convergence Protocol Security Layer
  • the intermediate routing node includes: L1, MAC, and RLC protocol layers using LTE technology from bottom to top; or, includes L1, MAC, RLC, and PDCP-t protocol layers using LTE technology;
  • the initial access node and the PDCP-s layer and the PDCP-t layer on the gateway node are merged into one protocol layer, it is a PDCP layer;
  • the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: an L1, a MAC, and a logical link control layer using a wireless local area network (WLAN) technology. LLC) and PDCP-s protocol layer;
  • WLAN wireless local area network
  • the intermediate routing node includes L1, MAC, and LLC protocol layers using WLAN technology from bottom to top.
  • performing end-to-end wireless backhaul link user plane encryption and user plane integrity protection between the initial access node and the gateway node includes:
  • the initial access node After the user plane data of the UE is sent to the initial access node through the radio access air interface Uu interface, the initial access node sends the user plane data of the UE to the wireless backhaul interface Ub port before
  • the PDCP-s layer of the initial access node performs encryption and integrity protection, and after the data is sent to the gateway node, the gateway node performs decryption and integrity verification at the PDCP-s layer; correspondingly,
  • the gateway node acquires user plane data that needs to be sent to the UE from the core network, and performs encryption and integrity protection on the PDCP-s layer of the gateway node before sending to the wireless backhaul interface Ub port, and the data is sent to the After the initial access node, the initial access node performs decryption and integrity verification at the PDCP-s layer.
  • the PDCP-s layer is used to implement: header compression and decompression, and security operations; Among them, security operations include: encryption, decryption, integrity protection and integrity verification.
  • performing end-to-end wireless access link user plane encryption between the UE and the initial access node, and performing end-to-end wireless access link control between the performing UE and the initial access node Face encryption and control plane integrity protection including:
  • the uplink user plane data of the UE and the uplink radio resource control (RRC) layer control plane signaling perform user plane encryption for the user plane data and the RRC layer control plane signal at the PDCP layer of the UE before transmitting to the air interface, respectively. Determining control plane encryption and integrity protection; after receiving the user plane data or the RRC layer control plane signaling, the initial access node decrypts user plane data and RRC layer control plane signaling and RRC Layer control plane signaling for integrity verification; accordingly,
  • the downlink user plane data and the RRC layer control plane signaling sent by the initial access node to the UE perform user plane encryption of the user plane data and the RRC layer at the PDCP layer of the initial access node before being sent to the air interface, respectively.
  • Control plane encryption and integrity protection of control plane signaling after receiving the user plane data or the RRC layer control plane signaling, the UE decrypts the user plane data and the RRC layer control plane signaling and performs RRC Layer control plane signaling for integrity verification.
  • the UE and the initial access node of the wireless access air interface on the Uu interface side include: L1, MAC, RLC, and Packet Convergence Protocol (PDCP) layer from bottom to top;
  • L1 MAC
  • RLC Radio Link Control
  • PDCP Packet Convergence Protocol
  • the performing end-to-end wireless access link access layer security between the UE and the initial access node includes:
  • End-to-end control plane access layer security is performed between the PDCP of the UE and the PDCP layer of the initial access node.
  • the method further includes: generating an end-to-end wireless backhaul link user plane encryption and a wireless backhaul link user plane integrity between the initial access node and the gateway node between the initial access node and the gateway node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for protection;
  • UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint including:
  • the wireless backhaul link access layer security root key K eNB-FAN of the initial access node performs an authentication and key agreement (AKA) process between the initial access node and the core network.
  • AKA authentication and key agreement
  • NAS non-access stratum
  • the wireless backhaul link access layer security root key K eNB-FAN of the gateway node performs an authentication and key agreement (AKA) process and the non-connection between the initial access node and the core network.
  • AKA authentication and key agreement
  • NAS layer
  • the method further includes: generating, by the UE and the initial access node, a user plane encryption key K UPenc required for performing end-to-end wireless access link user plane encryption between the UE and the initial access node And generating a control plane encryption key K RRCenc and a control plane integrity protection key required for performing end-to-end radio access link control plane encryption and control plane integrity protection between the performing UE and the initial access node Key K RRCint ,
  • the gateway node Generating, by the UE and the gateway node, the user plane encryption key K UPenc based on a radio access link access layer security root key K eNB , and generating the control plane encryption key K RRCenc and the control plane Integrity protection key K RRCint ; the gateway node sends the generated user plane encryption key K UPenc , control plane encryption key K RRCenc and control plane integrity protection key K RRCint to the initial access node ;or,
  • the UE and the gateway node are based on a radio access link access layer security root key K eNB , a downlink absolute carrier frequency number (EARFCN-DL) of the cell of the initial access node, and a physical cell identifier (PCI) Generating a new radio access link access layer root key K eNB* ; said gateway node transmitting said generated K eNB* to said initial access node; said UE and said initial access
  • the node generates the user plane encryption key K UPenc based on the K eNB* , and generates the control plane encryption key K RRCenc and the control plane integrity protection key K RRCint ;
  • the radio access link access layer security root key K eNB of the UE is generated after performing an AKA process and a NAS security process between the UE and the core network;
  • the wireless access link access layer security root key K eNB of the gateway node is sent by the core network to the core network after performing an AKA process and a NAS security process between the UE and the core network. Gateway node.
  • the method further includes: the gateway node transmitting the generated user plane encryption key K Upenc , a control plane encryption key K RRCenc, and a control plane integrity protection key K RRCint to the initial access node,
  • the gateway node sends the generated user plane encryption key K Upenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node, including:
  • the embodiment of the present invention further provides a user equipment (UE), which includes at least a first processing module and a first radio access link processing module;
  • UE user equipment
  • the first processing module is configured to: implement an AKA process and NAS security with the core network;
  • the first wireless access link processing module is configured to: perform an end to the initial access node
  • the wireless access link access layer is secure
  • the UE communicates with the initial access node through a wireless access link.
  • the first radio access link processing module is configured to: perform end-to-end wireless access link user plane encryption with the initial access node, and perform execution with the initial access node. End-to-end wireless access link control plane encryption and control plane integrity protection.
  • the wireless access air interface Uu port is adopted between the UE and the initial access node;
  • the initial access node is a wireless access small node that the UE accesses through the wireless access link.
  • the L1, the MAC, the RLC, and the Packet Convergence Protocol Layer (PDCP) protocol layer are included on the UE from bottom to top;
  • the first radio access link processing module is configured to: perform the end-to-end radio access link access layer between a PDCP protocol layer of the UE and a PDCP protocol layer of the initial access node Safety.
  • the UE further includes a first user plane key generation module and a first control plane key generation module;
  • the first user plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link
  • the eNB generates the radio access link user plane encryption key K UPenc ; or, based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and the PCI Generating a new radio access link access layer root key K eNB* , and generating the user plane encryption key K UPenc based on the K eNB* ;
  • the first control plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link
  • the eNB generates the radio access link control plane encryption key K RRCenc and the radio access link control plane integrity protection key K RRCint ; or based on the radio access link access layer security root key K
  • the eNB , the EARFCN-DL of the cell of the initial access node, and the PCI generate a new radio access link access layer root key K eNB* , and generate the control plane encryption key based on the K eNB* K RRCenc and the control plane integrity protection key K RRCint ;
  • the radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
  • the embodiment of the present invention further provides a wireless access small node, and the wireless access small node and the UE are linked by using a wireless access air interface;
  • the wireless access small node includes at least a second processing module and a second wireless access link. a path processing module and a first wireless backhaul link processing module;
  • the second processing module is configured to: implement an AKA process and NAS security with the core network;
  • a second radio access link processing module configured to: perform end-to-end wireless access link access layer security with the UE;
  • the first wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link access layer security with the gateway node.
  • the second radio access link processing module is configured to:
  • the wireless access air interface Uu interface side of the wireless access small node includes an L1, a MAC, an RLC, and a PDCP protocol layer from bottom to top;
  • the second radio access link processing module is configured to perform the end-to-end wireless access link control plane encryption and control plane between the PDCP layer of the radio access small node and the PDCP layer of the UE. Integrity protection.
  • the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node.
  • the wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer (L1), a medium access control layer (MAC), and a radio link control layer (RLC) using Long Term Evolution (LTE) technology. ), Packet Convergence Protocol Slimming Layer (PDCP-t) and Packet Convergence Protocol Security Layer (PDCP-s); or,
  • the wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
  • L1 a MAC
  • LLC logical link control layer
  • WLAN wireless local area network
  • the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between a PDCP-s of the wireless access small node and a PDCP-s layer of the gateway node .
  • the wireless access small node further includes a second user plane key generation module, configured to:
  • the second user plane key generation module is configured to:
  • the wireless backhaul link access layer secure root key K eNB-FAN performs an authentication and key agreement (AKA) process and a non-access stratum between the wireless access small node and the core network. (NAS) generated after the security process.
  • AKA authentication and key agreement
  • NAS non-access stratum between the wireless access small node and the core network.
  • the wireless access small node further includes a third user plane key generation module and a second control plane key generation module, where
  • the third user plane key generation module is configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE User plane encryption key K UPenc ; or, receiving a radio access link access layer root key K eNB* from the gateway node, and generating the user plane encryption key K UPenc based on the K eNB* ;
  • a second control plane key generating module configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE a control plane encryption key K RRCenc and a control plane integrity protection key K RRCint ; or receiving a radio access link access layer root key K eNB* generated from the gateway node, and based on the K eNB* generation Said control plane encryption key K RRCenc and said control plane integrity protection key K RRCint ;
  • the radio access link access layer root key K eNB* is the EARFCN-DL of the gateway node based on the radio access link access layer security root key K eNB and the radio access small node cell And the PCI generated; the radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
  • the embodiment of the invention further provides a wireless access small node, wherein the wireless access small node can access the core network through a wired interface;
  • the wireless access small node includes at least a second wireless backhaul link processing module configured to perform end-to-end wireless backhaul link access layer security with an initial access node of the UE.
  • the second wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
  • the wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer (L1), a medium access control layer (MAC), and a radio link control layer (RLC) using Long Term Evolution (LTE) technology. ), Packet Convergence Protocol Slimming Layer (PDCP-t) and Packet Convergence Protocol Security Layer (PDCP-s); or,
  • the wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
  • L1 a MAC
  • LLC logical link control layer
  • WLAN wireless local area network
  • the second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link between the PDCP-s layer of the wireless access small node and the PDCP-s layer of the initial access node Into the layer security.
  • the wireless access small node further includes a fourth user plane key generation module, configured to:
  • the fourth user plane key generation module is configured to:
  • the wireless backhaul link access layer security root key K eNB-FAN performs an authentication and key agreement (AKA) process and a non-access stratum (NAS) between the initial radio access node and the core network. ) generated after the security process.
  • AKA authentication and key agreement
  • NAS non-access stratum
  • the fourth user plane key generation module is further configured to:
  • the embodiment of the invention further provides a wireless access small node, including any combination of the two wireless access small nodes.
  • the embodiment of the present invention further provides a macro base station (MNB), which includes at least a second wireless backhaul link processing module, configured to perform end-to-end wireless backhaul link access layer security with an initial access node.
  • MNB macro base station
  • the second wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node;
  • the second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with an initial access node by: PDCP-s layer and location at the MNB
  • the end-to-end wireless backhaul link access layer security is performed between the PDCP-s layers of the initial access node.
  • an embodiment of the present invention further provides a readable storage medium, where computer executable instructions are stored, and the method for implementing access layer security is implemented when the computer executable instructions are executed.
  • the technical solution of the present application includes: performing end-to-end wireless access link access layer security between the UE and the initial access node; and performing end-to-end wireless backhaul link access between the initial access node and the gateway node Layer security; wherein the UE communicates with the core network through at least two wireless air interfaces; the communication path includes at least a UE, an initial access node, and a gateway node; when the communication path includes two wireless air interfaces, the UE The wireless communication link is communicated with the initial access node, and the initial access node communicates with the gateway node through a wireless backhaul link.
  • the wireless backhaul link security is only performed end-to-end between the gateway node and the initial access node, which ensures that the user plane data is on the wireless backhaul link.
  • the security during transmission avoids the security leakage caused by multiple air interfaces, that is, through multiple intermediate routing nodes; on the other hand, the wireless access link security is performed end-to-end between the UE and the initial access node.
  • FIG. 1 is a schematic diagram of a network topology of a conventional cellular radio access network
  • FIG. 2 is a schematic diagram of deploying a UDN in a specific area of a conventional cellular radio access network
  • Figure 3 is a schematic diagram of ultra-dense network deployment in a certain area in the future
  • FIG. 4 is a schematic diagram of a security level of an LTE system in the related art
  • FIG. 5 is a schematic diagram of an implementation of a security hierarchy diagram shown in FIG. 4 corresponding to an LTE system protocol stack;
  • FIG. 6 is a flowchart of a method for implementing access layer security according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of an application scenario for implementing access layer security according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of another application scenario for implementing access layer security according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a security protocol for implementing access layer security according to an embodiment of the present invention.
  • FIG. 10 is another security protocol architecture for implementing access layer security according to an embodiment of the present invention.
  • FIG. 11 is a flowchart of implementing key generation for implementing an end-to-end wireless backhaul link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention
  • FIG. 12 is a flowchart of a first implementation of key generation for implementing an end-to-end wireless access link access layer security based on the application scenario shown in FIG. 7 according to an embodiment of the present invention
  • FIG. 13 is a flowchart of a second implementation of key generation for implementing an end-to-end wireless access link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention
  • FIG. 14 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • FIG. 15 is a schematic structural diagram of a structure of a wireless access small node according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of ultra-dense network deployment in a certain area in the future, taking into account the infrastructure limitations of the actual deployment network, such as the limited number of wired network ports in the indicated area, and the implementation of CAPEX and OPEX without increasing the deployment and operation network.
  • the network is deployed flexibly and quickly. As shown in FIG. 3, only the small node 303 and the small node 309 are deployed with wired network ports, which can be indicated by the thick black solid line in FIG.
  • Wired backhaul to core network equipment, operations management and maintenance (OAM, Operation Administration and Maintenance, etc., such as small node 303 can be connected to device 302, and small node 309 can be connected to device 301.
  • OAM operations management and maintenance
  • small node 303 can be connected to device 302
  • small node 309 can be connected to device 301.
  • the other five small nodes are deployed without wired network ports. Therefore, these small nodes can only pass the wireless backhaul link between themselves and other small nodes around them (as shown by the dotted line in Figure 3). ), connected to the small node 303 or the small node 309 via a one-hop wireless backhaul link or a multi-hop wireless backhaul link, and finally connected to the core network device, the OAM device, etc. through the wired port of the small node 303 or the small node 309.
  • the communication data of many UEs must be transmitted through two or more air interfaces.
  • the UE 310 in FIG. 3 is taken as an example, and between the UE 310 and the device 301.
  • the communication data needs to be transmitted through two air interfaces, that is, through a wireless access link with the small node 306 (as shown by the lightning line in FIG. 3), and the wireless backhaul between the small node 306 and the small node 309.
  • the link is to enable communication with device 301.
  • the wireless backhaul link and the wireless backhaul link between the small node 306 and the small node 309 enable communication with the device 301.
  • FIG. 4 is a schematic diagram of a security hierarchy of a Long Term Evolution (LTE) system in the related art
  • FIG. 5 is a schematic diagram of a security hierarchy diagram shown in FIG. 4 corresponding to an implementation profile in an LTE system protocol stack
  • FIG. 5 is a diagonal line.
  • the shaded portion represents the control surface and the gray shaded portion represents the user plane.
  • the user plane protocol stack and the control plane protocol stack are also shown.
  • the core network device such as the mobility management entity/service gateway/data gateway (MME/S-GW/P-GW)
  • MME/S-GW/P-GW mobility management entity/service gateway/data gateway
  • NAS Non-- Access Stratum
  • IP/SCTP Inter-Network Protocol/Flow Control Transmission Protocol
  • APP User Interface Protocol Stack Application Layer Protocol
  • IP/User Datagram Protocol/User-side Tunneling Protocol IP/
  • the LTE system performs three security operations, namely, authentication and key agreement (AKA), and non-access layer security key negotiation (NAS SMC). , Non-Access Stratum Security Mode Command), Access Stratum Security Mode Command (AS SMC).
  • AKA authentication and key agreement
  • NAS SMC non-access layer security key negotiation
  • AS SMC Access Stratum Security Mode Command
  • a secure root key K is stored in the Universal Subscriber Identity Module (USIM) of the UE on the UE side, and is located in an Authentication Center (AuC) device on the network side.
  • the same security root key K is also saved, so that in the AKA process, first, the UE and the home subscriber server (HSS, Home Subscriber server) on the network side calculate according to the saved secure root key K, respectively.
  • ASME is the root key for subsequent NAS layer security and AS layer security.
  • the UE and the HSS also complete identity authentication with each other to ensure the legitimacy of the other device.
  • the NAS SMC process can be performed between the UE and the mobility management entity (MME, Mobility Management Entity) located on the network side.
  • MME mobility management entity
  • the UE and the MME derive a NAS layer integrity key K NAS int and a NAS layer security key K NAS enc according to the security management key K ASME generated in the AKA process.
  • the NAS layer security is implemented end-to-end between the NAS protocol layer on the UE side and the NAS protocol layer on the MME side.
  • Integrity protection and encryption are performed with the NAS layer integrity key K NAS int and the NAS layer security key K NAS enc to ensure the security of the NAS signaling.
  • Root key K eNB during the NAS SMC the MME is also based on the uplink NAS count value (uplink NAS COUNT) security management key K ASME and the NAS layer, calculates and generates a root key K eNB layer AS, and the AS layer
  • uplink NAS COUNT uplink NAS count value
  • K ASME uplink NAS COUNT
  • ASME uplink NAS COUNT
  • the base station (eNB) to which the UE is connected is notified, and then the AS SMC process can be performed between the eNB and the UE to ensure the security of the air access air interface (Uu port) between the UE and the eNB.
  • Uu port air access air interface
  • the UE and the eNB derive the integrity key K RRC int of the Uu interface control plane and the security key K RRC enc of the Uu interface control plane according to the K eNB , and derive the security key K UP enc of the Uu interface user plane.
  • the communication parties are relays and eNBs (for the sake of convenience, the interface between the relay and the eNB is called the Un interface), and the user plane integrity of the air interface Un interface can also be derived.
  • Key K UP int Corresponding to the LTE system protocol stack of FIG.
  • the AS layer security is implemented end-to-end between the Packet Data Convergence Protocol (PDCP) layer on the UE side and the PDCP protocol layer on the eNB side as shown in FIG.
  • the radio resource control (RRC) layer signaling of the UE and the eNB uses the Uu interface control plane integrity key K RRC int and the Uu interface control plane security key at the PDCP layer before transmitting to the peer end.
  • K RRC enc performs integrity protection and encryption; the upper layer data of the UE and the upper layer NAS layer signaling are transmitted to the eNB before the eNB transmits the data and signaling from the S1 interface to the UE before the PDCP layer.
  • the security key K UP enc of the user interface of the Uu interface is encrypted.
  • the data and signaling are also integrity protected at the PDCP layer by using the user plane integrity key K UP int of the Un interface.
  • Security through the AS layer ensures the security of information transmission over the wireless air interface.
  • FIG. 6 is a flowchart of a method for implementing access layer security according to an embodiment of the present invention. As shown in FIG. 6, the method includes the following steps:
  • Step 600 Implement an AKA process and a NAS layer security process between the UE/initial access node and the core network.
  • the specific implementation of this step is well-known to those skilled in the art, and the specific implementation is not limited to the scope of protection of the present application, and details are not described herein again.
  • Step 601 Perform end-to-end wireless access link access layer security between the UE and the initial access node; and perform end-to-end wireless backhaul link access layer security between the initial access node and the gateway node.
  • the UE communicates with the initial access node through a wireless access link, and the initial access node communicates with the gateway node through a wireless backhaul link.
  • the communication path further includes at least one intermediate routing node;
  • the initial access node communicates with the intermediate routing node through a wireless backhaul link, and the intermediate routing node communicates with the gateway node through a wireless backhaul link;
  • the intermediate routing nodes communicate via a wireless backhaul link.
  • the initial access node is a wireless access small node that the UE accesses through the wireless access link;
  • the gateway node is a wireless access small node or a macro base station capable of accessing the core network through a wired interface
  • the intermediate routing node is a wireless access small node that implements communication between the initial access node and the gateway node to finally provide relay transmission for communication between the UE accessing the initial access node and the core network.
  • the end-to-end wireless backhaul link access layer security between the gateway node and the initial access node is used to ensure the security of the information transmitted on the wireless backhaul interface (Ub interface) in the communication path of the UE, that is, the security is ensured.
  • Security when information is transmitted over the wireless backhaul link; and the end-to-end wireless access link access layer security procedure between the UE and the initial access node is used to ensure wireless connection of information in the UE's communication path
  • the security when transmitting over the air interface (Uu interface) ensures the security of the information as it travels over the wireless access link.
  • Performing an end-to-end wireless access link access layer security procedure between the UE and the initial access node includes: performing an end-to-end wireless access link access layer security process between the UE and the initial access node End-to-end wireless access link user plane encryption, and end-to-end wireless access link control plane encryption and control plane integrity protection between the UE and the initial access node;
  • the end-to-end wireless backhaul link access layer security process between the execution gateway node and the initial access node includes performing end-to-end user plane encryption and user plane integrity protection between the gateway node and the initial access node.
  • end-to-end wireless backhaul link access layer security between the execution gateway node and the initial access node and the end-to-end wireless access chain between the initial access node and the UE are included. Secure dual-link security process at the access layer.
  • FIG. 7 is a schematic diagram of an application scenario for implementing access layer security according to an embodiment of the present invention.
  • communication data between a UE and a core network needs to pass two or more segments.
  • Air interface transmission As shown in FIG. 7, it is assumed that one UE communicates with the core network through three air interfaces, and the UE accesses the wireless access small node 1 (SRAN-node1) through the wireless access link, and refers to SRAN-node1 as the initial access node.
  • SRAN-node1 wireless access small node 1
  • FAN First Access Node
  • the interface between the UE and SRAN-node1 is the wireless access air interface, that is, the Uu interface.
  • SRAN-node1 cannot directly access the core network through a wired interface (or no wired interface).
  • SRAN-node1 communicates with the wireless access small node 2 (SRAN-node2) through a wireless backhaul link, and refers to SRAN-node2 as an intermediate routing node.
  • the interface between SRAN-node1 and SRAN-node2 is called the wireless backhaul interface, that is, the Ub interface.
  • SRAN-node2 cannot directly access the core network through the wired interface.
  • SRAN-node2 communicates with the wireless access small node 3 (SRAN-node3) through the wireless backhaul link, and the SRAN-node3 can directly access the core network through the wired interface.
  • SRAN-node3 wireless access small node 3
  • SRAN-node3 is called a gateway node, and the interface between SRAN-node2 and SRAN-node3 is also called a Ub interface.
  • the SRAN-node 3 and the Evolved Packet Core (EPC) are directly connected through a wired interface.
  • the logical interface between the SRAN-node 3 and the EPC carried on the wired interface is the S1 interface in the LTE related technology.
  • the intermediate routing node provides relay transmission for realizing communication between the initial access node and the gateway node to finally implement communication between the UE accessing the initial access node and the core network device.
  • the UE communicates with the core network through three air interfaces (a Uu interface and two Ub interfaces). In the future network, the UE may also pass through two air interfaces (a Uu interface and a Ub). The interface communicates with the core network, or the UE may communicate with the core network via more than three air interfaces (a segment of Uu interface and an n-segment Ub interface (n>2)).
  • the UE communicates with the core network through at least two wireless air interfaces
  • the communication path of the UE communicating with the core network through at least two wireless air interfaces includes at least a UE, an initial access node, and a gateway node
  • the wireless air interface includes a radio access air interface (Uu port) between the UE and the initial access node and a wireless backhaul interface (Ub port) between the initial access node and the gateway node.
  • the communication path further includes at least one intermediate routing node.
  • the two-segment wireless air interface includes: a Uu interface between the UE and the initial access node, and an initial The Ub port between the access node and the intermediate routing node, the intermediate routing node, and the Ub interface between the gateway nodes; optionally, if there are more than two intermediate routing nodes, the Ub interface between the intermediate routing nodes is also included.
  • the end-to-end wireless backhaul link access layer security in step 601 is performed between the gateway node and the initial access node.
  • FIG. 8 is a schematic diagram of another application scenario for implementing access layer security according to an embodiment of the present invention, where In practical applications, based on Figure 2, there is also a scenario in the future ultra-dense network that is deployed in an area with traditional cellular coverage or at the edge of an area with traditional macrocell coverage.
  • some small nodes of the ultra-dense network are deployed in the coverage of the macro base station (MNB), such as SRAN-node2, and some small nodes are deployed at the edge of the coverage area of the MNB, such as SRAN-node1. It is clear, only two small nodes are shown in the figure, and no other small nodes are indicated. These small nodes have no wired backhaul to connect to the core network (CN) device.
  • MNB macro base station
  • SRAN-node2 the edge of the coverage area of the MNB
  • SRAN-node2 can access the MNB through the wireless backhaul between the MNB and the final access to the core network, and SRAN-node1 can only access the SRAN through the wireless backhaul. Node2 then finally accesses the core network through the MNB.
  • the UE accesses the network through a radio access link with SRAN-node 1, that is, SRAN-node1 is the initial access node and the gateway node is the MNB.
  • the end-to-end wireless backhaul link access layer security in step 601 is performed between the macro base station and the initial access node.
  • 9 is a security protocol architecture for implementing access layer security according to an embodiment of the present invention, performing an end-to-end wireless backhaul link between a gateway node (such as SRAN-node3) and an initial access node (such as SRAN-node1) E2E wireless backhaul security, that is, end-to-end access between the gateway node (such as SRAN-node3) and the PDCP-s (PDCP security) protocol layer of the initial access node (such as SRAN-node1) Layer security.
  • a gateway node such as SRAN-node3
  • an initial access node such as SRAN-node1 E2E wireless backhaul security
  • the gateway node such as SRAN-node3
  • the initial access node such as SRAN-node1
  • the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul of the gateway node includes the L1 physical layer, the medium access control (MAC) layer, the radio link control (RLC) layer, and the packet aggregation protocol (PDCP-t). Layer and Packet Convergence Protocol Security (PDCP-s) layer.
  • MAC medium access control
  • RLC radio link control
  • PDCP-t packet aggregation protocol
  • PDCP-s Layer and Packet Convergence Protocol Security
  • the PDCP-s layer performs the following functions: header compression and decompression, and security operations; among them, security operations, including encryption, decryption, integrity protection, and integrity verification.
  • the PDCP-t layer completes the packet convergence protocol (PDCP, Packet Data Convergence) in the related LTE technology. Protocol)
  • Other functions of the sublayer except the PDCP-s layer function including: data transmission; PDCP packet sequence number maintenance; data packets are transmitted to the upper layer in sequence during RLC layer reconstruction; RLC acknowledge mode packets when RLC layer is reconstructed Duplicate packet detection and discarding; time-based packet discarding; repeated packet discarding.
  • the PDCP-s and PDCP-t layers can also be combined into one protocol layer implementation, which is the PDCP sublayer in the related LTE technology.
  • FIG. 10 is a security protocol architecture for implementing access layer security according to an embodiment of the present invention.
  • the related protocol stack on the Ub interface in the UE communication path may also adopt other wireless communication technologies, such as a wireless local area network (WLAN). , Wireless Local Area Networks technology, as indicated by the grid filled with grid lines in Figure 10.
  • WLAN wireless local area network
  • end-to-end wireless backhaul link access layer security is performed between the gateway node and the initial access node, that is, end-to-end access layer security is performed between the gateway node and the PDCP-s protocol layer of the initial access node. .
  • the gateway node and the initial access node that is, the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node are respectively from bottom to top.
  • WLAN technology physical layer (PHY), MAC, logical link control layer (LLC, Logical Link Control) and other protocol layers and implement the user plane end-to-end security PDCP-s layer.
  • the functions performed by the PDCP-s layer are the same as those of FIG. 9, and are not described here.
  • the intermediate routing nodes in the UE communication path do not participate in the wireless backhaul link access layer security operation, therefore, as shown in the figure 10, in the intermediate routing node of the UE communication path, such as SRAN-node2, there is no need to implement the PDCP-s protocol layer. If the communication path of the UE includes more than one intermediate routing node, all intermediate routing nodes communicate with the UE. The path does not need to participate in the security operation of the backhaul link access layer, that is, the PDCP-s layer protocol does not need to be implemented.
  • the intermediate routing node (such as SRAN-node2) implements Ub1 interface communication with the initial access node (such as SRAN-node1) in the UE communication path and with the gateway node (such as SRAN-node3).
  • the Ub2 interface communicates between the Ub1 interface and the Ub2 interface, and includes protocol layers such as L1, MAC, and RLC from bottom to top.
  • protocol layers such as L1, MAC, and RLC from bottom to top.
  • a PDCP-t protocol layer may also be included.
  • the intermediate routing node (such as SRAN-node2) implements the communication path in the UE.
  • the Ub1 interface communication between the intermediate access node (such as SRAN-node1) and the Ub2 interface communication between the gateway node (such as SRAN-node3) is included in the Ub1 interface and the Ub2 interface, respectively from bottom to top.
  • PHY, MAC, LLC and other protocol layers using WLAN technology are included in the Ub1 interface and the Ub2 interface, respectively from bottom to top.
  • the end-to-end wireless backhaul link access layer security process between the gateway node and the initial access node includes: performing end-to-end between the gateway node and the initial access node.
  • User plane encryption and user plane integrity protection As shown in FIG. 10, the upper layer user plane data of the UE, the upper layer user plane data of the specific UE refers to the data of the protocol layer from the PDCP layer of the UE, such as the application layer of the UE in FIG. 10 (APP).
  • APP application layer of the UE in FIG. 10
  • the layer performs encryption and integrity protection. After the data is sent to the gateway node SRAN-node3, it is decrypted and integrity verified by the SRAN-node3 at the PDCP-s layer.
  • the gateway node such as SRAN-node3 is from the S-GW of the core network.
  • the /P-GW obtains the user plane data that needs to be sent to the UE.
  • the SRAN-node3 Before sending the SRAN-node3 to the Ub interface of the wireless backhaul interface, the SRAN-node3 needs to perform encryption and integrity protection at the PDCP-s layer, and the data is sent to the initial access node such as SRAN. After -node1, decryption and integrity verification is performed by SRAN-node1 at the PDCP-s layer.
  • the gateway node may be a macro base station. That is to say, all user plane data will perform end-to-end user plane encryption and user plane integrity protection before the first time entering the wireless backhaul interface transmission, thus ensuring the security of user plane data transmission in the wireless backhaul interface. Sex.
  • FIG. 11 is a flowchart of implementing key generation for implementing an end-to-end wireless backhaul link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention.
  • the security key generation method shown in FIG. 11 can generate the wireless required for performing end-to-end wireless backhaul link user plane encryption and user plane integrity protection between the gateway node and the initial access node in the embodiment of the present invention.
  • the backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint .
  • each small node has its own Universal Integrated Circuit Card (UICC).
  • UICC Universal Integrated Circuit Card
  • USB Global Subscriber Identity Module
  • a secure root key K the same secure root key of the USIM card is also stored in the network side authentication center (AuC) device. Therefore, with this root key, the UE-like security procedure shown in Figure 4 is taken, and Figure 11 generates an end-to-end wireless backhaul between the gateway node (such as SRAN-node3) and the initial access node (such as SRAN-node1).
  • the process of the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint required for link user plane encryption and user plane integrity protection specifically includes:
  • Step 1100 Perform AKA between SRAN-node1 and the core network.
  • the security management key K ASME is calculated in SRAN-node1 and the core network device (such as HSS).
  • this step is consistent with the method for performing AKA between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
  • Step 1101 Perform a NAS layer security procedure (NAS SMC) between the SRAN-node 1 and the core network device (such as the MME), and generate a security secret required for the NAS layer security at the SRAN-node 1 and the MME after performing the NAS layer security procedure.
  • the key is the NAS layer integrity key K NAS int and the NAS layer security key K NAS enc .
  • this step is consistent with the method for performing the NAS SMC between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
  • Step 1102 The MME sends the security information of the SRAN-node1 to a gateway node in the UE communication path, such as SRAN-node3.
  • the MME calculates and generates the uplink NAS count value (uplink NAS COUNT) generated based on the security management key K ASME generated by the AKA and the NAS SMC.
  • the MME sends the security information of the SRAN-node1 to the SRAN-node3, wherein the security information of the SRAN-node1 includes the root key K eNB-SRAN-node1 of the AS layer and the security capability of the SRAN-node1 (SRAN-node1 security capability) .
  • the SRAN-node1 security capability includes an integrity protection algorithm supported by SRAN-node1 and an encryption algorithm supported by SRAN-node1.
  • Step 1103 The gateway node (such as SRAN-node3) selects a security algorithm to generate an end-to-end wireless backhaul link user plane security key: wireless backhaul link user plane integrity protection key K UP-Wint and wireless backhaul link User side encryption key K UP-Wenc .
  • the SRAN-node3 selects the integrity protection algorithm and the encryption algorithm supported by the SRAN-node1 from the SRAN-node1 security capability, and derives the wireless backhaul link user plane from the root key K eNB-SRAN-node1 of the AS layer. Integrity protection key K UP-Wint and wireless backhaul link user plane encryption key K UP-Wenc .
  • the specific key derivation algorithm is consistent with the method in the LTE related art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
  • Step 1104 The gateway node (such as SRAN-node3) sends an E2E wireless backhaul link access layer security algorithm to the SRAN-node1.
  • the algorithm includes the SRAN-node3 locally derived wireless backhaul link user plane integrity protection key K UP in step 1103. -Wint and wireless backhaul link user plane encryption key K UP-Wenc used in the access layer integrity protection algorithm and access layer encryption algorithm.
  • SRAN-node3 sends an E2E wireless backhaul link access layer security algorithm to SRAN-node1 via SRAN-node2.
  • Step 1105 SRAN-node1 generates an end-to-end wireless backhaul link user plane security key, that is, a wireless backhaul link user plane integrity protection key K UP-Wint and a wireless backhaul link user plane encryption key K UP-Wenc .
  • SRAN-node1 generates the root key K eNB-SRAN-node1 of the AS layer by the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security, and then by K eNB-SRAN-node1 and
  • the security algorithm received in step 1104 derives a wireless backhaul link user plane integrity protection key K UP-Wint and a wireless backhaul link user plane encryption key K UP-Wenc .
  • Step 1106 SRAN-node1 sends an E2E wireless backhaul link access layer security completion notification to SRAN-node3 via SRAN-node2.
  • the end-to-end wireless backhaul link user plane access layer security key is generated between the initial access node and the gateway node, namely the wireless backhaul link user plane integrity protection key K UP-Wint and the wireless backhaul link.
  • the user plane encryption key K UP-Wenc can perform an end-to-end wireless backhaul link user plane access layer security operation between the initial access node and the gateway node.
  • the method provided in this embodiment further includes: performing end-to-end between the initial access node and the UE.
  • the E2E access link security performs end-to-end access layer security between the initial access node (such as SRAN-node1) and the PDCP protocol layer of the UE.
  • the protocol layer such as L1, MAC, RLC, and PDCP is included from the bottom to the top, and is used on the PDCP layer.
  • An APP layer that transmits user plane data or an RRC layer that transmits AS layer control plane signaling. It should be noted that when performing the end-to-end wireless access link access layer security between the initial access node and the UE, other small nodes (including intermediate routing nodes and gateway nodes) in the UE communication path do not participate.
  • the wireless access link access layer operates securely.
  • performing end-to-end wireless access link access layer security between the initial access node and the UE includes: performing end-to-end wireless connection between the initial access node and the UE.
  • the upper layer user plane data of the UE (such as the application layer APP data of the UE in FIG. 10, the NAS layer signaling of the UE, and the RRC layer control plane signaling of the UE) are respectively sent before being sent to the Uu port.
  • User plane encryption for user plane data and control plane encryption and integrity protection for RRC layer control plane signaling need to be performed at the PDCP layer, and the initial access node (such as SRAN-node1) receives user plane data or RRC layer control plane. After the signaling, the user plane data and the RRC layer control plane signaling are decrypted and the RRC layer control plane signaling integrity is verified. Similarly, the SRAN-node1 is used as the initial access node of the UE, and the downlink user plane is sent to the UE.
  • the user plane encryption of the user plane data and the control plane encryption and integrity protection for the RRC layer control plane signaling are respectively performed at the PDCP layer, and the UE receives the After the user plane data or the RRC layer control plane signaling, the user plane data and the RRC layer control plane signaling are decrypted and the RRC layer control plane signaling is integrity verified, thereby ensuring user plane data and control plane signaling.
  • Wireless access link Safety when.
  • FIG. 12 is a flowchart of a first implementation of key generation for implementing an end-to-end wireless access link access layer security based on the application scenario shown in FIG. 7 according to an embodiment of the present invention, by using the method of FIG.
  • the foregoing process specifically includes:
  • Step 1200 Perform AKA between the UE and the core network. After performing AKA, the security management key K ASME is calculated on the UE and the core network device (such as the HSS).
  • this step is consistent with the method for performing AKA between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
  • Step 1201 The NAS SMC is executed between the UE and the core network device (such as the MME). After performing the NAS layer security process, the security key required for the NAS layer security is generated at the UE and the MME, that is, the NAS layer integrity key. K NAS int and NAS layer security key K NAS enc .
  • this step is consistent with the method for performing the NAS SMC between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
  • Step 1202 The MME sends the security information of the UE to a gateway node in the UE communication path, such as SRAN-node 3.
  • the security information of the UE includes the security capabilities of the K eNB and the UE. The specific description is similar to the step 1102, and is easily implemented by those skilled in the art, and details are not described herein again.
  • the MME may further further implement the security capability information of the SRAN-node1, that is, the integrity protection algorithm supported by the SRAN-node1 and the SRAN- The encryption algorithm supported by node1 is sent to the gateway node.
  • Step 1203 SRAN-node3 requests an initial access node (such as SRAN-node1) accessed by the UE to request a radio access link access layer security algorithm supported by SRAN-node1, including an access layer integrity protection algorithm and Intrusion encryption algorithm.
  • an initial access node such as SRAN-node1
  • SRAN-node1 accessed by the UE to request a radio access link access layer security algorithm supported by SRAN-node1, including an access layer integrity protection algorithm and Intrusion encryption algorithm.
  • the SRAN-node 3 requests the SRAN-node 1 for the message of the radio access link access layer security algorithm, and the message that the SRAN-node1 sends the radio access link access layer security algorithm to the SRAN-node 3 is sent via the SRAN-node2. Give each other.
  • step 1202 SRAN-node3 has obtained the security of SRAN-node1 from the MME. Full capability information can then be omitted in step 1203.
  • Step 1204 SRAN-node3 generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • a radio access link access layer security key that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • the SRAN-node3 selects the integrity protection algorithm and encryption supported by the UE and the SRAN-node1 from the UE security capability and the received radio access link access layer security algorithm supported by the SRAN-node1.
  • the algorithm further derives the access key of the wireless access link access layer by the root key K eNB of the AS layer, that is, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection Key K RRCint .
  • Step 1205 SRAN-node3 notifies the SRAN-node1 radio access link access layer security key, and the notification message carries: the radio access link access layer security key, that is, the user plane encryption key K UP-Aenc , control plane encryption key K RRCenc , control plane integrity protection key K RRCint .
  • the notification message in this step is sent to SRAN-node1 via SRAN-node2.
  • the notification message can be used between SRAN-node3 and SRAN-node1 as shown in FIG. 10 when it is sent from SRAN-node3.
  • the end-to-end wireless backhaul link access layer is securely encrypted and integrity protected, and SRAN-node1 receives the decryption and integrity verification.
  • SRAN-node2 only forwards the message after receiving the message, and does not participate in security operations;
  • the notification message is transmitted between SRAN-node 3 and SRAN-node 2 and between SRAN-node 2 and SRAN-node 1, both between SRAN-node 3 and SRAN-node 2 and at SRAN-node 2 and SRAN-node 1
  • the security channel is established on the established secure channel or is secured by the access layer between SRAN-node3 and SRAN-node2 and between SRAN-node2 and SRAN-node1.
  • Step 1206 SRAN-node1 sends an access layer security mode command to the UE, where the command carries the access layer integrity protection used by the SRAN-node3 derived wireless access link access layer security key received by SRAN-node1. Algorithm and access layer encryption algorithm.
  • Step 1207 The UE generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • a radio access link access layer security key that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • the UE In this step, the UE generates the root key K eNB of the AS layer by using the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security, and then is received by the root key K eNB of the AS layer and step 1206.
  • the obtained security algorithm derives the wireless access link access layer security key, namely the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
  • Step 1208 The UE sends an access layer security mode complete message to SRAN-node1.
  • the end-to-end wireless access link access layer security key is generated between the UE and the initial access node, namely, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane is complete.
  • the security protection key K RRCint , the end-to-end wireless access link access layer security operation can be performed between the UE and the initial access node.
  • FIG. 13 is a flowchart of a second implementation of key generation for implementing an end-to-end wireless access link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention.
  • the user plane encryption key K UP-Aenc and the control plane required for performing the end-to-end wireless access link access layer security between the initial access node and the UE in the embodiment of the present invention can be generated by the method of FIG. Encryption key K RRCenc , control plane integrity protection key K RRCint .
  • the foregoing process specifically includes:
  • the steps 1300 to 1302 are completely consistent with the steps 1200 to 1202 shown in FIG. 12, and details are not described herein again.
  • Step 1303 After the SRAN-node3 receives the security information of the UE, the downlink absolute carrier frequency of the initial access node (such as SRAN-node1) accessed by the UE (EARFCN-DL, E-UTRA Absolute Radio Frequency Channel Number ), the physical cell identifier (PCI), and the received K eNB derive the secure root key K eNB* of the access layer of the radio access link.
  • the downlink absolute carrier frequency of the initial access node such as SRAN-node1 accessed by the UE
  • E-UTRA Absolute Radio Frequency Channel Number the physical cell identifier
  • K eNB the secure root key K eNB* of the access layer of the radio access link.
  • Step 1304 SRAN-node3 sends the derived secure root key K eNB* of the access layer of the radio access link to SRAN-node1.
  • SRAN-node3 will also send the UE security capability to SRAN-node1 during this process.
  • the message in this step is sent to SRAN-node1 via SRAN-node2.
  • SRAN-node2 In order to The security of the wireless access link access layer secure root key is transmitted via SRAN-node2.
  • the message between SRAN-node3 and SRAN-node1 shown in FIG. 10 can be utilized.
  • the end-to-end wireless backhaul link access layer secures encryption and integrity protection, and SRAN-node1 receives decryption and integrity verification.
  • SRAN-node2 only forwards the message after receiving the message, and does not participate in the security operation; or, the message in this step is sent between SRAN-node3 and SRAN-node2 and is sent between SRAN-node2 and SRAN-node1.
  • the message is sent between SRAN-node3 and SRAN-node2 and on the secure channel established between SRAN-node2 and SRAN-node1, or between SRAN-node3 and SRAN-node2 and between SRAN-node2 and SRAN.
  • the access layer between -node1 is securely secured.
  • Step 1305 SRAN-node1 selects a radio access link access layer integrity protection algorithm, an access layer encryption algorithm, and a radio access link is derived from a secure root key K eNB* of the radio access link access layer.
  • the access layer security key that is, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
  • the related key derivation algorithm in this step is the same as the control plane key derivation algorithm in the LTE related technology, and the specific implementation is not limited to the scope of protection of the present application, and details are not described herein again.
  • Step 1306 SRAN-node1 sends an access layer security mode command to the UE, and the access layer selected to be used when the SRAN-node1 derives the radio access link access layer security key in the access layer security mode command command is complete. Sex protection algorithm and access layer encryption algorithm.
  • Step 1307 The UE generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • a radio access link access layer security key that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
  • the UE In this step, the UE generates the root key K eNB of the AS layer by using the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security; then, the SRAN-node1 cell accessed by the K eNB and the UE EARFCN-DL, PCI derives the secure root key K eNB* of the access layer of the radio access link; finally, the UE is accessed by K eNB* using the access layer integrity protection algorithm received in step 1306.
  • the layer encryption algorithm derives the wireless access link access layer security key, namely the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
  • Step 1308 The UE sends an access layer security mode complete message to SRAN-node1.
  • the end-to-end wireless access link access layer security key is generated between the UE and the initial access node, namely, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane is complete.
  • the security protection key K RRCint , the end-to-end wireless access link access layer security operation can be performed between the UE and the initial access node.
  • the embodiment of the present invention performs end-to-end wireless backhaul link access layer security between the gateway node and the initial access node, and an end-to-end wireless access link between the initial access node and the UE.
  • the SRAN-node1 After receiving the user plane data of the UE from the Uu interface, the SRAN-node1 first decrypts the user plane encryption key K UP-Aenc of the access layer of the wireless access link, and then decrypts Then, the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint are used for encryption and integrity protection and then sent to the Ub interface.
  • the SRAN-node1 After receiving the user plane data of the UE from the Ub interface, the SRAN-node1 first uses the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint respectively. The decryption and integrity verification are performed, and then the user plane encryption key K UP-Aenc of the access layer of the wireless access link is used for encryption and then transmitted to the UE through the Uu interface.
  • the end-to-end wireless backhaul link access layer security between the gateway node and the initial access node in the embodiment of the present invention and the end-to-end wireless between the initial access node and the UE are adopted.
  • Access link layer security layer dual link security mechanism no matter how many intermediate routing nodes pass through the UE's communication path, the wireless backhaul link security is only end-to-end between the gateway node and the initial access node.
  • Execution ensures the security of user plane data transmission over the wireless backhaul link, avoiding the security leakage caused by multiple air interfaces, that is, through multiple intermediate routing nodes; on the other hand, the wireless access chain
  • the road security is performed end-to-end between the UE and the initial access node.
  • no modification to the UE using the LTE technology is required, and backward compatibility is ensured.
  • FIG. 14 is a schematic structural diagram of a structure of a UE according to an embodiment of the present invention. As shown in FIG. 14, the method includes at least a first processing module and a first radio access link processing module.
  • the first processing module is configured to: implement an AKA process and a NAS layer security with the core network;
  • the first wireless access link processing module is configured to: perform end-to-end wireless access link access layer security with the initial access node;
  • the UE communicates with the initial access node through a wireless access link.
  • the first wireless access link processing module is configured to: perform an end-to-end wireless access link user plane between the end-to-end wireless access link access layer security process and the initial access node Encryption, and perform end-to-end wireless access link control plane encryption and control plane integrity protection with the initial access node.
  • the radio access air interface Uu port is used between the UE and the initial access node; the initial access node is a radio access small node that the UE accesses through the radio access link.
  • the UE includes: L1, MAC, RLC, and Packet Convergence Protocol Layer (PDCP) protocol layers from bottom to top;
  • L1 MAC
  • RLC Radio Link Control
  • PDCP Packet Convergence Protocol Layer
  • the first radio access link processing module is configured to: perform the end-to-end radio access link access layer security process between a PDCP protocol layer of the UE and a PDCP protocol layer of the initial access node .
  • the UE of the embodiment of the present invention further includes: a first user plane key generation module and a first control plane key generation module; wherein
  • the first user plane key generation module is configured to: before the UE performs end-to-end wireless access link user plane encryption with the initial access node, access the layer security root key K eNB based on the radio access link Generating the radio access link user plane encryption key K UPenc ; or based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and PCI generation a new radio access link access stratum root key K eNB *, the encryption key K UPenc K eNB * generated based on the user plane;
  • the first control plane key generation module is configured to: generate, according to the radio access link access layer security root key K eNB , before performing end-to-end radio access link user plane encryption with the initial access node The radio access link control plane encryption key K RRCenc and the radio access link control plane integrity protection key K RRCint ; or based on the radio access link access layer security root key K eNB , The EARFCN-DL of the cell of the initial access node, and the PCI generate a new radio access link access layer root key K eNB* , and generate the control plane encryption key K RRCenc based on the K eNB* And the control plane integrity protection key K RRCint ;
  • the radio access link access layer security root key K eNB is generated after the AKA process and the NAS layer security process are performed between the UE and the core network.
  • FIG. 15 is a schematic structural diagram of a wireless access small node according to an embodiment of the present invention.
  • the wireless access small node and the UE are linked by using a wireless access air interface;
  • the wireless access small node includes at least a second processing module and a second wireless Access link processing module and first wireless backhaul link processing module; as shown in Figure 15:
  • the second processing module is configured to: implement an AKA process and a NAS layer security process with the core network;
  • a second radio access link processing module configured to: perform end-to-end wireless access link access layer security with the UE;
  • the first wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link access layer security with the gateway node.
  • the second radio access link processing module is configured to: perform an end-to-end wireless access link user plane encryption between the end-to-end radio access link security layer security procedure with the UE, and perform and End-to-end wireless access link control plane encryption and control plane integrity protection between UEs.
  • the wireless access air interface Uu interface side of the wireless access small node includes: L1, MAC, RLC, and PDCP protocol layers from top to bottom; the second wireless access link processing module is set to: in wireless access The end-to-end wireless access link control plane encryption and control plane integrity protection are performed between the PDCP layer of the small node and the PDCP layer of the UE.
  • the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node.
  • the wireless backhaul interface of the wireless access small node Ub interface side includes from the bottom to the top: the physical layer L1 using the long-term evolution LTE technology, the medium access control layer MAC, the radio link control layer RLC, and the packet convergence protocol slimming layer PDCP- t and packet convergence protocol security layer PDCP-s; or,
  • the wireless backhaul interface Ub interface side of the wireless access small node includes: an L1, a MAC, a logical link control layer LLC, and a PDCP-s protocol layer using a wireless local area network WLAN technology from bottom to top;
  • the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between the PDCP-s of the wireless access small node and the PDCP-s layer of the gateway node.
  • the wireless access small node further includes: a second user plane key generation module, configured to:
  • the second user plane key generation module is configured to:
  • the wireless backhaul link access layer security root key K eNB-FAN performs an authentication and key agreement (AKA) process and a NAS layer security process between the wireless access small node and the core network. After the build.
  • AKA authentication and key agreement
  • the wireless access small node further includes a third user plane key generation module and a second control plane key generation module, where
  • the third user plane key generation module is configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE User plane encryption key K UPenc ; or, receiving a radio access link access layer root key K eNB* from the gateway node, and generating the user plane encryption key K UPenc based on the K eNB* ;
  • a second control plane key generating module configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE a control plane encryption key K RRCenc and a control plane integrity protection key K RRCint ; or receiving a radio access link access layer root key K eNB* generated from the gateway node, and based on the K eNB* generation Said control plane encryption key K RRCenc and said control plane integrity protection key K RRCint ;
  • the radio access link access layer root key K eNB* is the EARFCN-DL of the gateway node based on the radio access link access layer security root key K eNB and the initial access node cell. And the PCI generated; the wireless access link access layer security root key K eNB is generated after the AKA process and the NAS layer security process are performed between the UE and the core network.
  • the wireless access small node shown in FIG. 15 can directly access the core network through a wired interface; wherein the initial access node is linked to the UE through a wireless access air interface;
  • the wireless access small node includes at least a second wireless backhaul link processing module configured to perform end-to-end wireless backhaul link access layer security with an initial access node of the UE.
  • the second wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
  • the wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer L1, a medium access control layer (MAC), a radio link control layer (RLC), and data using Long Term Evolution (LTE) technology.
  • MAC medium access control layer
  • RLC radio link control layer
  • LTE Long Term Evolution
  • PDCP-t Packet Convergence Protocol Slimming Layer
  • PDCP-s Packet Convergence Protocol Security Layer
  • the wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
  • L1 a MAC
  • LLC logical link control layer
  • WLAN wireless local area network
  • the second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link access layer between the PDCP-s layer of the wireless access small node and the PDCP-s layer of the initial access node Safety.
  • the wireless access small node further includes a fourth user plane key generation module, configured to:
  • the fourth user plane key generation module is set to:
  • the wireless backhaul link access layer security root key K eNB-FAN is an authentication and key agreement (AKA) process and a NAS layer security process between the initial wireless access small node and the core network. Generated.
  • AKA authentication and key agreement
  • the fourth user plane key generation module is further configured to:
  • the embodiment of the present invention further provides a macro base station (MNB), which is equivalent to the gateway node in the embodiment of the present invention, and includes at least: a second wireless backhaul link processing module, configured to: perform and the initial access node End-to-end wireless backhaul link access layer security procedures.
  • MNB macro base station
  • the second wireless backhaul link processing module of the macro base station is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
  • the second wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between the PDCP-s layer of the MNB and the PDCP-s layer of the initial access node.
  • an embodiment of the present invention further provides a UE, including a processor and a memory, where the processor stores instructions executable by the processor, and when the instructions are executed by the processor, performs the functions of the module shown in FIG. 14.
  • an embodiment of the present invention further provides a wireless access small node, including a processor and a memory, where the processor stores instructions executable by the processor, and when the instruction is executed by the processor, the method of FIG. 15 is performed. Show the function of the module.
  • an embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions, which are implemented to implement the method for implementing access layer security when the computer executable instructions are executed.
  • each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. / instruction to achieve its corresponding function.
  • This application is not limited to any specific combination of hardware and software.
  • the embodiment of the invention provides a method for implementing access layer security, a user equipment and a node, which can ensure the security of the user plane data in the wireless backhaul link, and avoids the passage of multiple air interfaces.
  • the security leakage caused by the intermediate routing nodes on the basis of ensuring the security of the wireless access link transmission, no modification to the UE using the LTE technology is required, and backward compatibility is ensured.

Abstract

A method for implementing access stratum security, comprising: executing end-to-end radio access link access stratum security between a UE and an initial access node; and executing end-to-end radio backhaul link access stratum security between the initial access node and a gateway node, where a communication path through which the UE communicates with a core network via at least two radio air interfaces comprises at least the UE, the initial access node, and the gateway node; insofar that the communication path comprises two radio air interfaces, the UE communicates with the initial access node via a radio access link, and the initial access node communicates with the gateway node via a radio backhaul link. The method greatly ensures the security of user plane data when being transmitted in the radio backhaul link, obviates, on the basis of ensured security for radio access link transmission, the need for any modification to the UE using the LTE technology, and ensures backward compatibility.

Description

实现接入层安全的方法及用户设备和节点Method for realizing access layer security, user equipment and nodes 技术领域Technical field
本申请涉及但不限于移动通信技术,尤指一种实现接入层安全的方法及用户设备和节点。The present application relates to, but is not limited to, mobile communication technologies, and in particular, to a method for implementing access layer security, and user equipment and nodes.
背景技术Background technique
蜂窝无线移动通信系统始于20世纪80年代,从一开始满足人类的语音通信需求发展到了后来在语音业务的基础上逐步满足人类的基础数据通信需求。传统蜂窝无线通信系统由无线网络运营商部署并运营,网络的建设经过运营商的缜密规划,图1为传统蜂窝无线接入网络的网络拓扑示意图,如图1所示,每个宏基站(MNB,macro(e)NB)的选址由运营商规划确定,每个宏基站可以达到几百米甚至几千米的无线覆盖,从而可以实现运营商运营区域内的近乎连续无缝覆盖。Cellular wireless mobile communication systems began in the 1980s and have evolved from the beginning to meet the needs of human voice communication to the basic needs of human data communication on the basis of voice services. The traditional cellular wireless communication system is deployed and operated by the wireless network operator. The construction of the network is carefully planned by the operator. Figure 1 is a schematic diagram of the network topology of the traditional cellular wireless access network. As shown in Figure 1, each macro base station (MNB) The location of macro(e)NB is determined by the operator's plan. Each macro base station can reach wireless coverage of several hundred meters or even several kilometers, so that nearly continuous seamless coverage within the operator's operating area can be achieved.
随着移动互联时代的到来,新的移动应用需求,尤其是那些要求高质量、高速率、低延时的移动应用需求出现了爆发式的增长。根据行业预测,一方面,在未来10年内,无线移动业务量将出现上千倍的增长,传统实现长距离宏覆盖的无线通信系统无法实现如此巨大的容量需求;另一方面,业界通过对用户通信行为和习惯的统计发现,大部分高数据流量的移动业务集中出现在室内环境和热点地区,比如商场、学校、用户家里、大型演出、集会场所等,而室内环境和热点地区具有区域分布广而散、单区域范围小、用户集中等特点,也就是说,传统蜂窝无线网络的广覆盖、均匀覆盖、固定覆盖特点使得其无法很好的适应这种小区域范围内业务集中出现的特性。此外,传统蜂窝无线网络由于各种各样的原因,比如建筑物的阻挡等会造成蜂窝无线信号在室内环境不如室外环境,这也使得传统蜂窝无线网络无法满足将来室内环境下的大数据容量需求。With the advent of the mobile Internet era, the demand for new mobile applications, especially those requiring high quality, high speed, low latency, has exploded. According to industry forecasts, on the one hand, wireless mobile services will increase by a thousand times in the next 10 years. Traditional wireless communication systems that implement long-distance macro coverage cannot achieve such huge capacity requirements. On the other hand, the industry has adopted users. Statistics on communication behaviors and habits found that most of the high-traffic mobile services are concentrated in indoor environments and hotspots, such as shopping malls, schools, user homes, large-scale performances, gathering places, etc., while indoor environments and hotspots have wide regional distribution. The characteristics of the scattered, single-area range and user concentration, that is to say, the wide coverage, uniform coverage and fixed coverage characteristics of the traditional cellular wireless network make it unable to adapt well to the characteristics of the concentrated business in such a small area. In addition, traditional cellular wireless networks may cause cellular wireless signals to be inferior to outdoor environments in indoor environments due to various reasons, such as building blocks, which also makes traditional cellular wireless networks unable to meet the demand for large data capacity in future indoor environments. .
为了解决上述问题,一种无线接入网节点(SRAN-node,Small Radio Access Network node,本文中可简称为小节点)应运而生。从概念上讲,SRAN-node是指发射功率比传统宏基站的发射功率低、覆盖范围也比传统宏 基站的覆盖范围小的无线接入网节点,因此,SRAN-node也可以称为低功率节点(LPN,Lower Power Node),比如可以是微基站(Pico Node)、家庭基站(Femto/Home(e)NB)、无线中继接入设备(Relay),以及其他可能出现的任何发射功率远低于传统宏基站的可以通过无线通信链路接入网络的接入网设备。In order to solve the above problem, a wireless access network node (SRAN-node, Small Radio Access Network node, which may be referred to as a small node in this paper) has emerged. Conceptually, SRAN-node means that the transmit power is lower than that of the traditional macro base station, and the coverage is also larger than the traditional macro. The base station has a small coverage area of the radio access network node. Therefore, the SRAN-node may also be referred to as a low power node (LPN), such as a Pico Node or a home base station (Femto/Home (e). NB), wireless relay access equipment (Relay), and any other access network equipment that may occur that is much lower than the traditional macro base station that can access the network through a wireless communication link.
而为了满足未来无线通信系统的巨大容量提升需求,尤其是为了适应特定区域内的集中式大数据量需求,业界预测可以在特定区域内增加SRAN-node的部署密度以实现网络容量的增长,满足用户需求。业界将这种在特定区域内密集部署的网络称之为超密集网络(UDN,Ultra Dense Network)。图2为在传统蜂窝无线接入网络的特定区域内部署UDN的示意图,如图2所示,在大厦200内、在体育场210内、在热点230区域均部署了大量SRAN-node。In order to meet the huge capacity increase requirements of future wireless communication systems, especially to meet the demand for centralized large data volume in a specific area, the industry predicts that the deployment density of SRAN-node can be increased in a specific area to achieve network capacity growth. User needs. The industry refers to such a densely deployed network in a specific area as the Ultra Dense Network (UDN). 2 is a schematic diagram of deploying a UDN in a specific area of a conventional cellular radio access network. As shown in FIG. 2, a large number of SRAN-nodes are deployed in the building 200, in the stadium 210, and in the hotspot 230 area.
UDN可以提高网络容量,在提高网络容量的同时,未来的网络也不希望增加网络的资本支出(CAPEX,Capital Expenditure)和运营支出(OPEX,Operating Expense),这就意味着UDN的部署需要减少人为的计划、优化和管理,可以根据网络拓扑、网络负荷、业务需求等在室内、室外的热点区域或者大业务量区域完成灵活快速部署,并实现自配置、自优化和自治愈。为了实现所有这些目标,业界普遍认为UDN中仅有部分或者少量SRAN-node可以通过有线连接(wired backhaul)(如光纤、电缆等)接入核心网设备;而其他SRAN-node则需要支持无线回程(wireless backhaul),利用SRAN-node之间密集短距离部署的特性,通过SRAN-node之间的无线回程链路实现SRAN-node之间的互联互通,以及通过无线回程链路经过两个SRAN-node之间的无线连接(一跳)或者依次经过多个SRAN-node之间的无线连接(多跳)接入核心网设备。如此,在UDN网络中,用户设备(UE,User Equipment)的通信数据很有可能需要经过两段甚至两段以上的空口传输,两段空口包括UE与UE所接入的SRAN-node(设记为SRAN-node-x)之间的空口无线接入链路(RAL,Radio Access Link),以及SRAN-node-x与有有线回程的SRAN-node(设记为SRAN-node-z)之间的空口无线回程链路。超过两段空口的情况,以三段空口为例,包括RAL、SRAN-node-x与某 个中间节点(设记为SRAN-node-y)之间的空口无线回程链路,以及SRAN-node-y与SRAN-node-z之间的空口无线回程链路。UDN can increase network capacity. While increasing network capacity, future networks do not want to increase network capital expenditure (CAPEX, Capital Expenditure) and operating expenses (OPEX, Operating Expense), which means that UDN deployment needs to reduce man-made The planning, optimization, and management can be flexibly and rapidly deployed in indoor and outdoor hotspots or large traffic areas according to network topology, network load, and service requirements, and achieve self-configuration, self-optimization, and self-healing. In order to achieve all of these goals, the industry generally believes that only a small part or a small number of SRAN-nodes in the UDN can access the core network equipment through wired backhaul (such as fiber, cable, etc.); other SRAN-nodes need to support wireless backhaul. (wireless backhaul), utilizing the characteristics of dense short-distance deployment between SRAN-nodes, realizes interworking between SRAN-nodes through wireless backhaul links between SRAN-nodes, and passes two SRANs through wireless backhaul links. A wireless connection (one hop) between nodes or a wireless connection (multi-hop) between multiple SRAN-nodes in turn accesses a core network device. As such, in the UDN network, the communication data of the user equipment (UE, User Equipment) is likely to need to be transmitted through two or more air interfaces. The two air interfaces include the SRAN-node accessed by the UE and the UE. Between the SRAN-node-x), the Radio Access Link (RAL), and between the SRAN-node-x and the SRAN-node with the wired backhaul (named SRAN-node-z) Air interface wireless backhaul link. In the case of more than two air ports, take three air ports as an example, including RAL, SRAN-node-x and some The air interface wireless backhaul link between the intermediate nodes (designated as SRAN-node-y) and the air interface wireless backhaul link between SRAN-node-y and SRAN-node-z.
未来UDN中将密集部署大量SRAN-node,而其中只有少部分SRAN-node有有线回程,这使得UE的通信数据很有可能需要经过两段甚至两段以上的空口传输,如何保证这种移动通信系统中的安全性,以保证UE的通信数据在两段甚至两段以上空口传输时的安全性,是亟需解决的技术问题,目前没有具体的实现技术方案。In the future UDN, a large number of SRAN-nodes will be deployed intensively, and only a small number of SRAN-nodes have wired backhaul, which makes it very likely that the communication data of the UE needs to be transmitted through two or more air interfaces. How to ensure such mobile communication Security in the system to ensure the security of the UE's communication data in two or more segments of air interface transmission is a technical problem that needs to be solved. Currently, there is no specific implementation technical solution.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本发明实施例提供一种实现接入层安全的方法及用户设备和节点,能够保证UE的通信数据在两段甚至两段以上空口传输时的安全性。The embodiments of the present invention provide a method for implementing access layer security, a user equipment, and a node, which can ensure the security of the communication data of the UE when two or more segments are transmitted.
本发明实施例提供了一种实现接入层安全的方法,包括:执行UE与初始接入节点之间的端到端无线接入链路接入层安全;以及执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全;An embodiment of the present invention provides a method for implementing access layer security, including: performing end-to-end wireless access link access layer security between a UE and an initial access node; and performing initial access node and gateway node End-to-end wireless backhaul link access layer security;
其中,UE经过至少两段无线空中接口与核心网通信的通信路径;所述通信路径中,至少包括UE、初始接入节点、网关节点;The communication path of the UE communicating with the core network through at least two wireless air interfaces; the communication path includes at least a UE, an initial access node, and a gateway node;
当所述通信路径包括两段无线空中接口时,UE与初始接入节点之间通过无线接入链路通信,初始接入节点与网关节点之间通过无线回程链路通信。When the communication path includes two wireless air interfaces, the UE communicates with the initial access node through a wireless access link, and the initial access node communicates with the gateway node through a wireless backhaul link.
可选地,Optionally,
当所述通信路径包括大于两段无线空中接口时,所述通信路径中还包括至少一个中间路由节点;When the communication path includes more than two wireless air interfaces, the communication path further includes at least one intermediate routing node;
当所述通信路径中包括一个中间路由节点时,所述初始接入节点与所述中间路由节点之间通过无线回程链路通信,所述中间路由节点与所述网关节点之间通过无线回程链路通信;When the communication path includes an intermediate routing node, the initial access node communicates with the intermediate routing node through a wireless backhaul link, and the intermediate routing node and the gateway node pass a wireless backhaul chain. Road communication
当所述通信路径中包括两个或两个以上中间路由节点时,所述中间路由 节点之间通过无线回程链路通信。When the communication path includes two or more intermediate routing nodes, the intermediate route Nodes communicate over a wireless backhaul link.
可选地,Optionally,
所述UE与初始接入节点之间采用无线接入空中接口Uu口;The wireless access air interface Uu port is adopted between the UE and the initial access node;
所述初始接入节点与网关节点之间采用无线回程接口Ub口。A wireless backhaul interface Ub port is adopted between the initial access node and the gateway node.
可选地,Optionally,
所述中间路由节点和所述初始接入节点之间采用无线回程接口Ub口,所述中间路由节点和所述网关节点之间采用无线回程接口Ub口;a wireless backhaul interface Ub port is used between the intermediate routing node and the initial access node, and a wireless backhaul interface Ub port is used between the intermediate routing node and the gateway node;
当所述中间路由节点为两个或两个以上时,所述中间路由节点之间采用无线回程接口Ub口。When the intermediate routing node is two or more, a wireless backhaul interface Ub port is adopted between the intermediate routing nodes.
可选地,Optionally,
所述初始接入节点为所述UE通过无线接入链路接入的无线接入小节点;The initial access node is a wireless access small node that the UE accesses through a wireless access link;
所述网关节点为能够通过有线接口接入所述核心网的无线接入小节点或宏基站;The gateway node is a wireless access small node or a macro base station capable of accessing the core network through a wired interface;
所述中间路由节点为实现所述初始接入节点和网关节点之间的通信从而最终实现接入所述初始接入节点的UE与所述核心网之间的通信提供中继传输的无线接入小节点。The intermediate routing node provides wireless communication for relay transmission by implementing communication between the initial access node and the gateway node to finally implement communication between the UE accessing the initial access node and the core network. Small node.
可选地,Optionally,
所述执行UE与初始接入节点之间的端到端无线接入链路接入层安全包括:The end-to-end wireless access link access layer security between the performing UE and the initial access node includes:
执行所述UE与所述初始接入节点之间的端到端无线接入链路用户面加密,以及执行所述UE与所述初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护;Performing end-to-end wireless access link user plane encryption between the UE and the initial access node, and performing end-to-end wireless access link control between the UE and the initial access node Face encryption and control plane integrity protection;
所述执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全包括:执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Performing the end-to-end wireless backhaul link access layer security between the initial access node and the gateway node includes: performing an end-to-end wireless backhaul link user plane between the initial access node and the gateway node Encryption and user plane integrity protection.
可选地,在所述初始接入节点的数据包汇聚协议安全(PDCP-s)层和所 述网关节点的PDCP-s层之间执行端到端无线回程链路接入层安全。Optionally, a packet convergence protocol security (PDCP-s) layer and a location at the initial access node The end-to-end wireless backhaul link access layer security is performed between the PDCP-s layers of the gateway node.
可选地,Optionally,
所述初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:使用长期演进(LTE)技术的物理层(L1)、媒体接入控制层(MAC)、无线链路控制层(RLC)、数据包汇聚协议瘦身层(PDCP-t)和数据包汇聚协议安全层(PDCP-s);The wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: a physical layer (L1) using Long Term Evolution (LTE) technology, and media access control from bottom to top Layer (MAC), Radio Link Control Layer (RLC), Packet Convergence Protocol Slimming Layer (PDCP-t), and Packet Convergence Protocol Security Layer (PDCP-s);
所述中间路由节点从下到上包括:使用LTE技术的L1、MAC和RLC协议层;或者,包括使用LTE技术的L1、MAC、RLC和PDCP-t协议层;The intermediate routing node includes: L1, MAC, and RLC protocol layers using LTE technology from bottom to top; or, includes L1, MAC, RLC, and PDCP-t protocol layers using LTE technology;
如果所述初始接入节点和所述网关节点上的PDCP-s层和PDCP-t层合并到一个协议层则为PDCP层;If the initial access node and the PDCP-s layer and the PDCP-t layer on the gateway node are merged into one protocol layer, it is a PDCP layer;
或者,or,
所述初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:使用无线局域网(WLAN)技术的L1、MAC、逻辑链路控制层(LLC)和PDCP-s协议层;The wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: an L1, a MAC, and a logical link control layer using a wireless local area network (WLAN) technology. LLC) and PDCP-s protocol layer;
所述中间路由节点从下到上包括使用WLAN技术的L1、MAC和LLC协议层。The intermediate routing node includes L1, MAC, and LLC protocol layers using WLAN technology from bottom to top.
可选地,所述执行初始接入节点和网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护包括:Optionally, performing end-to-end wireless backhaul link user plane encryption and user plane integrity protection between the initial access node and the gateway node includes:
所述UE的用户面数据,在通过无线接入空中接口Uu口发送给所述初始接入节点后,所述初始接入节点在将UE的用户面数据发送到无线回程接口Ub口之前,在所述初始接入节点的PDCP-s层执行加密和完整性保护,数据发送到所述网关节点之后,由所述网关节点在PDCP-s层进行解密和完整性验证;相应地,After the user plane data of the UE is sent to the initial access node through the radio access air interface Uu interface, the initial access node sends the user plane data of the UE to the wireless backhaul interface Ub port before The PDCP-s layer of the initial access node performs encryption and integrity protection, and after the data is sent to the gateway node, the gateway node performs decryption and integrity verification at the PDCP-s layer; correspondingly,
所述网关节点从核心网获取到需要发送给UE的用户面数据,在发送到无线回程接口Ub口前,在所述网关节点的PDCP-s层执行加密和完整性保护,数据发送到所述初始接入节点后,由所述初始接入节点在PDCP-s层进行解密和完整性验证。The gateway node acquires user plane data that needs to be sent to the UE from the core network, and performs encryption and integrity protection on the PDCP-s layer of the gateway node before sending to the wireless backhaul interface Ub port, and the data is sent to the After the initial access node, the initial access node performs decryption and integrity verification at the PDCP-s layer.
可选地,所述PDCP-s层用于实现:头压缩和解压缩,以及安全操作; 其中,安全操作包括:加密、解密、完整性保护和完整性验证。Optionally, the PDCP-s layer is used to implement: header compression and decompression, and security operations; Among them, security operations include: encryption, decryption, integrity protection and integrity verification.
可选地,所述执行UE与初始接入节点之间的端到端无线接入链路用户面加密,以及所述执行UE与初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护,包括:Optionally, performing end-to-end wireless access link user plane encryption between the UE and the initial access node, and performing end-to-end wireless access link control between the performing UE and the initial access node Face encryption and control plane integrity protection, including:
所述UE的上行用户面数据和上行无线资源控制(RRC)层控制面信令在发送到空中接口之前,分别在UE的PDCP层执行针对用户面数据的用户面加密以及针对RRC层控制面信令的控制面加密和完整性保护;所述初始接入节点接收到所述用户面数据或所述RRC层控制面信令后,对用户面数据和RRC层控制面信令进行解密并对RRC层控制面信令进行完整性验证;相应地,The uplink user plane data of the UE and the uplink radio resource control (RRC) layer control plane signaling perform user plane encryption for the user plane data and the RRC layer control plane signal at the PDCP layer of the UE before transmitting to the air interface, respectively. Determining control plane encryption and integrity protection; after receiving the user plane data or the RRC layer control plane signaling, the initial access node decrypts user plane data and RRC layer control plane signaling and RRC Layer control plane signaling for integrity verification; accordingly,
所述初始接入节点发送给UE的下行用户面数据和RRC层控制面信令在发送到空中接口之前,分别在初始接入节点的PDCP层执行对用户面数据的用户面加密以及对RRC层控制面信令的控制面加密和完整性保护;所述UE接收到用户面数据或RRC层控制面信令后,对所述用户面数据和所述RRC层控制面信令进行解密和对RRC层控制面信令进行完整性验证。The downlink user plane data and the RRC layer control plane signaling sent by the initial access node to the UE perform user plane encryption of the user plane data and the RRC layer at the PDCP layer of the initial access node before being sent to the air interface, respectively. Control plane encryption and integrity protection of control plane signaling; after receiving the user plane data or the RRC layer control plane signaling, the UE decrypts the user plane data and the RRC layer control plane signaling and performs RRC Layer control plane signaling for integrity verification.
可选地,Optionally,
所述UE和所述初始节点的无线接入空中接口Uu接口侧上从下到上分别包括:L1、MAC、RLC以及数据包汇聚协议(PDCP)层;The UE and the initial access node of the wireless access air interface on the Uu interface side include: L1, MAC, RLC, and Packet Convergence Protocol (PDCP) layer from bottom to top;
所述执行UE与初始接入节点之间的端到端无线接入链路接入层安全,包括:The performing end-to-end wireless access link access layer security between the UE and the initial access node includes:
在所述UE的PDCP和所述初始接入节点的PDCP层之间执行端到端控制面接入层安全。End-to-end control plane access layer security is performed between the PDCP of the UE and the PDCP layer of the initial access node.
可选地,Optionally,
该方法还包括:所述初始接入节点和所述网关节点之间生成所述执行初始接入节点与网关节点之间端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintThe method further includes: generating an end-to-end wireless backhaul link user plane encryption and a wireless backhaul link user plane integrity between the initial access node and the gateway node between the initial access node and the gateway node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for protection;
其中,所述生成所述执行初始接入节点与网关节点之间端到端无线回程 链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint,包括:The generating a wireless backhaul link user plane encryption key K required to perform end-to-end wireless backhaul link user plane encryption and wireless backhaul link user plane integrity protection between the initial access node and the gateway node is generated. UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint , including:
所述初始接入节点和所述网关节点基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating, by the initial access node and the gateway node, the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link based on a wireless backhaul link access layer security root key K eNB-FAN User plane integrity protection key K UP-Wint ;
其中,所述初始接入节点的无线回程链路接入层安全根密钥KeNB-FAN为所述初始接入节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和非接入层(NAS)安全过程后生成的;The wireless backhaul link access layer security root key K eNB-FAN of the initial access node performs an authentication and key agreement (AKA) process between the initial access node and the core network. Generated after the non-access stratum (NAS) security process;
其中,所述网关节点的无线回程链路接入层安全根密钥KeNB-FAN为所述初始接入节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和非接入层(NAS)安全过程后,由所述核心网发送给所述网关节点的。The wireless backhaul link access layer security root key K eNB-FAN of the gateway node performs an authentication and key agreement (AKA) process and the non-connection between the initial access node and the core network. After the layer (NAS) security process is sent by the core network to the gateway node.
可选地,Optionally,
该方法还包括:所述UE与所述初始接入节点之间生成所述执行UE与初始接入节点之间端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成所述执行UE与所述初始接入节点之间端到端无线接入链路控制面加密和控制面完整性保护所需要的控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCintThe method further includes: generating, by the UE and the initial access node, a user plane encryption key K UPenc required for performing end-to-end wireless access link user plane encryption between the UE and the initial access node And generating a control plane encryption key K RRCenc and a control plane integrity protection key required for performing end-to-end radio access link control plane encryption and control plane integrity protection between the performing UE and the initial access node Key K RRCint ,
其中,所述生成所述执行UE与初始接入节点之间端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成所述执行UE与所述初始接入节点之间端到端无线接入链路控制面加密和控制面完整性保护所需要的控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint,包括:The generating a user plane encryption key K UPenc required to perform end-to-end wireless access link user plane encryption between the performing UE and the initial access node, and generating the performing UE and the initial access Control plane encryption key K RRCenc and control plane integrity protection key K RRCint required for end-to-end wireless access link control plane encryption and control plane integrity protection between nodes, including:
所述UE和所述网关节点基于无线接入链路接入层安全根密钥KeNB生成所述用户面加密密钥KUPenc,以及生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCint;所述网关节点将所述生成的用户面加密密钥KUPenc,控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点;或,Generating, by the UE and the gateway node, the user plane encryption key K UPenc based on a radio access link access layer security root key K eNB , and generating the control plane encryption key K RRCenc and the control plane Integrity protection key K RRCint ; the gateway node sends the generated user plane encryption key K UPenc , control plane encryption key K RRCenc and control plane integrity protection key K RRCint to the initial access node ;or,
所述UE和所述网关节点基于无线接入链路接入层安全根密钥KeNB、所 述初始接入节点的小区的下行绝对载频号(EARFCN-DL),以及物理小区标识(PCI)生成一个新的无线接入链路接入层根密钥KeNB*;所述网关节点将所述生成的KeNB*发送给所述初始接入节点;所述UE和所述初始接入节点基于所述KeNB*生成所述用户面加密密钥KUPenc,以及生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCintThe UE and the gateway node are based on a radio access link access layer security root key K eNB , a downlink absolute carrier frequency number (EARFCN-DL) of the cell of the initial access node, and a physical cell identifier (PCI) Generating a new radio access link access layer root key K eNB* ; said gateway node transmitting said generated K eNB* to said initial access node; said UE and said initial access The node generates the user plane encryption key K UPenc based on the K eNB* , and generates the control plane encryption key K RRCenc and the control plane integrity protection key K RRCint ;
其中,所述UE的无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS安全过程后生成的;The radio access link access layer security root key K eNB of the UE is generated after performing an AKA process and a NAS security process between the UE and the core network;
其中,所述网关节点的无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS安全过程后,由所述核心网发送给所述网关节点的。The wireless access link access layer security root key K eNB of the gateway node is sent by the core network to the core network after performing an AKA process and a NAS security process between the UE and the core network. Gateway node.
可选地,Optionally,
该方法还包括:所述网关节点将所述生成的用户面加密密钥KUpenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点,The method further includes: the gateway node transmitting the generated user plane encryption key K Upenc , a control plane encryption key K RRCenc, and a control plane integrity protection key K RRCint to the initial access node,
其中,所述网关节点将所述生成的用户面加密密钥KUpenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点,包括:The gateway node sends the generated user plane encryption key K Upenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node, including:
所述网关节点向所述初始接入节点发送携带有所述用户面加密密钥KUpenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint的消息,对所述消息执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护;Transmitting, by the gateway node, a message carrying the user plane encryption key K Upenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node, and executing the message on the message End-to-end wireless backhaul link user plane encryption and user plane integrity protection between the initial access node and the gateway node;
所述网关节点将所述生成的KeNB*发送给所述初始接入节点,包括:Sending, by the gateway node, the generated K eNB* to the initial access node, including:
所述网关节点向所述初始接入节点发送携带有所述KeNB*的消息,对所述消息执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Transmitting, by the gateway node, the message carrying the K eNB* to the initial access node, and performing an end-to-end wireless backhaul link user plane between the initial access node and the gateway node for the message Encryption and user plane integrity protection.
本发明实施例还提供了一种用户设备(UE),至少包括第一处理模块、第一无线接入链路处理模块;其中,The embodiment of the present invention further provides a user equipment (UE), which includes at least a first processing module and a first radio access link processing module;
第一处理模块,设置为:与核心网之间实现AKA过程和NAS安全;The first processing module is configured to: implement an AKA process and NAS security with the core network;
第一无线接入链路处理模块,设置为:执行与初始接入节点之间的端到 端无线接入链路接入层安全;The first wireless access link processing module is configured to: perform an end to the initial access node The wireless access link access layer is secure;
其中,UE与初始接入节点之间通过无线接入链路通信。The UE communicates with the initial access node through a wireless access link.
可选地,所述第一无线接入链路处理模块是设置为:执行与初始接入节点之间的端到端无线接入链路用户面加密,以及执行与初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护。Optionally, the first radio access link processing module is configured to: perform end-to-end wireless access link user plane encryption with the initial access node, and perform execution with the initial access node. End-to-end wireless access link control plane encryption and control plane integrity protection.
可选地,Optionally,
所述UE与初始接入节点之间采用无线接入空中接口Uu口;The wireless access air interface Uu port is adopted between the UE and the initial access node;
所述初始接入节点为UE通过无线接入链路接入的无线接入小节点。The initial access node is a wireless access small node that the UE accesses through the wireless access link.
可选地,Optionally,
所述UE上从下到上包括L1、MAC、RLC以及数据包汇聚协议层(PDCP)协议层;The L1, the MAC, the RLC, and the Packet Convergence Protocol Layer (PDCP) protocol layer are included on the UE from bottom to top;
所述第一无线接入链路处理模块是设置为:在所述UE的PDCP协议层和所述初始接入节点的PDCP协议层之间执行所述端到端无线接入链路接入层安全。The first radio access link processing module is configured to: perform the end-to-end radio access link access layer between a PDCP protocol layer of the UE and a PDCP protocol layer of the initial access node Safety.
可选地,所述UE还包括第一用户面密钥生成模块和第一控制面密钥生成模块;其中,Optionally, the UE further includes a first user plane key generation module and a first control plane key generation module;
第一用户面密钥生成模块,设置为:在执行与所述初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路用户面加密密钥KUPenc;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述用户面加密密钥KUPencThe first user plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link The eNB generates the radio access link user plane encryption key K UPenc ; or, based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and the PCI Generating a new radio access link access layer root key K eNB* , and generating the user plane encryption key K UPenc based on the K eNB* ;
第一控制面密钥生成模块,设置为:在执行与所述初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路控制面加密密钥KRRCenc和所述无线接入链路控制面完整性保护密钥KRRCint;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述控制面加密密钥KRRCenc和 所述控制面完整性保护密钥KRRCintThe first control plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link The eNB generates the radio access link control plane encryption key K RRCenc and the radio access link control plane integrity protection key K RRCint ; or based on the radio access link access layer security root key K The eNB , the EARFCN-DL of the cell of the initial access node, and the PCI generate a new radio access link access layer root key K eNB* , and generate the control plane encryption key based on the K eNB* K RRCenc and the control plane integrity protection key K RRCint ;
其中,无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执AKA过程和NAS安全过程后生成的。The radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
本发明实施例还提供了一种无线接入小节点,该无线接入小节点与UE通过无线接入空中接口链接;该无线接入小节点至少包括第二处理模块、第二无线接入链路处理模块以及第一无线回程链路处理模块;其中,The embodiment of the present invention further provides a wireless access small node, and the wireless access small node and the UE are linked by using a wireless access air interface; the wireless access small node includes at least a second processing module and a second wireless access link. a path processing module and a first wireless backhaul link processing module; wherein
第二处理模块,设置为:与核心网之间实现AKA过程和NAS安全;The second processing module is configured to: implement an AKA process and NAS security with the core network;
第二无线接入链路处理模块,设置为:执行与UE之间的端到端无线接入链路接入层安全;a second radio access link processing module, configured to: perform end-to-end wireless access link access layer security with the UE;
第一无线回程链路处理模块,设置为:执行与网关节点之间的端到端无线回程链路接入层安全。The first wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link access layer security with the gateway node.
可选地,所述第二无线接入链路处理模块是设置为:Optionally, the second radio access link processing module is configured to:
执行与所述UE之间的端到端无线接入链路用户面加密,以及执行与UE之间的端到端无线接入链路控制面加密和控制面完整性保护。Perform end-to-end wireless access link user plane encryption with the UE, and perform end-to-end wireless access link control plane encryption and control plane integrity protection with the UE.
可选地,Optionally,
所述无线接入小节点的无线接入空中接口Uu接口侧从下到上包括L1、MAC、RLC以及PDCP协议层;The wireless access air interface Uu interface side of the wireless access small node includes an L1, a MAC, an RLC, and a PDCP protocol layer from bottom to top;
所述第二无线接入链路处理模块是设置为:在所述无线接入小节点的PDCP层和UE的PDCP层之间执行所述端到端的无线接入链路控制面加密和控制面完整性保护。The second radio access link processing module is configured to perform the end-to-end wireless access link control plane encryption and control plane between the PDCP layer of the radio access small node and the PDCP layer of the UE. Integrity protection.
可选地,所述第一无线回程链路处理模块是设置为:执行与网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Optionally, the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node.
可选地,Optionally,
所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进(LTE)技术的物理层(L1)、媒体接入控制层(MAC)、无线链路控制层(RLC)、数据包汇聚协议瘦身层(PDCP-t)和数据包汇聚协议安全层(PDCP-s);或者, The wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer (L1), a medium access control layer (MAC), and a radio link control layer (RLC) using Long Term Evolution (LTE) technology. ), Packet Convergence Protocol Slimming Layer (PDCP-t) and Packet Convergence Protocol Security Layer (PDCP-s); or,
所述无线接入小节点上从下到上包括:使用无线局域网(WLAN)技术的L1、MAC、逻辑链路控制层(LLC)和PDCP-s协议层;The wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
所述第一无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s和所述网关节点的PDCP-s层之间执行端到端的无线回程链路接入层安全。The first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between a PDCP-s of the wireless access small node and a PDCP-s layer of the gateway node .
可选地,所述无线接入小节点还包括第二用户面密钥生成模块,设置为:Optionally, the wireless access small node further includes a second user plane key generation module, configured to:
在所述第一无线回程链路处理模块执行与所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating the end-to-end wireless backhaul link user before the first wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for face encryption and wireless backhaul link user plane integrity protection.
可选地,所述第二用户面密钥生成模块是设置为:Optionally, the second user plane key generation module is configured to:
基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
其中,所述无线回程链路接入层安全根密钥KeNB-FAN为所述无线接入小节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和非接入层(NAS)安全过程后生成的。The wireless backhaul link access layer secure root key K eNB-FAN performs an authentication and key agreement (AKA) process and a non-access stratum between the wireless access small node and the core network. (NAS) generated after the security process.
可选地,所述无线接入小节点还包括第三用户面密钥生成模块和第二控制面密钥生成模块;其中,Optionally, the wireless access small node further includes a third user plane key generation module and a second control plane key generation module, where
第三用户面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路用户面加密密钥KUPenc;或,接收来自网关节点的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述用户面加密密钥KUPencThe third user plane key generation module is configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE User plane encryption key K UPenc ; or, receiving a radio access link access layer root key K eNB* from the gateway node, and generating the user plane encryption key K UPenc based on the K eNB* ;
第二控制面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint;或,接收来自网关节点生成的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCinta second control plane key generating module, configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE a control plane encryption key K RRCenc and a control plane integrity protection key K RRCint ; or receiving a radio access link access layer root key K eNB* generated from the gateway node, and based on the K eNB* generation Said control plane encryption key K RRCenc and said control plane integrity protection key K RRCint ;
其中,无线接入链路接入层根密钥KeNB*为所述网关节点基于无线接入链路接入层安全根密钥KeNB、所述无线接入小节点的小区的EARFCN-DL,以及PCI生成的;无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS安全过程后生成的。The radio access link access layer root key K eNB* is the EARFCN-DL of the gateway node based on the radio access link access layer security root key K eNB and the radio access small node cell And the PCI generated; the radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
本发明实施例又提供了一种无线接入小节点,该无线接入小节点能够通过有线接口接入核心网;The embodiment of the invention further provides a wireless access small node, wherein the wireless access small node can access the core network through a wired interface;
该无线接入小节点至少包括第二无线回程链路处理模块,设置为:执行与UE的初始接入节点之间的端到端无线回程链路接入层安全。The wireless access small node includes at least a second wireless backhaul link processing module configured to perform end-to-end wireless backhaul link access layer security with an initial access node of the UE.
可选地,所述第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Optionally, the second wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
可选地,Optionally,
所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进(LTE)技术的物理层(L1)、媒体接入控制层(MAC)、无线链路控制层(RLC)、数据包汇聚协议瘦身层(PDCP-t)和数据包汇聚协议安全层(PDCP-s);或者,The wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer (L1), a medium access control layer (MAC), and a radio link control layer (RLC) using Long Term Evolution (LTE) technology. ), Packet Convergence Protocol Slimming Layer (PDCP-t) and Packet Convergence Protocol Security Layer (PDCP-s); or,
所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用无线局域网(WLAN)技术的L1、MAC、逻辑链路控制层(LLC)和PDCP-s协议层;The wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
所述第二无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端的无线回程链路接入层安全。The second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link between the PDCP-s layer of the wireless access small node and the PDCP-s layer of the initial access node Into the layer security.
可选地,所述无线接入小节点还包括第四用户面密钥生成模块,设置为:Optionally, the wireless access small node further includes a fourth user plane key generation module, configured to:
在所述第二无线回程链路处理模块执行与所述初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating and executing the end-to-end wireless backhaul chain before the second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for user plane encryption and wireless backhaul link user plane integrity protection.
可选地,所述第四用户面密钥生成模块是设置为:Optionally, the fourth user plane key generation module is configured to:
基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
其中,所述无线回程链路接入层安全根密钥KeNB-FAN为初始无线接入节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和非接入层(NAS)安全过程后生成的。The wireless backhaul link access layer security root key K eNB-FAN performs an authentication and key agreement (AKA) process and a non-access stratum (NAS) between the initial radio access node and the core network. ) generated after the security process.
可选地,所述第四用户面密钥生成模块还设置为:Optionally, the fourth user plane key generation module is further configured to:
基于无线接入链路接入层安全根密钥KeNB生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面加密所需要的控制面加密密钥KRRCenc和用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面完整性保护所需要的控制面完整性保护密钥KRRCint并发送给所述初始接入节点;或,Generating user plane encryption required for performing end-to-end wireless access link user plane encryption between the UE and the initial access node of the UE based on the radio access link access layer security root key K eNB a key K UPenc and a control plane encryption key K RRCenc required to perform end-to-end radio access link control plane encryption between the UE and the initial access node of the UE and for the Performing a control plane integrity protection key K RRCint required for end-to-end radio access link control plane integrity protection between the UE and the initial access node of the UE and transmitting the key K RRCint to the initial access node; or
基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,并将所述生成的KeNB*发送给所述初始接入节点。Generating a new radio access link access layer root key K eNB* based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and the PCI, And transmitting the generated K eNB* to the initial access node.
本发明实施例还提供了一种无线接入小节点,包括上述两种无线接入小节点的任意组合。The embodiment of the invention further provides a wireless access small node, including any combination of the two wireless access small nodes.
本发明实施例还提供了一种宏基站(MNB),至少包括第二无线回程链路处理模块,设置为:执行与初始接入节点之间的端到端无线回程链路接入层安全。The embodiment of the present invention further provides a macro base station (MNB), which includes at least a second wireless backhaul link processing module, configured to perform end-to-end wireless backhaul link access layer security with an initial access node.
可选地,Optionally,
所述第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护;The second wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node;
所述第二无线回程链路处理模块通过以下方式执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护:在所述MNB的PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端无线回程链路接入层安全。 The second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with an initial access node by: PDCP-s layer and location at the MNB The end-to-end wireless backhaul link access layer security is performed between the PDCP-s layers of the initial access node.
此外,本发明实施例还提供一种可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现所述的实现接入层安全的方法。In addition, an embodiment of the present invention further provides a readable storage medium, where computer executable instructions are stored, and the method for implementing access layer security is implemented when the computer executable instructions are executed.
本申请技术方案包括:执行UE与初始接入节点之间的端到端无线接入链路接入层安全;以及执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全;其中,UE经过至少两段无线空中接口与核心网通信的通信路径;该通信路径中,至少包括UE、初始接入节点、网关节点;当通信路径包括两段无线空中接口时,UE与初始接入节点之间通过无线接入链路通信,初始接入节点与网关节点之间通过无线回程链路通信。一方面,无论UE的通信路径中经过多少个中间路由节点,无线回程链路安全只在网关节点与初始接入节点之间端到端执行,很好地保证了用户面数据在无线回程链路中传输时的安全,避免了因为经过多段空中接口也即经过多个中间路由节点导致的安全泄露隐患;另一方面,无线接入链路安全在UE和初始接入节点之间端到端执行,在保证了无线接入链路传输安全的基础上,不需要对使用LTE技术的UE做任何修改,保证了后向兼容性。The technical solution of the present application includes: performing end-to-end wireless access link access layer security between the UE and the initial access node; and performing end-to-end wireless backhaul link access between the initial access node and the gateway node Layer security; wherein the UE communicates with the core network through at least two wireless air interfaces; the communication path includes at least a UE, an initial access node, and a gateway node; when the communication path includes two wireless air interfaces, the UE The wireless communication link is communicated with the initial access node, and the initial access node communicates with the gateway node through a wireless backhaul link. On the one hand, no matter how many intermediate routing nodes pass through the communication path of the UE, the wireless backhaul link security is only performed end-to-end between the gateway node and the initial access node, which ensures that the user plane data is on the wireless backhaul link. The security during transmission avoids the security leakage caused by multiple air interfaces, that is, through multiple intermediate routing nodes; on the other hand, the wireless access link security is performed end-to-end between the UE and the initial access node. On the basis of ensuring the security of the wireless access link transmission, it is not necessary to make any modification to the UE using the LTE technology, and the backward compatibility is ensured.
本申请的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present application will be set forth in the description which follows. The objectives and other advantages of the present invention can be realized and obtained by the structure of the invention.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the present application, and are intended to be a part of this application. In the drawing:
图1为传统蜂窝无线接入网络的网络拓扑示意图;1 is a schematic diagram of a network topology of a conventional cellular radio access network;
图2为在传统蜂窝无线接入网络的特定区域内部署UDN的示意图;2 is a schematic diagram of deploying a UDN in a specific area of a conventional cellular radio access network;
图3为未来一定区域内的超密集网络部署示意图;Figure 3 is a schematic diagram of ultra-dense network deployment in a certain area in the future;
图4为相关技术中LTE系统的安全层级示意图; 4 is a schematic diagram of a security level of an LTE system in the related art;
图5为图4所示的安全层级示意图对应在LTE系统协议栈中的实现分布图;5 is a schematic diagram of an implementation of a security hierarchy diagram shown in FIG. 4 corresponding to an LTE system protocol stack;
图6为本发明实施例的实现接入层安全的方法的流程图;FIG. 6 is a flowchart of a method for implementing access layer security according to an embodiment of the present invention;
图7为本发明实施例的实现接入层安全的一个应用场景的示意图;FIG. 7 is a schematic diagram of an application scenario for implementing access layer security according to an embodiment of the present invention;
图8为本发明实施例的实现接入层安全的另一个应用场景的示意图;FIG. 8 is a schematic diagram of another application scenario for implementing access layer security according to an embodiment of the present invention;
图9为本发明实施例的实现接入层安全的一种安全协议架构;FIG. 9 is a schematic diagram of a security protocol for implementing access layer security according to an embodiment of the present invention;
图10为本发明实施例的实现接入层安全的另一种安全协议架构;FIG. 10 is another security protocol architecture for implementing access layer security according to an embodiment of the present invention;
图11为本发明实施例基于图7所示应用场景的实现端到端无线回程链路接入层安全的密钥生成实施流程图;FIG. 11 is a flowchart of implementing key generation for implementing an end-to-end wireless backhaul link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention;
图12为本发明实施例基于图7所示应用场景的实现端到端无线接入链路接入层安全的密钥生成第一实施流程图;FIG. 12 is a flowchart of a first implementation of key generation for implementing an end-to-end wireless access link access layer security based on the application scenario shown in FIG. 7 according to an embodiment of the present invention; FIG.
图13为本发明实施例基于图7所示应用场景的实现端到端无线接入链路接入层安全的密钥生成第二实施流程图;FIG. 13 is a flowchart of a second implementation of key generation for implementing an end-to-end wireless access link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention; FIG.
图14为本发明实施例的用户设备的组成结构示意图;FIG. 14 is a schematic structural diagram of a user equipment according to an embodiment of the present invention;
图15为本发明实施例的无线接入小节点的组成结构示意图。FIG. 15 is a schematic structural diagram of a structure of a wireless access small node according to an embodiment of the present invention.
本发明的实施方式Embodiments of the invention
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
为了满足未来10年上千倍业务量增长的预期,UDN将被广泛部署以承担大量业务流量。UDN可以被部署在室内、室外热点区域或者任何有大业务量需求的区域。图3为未来一定区域内的超密集网络部署示意图,考虑到实际部署网络的基础设施限制,比如在所示区域内有线网络端口数目有限,以及为不增加部署和运营网络的CAPEX和OPEX,实现灵活快捷部署该网络,如图3所示的7个SRAN-node中,只有小节点303和小节点309所部署的位置有有线网络端口,即可以通过图3中的粗黑实线所示的有线回程连接到核心网设备、运营管理维护(OAM,Operation Administration and  Maintenance)设备等,如小节点303可以连接到设备302,而小节点309可以连接到设备301。图3中,其他的5个小节点所部署的位置均没有有线网络端口,因此,这些小节点只能通过自身与周围其他小节点之间的无线回程链路(如图3中的虚线所示),经过一跳无线回程链路或者多跳无线回程链路连接到小节点303或小节点309,最终通过小节点303或小节点309的有线端口连接到核心网设备、OAM设备等。相应地,在图3所示的网络部署中,必然导致很多UE的通信数据需要经过两段甚至两段以上的空口传输,比如:以图3中的UE 310为例,UE310与设备301之间的通信数据需要经过两段空口的传输,即经过与小节点306之间的无线接入链路(如图3中的闪电线所示),以及小节点306与小节点309之间的无线回程链路来实现与设备301之间的通信。再如:图3中的UE 311与设备301之间的通信数据则需要经过三段空口传输,即经过与小节点307之间的无线接入链路,以及小节点307与小节点306之间的无线回程链路和小节点306与小节点309之间的无线回程链路来实现与设备301之间的通信。In order to meet the expectations of thousands of times of business growth in the next 10 years, UDN will be widely deployed to undertake a large amount of business traffic. UDNs can be deployed indoors, outdoors, hotspots, or any area with large traffic demands. Figure 3 is a schematic diagram of ultra-dense network deployment in a certain area in the future, taking into account the infrastructure limitations of the actual deployment network, such as the limited number of wired network ports in the indicated area, and the implementation of CAPEX and OPEX without increasing the deployment and operation network. The network is deployed flexibly and quickly. As shown in FIG. 3, only the small node 303 and the small node 309 are deployed with wired network ports, which can be indicated by the thick black solid line in FIG. Wired backhaul to core network equipment, operations management and maintenance (OAM, Operation Administration and Maintenance, etc., such as small node 303 can be connected to device 302, and small node 309 can be connected to device 301. In Figure 3, the other five small nodes are deployed without wired network ports. Therefore, these small nodes can only pass the wireless backhaul link between themselves and other small nodes around them (as shown by the dotted line in Figure 3). ), connected to the small node 303 or the small node 309 via a one-hop wireless backhaul link or a multi-hop wireless backhaul link, and finally connected to the core network device, the OAM device, etc. through the wired port of the small node 303 or the small node 309. Correspondingly, in the network deployment shown in FIG. 3, the communication data of many UEs must be transmitted through two or more air interfaces. For example, the UE 310 in FIG. 3 is taken as an example, and between the UE 310 and the device 301. The communication data needs to be transmitted through two air interfaces, that is, through a wireless access link with the small node 306 (as shown by the lightning line in FIG. 3), and the wireless backhaul between the small node 306 and the small node 309. The link is to enable communication with device 301. For another example, the communication data between the UE 311 and the device 301 in FIG. 3 needs to be transmitted through three air interfaces, that is, through a wireless access link with the small node 307, and between the small node 307 and the small node 306. The wireless backhaul link and the wireless backhaul link between the small node 306 and the small node 309 enable communication with the device 301.
图4为相关技术中长期演进(LTE,Long Term Evolution)系统的安全层级示意图,图5为图4所示的安全层级示意图对应在LTE系统协议栈中的实现分布图,图5中,斜线阴影部分表示控制面,灰阴影部分表示用户面。如图5所示,同时示出了用户面协议栈和控制面协议栈,对核心网设备(如移动管理实体/服务网关/数据网关(MME/S-GW/P-GW))而言,这些设备在物理上可以位于同一个物理设备,但逻辑上实现不同的逻辑功能,如图5中最右侧的核心网设备协议栈架构中,控制面协议栈非接入层(NAS,Non-Access Stratum)和网络间协议/流控制传输协议(IP/SCTP)在MME上实现,而用户面协议栈应用层协议(APP)和网络间协议/用户数据报协议/用户面隧道协议(IP/UDP/GTP-U)在S-GW/P-GW上实现。根据图4所示,为了保证LTE系统的通信安全,LTE系统会执行三个安全操作,即鉴权和密钥协商(AKA,Authentication and Key Agreement)、非接入层安全密钥协商(NAS SMC,Non-Access Stratum Security Mode Command)、接入层安全密钥协商(AS SMC,Access Stratum Security Mode Command)。4 is a schematic diagram of a security hierarchy of a Long Term Evolution (LTE) system in the related art, and FIG. 5 is a schematic diagram of a security hierarchy diagram shown in FIG. 4 corresponding to an implementation profile in an LTE system protocol stack, and FIG. 5 is a diagonal line. The shaded portion represents the control surface and the gray shaded portion represents the user plane. As shown in FIG. 5, the user plane protocol stack and the control plane protocol stack are also shown. For the core network device (such as the mobility management entity/service gateway/data gateway (MME/S-GW/P-GW)), These devices can be physically located on the same physical device, but logically implement different logical functions, as shown in the rightmost core network device protocol stack architecture in Figure 5, the control plane protocol stack non-access layer (NAS, Non-- Access Stratum) and Inter-Network Protocol/Flow Control Transmission Protocol (IP/SCTP) are implemented on the MME, while User Interface Protocol Stack Application Layer Protocol (APP) and Inter-Network Protocol/User Datagram Protocol/User-side Tunneling Protocol (IP/) UDP/GTP-U) is implemented on the S-GW/P-GW. According to FIG. 4, in order to ensure communication security of the LTE system, the LTE system performs three security operations, namely, authentication and key agreement (AKA), and non-access layer security key negotiation (NAS SMC). , Non-Access Stratum Security Mode Command), Access Stratum Security Mode Command (AS SMC).
如图4所示,位于UE侧的UE的全球用户身份模块(USIM,Universal  Subscriber Identity Module)上会保存有一个安全根密钥K,位于网络侧的鉴权中心(AuC,Authentication Center)设备中也会保存有这个相同的安全根密钥K,这样,在AKA过程中,首先,UE和网络侧的用户归属服务器(HSS,Home Subscriber server)会分别根据上述保存的安全根密钥K,计算出加密密钥(CK,Cipher Key)和完整性密钥(IK,Integrity Key);然后,UE和HSS再分别根据所生成的CK、IK计算得到安全管理密钥KASME,安全管理密钥KASME是后续NAS层安全和AS层安全的根密钥。在AKA过程中,除了上述生成安全管理密钥KASME,UE和HSS之间还完成相互之间的身份认证,以确保对方设备的合法性。As shown in FIG. 4, a secure root key K is stored in the Universal Subscriber Identity Module (USIM) of the UE on the UE side, and is located in an Authentication Center (AuC) device on the network side. The same security root key K is also saved, so that in the AKA process, first, the UE and the home subscriber server (HSS, Home Subscriber server) on the network side calculate according to the saved secure root key K, respectively. Encryption key (CK, Cipher Key) and integrity key (IK, Integrity Key); then, the UE and the HSS calculate the security management key K ASME and the security management key K according to the generated CK and IK, respectively. ASME is the root key for subsequent NAS layer security and AS layer security. In the AKA process, in addition to generating the security management key K ASME as described above, the UE and the HSS also complete identity authentication with each other to ensure the legitimacy of the other device.
完成了AKA过程后,UE和位于网络侧的移动管理实体(MME,Mobility Management Entity)之间就可以执行NAS SMC过程。具体包括:UE和MME根据AKA过程中生成的安全管理密钥KASME派生出NAS层完整性密钥KNAS  int和NAS层安全密钥KNAS enc。对应于图5的LTE系统协议栈,NAS层安全在UE侧的NAS协议层和MME侧的NAS协议层之间端到端实现,UE和MME的NAS层信令在传给对端之前,会用NAS层完整性密钥KNAS int、NAS层安全密钥KNAS enc进行完整性保护和加密,以保证NAS信令的安全性。After the AKA process is completed, the NAS SMC process can be performed between the UE and the mobility management entity (MME, Mobility Management Entity) located on the network side. Specifically, the UE and the MME derive a NAS layer integrity key K NAS int and a NAS layer security key K NAS enc according to the security management key K ASME generated in the AKA process. Corresponding to the LTE system protocol stack of FIG. 5, the NAS layer security is implemented end-to-end between the NAS protocol layer on the UE side and the NAS protocol layer on the MME side. Before the NAS layer signaling of the UE and the MME is transmitted to the peer end, Integrity protection and encryption are performed with the NAS layer integrity key K NAS int and the NAS layer security key K NAS enc to ensure the security of the NAS signaling.
在NAS SMC过程中,MME还基于安全管理密钥KASME和NAS层的上行NAS计数值(uplink NAS COUNT),计算生成AS层的根密钥KeNB,并将AS层的根密钥KeNB通知给UE所接入的基站(eNB),此后在eNB和UE之间可以执行AS SMC过程,以保证UE和eNB之间的无线接入空中接口(Uu口)的安全性。具体包括:UE和eNB根据KeNB派生出Uu口控制面的完整性密钥KRRC int和Uu口控制面的安全密钥KRRC enc,派生出Uu口用户面的安全密钥KUP enc,对于通信双方为中继设备(relay)和eNB的情况(为了方便区分,相关技术中将relay和eNB之间的接口称为Un接口),还可以派生出空中接口Un口的用户面完整性密钥KUP int。对应于图5的LTE系统协议栈,AS层安全在图5所示的UE侧的数据包汇聚协议(PDCP,Packet Data Convergence Protocol)层和eNB侧的PDCP协议层之间端到端实现。UE和eNB的无线资源控制(RRC,Radio Resource Control)层信令在传输给对端之前,会在PDCP层用Uu口控制面的完整性密钥KRRC int、Uu口控制面的安 全密钥KRRC enc进行完整性保护和加密;UE的上层数据和上层NAS层信令等在传输给eNB之前,以及eNB在将来自S1接口的数据和信令等传输给UE之前,会在PDCP层用Uu口用户面的安全密钥KUP enc进行加密,对于Un口传输的情况,这些数据和信令还会在PDCP层用Un口的用户面完整性密钥KUP int进行完整性保护。通过AS层安全,保证了信息在无线空口传输的安全性。Root key K eNB during the NAS SMC, the MME is also based on the uplink NAS count value (uplink NAS COUNT) security management key K ASME and the NAS layer, calculates and generates a root key K eNB layer AS, and the AS layer The base station (eNB) to which the UE is connected is notified, and then the AS SMC process can be performed between the eNB and the UE to ensure the security of the air access air interface (Uu port) between the UE and the eNB. Specifically, the UE and the eNB derive the integrity key K RRC int of the Uu interface control plane and the security key K RRC enc of the Uu interface control plane according to the K eNB , and derive the security key K UP enc of the Uu interface user plane. For the case where the communication parties are relays and eNBs (for the sake of convenience, the interface between the relay and the eNB is called the Un interface), and the user plane integrity of the air interface Un interface can also be derived. Key K UP int . Corresponding to the LTE system protocol stack of FIG. 5, the AS layer security is implemented end-to-end between the Packet Data Convergence Protocol (PDCP) layer on the UE side and the PDCP protocol layer on the eNB side as shown in FIG. The radio resource control (RRC) layer signaling of the UE and the eNB uses the Uu interface control plane integrity key K RRC int and the Uu interface control plane security key at the PDCP layer before transmitting to the peer end. K RRC enc performs integrity protection and encryption; the upper layer data of the UE and the upper layer NAS layer signaling are transmitted to the eNB before the eNB transmits the data and signaling from the S1 interface to the UE before the PDCP layer. The security key K UP enc of the user interface of the Uu interface is encrypted. For the Un port transmission, the data and signaling are also integrity protected at the PDCP layer by using the user plane integrity key K UP int of the Un interface. Security through the AS layer ensures the security of information transmission over the wireless air interface.
图6为本发明实施例的实现接入层安全的方法的流程图,如图6所示,所述方法包括以下步骤:FIG. 6 is a flowchart of a method for implementing access layer security according to an embodiment of the present invention. As shown in FIG. 6, the method includes the following steps:
步骤600:UE/初始接入节点与核心网之间实现AKA过程和NAS层安全过程。本步骤的具体实现属于本领域技术人员的公知技术,具体实现并不用于限定本申请的保护范围,这里不再赘述。Step 600: Implement an AKA process and a NAS layer security process between the UE/initial access node and the core network. The specific implementation of this step is well-known to those skilled in the art, and the specific implementation is not limited to the scope of protection of the present application, and details are not described herein again.
步骤601:执行UE与初始接入节点之间的端到端无线接入链路接入层安全;以及执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全。Step 601: Perform end-to-end wireless access link access layer security between the UE and the initial access node; and perform end-to-end wireless backhaul link access layer security between the initial access node and the gateway node.
其中,UE经过至少两段无线空中接口与核心网通信的通信路径;该通信路径中,至少包括UE、初始接入节点、网关节点;The communication path of the UE communicating with the core network through at least two wireless air interfaces; the communication path includes at least a UE, an initial access node, and a gateway node;
当通信路径包括两段无线空中接口时,UE与初始接入节点之间通过无线接入链路通信,初始接入节点与网关节点之间通过无线回程链路通信。When the communication path includes two wireless air interfaces, the UE communicates with the initial access node through a wireless access link, and the initial access node communicates with the gateway node through a wireless backhaul link.
可选地,Optionally,
当所述通信路径包括大于两段无线空中接口时,通信路径中还包括至少一个中间路由节点;When the communication path includes more than two wireless air interfaces, the communication path further includes at least one intermediate routing node;
当通信路径中包括一个中间路由节点时,初始接入节点与中间路由节点之间通过无线回程链路通信,中间路由节点与所述网关节点之间通过无线回程链路通信;When an intermediate routing node is included in the communication path, the initial access node communicates with the intermediate routing node through a wireless backhaul link, and the intermediate routing node communicates with the gateway node through a wireless backhaul link;
当通信路径中包括两个或两个以上中间路由节点时,中间路由节点之间通过无线回程链路通信。When two or more intermediate routing nodes are included in the communication path, the intermediate routing nodes communicate via a wireless backhaul link.
其中,among them,
初始接入节点为UE通过无线接入链路接入的无线接入小节点; The initial access node is a wireless access small node that the UE accesses through the wireless access link;
网关节点为能够通过有线接口接入核心网的无线接入小节点或宏基站;The gateway node is a wireless access small node or a macro base station capable of accessing the core network through a wired interface;
中间路由节点为实现初始接入节点和网关节点之间的通信从而最终实现接入初始接入节点的UE与核心网之间的通信提供中继传输的无线接入小节点。The intermediate routing node is a wireless access small node that implements communication between the initial access node and the gateway node to finally provide relay transmission for communication between the UE accessing the initial access node and the core network.
其中,among them,
网关节点与初始接入节点之间的端到端无线回程链路接入层安全,用于确保信息在UE的通信路径中的无线回程接口(Ub接口)上传输时的安全性,即确保了信息在无线回程链路上传输时的安全性;而UE与初始接入节点之间的端到端无线接入链路接入层安全过程,用于确保信息在UE的通信路径中的无线接入空中接口(Uu接口)上传输时的安全性,即确保了信息在无线接入链路上传输时的安全性。The end-to-end wireless backhaul link access layer security between the gateway node and the initial access node is used to ensure the security of the information transmitted on the wireless backhaul interface (Ub interface) in the communication path of the UE, that is, the security is ensured. Security when information is transmitted over the wireless backhaul link; and the end-to-end wireless access link access layer security procedure between the UE and the initial access node is used to ensure wireless connection of information in the UE's communication path The security when transmitting over the air interface (Uu interface) ensures the security of the information as it travels over the wireless access link.
本步骤中,In this step,
执行UE与初始接入节点之间的端到端无线接入链路接入层安全过程包括:执行UE与初始接入节点之间的端到端无线接入链路接入层安全过程之间的端到端的无线接入链路用户面加密,以及执行UE与初始接入节点之间的端到端的无线接入链路控制面加密和控制面完整性保护;Performing an end-to-end wireless access link access layer security procedure between the UE and the initial access node includes: performing an end-to-end wireless access link access layer security process between the UE and the initial access node End-to-end wireless access link user plane encryption, and end-to-end wireless access link control plane encryption and control plane integrity protection between the UE and the initial access node;
执行网关节点与初始接入节点之间的端到端无线回程链路接入层安全过程包括:执行网关节点与初始接入节点之间的端到端用户面加密和用户面完整性保护。The end-to-end wireless backhaul link access layer security process between the execution gateway node and the initial access node includes performing end-to-end user plane encryption and user plane integrity protection between the gateway node and the initial access node.
从本发明实施例的方法可见,包括了执行网关节点与初始接入节点之间的端到端无线回程链路接入层安全以及初始接入节点与UE之间的端到端无线接入链路接入层安全的双链路安全过程。It can be seen from the method of the embodiment of the present invention that the end-to-end wireless backhaul link access layer security between the execution gateway node and the initial access node and the end-to-end wireless access chain between the initial access node and the UE are included. Secure dual-link security process at the access layer.
图7为本发明实施例的实现接入层安全的一个应用场景的示意图,基于图3所示,在未来的网络中,UE与核心网之间的通信数据需要经过两段甚至两段以上的空口传输。如图7所示,假设一个UE经过三段空中接口与核心网通信,UE通过无线接入链路接入无线接入小节点1(SRAN-node1),将SRAN-node1称为初始接入节点(FAN,First Access Node),UE和SRAN-node1之间的接口即为无线接入空中接口即Uu接口。图7中, SRAN-node1无法通过有线接口(或者没有有线接口)直接接入核心网,SRAN-node1通过无线回程链路与无线接入小节点2(SRAN-node2)通信,将SRAN-node2称为中间路由节点,SRAN-node1和SRAN-node2之间的接口称为无线回程接口即Ub接口。SRAN-node2也无法通过有线接口直接接入核心网,SRAN-node2通过无线回程链路与无线接入小节点3(SRAN-node3)通信,而SRAN-node3可以通过有线接口直接接入核心网,将SRAN-node3称为网关节点,SRAN-node2和SRAN-node3之间的接口同样称为Ub接口。SRAN-node3与核心网(EPC,Evolved Packet Core)之间通过有线接口直接连接,承载在该有线接口上的SRAN-node3和EPC之间的逻辑接口为LTE相关技术中的S1接口。中间路由节点为实现初始接入节点和网关节点之间的通信从而最终实现接入初始接入节点的UE与核心网设备之间的通信提供中继传输。FIG. 7 is a schematic diagram of an application scenario for implementing access layer security according to an embodiment of the present invention. According to FIG. 3, in a future network, communication data between a UE and a core network needs to pass two or more segments. Air interface transmission. As shown in FIG. 7, it is assumed that one UE communicates with the core network through three air interfaces, and the UE accesses the wireless access small node 1 (SRAN-node1) through the wireless access link, and refers to SRAN-node1 as the initial access node. (FAN, First Access Node), the interface between the UE and SRAN-node1 is the wireless access air interface, that is, the Uu interface. In Figure 7, SRAN-node1 cannot directly access the core network through a wired interface (or no wired interface). SRAN-node1 communicates with the wireless access small node 2 (SRAN-node2) through a wireless backhaul link, and refers to SRAN-node2 as an intermediate routing node. The interface between SRAN-node1 and SRAN-node2 is called the wireless backhaul interface, that is, the Ub interface. SRAN-node2 cannot directly access the core network through the wired interface. SRAN-node2 communicates with the wireless access small node 3 (SRAN-node3) through the wireless backhaul link, and the SRAN-node3 can directly access the core network through the wired interface. SRAN-node3 is called a gateway node, and the interface between SRAN-node2 and SRAN-node3 is also called a Ub interface. The SRAN-node 3 and the Evolved Packet Core (EPC) are directly connected through a wired interface. The logical interface between the SRAN-node 3 and the EPC carried on the wired interface is the S1 interface in the LTE related technology. The intermediate routing node provides relay transmission for realizing communication between the initial access node and the gateway node to finally implement communication between the UE accessing the initial access node and the core network device.
图7中仅以UE经过三段空中接口(一段Uu接口和两段Ub接口)与核心网通信为例进行说明,在未来网络中,UE也可能经过两段空中接口(一段Uu接口和一段Ub接口)与核心网通信,或者UE可能经过超过三段空中接口(一段Uu接口和n段Ub接口(n>2))与核心网通信。也就是说,UE经过至少两段无线空中接口与核心网通信,UE经过至少两段无线空中接口与核心网通信的通信路径中,至少包括UE、初始接入节点、网关节点;其中,两段无线空中接口包括:UE和初始接入节点之间的无线接入空中接口(Uu口)和初始接入节点与网关节点之间的无线回程接口(Ub口)。当UE经过大于两段无线空中接口与核心网通信时,通信路径中还包括至少一个中间路由节点,此时,大于两段无线空中接口包括:UE和初始接入节点之间的Uu口、初始接入节点和中间路由节点之间的Ub口、中间路由节点和网关节点之间的Ub口;可选地,如果有超过两个中间路由节点时,还包括中间路由节点之间的Ub口。In Figure 7, only the UE communicates with the core network through three air interfaces (a Uu interface and two Ub interfaces). In the future network, the UE may also pass through two air interfaces (a Uu interface and a Ub). The interface communicates with the core network, or the UE may communicate with the core network via more than three air interfaces (a segment of Uu interface and an n-segment Ub interface (n>2)). That is, the UE communicates with the core network through at least two wireless air interfaces, and the communication path of the UE communicating with the core network through at least two wireless air interfaces includes at least a UE, an initial access node, and a gateway node; The wireless air interface includes a radio access air interface (Uu port) between the UE and the initial access node and a wireless backhaul interface (Ub port) between the initial access node and the gateway node. When the UE communicates with the core network through more than two wireless air interfaces, the communication path further includes at least one intermediate routing node. In this case, the two-segment wireless air interface includes: a Uu interface between the UE and the initial access node, and an initial The Ub port between the access node and the intermediate routing node, the intermediate routing node, and the Ub interface between the gateway nodes; optionally, if there are more than two intermediate routing nodes, the Ub interface between the intermediate routing nodes is also included.
对于图7所示的本发明实施例的实现接入层安全的一个应用场景,步骤601中的端到端无线回程链路接入层安全是在网关节点和初始接入节点之间执行的。For an application scenario of implementing access layer security in the embodiment of the present invention shown in FIG. 7, the end-to-end wireless backhaul link access layer security in step 601 is performed between the gateway node and the initial access node.
图8为本发明实施例的实现接入层安全的另一个应用场景的示意图,在 实际应用中,基于图2,未来的超密集网络还有一种场景是部署在有传统蜂窝覆盖的区域内或者在有传统宏蜂窝覆盖的区域边缘。如图8所示,超密集网络的部分小节点部署在宏基站(MNB)的覆盖范围内,比如SRAN-node2,而部分小节点部署在MNB的覆盖的区域边缘,比如SRAN-node1(为图示清晰,图中只示意了两个小节点,未示意其他更多小节点),这些小节点均没有有线回程连接到核心网(CN)设备。其中,SRAN-node2因为在MNB覆盖范围内,因此SRAN-node2可以通过与MNB之间的无线回程接入MNB,再最终接入核心网,而SRAN-node1则只能通过无线回程接入SRAN-node2之后再最终通过MNB接入核心网。图8中,UE通过与SRAN-node1之间的无线接入链路接入网络,也就是说SRAN-node1是初始接入节点,而网关节点则为MNB。FIG. 8 is a schematic diagram of another application scenario for implementing access layer security according to an embodiment of the present invention, where In practical applications, based on Figure 2, there is also a scenario in the future ultra-dense network that is deployed in an area with traditional cellular coverage or at the edge of an area with traditional macrocell coverage. As shown in Figure 8, some small nodes of the ultra-dense network are deployed in the coverage of the macro base station (MNB), such as SRAN-node2, and some small nodes are deployed at the edge of the coverage area of the MNB, such as SRAN-node1. It is clear, only two small nodes are shown in the figure, and no other small nodes are indicated. These small nodes have no wired backhaul to connect to the core network (CN) device. Among them, SRAN-node2 can access the MNB through the wireless backhaul between the MNB and the final access to the core network, and SRAN-node1 can only access the SRAN through the wireless backhaul. Node2 then finally accesses the core network through the MNB. In Figure 8, the UE accesses the network through a radio access link with SRAN-node 1, that is, SRAN-node1 is the initial access node and the gateway node is the MNB.
对于图8所示的本发明实施例的实现接入层安全的另一个应用场景,步骤601中端到端无线回程链路接入层安全是在宏基站和初始接入节点之间执行的。For another application scenario for implementing access layer security in the embodiment of the present invention shown in FIG. 8, the end-to-end wireless backhaul link access layer security in step 601 is performed between the macro base station and the initial access node.
下面针对本发明实施例的不同应用场景,详细描述本发明实施例的方法的具体实现。The specific implementation of the method in the embodiment of the present invention is described in detail below for different application scenarios of the embodiments of the present invention.
图9为本发明实施例的实现接入层安全的一种安全协议架构,在网关节点(如SRAN-node3)和初始接入节点(如SRAN-node1)之间执行端到端的无线回程链路接入层安全(E2E wireless backhaul security),即在网关节点(如SRAN-node3)和初始接入节点(如SRAN-node1)的PDCP-s(PDCP security)协议层之间执行端到端的接入层安全。在E2E wireless backhaul security的两端即网关节点(如SRAN-node3)和初始接入节点(如SRAN-node1)上,即初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:L1物理层、媒体接入控制(MAC,Media Access Control)层、无线链路控制(RLC,Radio Link Control)层、数据包汇聚协议瘦身(PDCP-t)层以及数据包汇聚协议安全(PDCP-s)层。9 is a security protocol architecture for implementing access layer security according to an embodiment of the present invention, performing an end-to-end wireless backhaul link between a gateway node (such as SRAN-node3) and an initial access node (such as SRAN-node1) E2E wireless backhaul security, that is, end-to-end access between the gateway node (such as SRAN-node3) and the PDCP-s (PDCP security) protocol layer of the initial access node (such as SRAN-node1) Layer security. On both ends of the E2E wireless backhaul security, that is, the gateway node (such as SRAN-node3) and the initial access node (such as SRAN-node1), that is, the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul of the gateway node The Ub interface side of the interface includes the L1 physical layer, the medium access control (MAC) layer, the radio link control (RLC) layer, and the packet aggregation protocol (PDCP-t). Layer and Packet Convergence Protocol Security (PDCP-s) layer.
其中,PDCP-s层完成以下功能:头压缩和解压缩,以及安全操作;其中,安全操作,包括加密、解密、完整性保护和完整性验证。其中,PDCP-t层完成相关LTE技术中数据包汇聚协议(PDCP,Packet Data Convergence  Protocol)子层除PDCP-s层功能之外的其他功能,包括:数据传输;PDCP包序列号维护;RLC层重建时向上层按序传递数据包;RLC层重建时,对RLC确认模式数据包的重复包检测和丢弃;基于时间的包丢弃;重复包丢弃。Among them, the PDCP-s layer performs the following functions: header compression and decompression, and security operations; among them, security operations, including encryption, decryption, integrity protection, and integrity verification. The PDCP-t layer completes the packet convergence protocol (PDCP, Packet Data Convergence) in the related LTE technology. Protocol) Other functions of the sublayer except the PDCP-s layer function, including: data transmission; PDCP packet sequence number maintenance; data packets are transmitted to the upper layer in sequence during RLC layer reconstruction; RLC acknowledge mode packets when RLC layer is reconstructed Duplicate packet detection and discarding; time-based packet discarding; repeated packet discarding.
需要说明的是,PDCP-s和PDCP-t层也可以合并成一个协议层实现,合并在一起即为相关LTE技术中的PDCP子层。It should be noted that the PDCP-s and PDCP-t layers can also be combined into one protocol layer implementation, which is the PDCP sublayer in the related LTE technology.
图9中UE通信路径中的所有SRAN-node都采用LTE相关技术。图10为本发明实施例的实现接入层安全的一种安全协议架构,如图10所示,UE通信路径中Ub接口上的相关协议栈也可以采用其他无线通信技术,比如无线局域网(WLAN,Wireless Local Area Networks)技术,如在图10中用网格线填充的方格表示。那么,在网关节点和初始接入节点之间执行端到端的无线回程链路接入层安全,即在网关节点和初始接入节点的PDCP-s协议层之间执行端到端的接入层安全。此时,在E2E wireless backhaul security的两端即网关节点和初始接入节点上,即初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:采用WLAN技术的物理层(PHY)、MAC、逻辑链路控制层(LLC,Logical Link Control)等协议层,以及实现用户面端到端安全的PDCP-s层。PDCP-s层完成的功能同图9的说明,这里不再赘述。All SRAN-nodes in the UE communication path in FIG. 9 adopt LTE related technologies. FIG. 10 is a security protocol architecture for implementing access layer security according to an embodiment of the present invention. As shown in FIG. 10, the related protocol stack on the Ub interface in the UE communication path may also adopt other wireless communication technologies, such as a wireless local area network (WLAN). , Wireless Local Area Networks technology, as indicated by the grid filled with grid lines in Figure 10. Then, end-to-end wireless backhaul link access layer security is performed between the gateway node and the initial access node, that is, end-to-end access layer security is performed between the gateway node and the PDCP-s protocol layer of the initial access node. . At this time, on both ends of the E2E wireless backhaul security, that is, the gateway node and the initial access node, that is, the wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node are respectively from bottom to top. Including: WLAN technology physical layer (PHY), MAC, logical link control layer (LLC, Logical Link Control) and other protocol layers, and implement the user plane end-to-end security PDCP-s layer. The functions performed by the PDCP-s layer are the same as those of FIG. 9, and are not described here.
在执行网关节点和初始接入节点之间的端到端无线回程链路接入层安全时,UE通信路径中的中间路由节点均不参与无线回程链路接入层安全操作,因此,如图10所示,在UE通信路径的中间路由节点如SRAN-node2上,不需要实现PDCP-s协议层,如果UE的通信路径中包括超过一个中间路由节点,所有的中间路由节点在该UE的通信路径上都不需要参与回程链路接入层安全操作,即不需要实现PDCP-s层协议。When the end-to-end wireless backhaul link access layer security between the gateway node and the initial access node is performed, the intermediate routing nodes in the UE communication path do not participate in the wireless backhaul link access layer security operation, therefore, as shown in the figure 10, in the intermediate routing node of the UE communication path, such as SRAN-node2, there is no need to implement the PDCP-s protocol layer. If the communication path of the UE includes more than one intermediate routing node, all intermediate routing nodes communicate with the UE. The path does not need to participate in the security operation of the backhaul link access layer, that is, the PDCP-s layer protocol does not need to be implemented.
如图9所示,中间路由节点(如SRAN-node2)为实现在UE通信路径中与初始接入节点(如SRAN-node1)之间的Ub1接口通信以及和网关节点(如SRAN-node3)之间的Ub2接口通信,在Ub1接口端和Ub2接口端,从下到上分别包括:L1、MAC、RLC等协议层。可选地,还可以包括PDCP-t协议层。如图10所示,中间路由节点(如SRAN-node2)为实现在UE通信路径 中与初始接入节点(如SRAN-node1)之间的Ub1接口通信以及和网关节点(如SRAN-node3)之间的Ub2接口通信,在Ub1接口端和Ub2接口端,从下到上分别包括:采用WLAN技术的PHY、MAC、LLC等协议层。As shown in FIG. 9, the intermediate routing node (such as SRAN-node2) implements Ub1 interface communication with the initial access node (such as SRAN-node1) in the UE communication path and with the gateway node (such as SRAN-node3). The Ub2 interface communicates between the Ub1 interface and the Ub2 interface, and includes protocol layers such as L1, MAC, and RLC from bottom to top. Optionally, a PDCP-t protocol layer may also be included. As shown in Figure 10, the intermediate routing node (such as SRAN-node2) implements the communication path in the UE. The Ub1 interface communication between the intermediate access node (such as SRAN-node1) and the Ub2 interface communication between the gateway node (such as SRAN-node3) is included in the Ub1 interface and the Ub2 interface, respectively from bottom to top. : PHY, MAC, LLC and other protocol layers using WLAN technology.
以图7所示的应用场景为例,执行网关节点和初始接入节点之间的端到端无线回程链路接入层安全过程包括:执行网关节点和初始接入节点之间的端到端用户面加密和用户面完整性保护。具体而言,如图10所示,UE的上层用户面数据,具体UE的上层用户面数据是指来自UE的PDCP层以上的协议层的数据,比如如图10中的UE的应用层(APP)数据、UE的NAS层信令,在通过Uu接口发送给初始接入节点如SRAN-node1之后,SRAN-node1在将UE的用户面数据发送到无线回程接口Ub口之前,需要在PDCP-s层执行加密和完整性保护,待数据发送到网关节点SRAN-node3之后,由SRAN-node3在PDCP-s层进行解密和完整性验证;同样,网关节点如SRAN-node3从核心网的S-GW/P-GW获取到需要发送给UE的用户面数据,SRAN-node3在发送到无线回程接口Ub口之前,需要在PDCP-s层执行加密和完整性保护,数据发送到初始接入节点如SRAN-node1后,由SRAN-node1在PDCP-s层进行解密和完整性验证。这里,网关节点可以是宏基站。也就是说,所有用户面数据在第一次进入无线回程接口传输之前,均会执行端到端用户面加密和用户面完整性保护,从而确保了用户面数据在无线回程接口中传输时的安全性。Taking the application scenario shown in FIG. 7 as an example, the end-to-end wireless backhaul link access layer security process between the gateway node and the initial access node includes: performing end-to-end between the gateway node and the initial access node. User plane encryption and user plane integrity protection. Specifically, as shown in FIG. 10, the upper layer user plane data of the UE, the upper layer user plane data of the specific UE refers to the data of the protocol layer from the PDCP layer of the UE, such as the application layer of the UE in FIG. 10 (APP). The data, the NAS layer signaling of the UE, after being sent to the initial access node such as SRAN-node1 through the Uu interface, the SRAN-node1 needs to be in the PDCP-s before transmitting the user plane data of the UE to the wireless backhaul interface Ub port. The layer performs encryption and integrity protection. After the data is sent to the gateway node SRAN-node3, it is decrypted and integrity verified by the SRAN-node3 at the PDCP-s layer. Similarly, the gateway node such as SRAN-node3 is from the S-GW of the core network. The /P-GW obtains the user plane data that needs to be sent to the UE. Before sending the SRAN-node3 to the Ub interface of the wireless backhaul interface, the SRAN-node3 needs to perform encryption and integrity protection at the PDCP-s layer, and the data is sent to the initial access node such as SRAN. After -node1, decryption and integrity verification is performed by SRAN-node1 at the PDCP-s layer. Here, the gateway node may be a macro base station. That is to say, all user plane data will perform end-to-end user plane encryption and user plane integrity protection before the first time entering the wireless backhaul interface transmission, thus ensuring the security of user plane data transmission in the wireless backhaul interface. Sex.
图11为本发明实施例基于图7所示应用场景的实现端到端无线回程链路接入层安全的密钥生成实施流程图。通过图11所示的安全密钥生成方法,可以生成本发明实施例中执行网关节点和初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint。在图11所示的实施例中,每个小节点均具有自己的通用集成电路卡(UICC,Universal Integrated Circuit Card),像UE一样,UICC卡中的全球用户身份模块(USIM)上会保存有一个安全根密钥K,网络侧鉴权中心(AuC)设备中也会保存有该USIM卡相同的安全根密钥。因此,利用这个根密钥,采取图4所示的类似UE的安全过程,图11生成网关节点(如SRAN-node3)和初始接入节点(如 SRAN-node1)之间的端到端无线回程链路用户面加密和用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint的过程具体包括:FIG. 11 is a flowchart of implementing key generation for implementing an end-to-end wireless backhaul link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention. The security key generation method shown in FIG. 11 can generate the wireless required for performing end-to-end wireless backhaul link user plane encryption and user plane integrity protection between the gateway node and the initial access node in the embodiment of the present invention. The backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint . In the embodiment shown in FIG. 11, each small node has its own Universal Integrated Circuit Card (UICC). Like the UE, the Global Subscriber Identity Module (USIM) in the UICC card is saved. A secure root key K, the same secure root key of the USIM card is also stored in the network side authentication center (AuC) device. Therefore, with this root key, the UE-like security procedure shown in Figure 4 is taken, and Figure 11 generates an end-to-end wireless backhaul between the gateway node (such as SRAN-node3) and the initial access node (such as SRAN-node1). The process of the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint required for link user plane encryption and user plane integrity protection specifically includes:
步骤1100:SRAN-node1和核心网之间执行AKA,执行完AKA之后,在SRAN-node1和核心网设备(如HSS)中分别计算得到安全管理密钥KASMEStep 1100: Perform AKA between SRAN-node1 and the core network. After performing AKA, the security management key K ASME is calculated in SRAN-node1 and the core network device (such as HSS).
本步骤的具体实现与LTE相关技术中UE和核心网之间执行AKA的方法一致,是本领域技术人员容易实现的,并不用于限定本申请的保护范围,这里不再赘述。The specific implementation of this step is consistent with the method for performing AKA between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1101:SRAN-node1和核心网设备(如MME)之间执行NAS层安全过程(NAS SMC),在执行NAS层安全过程之后,在SRAN-node1和MME处生成NAS层安全所需要的安全密钥即NAS层完整性密钥KNAS int和NAS层安全密钥KNAS encStep 1101: Perform a NAS layer security procedure (NAS SMC) between the SRAN-node 1 and the core network device (such as the MME), and generate a security secret required for the NAS layer security at the SRAN-node 1 and the MME after performing the NAS layer security procedure. The key is the NAS layer integrity key K NAS int and the NAS layer security key K NAS enc .
本步骤的具体实现与LTE相关技术中UE和核心网之间执行NAS SMC的方法一致,是本领域技术人员容易实现的,并不用于限定本申请的保护范围,这里不再赘述。The specific implementation of this step is consistent with the method for performing the NAS SMC between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1102:MME将SRAN-node1的安全信息发送给UE通信路径中的网关节点如SRAN-node3。Step 1102: The MME sends the security information of the SRAN-node1 to a gateway node in the UE communication path, such as SRAN-node3.
在NAS层安全过程中,MME除了生成NAS层的安全密钥之外,还基于AKA所生成的安全管理密钥KASME和NAS SMC中所生成的上行NAS计数值(uplink NAS COUNT),计算生成无线回程链路AS层的根密钥KeNB-SRAN-node1(或者记为KeNB-FAN)。然后,MME将SRAN-node1的安全信息发送给SRAN-node3,其中,SRAN-node1 的安全信息包括AS层的根密钥KeNB-SRAN-node1和SRAN-node1的安全能力(SRAN-node1security capability)。其中,SRAN-node1security capability包括SRAN-node1所支持的完整性保护算法和SRAN-node1所支持的加密算法。In the NAS layer security process, in addition to generating the NAS layer security key, the MME calculates and generates the uplink NAS count value (uplink NAS COUNT) generated based on the security management key K ASME generated by the AKA and the NAS SMC. The root key K eNB-SRAN-node1 of the AS layer of the wireless backhaul link (or K eNB-FAN ). Then, the MME sends the security information of the SRAN-node1 to the SRAN-node3, wherein the security information of the SRAN-node1 includes the root key K eNB-SRAN-node1 of the AS layer and the security capability of the SRAN-node1 (SRAN-node1 security capability) . The SRAN-node1 security capability includes an integrity protection algorithm supported by SRAN-node1 and an encryption algorithm supported by SRAN-node1.
步骤1103:网关节点(如SRAN-node3)选择安全算法,生成端到端无线回程链路用户面安全密钥即:无线回程链路用户面完整性保护密钥KUP-Wint 和无线回程链路用户面加密密钥KUP-WencStep 1103: The gateway node (such as SRAN-node3) selects a security algorithm to generate an end-to-end wireless backhaul link user plane security key: wireless backhaul link user plane integrity protection key K UP-Wint and wireless backhaul link User side encryption key K UP-Wenc .
本步骤中,SRAN-node3从SRAN-node1security capability中选择出SRAN-node1所支持的完整性保护算法和加密算法,由AS层的根密钥KeNB-SRAN-node1派生出无线回程链路用户面完整性保护密钥KUP-Wint和无线回程链路用户面加密密钥KUP-Wenc。具体密钥派生算法与LTE相关技术中的方法一致,并不用于限定本申请的保护范围,这里不再赘述。In this step, the SRAN-node3 selects the integrity protection algorithm and the encryption algorithm supported by the SRAN-node1 from the SRAN-node1 security capability, and derives the wireless backhaul link user plane from the root key K eNB-SRAN-node1 of the AS layer. Integrity protection key K UP-Wint and wireless backhaul link user plane encryption key K UP-Wenc . The specific key derivation algorithm is consistent with the method in the LTE related art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1104:网关节点(如SRAN-node3)向SRAN-node1发送E2E无线回程链路接入层安全算法,算法包括步骤1103中SRAN-node3本地派生无线回程链路用户面完整性保护密钥KUP-Wint和无线回程链路用户面加密密钥KUP-Wenc时所采用的接入层完整性保护算法和接入层加密算法。Step 1104: The gateway node (such as SRAN-node3) sends an E2E wireless backhaul link access layer security algorithm to the SRAN-node1. The algorithm includes the SRAN-node3 locally derived wireless backhaul link user plane integrity protection key K UP in step 1103. -Wint and wireless backhaul link user plane encryption key K UP-Wenc used in the access layer integrity protection algorithm and access layer encryption algorithm.
本步骤中,SRAN-node3经由SRAN-node2向SRAN-node1发送E2E无线回程链路接入层安全算法。In this step, SRAN-node3 sends an E2E wireless backhaul link access layer security algorithm to SRAN-node1 via SRAN-node2.
步骤1105:SRAN-node1生成端到端无线回程链路用户面安全密钥即无线回程链路用户面完整性保护密钥KUP-Wint和无线回程链路用户面加密密钥KUP-WencStep 1105: SRAN-node1 generates an end-to-end wireless backhaul link user plane security key, that is, a wireless backhaul link user plane integrity protection key K UP-Wint and a wireless backhaul link user plane encryption key K UP-Wenc .
本步骤中,SRAN-node1由AKA过程生成的安全管理密钥KASME和NAS层安全产生的uplink NAS COUNT生成AS层的根密钥KeNB-SRAN-node1,然后由KeNB-SRAN-node1和步骤1104收到的安全算法派生出无线回程链路用户面完整性保护密钥KUP-Wint和无线回程链路用户面加密密钥KUP-WencIn this step, SRAN-node1 generates the root key K eNB-SRAN-node1 of the AS layer by the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security, and then by K eNB-SRAN-node1 and The security algorithm received in step 1104 derives a wireless backhaul link user plane integrity protection key K UP-Wint and a wireless backhaul link user plane encryption key K UP-Wenc .
步骤1106:SRAN-node1经由SRAN-node2发送E2E无线回程链路接入层安全完成通知给SRAN-node3。Step 1106: SRAN-node1 sends an E2E wireless backhaul link access layer security completion notification to SRAN-node3 via SRAN-node2.
自此,初始接入节点和网关节点之间生成了端到端无线回程链路用户面接入层安全的密钥即无线回程链路用户面完整性保护密钥KUP-Wint和无线回程链路用户面加密密钥KUP-Wenc,初始接入节点和网关节点之间可以执行端到端无线回程链路用户面接入层安全操作。采用图11所示的安全密钥生成方法,无线回程链路的接入层安全密钥不在空中接口上传输,大大降低了无线回程链路的接入层安全密钥的泄露风险。Since then, the end-to-end wireless backhaul link user plane access layer security key is generated between the initial access node and the gateway node, namely the wireless backhaul link user plane integrity protection key K UP-Wint and the wireless backhaul link. The user plane encryption key K UP-Wenc can perform an end-to-end wireless backhaul link user plane access layer security operation between the initial access node and the gateway node. With the security key generation method shown in FIG. 11, the access layer security key of the wireless backhaul link is not transmitted on the air interface, which greatly reduces the risk of leakage of the access layer security key of the wireless backhaul link.
除在网关节点(如SRAN-node3)和初始接入节点(如SRAN-node1)之 间执行端到端的无线回程链路接入层安全(E2E wireless backhaul security)之外,如图10所示,本实施例提供的方法还包括:在初始接入节点和UE之间执行端到端的无线接入链路接入层安全(E2E access link security),即在初始接入节点(如SRAN-node1)和UE的PDCP协议层之间执行端到端的接入层安全。在E2E access link security的两端即初始接入节点(如SRAN-node1)和UE上,从下到上分别包括:L1、MAC、RLC、PDCP等协议层,在PDCP层之上,为用于传输用户面数据的APP层或者用于传输AS层控制面信令的RRC层。需要说明的是,在执行初始接入节点和UE之间的端到端的无线接入链路接入层安全时,UE通信路径中的其他小节点(包括中间路由节点和网关节点)均不参与无线接入链路接入层安全操作。In addition to the gateway node (such as SRAN-node3) and the initial access node (such as SRAN-node1) In addition to the end-to-end wireless backhaul link security layer (E2E wireless backhaul security), as shown in FIG. 10, the method provided in this embodiment further includes: performing end-to-end between the initial access node and the UE. The E2E access link security performs end-to-end access layer security between the initial access node (such as SRAN-node1) and the PDCP protocol layer of the UE. At the two ends of the E2E access link security, that is, the initial access node (such as SRAN-node1) and the UE, the protocol layer such as L1, MAC, RLC, and PDCP is included from the bottom to the top, and is used on the PDCP layer. An APP layer that transmits user plane data or an RRC layer that transmits AS layer control plane signaling. It should be noted that when performing the end-to-end wireless access link access layer security between the initial access node and the UE, other small nodes (including intermediate routing nodes and gateway nodes) in the UE communication path do not participate. The wireless access link access layer operates securely.
以图7所示的应用场景为例,执行初始接入节点和UE之间的端到端的无线接入链路接入层安全包括:执行初始接入节点和UE之间的端到端的无线接入链路用户面加密,以及执行初始接入节点和UE之间的端到端的无线接入链路控制面加密和控制面完整性保护。如图10所示,UE的上层用户面数据(如图10中的UE的应用层APP数据,UE的NAS层信令,以及UE的RRC层控制面信令)在发送到Uu口之前,分别需要在PDCP层执行针对用户面数据的用户面加密以及针对RRC层控制面信令的控制面加密和完整性保护,初始接入节点(如SRAN-node1)接收到用户面数据或RRC层控制面信令后,对用户面数据和RRC层控制面信令进行解密并对RRC层控制面信令完整性验证;同样,SRAN-node1作为UE的初始接入节点,其发送给UE的下行用户面数据和RRC层控制面信令在发送到Uu口之前,也分别需要在PDCP层执行对用户面数据的用户面加密以及对RRC层控制面信令的控制面加密和完整性保护,UE接收到用户面数据或RRC层控制面信令后,对用户面数据和RRC层控制面信令进行解密和对RRC层控制面信令进行完整性验证,从而确保了用户面数据和控制面信令在无线接入链路中传输时的安全性。Taking the application scenario shown in FIG. 7 as an example, performing end-to-end wireless access link access layer security between the initial access node and the UE includes: performing end-to-end wireless connection between the initial access node and the UE. Incoming user plane encryption, and performing end-to-end wireless access link control plane encryption and control plane integrity protection between the initial access node and the UE. As shown in FIG. 10, the upper layer user plane data of the UE (such as the application layer APP data of the UE in FIG. 10, the NAS layer signaling of the UE, and the RRC layer control plane signaling of the UE) are respectively sent before being sent to the Uu port. User plane encryption for user plane data and control plane encryption and integrity protection for RRC layer control plane signaling need to be performed at the PDCP layer, and the initial access node (such as SRAN-node1) receives user plane data or RRC layer control plane. After the signaling, the user plane data and the RRC layer control plane signaling are decrypted and the RRC layer control plane signaling integrity is verified. Similarly, the SRAN-node1 is used as the initial access node of the UE, and the downlink user plane is sent to the UE. Before the data and the RRC layer control plane signaling are sent to the Uu interface, the user plane encryption of the user plane data and the control plane encryption and integrity protection for the RRC layer control plane signaling are respectively performed at the PDCP layer, and the UE receives the After the user plane data or the RRC layer control plane signaling, the user plane data and the RRC layer control plane signaling are decrypted and the RRC layer control plane signaling is integrity verified, thereby ensuring user plane data and control plane signaling. Wireless access link Safety when.
图12为本发明实施例基于图7所示应用场景的实现端到端无线接入链路接入层安全的密钥生成第一实施流程图,通过图12的方法,可以生成本发明实施例中执行初始接入节点和UE之间的端到端无线接入链路接入层安全 所需要的用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCint。如图12所示,上述过程具体包括:FIG. 12 is a flowchart of a first implementation of key generation for implementing an end-to-end wireless access link access layer security based on the application scenario shown in FIG. 7 according to an embodiment of the present invention, by using the method of FIG. The user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key required for performing the end-to-end wireless access link access layer security between the initial access node and the UE Key K RRCint . As shown in FIG. 12, the foregoing process specifically includes:
步骤1200:UE和核心网之间执行AKA,执行完AKA之后,在UE和核心网设备(如HSS)上分别计算得到安全管理密钥KASMEStep 1200: Perform AKA between the UE and the core network. After performing AKA, the security management key K ASME is calculated on the UE and the core network device (such as the HSS).
本步骤的具体实现与LTE相关技术中UE和核心网之间执行AKA的方法一致,是本领域技术人员容易实现的,并不用于限定本申请的保护范围,这里不再赘述。The specific implementation of this step is consistent with the method for performing AKA between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1201:UE和核心网设备(如MME)之间执行NAS SMC,在执行NAS层安全过程之后,在UE和MME处生成了NAS层安全所需要的安全密钥,即NAS层完整性密钥KNAS int和NAS层安全密钥KNAS encStep 1201: The NAS SMC is executed between the UE and the core network device (such as the MME). After performing the NAS layer security process, the security key required for the NAS layer security is generated at the UE and the MME, that is, the NAS layer integrity key. K NAS int and NAS layer security key K NAS enc .
本步骤的具体实现与LTE相关技术中UE和核心网之间执行NAS SMC的方法一致,是本领域技术人员容易实现的,并不用于限定本申请的保护范围,这里不再赘述。The specific implementation of this step is consistent with the method for performing the NAS SMC between the UE and the core network in the LTE related technology, and is easily implemented by a person skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1202:MME将UE的安全信息发送给UE通信路径中的网关节点如SRAN-node3。其中,UE的安全信息包括KeNB和UE的安全能力,具体说明与步骤1102类似,对于本领域技术人员来讲是容易实现的,这里不再赘述。Step 1202: The MME sends the security information of the UE to a gateway node in the UE communication path, such as SRAN-node 3. The security information of the UE includes the security capabilities of the K eNB and the UE. The specific description is similar to the step 1102, and is easily implemented by those skilled in the art, and details are not described herein again.
可选地,如果MME获得有UE的初始接入节点为SRAN-node1的信息,那么,MME还可以进一步将SRAN-node1的安全能力信息,即SRAN-node1所支持的完整性保护算法和SRAN-node1所支持的加密算法发送给网关节点。Optionally, if the MME obtains the information that the initial access node of the UE is the SRAN-node1, the MME may further further implement the security capability information of the SRAN-node1, that is, the integrity protection algorithm supported by the SRAN-node1 and the SRAN- The encryption algorithm supported by node1 is sent to the gateway node.
步骤1203:SRAN-node3向UE所接入的初始接入节点(如SRAN-node1)索要SRAN-node1所支持的无线接入链路接入层安全算法,包括接入层完整性保护算法和接入层加密算法。Step 1203: SRAN-node3 requests an initial access node (such as SRAN-node1) accessed by the UE to request a radio access link access layer security algorithm supported by SRAN-node1, including an access layer integrity protection algorithm and Intrusion encryption algorithm.
本步骤中,SRAN-node3向SRAN-node1索要无线接入链路接入层安全算法的消息,SRAN-node1向SRAN-node3发送无线接入链路接入层安全算法的消息经由SRAN-node2发送给对方。In this step, the SRAN-node 3 requests the SRAN-node 1 for the message of the radio access link access layer security algorithm, and the message that the SRAN-node1 sends the radio access link access layer security algorithm to the SRAN-node 3 is sent via the SRAN-node2. Give each other.
如果步骤1202中SRAN-node3已经从MME处获得了SRAN-node1的安 全能力信息,那么在步骤1203中可以省略。If in step 1202, SRAN-node3 has obtained the security of SRAN-node1 from the MME. Full capability information can then be omitted in step 1203.
步骤1204:SRAN-node3生成无线接入链路接入层安全密钥,即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintStep 1204: SRAN-node3 generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
本步骤中,SRAN-node3从UE security capability和所接收到的SRAN-node1所支持的无线接入链路接入层安全算法中,选择出UE和SRAN-node1均支持的完整性保护算法和加密算法,再由AS层的根密钥KeNB派生出无线接入链路接入层安全密钥,即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintIn this step, the SRAN-node3 selects the integrity protection algorithm and encryption supported by the UE and the SRAN-node1 from the UE security capability and the received radio access link access layer security algorithm supported by the SRAN-node1. The algorithm further derives the access key of the wireless access link access layer by the root key K eNB of the AS layer, that is, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection Key K RRCint .
步骤1205:SRAN-node3通知SRAN-node1无线接入链路接入层安全密钥,在通知消息中携带有:无线接入链路接入层安全密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintStep 1205: SRAN-node3 notifies the SRAN-node1 radio access link access layer security key, and the notification message carries: the radio access link access layer security key, that is, the user plane encryption key K UP-Aenc , control plane encryption key K RRCenc , control plane integrity protection key K RRCint .
本步骤中的通知消息经由SRAN-node2发送给SRAN-node1。The notification message in this step is sent to SRAN-node1 via SRAN-node2.
可选地,Optionally,
为了保证无线接入链路接入层安全密钥经由SRAN-node2发送时的安全性,该通知消息在从SRAN-node3发出时,可以利用图10所示的SRAN-node3与SRAN-node1之间的端到端无线回程链路接入层安全进行加密和完整性保护,SRAN-node1收到后再进行解密和完整性验证。其中,SRAN-node2收到该消息后只是转发而已,不参与安全操作;In order to ensure the security when the radio access link access layer security key is transmitted via SRAN-node2, the notification message can be used between SRAN-node3 and SRAN-node1 as shown in FIG. 10 when it is sent from SRAN-node3. The end-to-end wireless backhaul link access layer is securely encrypted and integrity protected, and SRAN-node1 receives the decryption and integrity verification. Among them, SRAN-node2 only forwards the message after receiving the message, and does not participate in security operations;
或者,该通知消息在SRAN-node3与SRAN-node2之间发送以及在SRAN-node2与SRAN-node1之间发送时,均在SRAN-node3与SRAN-node2之间及在SRAN-node2与SRAN-node1之间建立的安全通道上发送,或者通过SRAN-node3与SRAN-node2之间及在SRAN-node2与SRAN-node1之间的接入层安全进行安全保护。Alternatively, the notification message is transmitted between SRAN-node 3 and SRAN-node 2 and between SRAN-node 2 and SRAN-node 1, both between SRAN-node 3 and SRAN-node 2 and at SRAN-node 2 and SRAN-node 1 The security channel is established on the established secure channel or is secured by the access layer between SRAN-node3 and SRAN-node2 and between SRAN-node2 and SRAN-node1.
步骤1206:SRAN-node1向UE发送接入层安全模式命令,命令中携带SRAN-node1所接收到的SRAN-node3派生无线接入链路接入层安全密钥所使用的接入层完整性保护算法和接入层加密算法。Step 1206: SRAN-node1 sends an access layer security mode command to the UE, where the command carries the access layer integrity protection used by the SRAN-node3 derived wireless access link access layer security key received by SRAN-node1. Algorithm and access layer encryption algorithm.
步骤1207:UE生成无线接入链路接入层安全密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintStep 1207: The UE generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
本步骤中,UE利用AKA过程生成的安全管理密钥KASME和NAS层安全产生的uplink NAS COUNT生成AS层的根密钥KeNB,然后由AS层的根密钥KeNB和步骤1206中收到的安全算法派生出无线接入链路接入层安全密钥,即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintIn this step, the UE generates the root key K eNB of the AS layer by using the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security, and then is received by the root key K eNB of the AS layer and step 1206. The obtained security algorithm derives the wireless access link access layer security key, namely the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
步骤1208:UE发送接入层安全模式完成消息给SRAN-node1。Step 1208: The UE sends an access layer security mode complete message to SRAN-node1.
自此,UE和初始接入节点之间生成了端到端无线接入链路接入层安全的密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCint,UE和初始接入节点之间可以执行端到端无线接入链路接入层安全操作。Since then, the end-to-end wireless access link access layer security key is generated between the UE and the initial access node, namely, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane is complete. The security protection key K RRCint , the end-to-end wireless access link access layer security operation can be performed between the UE and the initial access node.
图13为本发明实施例基于图7所示应用场景的实现端到端无线接入链路接入层安全的密钥生成第二实施流程图。通过图13的方法,可以生成本发明实施例中执行初始接入节点和UE之间的端到端无线接入链路接入层安全所需要的用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCint。如图13所示,上述过程具体包括:FIG. 13 is a flowchart of a second implementation of key generation for implementing an end-to-end wireless access link access layer security according to the application scenario shown in FIG. 7 according to an embodiment of the present invention. The user plane encryption key K UP-Aenc and the control plane required for performing the end-to-end wireless access link access layer security between the initial access node and the UE in the embodiment of the present invention can be generated by the method of FIG. Encryption key K RRCenc , control plane integrity protection key K RRCint . As shown in FIG. 13, the foregoing process specifically includes:
步骤1300~步骤1302与图12所示的步骤1200~1202完全一致,这里不再赘述。The steps 1300 to 1302 are completely consistent with the steps 1200 to 1202 shown in FIG. 12, and details are not described herein again.
步骤1303:SRAN-node3接收到UE的安全信息后,由UE所接入的初始接入节点(如SRAN-node1)小区的下行绝对载频号(EARFCN-DL,E-UTRA Absolute Radio Frequency Channel Number)、物理小区标识(PCI,Phisical Cell Identity)和所收到的KeNB派生出无线接入链路接入层的安全根密钥KeNB*Step 1303: After the SRAN-node3 receives the security information of the UE, the downlink absolute carrier frequency of the initial access node (such as SRAN-node1) accessed by the UE (EARFCN-DL, E-UTRA Absolute Radio Frequency Channel Number ), the physical cell identifier (PCI), and the received K eNB derive the secure root key K eNB* of the access layer of the radio access link.
本步骤的具体实现属于本领域技术人员的惯用技术手段,并不用于限定本申请的保护范围,这里不再赘述。The specific implementation of this step is a common technical means for those skilled in the art, and is not intended to limit the scope of protection of the present application, and details are not described herein again.
步骤1304:SRAN-node3将所派生出的无线接入链路接入层的安全根密钥KeNB*发送给SRAN-node1。Step 1304: SRAN-node3 sends the derived secure root key K eNB* of the access layer of the radio access link to SRAN-node1.
可选地,如果SRAN-node1 没有UE的UE security capability,SRAN-node3在此过程中还会将UE security capability发送给SRAN-node1。Optionally, if SRAN-node1 does not have the UE's UE security capability, SRAN-node3 will also send the UE security capability to SRAN-node1 during this process.
本步骤中的消息经由SRAN-node2发送给SRAN-node1。可选地,为了 保证无线接入链路接入层安全根密钥经由SRAN-node2发送时的安全性,该消息在从SRAN-node3发出时,可以利用图10所示的SRAN-node3与SRAN-node1之间的端到端无线回程链路接入层安全进行加密和完整性保护,SRAN-node1收到后再进行解密和完整性验证。其中,SRAN-node2收到该消息后只是转发而已,不参与安全操作;或者,本步骤中的消息在SRAN-node3与SRAN-node2之间发送以及在SRAN-node2与SRAN-node1之间发送时,该消息均在SRAN-node3与SRAN-node2之间及在SRAN-node2与SRAN-node1之间建立的安全通道上发送,或者通过SRAN-node3与SRAN-node2之间及在SRAN-node2与SRAN-node1之间的接入层安全进行安全保护。The message in this step is sent to SRAN-node1 via SRAN-node2. Optionally, in order to The security of the wireless access link access layer secure root key is transmitted via SRAN-node2. When the message is sent from SRAN-node3, the message between SRAN-node3 and SRAN-node1 shown in FIG. 10 can be utilized. The end-to-end wireless backhaul link access layer secures encryption and integrity protection, and SRAN-node1 receives decryption and integrity verification. SRAN-node2 only forwards the message after receiving the message, and does not participate in the security operation; or, the message in this step is sent between SRAN-node3 and SRAN-node2 and is sent between SRAN-node2 and SRAN-node1. The message is sent between SRAN-node3 and SRAN-node2 and on the secure channel established between SRAN-node2 and SRAN-node1, or between SRAN-node3 and SRAN-node2 and between SRAN-node2 and SRAN. The access layer between -node1 is securely secured.
步骤1305:SRAN-node1选择无线接入链路接入层完整性保护算法,接入层加密算法,由无线接入链路接入层的安全根密钥KeNB*派生出无线接入链路接入层安全密钥,即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintStep 1305: SRAN-node1 selects a radio access link access layer integrity protection algorithm, an access layer encryption algorithm, and a radio access link is derived from a secure root key K eNB* of the radio access link access layer. The access layer security key, that is, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
本步骤的相关密钥派生算法与LTE相关技术中的控制面密钥派生算法相同,具体实现并不用于限定本申请的保护范围,这里不再赘述。The related key derivation algorithm in this step is the same as the control plane key derivation algorithm in the LTE related technology, and the specific implementation is not limited to the scope of protection of the present application, and details are not described herein again.
步骤1306:SRAN-node1向UE发送接入层安全模式命令,在接入层安全模式命令命令中携带SRAN-node1派生无线接入链路接入层安全密钥时所选择使用的接入层完整性保护算法和接入层加密算法。Step 1306: SRAN-node1 sends an access layer security mode command to the UE, and the access layer selected to be used when the SRAN-node1 derives the radio access link access layer security key in the access layer security mode command command is complete. Sex protection algorithm and access layer encryption algorithm.
步骤1307:UE生成无线接入链路接入层安全密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintStep 1307: The UE generates a radio access link access layer security key, that is, a user plane encryption key K UP-Aenc , a control plane encryption key K RRCenc , and a control plane integrity protection key K RRCint .
本步骤中,UE利用AKA过程生成的安全管理密钥KASME和NAS层安全产生的uplink NAS COUNT生成AS层的根密钥KeNB;然后,由KeNB、UE所接入的SRAN-node1小区的EARFCN-DL、PCI派生出无线接入链路接入层的安全根密钥KeNB*;最后,UE由KeNB*,使用步骤1306所接收到的接入层完整性保护算法,接入层加密算法派生出无线接入链路接入层安全密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCintIn this step, the UE generates the root key K eNB of the AS layer by using the security management key K ASME generated by the AKA process and the uplink NAS COUNT generated by the NAS layer security; then, the SRAN-node1 cell accessed by the K eNB and the UE EARFCN-DL, PCI derives the secure root key K eNB* of the access layer of the radio access link; finally, the UE is accessed by K eNB* using the access layer integrity protection algorithm received in step 1306. The layer encryption algorithm derives the wireless access link access layer security key, namely the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane integrity protection key K RRCint .
步骤1308:UE发送接入层安全模式完成消息给SRAN-node1。 Step 1308: The UE sends an access layer security mode complete message to SRAN-node1.
自此,UE和初始接入节点之间生成了端到端无线接入链路接入层安全的密钥即用户面加密密钥KUP-Aenc、控制面加密密钥KRRCenc、控制面完整性保护密钥KRRCint,UE和初始接入节点之间可以执行端到端无线接入链路接入层安全操作。Since then, the end-to-end wireless access link access layer security key is generated between the UE and the initial access node, namely, the user plane encryption key K UP-Aenc , the control plane encryption key K RRCenc , and the control plane is complete. The security protection key K RRCint , the end-to-end wireless access link access layer security operation can be performed between the UE and the initial access node.
需要说明的是,本发明实施例在执行网关节点与初始接入节点之间的端到端无线回程链路接入层安全以及初始接入节点与UE之间的端到端无线接入链路接入层安全的双链路安全过程中,SRAN-node1从Uu口收到UE的用户面数据后,先利用无线接入链路接入层的用户面加密密钥KUP-Aenc解密,然后再分别利用无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint进行加密和完整性保护再发送到Ub接口。同样的,SRAN-node1从Ub口收到UE的用户面数据后,先分别利用无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint进行解密和完整性验证,然后再利用无线接入链路接入层的用户面加密密钥KUP-Aenc进行加密后通过Uu接口发送给UE。It should be noted that the embodiment of the present invention performs end-to-end wireless backhaul link access layer security between the gateway node and the initial access node, and an end-to-end wireless access link between the initial access node and the UE. In the dual-link security process of the access layer security, after receiving the user plane data of the UE from the Uu interface, the SRAN-node1 first decrypts the user plane encryption key K UP-Aenc of the access layer of the wireless access link, and then decrypts Then, the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint are used for encryption and integrity protection and then sent to the Ub interface. Similarly, after receiving the user plane data of the UE from the Ub interface, the SRAN-node1 first uses the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint respectively. The decryption and integrity verification are performed, and then the user plane encryption key K UP-Aenc of the access layer of the wireless access link is used for encryption and then transmitted to the UE through the Uu interface.
从上述本申请技术方案可见,采用本发明实施例的网关节点与初始接入节点之间的端到端无线回程链路接入层安全,以及初始接入节点与UE之间的端到端无线接入链路接入层安全的双链路安全机制,一方面,无论UE的通信路径中经过多少个中间路由节点,无线回程链路安全只在网关节点与初始接入节点之间端到端执行,很好地保证了用户面数据在无线回程链路中传输时的安全,避免了因为经过多段空中接口也即经过多个中间路由节点导致的安全泄露隐患;另一方面,无线接入链路安全在UE和初始接入节点之间端到端执行,在保证了无线接入链路传输安全的基础上,不需要对使用LTE技术的UE做任何修改,保证了后向兼容性。It can be seen from the above technical solution of the present application that the end-to-end wireless backhaul link access layer security between the gateway node and the initial access node in the embodiment of the present invention and the end-to-end wireless between the initial access node and the UE are adopted. Access link layer security layer dual link security mechanism, on the one hand, no matter how many intermediate routing nodes pass through the UE's communication path, the wireless backhaul link security is only end-to-end between the gateway node and the initial access node. Execution ensures the security of user plane data transmission over the wireless backhaul link, avoiding the security leakage caused by multiple air interfaces, that is, through multiple intermediate routing nodes; on the other hand, the wireless access chain The road security is performed end-to-end between the UE and the initial access node. On the basis of ensuring the security of the wireless access link transmission, no modification to the UE using the LTE technology is required, and backward compatibility is ensured.
图14为本发明实施例的UE的组成结构示意图,如图14所示,至少包括第一处理模块、第一无线接入链路处理模块;其中,FIG. 14 is a schematic structural diagram of a structure of a UE according to an embodiment of the present invention. As shown in FIG. 14, the method includes at least a first processing module and a first radio access link processing module.
第一处理模块,设置为:与核心网之间实现AKA过程和NAS层安全;The first processing module is configured to: implement an AKA process and a NAS layer security with the core network;
第一无线接入链路处理模块,设置为:执行与初始接入节点之间的端到端无线接入链路接入层安全;The first wireless access link processing module is configured to: perform end-to-end wireless access link access layer security with the initial access node;
其中,UE与初始接入节点之间通过无线接入链路通信。 The UE communicates with the initial access node through a wireless access link.
其中,第一无线接入链路处理模块是设置为:执行与初始接入节点之间的端到端无线接入链路接入层安全过程之间的端到端的无线接入链路用户面加密,以及执行与初始接入节点之间的端到端的无线接入链路控制面加密和控制面完整性保护。The first wireless access link processing module is configured to: perform an end-to-end wireless access link user plane between the end-to-end wireless access link access layer security process and the initial access node Encryption, and perform end-to-end wireless access link control plane encryption and control plane integrity protection with the initial access node.
其中,UE与初始接入节点之间采用无线接入空中接口Uu口;初始接入节点为UE通过无线接入链路接入的无线接入小节点。The radio access air interface Uu port is used between the UE and the initial access node; the initial access node is a radio access small node that the UE accesses through the radio access link.
其中,among them,
UE上从下到上包括:L1、MAC、RLC以及数据包汇聚协议层(PDCP)协议层;The UE includes: L1, MAC, RLC, and Packet Convergence Protocol Layer (PDCP) protocol layers from bottom to top;
第一无线接入链路处理模块是设置为:在所述UE的PDCP协议层和所述初始接入节点的PDCP协议层之间执行所述端到端无线接入链路接入层安全过程。The first radio access link processing module is configured to: perform the end-to-end radio access link access layer security process between a PDCP protocol layer of the UE and a PDCP protocol layer of the initial access node .
可选地,Optionally,
本发明实施例的UE还包括:第一用户面密钥生成模块和第一控制面密钥生成模块;其中,The UE of the embodiment of the present invention further includes: a first user plane key generation module and a first control plane key generation module; wherein
第一用户面密钥生成模块,设置为:在UE执行与初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路用户面加密密钥KUPenc;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述用户面加密密钥KUPencThe first user plane key generation module is configured to: before the UE performs end-to-end wireless access link user plane encryption with the initial access node, access the layer security root key K eNB based on the radio access link Generating the radio access link user plane encryption key K UPenc ; or based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and PCI generation a new radio access link access stratum root key K eNB *, the encryption key K UPenc K eNB * generated based on the user plane;
第一控制面密钥生成模块,设置为:在执行与初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路控制面加密密钥KRRCenc和所述无线接入链路控制面完整性保护密钥KRRCint;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCintThe first control plane key generation module is configured to: generate, according to the radio access link access layer security root key K eNB , before performing end-to-end radio access link user plane encryption with the initial access node The radio access link control plane encryption key K RRCenc and the radio access link control plane integrity protection key K RRCint ; or based on the radio access link access layer security root key K eNB , The EARFCN-DL of the cell of the initial access node, and the PCI generate a new radio access link access layer root key K eNB* , and generate the control plane encryption key K RRCenc based on the K eNB* And the control plane integrity protection key K RRCint ;
其中,无线接入链路接入层安全根密钥KeNB为UE与核心网之间执AKA过程和NAS层安全过程后生成的。The radio access link access layer security root key K eNB is generated after the AKA process and the NAS layer security process are performed between the UE and the core network.
图15为本发明实施例的无线接入小节点的组成结构示意图,该无线接入小节点与UE通过无线接入空中接口链接;该无线接入小节点至少包括第二处理模块、第二无线接入链路处理模块以及第一无线回程链路处理模块;如图15所示:15 is a schematic structural diagram of a wireless access small node according to an embodiment of the present invention. The wireless access small node and the UE are linked by using a wireless access air interface; the wireless access small node includes at least a second processing module and a second wireless Access link processing module and first wireless backhaul link processing module; as shown in Figure 15:
第二处理模块,设置为:与核心网之间实现AKA过程和NAS层安全过程;The second processing module is configured to: implement an AKA process and a NAS layer security process with the core network;
第二无线接入链路处理模块,设置为:执行与UE之间的端到端无线接入链路接入层安全;a second radio access link processing module, configured to: perform end-to-end wireless access link access layer security with the UE;
第一无线回程链路处理模块,设置为:执行与网关节点之间的端到端无线回程链路接入层安全。The first wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link access layer security with the gateway node.
其中,among them,
第二无线接入链路处理模块是设置为:执行与UE之间的端到端无线接入链路接入层安全过程之间的端到端的无线接入链路用户面加密,以及执行与UE之间的端到端的无线接入链路控制面加密和控制面完整性保护。The second radio access link processing module is configured to: perform an end-to-end wireless access link user plane encryption between the end-to-end radio access link security layer security procedure with the UE, and perform and End-to-end wireless access link control plane encryption and control plane integrity protection between UEs.
该无线接入小节点的无线接入空中接口Uu接口侧从上从下到上包括:L1、MAC、RLC以及PDCP协议层;第二无线接入链路处理模块是设置为:在无线接入小节点的PDCP层和UE的PDCP层之间执行所述端到端的无线接入链路控制面加密和控制面完整性保护。The wireless access air interface Uu interface side of the wireless access small node includes: L1, MAC, RLC, and PDCP protocol layers from top to bottom; the second wireless access link processing module is set to: in wireless access The end-to-end wireless access link control plane encryption and control plane integrity protection are performed between the PDCP layer of the small node and the PDCP layer of the UE.
第一无线回程链路处理模块是设置为:执行与网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。The first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node.
无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进LTE技术的物理层L1、媒体接入控制层MAC、无线链路控制层RLC、数据包汇聚协议瘦身层PDCP-t和数据包汇聚协议安全层PDCP-s;或者,The wireless backhaul interface of the wireless access small node Ub interface side includes from the bottom to the top: the physical layer L1 using the long-term evolution LTE technology, the medium access control layer MAC, the radio link control layer RLC, and the packet convergence protocol slimming layer PDCP- t and packet convergence protocol security layer PDCP-s; or,
所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用无线局域网WLAN技术的L1、MAC、逻辑链路控制层LLC和PDCP-s协议层; The wireless backhaul interface Ub interface side of the wireless access small node includes: an L1, a MAC, a logical link control layer LLC, and a PDCP-s protocol layer using a wireless local area network WLAN technology from bottom to top;
第一无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s和所述网关节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between the PDCP-s of the wireless access small node and the PDCP-s layer of the gateway node.
可选地,所述无线接入小节点还包括:第二用户面密钥生成模块,设置为:Optionally, the wireless access small node further includes: a second user plane key generation module, configured to:
在第一无线回程链路处理模块执行与网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating the end-to-end wireless backhaul link user plane encryption and wireless before the first wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node The wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint required for backhaul link user plane integrity protection.
所述第二用户面密钥生成模块是设置为:The second user plane key generation module is configured to:
基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
其中,所述无线回程链路接入层安全根密钥KeNB-FAN为所述无线接入小节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和NAS层安全过程后生成的。The wireless backhaul link access layer security root key K eNB-FAN performs an authentication and key agreement (AKA) process and a NAS layer security process between the wireless access small node and the core network. After the build.
可选地,所述无线接入小节点还包括第三用户面密钥生成模块和第二控制面密钥生成模块;其中,Optionally, the wireless access small node further includes a third user plane key generation module and a second control plane key generation module, where
第三用户面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路用户面加密密钥KUPenc;或,接收来自网关节点的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述用户面加密密钥KUPencThe third user plane key generation module is configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE User plane encryption key K UPenc ; or, receiving a radio access link access layer root key K eNB* from the gateway node, and generating the user plane encryption key K UPenc based on the K eNB* ;
第二控制面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint;或,接收来自网关节点生成的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCinta second control plane key generating module, configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE a control plane encryption key K RRCenc and a control plane integrity protection key K RRCint ; or receiving a radio access link access layer root key K eNB* generated from the gateway node, and based on the K eNB* generation Said control plane encryption key K RRCenc and said control plane integrity protection key K RRCint ;
其中,无线接入链路接入层根密钥KeNB*为所述网关节点基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以 及PCI生成的;无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS层安全过程后生成的。The radio access link access layer root key K eNB* is the EARFCN-DL of the gateway node based on the radio access link access layer security root key K eNB and the initial access node cell. And the PCI generated; the wireless access link access layer security root key K eNB is generated after the AKA process and the NAS layer security process are performed between the UE and the core network.
和/或,and / or,
图15所示的无线接入小节点能够通过有线接口直接接入核心网;其中,初始接入节点为与UE通过无线接入空中接口链接;The wireless access small node shown in FIG. 15 can directly access the core network through a wired interface; wherein the initial access node is linked to the UE through a wireless access air interface;
该无线接入小节点至少包括第二无线回程链路处理模块,设置为:执行与UE的初始接入节点之间的端到端无线回程链路接入层安全。The wireless access small node includes at least a second wireless backhaul link processing module configured to perform end-to-end wireless backhaul link access layer security with an initial access node of the UE.
其中,第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护。The second wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
该无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进(LTE)技术的物理层L1、媒体接入控制层(MAC)、无线链路控制层(RLC)、数据包汇聚协议瘦身层(PDCP-t)和数据包汇聚协议安全层(PDCP-s);或者,The wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, a physical layer L1, a medium access control layer (MAC), a radio link control layer (RLC), and data using Long Term Evolution (LTE) technology. Packet Convergence Protocol Slimming Layer (PDCP-t) and Packet Convergence Protocol Security Layer (PDCP-s); or,
所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用无线局域网(WLAN)技术的L1、MAC、逻辑链路控制层(LLC)和PDCP-s协议层;The wireless backhaul interface Ub interface side of the wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer (LLC), and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
第二无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link access layer between the PDCP-s layer of the wireless access small node and the PDCP-s layer of the initial access node Safety.
可选地,所述无线接入小节点还包括第四用户面密钥生成模块,设置为:Optionally, the wireless access small node further includes a fourth user plane key generation module, configured to:
在所述第二无线回程链路处理模块执行与所述初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating and executing the end-to-end wireless backhaul chain before the second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for user plane encryption and wireless backhaul link user plane integrity protection.
其中,第四用户面密钥生成模块是设置为:The fourth user plane key generation module is set to:
基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用 户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
其中,所述无线回程链路接入层安全根密钥KeNB-FAN为初始无线接入小节点与所述核心网之间执行鉴权和密钥协商(AKA)过程和NAS层安全过程后生成的。The wireless backhaul link access layer security root key K eNB-FAN is an authentication and key agreement (AKA) process and a NAS layer security process between the initial wireless access small node and the core network. Generated.
可选地,第四用户面密钥生成模块还设置为:Optionally, the fourth user plane key generation module is further configured to:
基于无线接入链路接入层安全根密钥KeNB生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面加密所需要的控制面加密密钥KRRCenc和所述用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面完整性保护所需要的控制面完整性保护密钥KRRCint并发送给所述初始接入节点;或,Generating user plane encryption required for performing end-to-end wireless access link user plane encryption between the UE and the initial access node of the UE based on the radio access link access layer security root key K eNB a key K UPenc and a control plane encryption key K RRCenc required to perform end-to-end radio access link control plane encryption between the UE and the initial access node of the UE and the Performing a control plane integrity protection key K RRCint required for end-to-end radio access link control plane integrity protection between the UE and the initial access node of the UE, and sending the key to the initial access node; or,
基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,并将所述生成的KeNB*发送给所述初始接入节点。Generating a new radio access link access layer root key K eNB* based on the radio access link access layer security root key K eNB , the EARFCN-DL of the cell of the initial access node, and the PCI, And transmitting the generated K eNB* to the initial access node.
本发明实施例还提供了一种宏基站(MNB),该MNB相当于本发明实施例中的网关节点,至少包括:第二无线回程链路处理模块,设置为:执行与初始接入节点之间的端到端无线回程链路接入层安全过程。The embodiment of the present invention further provides a macro base station (MNB), which is equivalent to the gateway node in the embodiment of the present invention, and includes at least: a second wireless backhaul link processing module, configured to: perform and the initial access node End-to-end wireless backhaul link access layer security procedures.
其中,among them,
宏基站的第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护。The second wireless backhaul link processing module of the macro base station is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node.
第二无线回程链路处理模块是设置为:在所述MNB的PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The second wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between the PDCP-s layer of the MNB and the PDCP-s layer of the initial access node.
此外,本发明实施例还提供一种UE,包括处理器和存储器,存储器中存储有处理器可执行的指令,当指令被处理器执行时,执行图14所示模块的功能。In addition, an embodiment of the present invention further provides a UE, including a processor and a memory, where the processor stores instructions executable by the processor, and when the instructions are executed by the processor, performs the functions of the module shown in FIG. 14.
此外,本发明实施例还提供一种无线接入小节点,包括处理器和存储器,存储器中存储有处理器可执行的指令,当指令被处理器执行时,执行图15所 示模块的功能。In addition, an embodiment of the present invention further provides a wireless access small node, including a processor and a memory, where the processor stores instructions executable by the processor, and when the instruction is executed by the processor, the method of FIG. 15 is performed. Show the function of the module.
此外,本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现所述的实现接入层安全的方法。In addition, an embodiment of the present invention further provides a computer readable storage medium storing computer executable instructions, which are implemented to implement the method for implementing access layer security when the computer executable instructions are executed.
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件(例如处理器)完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,例如通过集成电路来实现其相应功能,也可以采用软件功能模块的形式实现,例如通过处理器执行存储于存储器中的程序/指令来实现其相应功能。本申请不限制于任何特定形式的硬件和软件的结合。One of ordinary skill in the art will appreciate that all or a portion of the above steps may be performed by a program to instruct related hardware, such as a processor, which may be stored in a computer readable storage medium, such as a read only memory, disk or optical disk. Wait. Alternatively, all or part of the steps of the above embodiments may also be implemented using one or more integrated circuits. Correspondingly, each module/unit in the above embodiment may be implemented in the form of hardware, for example, by implementing an integrated circuit to implement its corresponding function, or may be implemented in the form of a software function module, for example, executing a program stored in the memory by a processor. / instruction to achieve its corresponding function. This application is not limited to any specific combination of hardware and software.
以上所述,仅为本申请的较佳实例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above descriptions are only preferred examples of the present application and are not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the present application are intended to be included within the scope of the present application.
工业实用性Industrial applicability
本发明实施例提供一种实现接入层安全的方法及用户设备和节点,很好地保证了用户面数据在无线回程链路中传输时的安全,避免了因为经过多段空中接口也即经过多个中间路由节点导致的安全泄露隐患;在保证了无线接入链路传输安全的基础上,不需要对使用LTE技术的UE做任何修改,保证了后向兼容性。 The embodiment of the invention provides a method for implementing access layer security, a user equipment and a node, which can ensure the security of the user plane data in the wireless backhaul link, and avoids the passage of multiple air interfaces. The security leakage caused by the intermediate routing nodes; on the basis of ensuring the security of the wireless access link transmission, no modification to the UE using the LTE technology is required, and backward compatibility is ensured.

Claims (38)

  1. 一种实现接入层安全的方法,包括:执行用户设备UE与初始接入节点之间的端到端无线接入链路接入层安全;以及执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全;A method for implementing access layer security, comprising: performing end-to-end wireless access link access layer security between a user equipment UE and an initial access node; and performing an end between an initial access node and a gateway node To the wireless backhaul link access layer security;
    其中,UE经过至少两段无线空中接口与核心网通信的通信路径;所述通信路径中,至少包括UE、初始接入节点、网关节点;The communication path of the UE communicating with the core network through at least two wireless air interfaces; the communication path includes at least a UE, an initial access node, and a gateway node;
    当所述通信路径包括两段无线空中接口时,UE与初始接入节点之间通过无线接入链路通信,初始接入节点与网关节点之间通过无线回程链路通信。When the communication path includes two wireless air interfaces, the UE communicates with the initial access node through a wireless access link, and the initial access node communicates with the gateway node through a wireless backhaul link.
  2. 根据权利要求1所述的方法,其中,The method of claim 1 wherein
    当所述通信路径包括大于两段无线空中接口时,所述通信路径中还包括至少一个中间路由节点;When the communication path includes more than two wireless air interfaces, the communication path further includes at least one intermediate routing node;
    当所述通信路径中包括一个中间路由节点时,所述初始接入节点与所述中间路由节点之间通过无线回程链路通信,所述中间路由节点与所述网关节点之间通过无线回程链路通信;When the communication path includes an intermediate routing node, the initial access node communicates with the intermediate routing node through a wireless backhaul link, and the intermediate routing node and the gateway node pass a wireless backhaul chain. Road communication
    当所述通信路径中包括两个或两个以上中间路由节点时,所述中间路由节点之间通过无线回程链路通信。When two or more intermediate routing nodes are included in the communication path, the intermediate routing nodes communicate via a wireless backhaul link.
  3. 根据权利要求1或2所述的方法,其中,The method according to claim 1 or 2, wherein
    所述UE与初始接入节点之间采用无线接入空中接口Uu口;The wireless access air interface Uu port is adopted between the UE and the initial access node;
    所述初始接入节点与网关节点之间采用无线回程接口Ub口。A wireless backhaul interface Ub port is adopted between the initial access node and the gateway node.
  4. 根据权利要求2所述的方法,其中,The method of claim 2, wherein
    所述中间路由节点和所述初始接入节点之间采用无线回程接口Ub口,所述中间路由节点和所述网关节点之间采用无线回程接口Ub口;a wireless backhaul interface Ub port is used between the intermediate routing node and the initial access node, and a wireless backhaul interface Ub port is used between the intermediate routing node and the gateway node;
    当所述中间路由节点为两个或两个以上时,所述中间路由节点之间采用无线回程接口Ub口。When the intermediate routing node is two or more, a wireless backhaul interface Ub port is adopted between the intermediate routing nodes.
  5. 根据权利要求1或2所述的方法,其中,The method according to claim 1 or 2, wherein
    所述初始接入节点为所述UE通过无线接入链路接入的无线接入小节点;The initial access node is a wireless access small node that the UE accesses through a wireless access link;
    所述网关节点为能够通过有线接口接入所述核心网的无线接入小节点或 宏基站;The gateway node is a wireless access small node capable of accessing the core network through a wired interface or Macro base station
    所述中间路由节点为实现所述初始接入节点和网关节点之间的通信从而最终实现接入所述初始接入节点的UE与所述核心网之间的通信提供中继传输的无线接入小节点。The intermediate routing node provides wireless communication for relay transmission by implementing communication between the initial access node and the gateway node to finally implement communication between the UE accessing the initial access node and the core network. Small node.
  6. 根据权利要求1或2所述的方法,其中,The method according to claim 1 or 2, wherein
    所述执行UE与初始接入节点之间的端到端无线接入链路接入层安全包括:执行所述UE与所述初始接入节点之间的端到端无线接入链路用户面加密,以及执行所述UE与所述初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护;Performing end-to-end wireless access link access layer security between the UE and the initial access node includes: performing an end-to-end wireless access link user plane between the UE and the initial access node Encrypting, and performing end-to-end wireless access link control plane encryption and control plane integrity protection between the UE and the initial access node;
    所述执行初始接入节点和网关节点之间的端到端无线回程链路接入层安全包括:执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Performing the end-to-end wireless backhaul link access layer security between the initial access node and the gateway node includes: performing an end-to-end wireless backhaul link user plane between the initial access node and the gateway node Encryption and user plane integrity protection.
  7. 根据权利要求6所述的方法,其中,在所述初始接入节点的数据包汇聚协议安全PDCP-s层和所述网关节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The method of claim 6 wherein end-to-end wireless backhaul link access is performed between a packet aggregation protocol secure PDCP-s layer of the initial access node and a PDCP-s layer of the gateway node Layer security.
  8. 根据权利要求7所述的方法,其中,The method of claim 7 wherein
    所述初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:使用长期演进LTE技术的物理层L1、媒体接入控制层MAC、无线链路控制层RLC、数据包汇聚协议瘦身层PDCP-t和数据包汇聚协议安全层PDCP-s;The wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: a physical layer L1 using a long-term evolution LTE technology, a medium access control layer MAC, and a wireless Link control layer RLC, packet convergence protocol slimming layer PDCP-t and data packet convergence protocol security layer PDCP-s;
    所述中间路由节点从下到上包括:使用LTE技术的L1、MAC和RLC协议层;或者,包括使用LTE技术的L1、MAC、RLC和PDCP-t协议层;The intermediate routing node includes: L1, MAC, and RLC protocol layers using LTE technology from bottom to top; or, includes L1, MAC, RLC, and PDCP-t protocol layers using LTE technology;
    如果所述初始接入节点和所述网关节点上的PDCP-s层和PDCP-t层合并到一个协议层则为数据包汇聚协议PDCP层;If the initial access node and the PDCP-s layer and the PDCP-t layer on the gateway node are merged into one protocol layer, the data packet convergence protocol PDCP layer;
    或者,or,
    所述初始接入节点的无线回程接口Ub接口侧和所述网关节点的无线回程接口Ub接口侧从下到上分别包括:使用无线局域网WLAN技术的L1、MAC、逻辑链路控制层LLC和PDCP-s协议层; The wireless backhaul interface Ub interface side of the initial access node and the wireless backhaul interface Ub interface side of the gateway node respectively include: L1, MAC, logical link control layer LLC and PDCP using wireless local area network WLAN technology, respectively. -s protocol layer;
    所述中间路由节点从下到上包括使用WLAN技术的L1、MAC和LLC协议层。The intermediate routing node includes L1, MAC, and LLC protocol layers using WLAN technology from bottom to top.
  9. 根据权利要求7所述的方法,其中,所述执行初始接入节点和网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护包括:The method of claim 7, wherein said performing end-to-end wireless backhaul link user plane encryption and user plane integrity protection between the initial access node and the gateway node comprises:
    所述UE的用户面数据,在通过无线接入空中接口Uu口发送给所述初始接入节点后,所述初始接入节点在将UE的用户面数据发送到无线回程接口Ub口之前,在所述初始接入节点的PDCP-s层执行加密和完整性保护,数据发送到所述网关节点之后,由所述网关节点在PDCP-s层进行解密和完整性验证;相应地,After the user plane data of the UE is sent to the initial access node through the radio access air interface Uu interface, the initial access node sends the user plane data of the UE to the wireless backhaul interface Ub port before The PDCP-s layer of the initial access node performs encryption and integrity protection, and after the data is sent to the gateway node, the gateway node performs decryption and integrity verification at the PDCP-s layer; correspondingly,
    所述网关节点从核心网获取到需要发送给UE的用户面数据,在发送到无线回程接口Ub口前,在所述网关节点的PDCP-s层执行加密和完整性保护,数据发送到所述初始接入节点后,由所述初始接入节点在PDCP-s层进行解密和完整性验证。The gateway node acquires user plane data that needs to be sent to the UE from the core network, and performs encryption and integrity protection on the PDCP-s layer of the gateway node before sending to the wireless backhaul interface Ub port, and the data is sent to the After the initial access node, the initial access node performs decryption and integrity verification at the PDCP-s layer.
  10. 根据权利要求7所述的方法,其中,所述PDCP-s层用于实现:头压缩和解压缩,以及安全操作;其中,安全操作包括:加密、解密、完整性保护和完整性验证。The method of claim 7, wherein the PDCP-s layer is for implementing: header compression and decompression, and security operations; wherein the security operations include: encryption, decryption, integrity protection, and integrity verification.
  11. 根据权利要求6所述的方法,其中,所述执行UE与初始接入节点之间的端到端无线接入链路用户面加密,以及所述执行UE与初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护,包括:The method of claim 6, wherein the performing end-to-end wireless access link user plane encryption between the UE and the initial access node, and the end-to-end between the performing UE and the initial access node End-to-side wireless access link control plane encryption and control plane integrity protection, including:
    所述UE的上行用户面数据和上行无线资源控制RRC层控制面信令在发送到空中接口之前,分别在UE的数据包汇聚协议PDCP层执行针对用户面数据的用户面加密以及针对RRC层控制面信令的控制面加密和完整性保护;所述初始接入节点接收到所述用户面数据或所述RRC层控制面信令后,对用户面数据和RRC层控制面信令进行解密并对RRC层控制面信令进行完整性验证;相应地,The uplink user plane data of the UE and the uplink radio resource control RRC layer control plane signaling perform user plane encryption for user plane data and RRC layer control in the packet aggregation protocol PDCP layer of the UE before being sent to the air interface, respectively. Control plane encryption and integrity protection of the face signaling; after receiving the user plane data or the RRC layer control plane signaling, the initial access node decrypts the user plane data and the RRC layer control plane signaling and Perform integrity verification on RRC layer control plane signaling; accordingly,
    所述初始接入节点发送给UE的下行用户面数据和RRC层控制面信令在发送到空中接口之前,分别在初始接入节点的PDCP层执行对用户面数据的用户面加密以及对RRC层控制面信令的控制面加密和完整性保护;所述UE 接收到用户面数据或RRC层控制面信令后,对所述用户面数据和所述RRC层控制面信令进行解密和对RRC层控制面信令进行完整性验证。The downlink user plane data and the RRC layer control plane signaling sent by the initial access node to the UE perform user plane encryption of the user plane data and the RRC layer at the PDCP layer of the initial access node before being sent to the air interface, respectively. Control plane encryption and integrity protection for control plane signaling; the UE After receiving the user plane data or the RRC layer control plane signaling, decrypting the user plane data and the RRC layer control plane signaling, and performing integrity verification on the RRC layer control plane signaling.
  12. 根据权利要求11所述的方法,其中,The method of claim 11 wherein
    所述UE和所述初始节点的无线接入空中接口Uu接口侧上从下到上分别包括:物理层L1、媒体接入控制层MAC、无线链路控制层RLC以及数据包汇聚协议PDCP层;The UE and the wireless access air interface on the Uu interface side of the initial node include: a physical layer L1, a medium access control layer MAC, a radio link control layer RLC, and a packet convergence protocol PDCP layer, respectively, from bottom to top;
    所述执行UE与初始接入节点之间的端到端无线接入链路接入层安全,包括:在所述UE的PDCP和所述初始接入节点的PDCP层之间执行端到端控制面接入层安全。Performing end-to-end radio access link access layer security between the UE and the initial access node, including performing end-to-end control between the PDCP of the UE and the PDCP layer of the initial access node Face access layer security.
  13. 根据权利要求6所述的方法,所述方法还包括:所述初始接入节点和所述网关节点之间生成所述执行初始接入节点与网关节点之间端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintThe method according to claim 6, further comprising: generating, between the initial access node and the gateway node, the end-to-end wireless backhaul link user plane between the performing initial access node and the gateway node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for encryption and wireless backhaul link user plane integrity protection,
    其中,所述生成所述执行初始接入节点与网关节点之间端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-Wint,包括:The generating a wireless backhaul link user plane encryption key K required to perform end-to-end wireless backhaul link user plane encryption and wireless backhaul link user plane integrity protection between the initial access node and the gateway node is generated. UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint , including:
    所述初始接入节点和所述网关节点基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating, by the initial access node and the gateway node, the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link based on a wireless backhaul link access layer security root key K eNB-FAN User plane integrity protection key K UP-Wint ;
    其中,所述初始接入节点的无线回程链路接入层安全根密钥KeNB-FAN为所述初始接入节点与所述核心网之间执行鉴权和密钥协商AKA过程和非接入层NAS安全过程后生成的;The wireless backhaul link access layer security root key K eNB-FAN of the initial access node performs authentication and key agreement AKA process and non-connection between the initial access node and the core network. Generated after the inbound NAS security process;
    其中,所述网关节点的无线回程链路接入层安全根密钥KeNB-FAN为所述初始接入节点与所述核心网之间执行鉴权和密钥协商AKA过程和非接入层NAS安全过程后,由所述核心网发送给所述网关节点的。The wireless backhaul link access layer security root key K eNB-FAN of the gateway node performs authentication and key agreement between the initial access node and the core network, and the AKA process and the non-access stratum After the NAS security process is sent by the core network to the gateway node.
  14. 根据权利要求6所述的方法,该方法还包括:所述UE与所述初始接入节点之间生成所述执行UE与初始接入节点之间端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成所述执行UE与所述初始 接入节点之间端到端无线接入链路控制面加密和控制面完整性保护所需要的控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCintThe method according to claim 6, further comprising: generating an end-to-end wireless access link user plane encryption between the execution UE and the initial access node between the UE and the initial access node Required user plane encryption key K UPenc , and control plane encryption key required to generate end-to-end radio access link control plane encryption and control plane integrity protection between the performing UE and the initial access node K RRCenc and control plane integrity protection key K RRCint ;
    其中,所述生成所述执行UE与初始接入节点之间端到端无线接入链路用户面加密所需要的用户面加密密钥KUPenc,以及生成所述执行UE与所述初始接入节点之间端到端无线接入链路控制面加密和控制面完整性保护所需要的控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint,包括:The generating a user plane encryption key K UPenc required to perform end-to-end wireless access link user plane encryption between the performing UE and the initial access node, and generating the performing UE and the initial access Control plane encryption key K RRCenc and control plane integrity protection key K RRCint required for end-to-end wireless access link control plane encryption and control plane integrity protection between nodes, including:
    所述UE和所述网关节点基于无线接入链路接入层安全根密钥KeNB生成所述用户面加密密钥KUPenc,以及生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCint;所述网关节点将所述生成的用户面加密密钥KUPenc,控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点;或,Generating, by the UE and the gateway node, the user plane encryption key K UPenc based on a radio access link access layer security root key K eNB , and generating the control plane encryption key K RRCenc and the control plane Integrity protection key K RRCint ; the gateway node sends the generated user plane encryption key K UPenc , control plane encryption key K RRCenc and control plane integrity protection key K RRCint to the initial access node ;or,
    所述UE和所述网关节点基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的下行绝对载频号EARFCN-DL,以及物理小区标识PCI生成一个新的无线接入链路接入层根密钥KeNB*;所述网关节点将所述生成的KeNB*发送给所述初始接入节点;所述UE和所述初始接入节点基于所述KeNB*生成所述用户面加密密钥KUPenc,以及生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCintThe UE and the gateway node generate a new one based on the radio access link access layer security root key K eNB , the downlink absolute carrier frequency EARFCN-DL of the cell of the initial access node, and the physical cell identifier PCI Wireless access link access layer root key K eNB* ; said gateway node transmits said generated K eNB* to said initial access node; said UE and said initial access node are based on said K eNB* generates the user plane encryption key K UPenc , and generates the control plane encryption key K RRCenc and the control plane integrity protection key K RRCint ;
    其中,所述UE的无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行鉴权和密钥协商AKA过程和非接入层NAS安全过程后生成的;The radio access link access layer security root key K eNB of the UE is generated after the authentication and key agreement AKA process and the non-access stratum NAS security process are performed between the UE and the core network. of;
    其中,所述网关节点的无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS安全过程后,由所述核心网发送给所述网关节点的。The wireless access link access layer security root key K eNB of the gateway node is sent by the core network to the core network after performing an AKA process and a NAS security process between the UE and the core network. Gateway node.
  15. 根据权利要求14所述的方法,该方法还包括:The method of claim 14 further comprising:
    所述网关节点将所述生成的用户面加密密钥KUPenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点, Transmitting , by the gateway node, the generated user plane encryption key K UPenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node,
    其中,所述网关节点将所述生成的用户面加密密钥KUPenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint发送给所述初始接入节点,包括: The gateway node sends the generated user plane encryption key K UPenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node, including:
    所述网关节点向所述初始接入节点发送携带有所述用户面加密密钥KUPenc、控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint的消息,对所述消息执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护;Transmitting, by the gateway node, a message carrying the user plane encryption key K UPenc , the control plane encryption key K RRCenc, and the control plane integrity protection key K RRCint to the initial access node, and executing the message on the message End-to-end wireless backhaul link user plane encryption and user plane integrity protection between the initial access node and the gateway node;
    所述网关节点将所述生成的KeNB*发送给所述初始接入节点,包括:Sending, by the gateway node, the generated K eNB* to the initial access node, including:
    所述网关节点向所述初始接入节点发送携带有所述KeNB*的消息,对所述消息执行所述初始接入节点和所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。Transmitting, by the gateway node, the message carrying the K eNB* to the initial access node, and performing an end-to-end wireless backhaul link user plane between the initial access node and the gateway node for the message Encryption and user plane integrity protection.
  16. 一种用户设备UE,包括第一处理模块、第一无线接入链路处理模块;其中,A user equipment UE includes a first processing module and a first radio access link processing module;
    第一处理模块,设置为:与核心网之间实现鉴权和密钥协商AKA过程和非接入层NAS安全;The first processing module is configured to: implement an authentication and key agreement AKA process and non-access layer NAS security with the core network;
    第一无线接入链路处理模块,设置为:执行与初始接入节点之间的端到端无线接入链路接入层安全;The first wireless access link processing module is configured to: perform end-to-end wireless access link access layer security with the initial access node;
    其中,UE与初始接入节点之间通过无线接入链路通信。The UE communicates with the initial access node through a wireless access link.
  17. 根据权利要求16所述的UE,其中,所述第一无线接入链路处理模块是设置为:执行与初始接入节点之间的端到端无线接入链路用户面加密,以及执行与初始接入节点之间的端到端无线接入链路控制面加密和控制面完整性保护。The UE of claim 16, wherein the first radio access link processing module is configured to perform end-to-end wireless access link user plane encryption with an initial access node, and perform End-to-end wireless access link control plane encryption and control plane integrity protection between initial access nodes.
  18. 根据权利要求17所述的UE,其中,The UE according to claim 17, wherein
    所述UE与初始接入节点之间采用无线接入空中接口Uu口;The wireless access air interface Uu port is adopted between the UE and the initial access node;
    所述初始接入节点为UE通过无线接入链路接入的无线接入小节点。The initial access node is a wireless access small node that the UE accesses through the wireless access link.
  19. 根据权利要求18所述的UE,其中,The UE according to claim 18, wherein
    所述UE上从下到上包括物理层L1、媒体接入控制层MAC、无线链路控制层RLC以及数据包汇聚协议PDCP协议层;The UE includes a physical layer L1, a medium access control layer MAC, a radio link control layer RLC, and a packet convergence protocol PDCP protocol layer from bottom to top;
    所述第一无线接入链路处理模块是设置为:在所述UE的PDCP协议层和所述初始接入节点的PDCP协议层之间执行所述端到端无线接入链路接入 层安全。The first radio access link processing module is configured to perform the end-to-end wireless access link access between a PDCP protocol layer of the UE and a PDCP protocol layer of the initial access node Layer security.
  20. 根据权利要求17所述的UE,所述UE还包括第一用户面密钥生成模块和第一控制面密钥生成模块;其中,The UE according to claim 17, the UE further includes a first user plane key generation module and a first control plane key generation module;
    第一用户面密钥生成模块,设置为:在执行与所述初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路用户面加密密钥KUPenc;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的下行绝对载频号EARFCN-DL,以及物理小区标识PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述用户面加密密钥KUPencThe first user plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link The eNB generates the radio access link user plane encryption key K UPenc ; or, based on the radio access link access layer security root key K eNB , the downlink absolute carrier frequency number EARFCN of the cell of the initial access node - DL, and the physical cell identity PCI generates a new radio access link access layer root key K eNB* , and generates the user plane encryption key K UPenc based on the K eNB* ;
    第一控制面密钥生成模块,设置为:在执行与所述初始接入节点之间端到端无线接入链路用户面加密之前,基于无线接入链路接入层安全根密钥KeNB生成所述无线接入链路控制面加密密钥KRRCenc和所述无线接入链路控制面完整性保护密钥KRRCint;或,基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的EARFCN-DL,以及PCI生成一个新的无线接入链路接入层根密钥KeNB*,基于所述KeNB*生成所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCintThe first control plane key generation module is configured to: before the performing the end-to-end wireless access link user plane encryption with the initial access node, the access layer security root key K based on the wireless access link The eNB generates the radio access link control plane encryption key K RRCenc and the radio access link control plane integrity protection key K RRCint ; or based on the radio access link access layer security root key Ke NB , EARFCN-DL of the cell of the initial access node, and PCI generate a new radio access link access layer root key K eNB* , and generate the control plane encryption key based on the K eNB* K RRCenc and the control plane integrity protection key K RRCint ;
    其中,无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执AKA过程和NAS安全过程后生成的。The radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
  21. 一种无线接入小节点,该无线接入小节点与用户设备UE通过无线接入空中接口链接;该无线接入小节点至少包括第二处理模块、第二无线接入链路处理模块以及第一无线回程链路处理模块;其中,a wireless access small node, the wireless access small node and the user equipment UE are linked by a wireless access air interface; the wireless access small node includes at least a second processing module, a second wireless access link processing module, and a a wireless backhaul link processing module; wherein
    第二处理模块,设置为:与核心网之间实现鉴权和密钥协商AKA过程和非接入层NAS安全;The second processing module is configured to: implement authentication and key agreement between the AKA process and the non-access layer NAS security with the core network;
    第二无线接入链路处理模块,设置为:执行与UE之间的端到端无线接入链路接入层安全;a second radio access link processing module, configured to: perform end-to-end wireless access link access layer security with the UE;
    第一无线回程链路处理模块,设置为:执行与网关节点之间的端到端无线回程链路接入层安全。The first wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link access layer security with the gateway node.
  22. 根据权利要求21所述的无线接入小节点,其中,所述第二无线接入 链路处理模块是设置为:The wireless access small node of claim 21, wherein the second wireless access The link processing module is set to:
    执行与所述UE之间的端到端无线接入链路用户面加密,以及执行与UE之间的端到端无线接入链路控制面加密和控制面完整性保护。Perform end-to-end wireless access link user plane encryption with the UE, and perform end-to-end wireless access link control plane encryption and control plane integrity protection with the UE.
  23. 根据权利要求21或22所述的无线接入小节点,其中,The wireless access small node according to claim 21 or 22, wherein
    所述无线接入小节点的无线接入空中接口Uu接口侧从下到上包括:物理层L1、媒体接入控制层MAC、无线链路控制层RLC以及PDCP协议层;The radio access air interface Uu interface side of the radio access small node includes: a physical layer L1, a medium access control layer MAC, a radio link control layer RLC, and a PDCP protocol layer from bottom to top;
    所述第二无线接入链路处理模块是设置为:在所述无线接入小节点的PDCP层和UE的PDCP层之间执行所述端到端的无线接入链路控制面加密和控制面完整性保护。The second radio access link processing module is configured to perform the end-to-end wireless access link control plane encryption and control plane between the PDCP layer of the radio access small node and the PDCP layer of the UE. Integrity protection.
  24. 根据权利要求21所述的无线接入小节点,其中,所述第一无线回程链路处理模块是设置为:执行与网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护。The wireless access small node according to claim 21, wherein the first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link user plane encryption and user plane integrity with the gateway node. Sexual protection.
  25. 根据权利要求21或24所述的无线接入小节点,其中,The wireless access small node according to claim 21 or 24, wherein
    所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进LTE技术的物理层L1、媒体接入控制层MAC、无线链路控制层RLC、数据包汇聚协议瘦身层PDCP-t和数据包汇聚协议安全层PDCP-s;或者,The wireless backhaul interface Ub interface side of the wireless access small node includes: a physical layer L1 using a long-term evolution LTE technology, a medium access control layer MAC, a radio link control layer RLC, and a packet convergence protocol slimming layer. PDCP-t and packet convergence protocol security layer PDCP-s; or,
    所述无线接入小节点上从下到上包括:使用无线局域网WLAN技术的L1、MAC、逻辑链路控制层LLC和PDCP-s协议层;The wireless access small node includes, from bottom to top, an L1, a MAC, a logical link control layer LLC, and a PDCP-s protocol layer using a wireless local area network (WLAN) technology;
    所述第一无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s和所述网关节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The first wireless backhaul link processing module is configured to perform end-to-end wireless backhaul link access layer security between a PDCP-s of the wireless access small node and a PDCP-s layer of the gateway node .
  26. 根据权利要求24所述的无线接入小节点,所述无线接入小节点还包括第二用户面密钥生成模块,设置为:The wireless access small node according to claim 24, wherein the wireless access small node further comprises a second user plane key generation module, which is configured to:
    在所述第一无线回程链路处理模块执行与所述网关节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating the end-to-end wireless backhaul link user before the first wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the gateway node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for face encryption and wireless backhaul link user plane integrity protection.
  27. 根据权利要求26所述的无线接入小节点,其中,所述第二用户面密 钥生成模块是设置为:The wireless access node of claim 26, wherein the second user is dense The key generation module is set to:
    基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
    其中,所述无线回程链路接入层安全根密钥KeNB-FAN为所述无线接入小节点与所述核心网之间执行鉴权和密钥协商AKA过程和非接入层NAS安全过程后生成的。The wireless backhaul link access layer security root key K eNB-FAN performs authentication and key agreement AKA process and non-access layer NAS security between the wireless access small node and the core network. Generated after the process.
  28. 根据权利要求27所述的无线接入小节点,所述无线接入小节点还包括第三用户面密钥生成模块和第二控制面密钥生成模块;其中,The wireless access small node according to claim 27, wherein the wireless access small node further includes a third user plane key generation module and a second control plane key generation module;
    第三用户面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路用户面加密密钥KUPenc;或,接收来自网关节点的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述用户面加密密钥KUPencThe third user plane key generation module is configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE User plane encryption key K UPenc ; or, receiving a radio access link access layer root key K eNB* from the gateway node, and generating the user plane encryption key K UPenc based on the K eNB* ;
    第二控制面密钥生成模块,设置为:在所述无线接入小节点执行与UE之间端到端无线接入链路用户面加密之前,接收来自网关节点的所述无线接入链路控制面加密密钥KRRCenc和控制面完整性保护密钥KRRCint;或,接收来自网关节点生成的无线接入链路接入层根密钥KeNB*,并基于所述KeNB*生成所述所述控制面加密密钥KRRCenc和所述控制面完整性保护密钥KRRCinta second control plane key generating module, configured to: receive the wireless access link from the gateway node before the wireless access small node performs end-to-end wireless access link user plane encryption with the UE a control plane encryption key K RRCenc and a control plane integrity protection key K RRCint ; or receiving a radio access link access layer root key K eNB* generated from the gateway node, and based on the K eNB* generation Said control plane encryption key K RRCenc and said control plane integrity protection key K RRCint ;
    其中,无线接入链路接入层根密钥KeNB*为所述网关节点基于无线接入链路接入层安全根密钥KeNB、所述无线接入小节点的小区的下行绝对载频号EARFCN-DL,以及物理小区标识PCI生成的;无线接入链路接入层安全根密钥KeNB为所述UE与所述核心网之间执行AKA过程和NAS安全过程后生成的。The radio access link access layer root key K eNB* is a downlink absolute load of the gateway node based on the radio access link access layer security root key K eNB and the radio access small node cell. The frequency number EARFCN-DL and the physical cell identifier are generated by the PCI; the radio access link access layer security root key K eNB is generated after the AKA process and the NAS security process are performed between the UE and the core network.
  29. 一种无线接入小节点,该无线接入小节点能够通过有线接口接入核心网;A wireless access small node capable of accessing a core network through a wired interface;
    该无线接入小节点至少包括第二无线回程链路处理模块,设置为:执行与UE的初始接入节点之间的端到端无线回程链路接入层安全。The wireless access small node includes at least a second wireless backhaul link processing module configured to perform end-to-end wireless backhaul link access layer security with an initial access node of the UE.
  30. 根据权利要求29所述的无线接入小节点,其中,所述第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用 户面加密和用户面完整性保护。The wireless access small node of claim 29, wherein the second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link with the initial access node User area encryption and user plane integrity protection.
  31. 根据权利要求30所述的无线接入小节点,其中,The wireless access small node according to claim 30, wherein
    所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用长期演进LTE技术的物理层L1、媒体接入控制层MAC、无线链路控制层RLC、数据包汇聚协议瘦身层PDCP-t和数据包汇聚协议安全层PDCP-s;或者,The wireless backhaul interface Ub interface side of the wireless access small node includes: a physical layer L1 using a long-term evolution LTE technology, a medium access control layer MAC, a radio link control layer RLC, and a packet convergence protocol slimming layer. PDCP-t and packet convergence protocol security layer PDCP-s; or,
    所述无线接入小节点的无线回程接口Ub接口侧从下到上包括:使用无线局域网WLAN技术的L1、MAC、逻辑链路控制层LLC和PDCP-s协议层;The wireless backhaul interface Ub interface side of the wireless access small node includes: an L1, a MAC, a logical link control layer LLC, and a PDCP-s protocol layer using a wireless local area network WLAN technology from bottom to top;
    所述第二无线回程链路处理模块是设置为:在所述无线接入小节点的PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The second wireless backhaul link processing module is configured to perform an end-to-end wireless backhaul link between a PDCP-s layer of the wireless access small node and a PDCP-s layer of the initial access node Into the layer security.
  32. 根据权利要求30所述的无线接入小节点,所述无线接入小节点还包括第四用户面密钥生成模块,设置为:The wireless access small node according to claim 30, wherein the wireless access small node further comprises a fourth user plane key generation module, which is configured to:
    在所述第二无线回程链路处理模块执行与所述初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护之前,生成执行所述端到端无线回程链路用户面加密和无线回程链路用户面完整性保护所需要的无线回程链路用户面加密密钥KUP-Wenc和无线回程链路用户面完整性保护密钥KUP-WintGenerating and executing the end-to-end wireless backhaul chain before the second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node Wireless backhaul link user plane encryption key K UP-Wenc and wireless backhaul link user plane integrity protection key K UP-Wint required for user plane encryption and wireless backhaul link user plane integrity protection.
  33. 根据权利要求32所述的无线接入小节点,其中,所述第四用户面密钥生成模块是设置为:The wireless access small node according to claim 32, wherein the fourth user plane key generation module is configured to:
    基于无线回程链路接入层安全根密钥KeNB-FAN生成所述无线回程链路用户面加密密钥KUP-Wenc和所述无线回程链路用户面完整性保护密钥KUP-WintGenerating the wireless backhaul link user plane encryption key K UP-Wenc and the wireless backhaul link user plane integrity protection key K UP-Wint based on the wireless backhaul link access layer security root key K eNB-FAN ;
    其中,所述无线回程链路接入层安全根密钥KeNB-FAN为初始无线接入节点与所述核心网之间执行鉴权和密钥协商AKA过程和非接入层NAS安全过程后生成的。The wireless backhaul link access layer security root key K eNB-FAN is after performing an authentication and key agreement AKA process and a non-access layer NAS security process between the initial wireless access node and the core network. Generated.
  34. 根据权利要求32所述的无线接入小节点,其中,所述第四用户面密钥生成模块还设置为:The wireless access small node according to claim 32, wherein the fourth user plane key generation module is further configured to:
    基于无线接入链路接入层安全根密钥KeNB生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路用户面加密所需要的用户面加 密密钥KUPenc,以及生成用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面加密所需要的控制面加密密钥KRRCenc和用于所述UE与所述UE的初始接入节点之间执行端到端无线接入链路控制面完整性保护所需要的控制面完整性保护密钥KRRCint并发送给所述初始接入节点;或,Generating user plane encryption required for performing end-to-end wireless access link user plane encryption between the UE and the initial access node of the UE based on the radio access link access layer security root key K eNB a key K UPenc and a control plane encryption key K RRCenc required to perform end-to-end radio access link control plane encryption between the UE and the initial access node of the UE and for the Performing a control plane integrity protection key K RRCint required for end-to-end radio access link control plane integrity protection between the UE and the initial access node of the UE and transmitting the key K RRCint to the initial access node; or
    基于无线接入链路接入层安全根密钥KeNB、所述初始接入节点的小区的下行绝对载频号EARFCN-DL,以及物理小区标识PCI生成一个新的无线接入链路接入层根密钥KeNB*,并将所述生成的KeNB*发送给所述初始接入节点。Generating a new radio access link based on the radio access link access layer security root key K eNB , the downlink absolute carrier frequency EARFCN-DL of the cell of the initial access node, and the physical cell identity PCI Layer root key K eNB* and transmitting the generated K eNB* to the initial access node.
  35. 一种无线接入小节点,包括权利要求21~权利要求28任意组合,和权利要求29~权利要求34任意组合的无线接入小节点。A wireless access small node comprising any combination of claims 21 to 28 and a wireless access small node of any combination of claims 29 and 34.
  36. 一种宏基站MNB,至少包括第二无线回程链路处理模块,设置为:执行与初始接入节点之间的端到端无线回程链路接入层安全。A macro base station MNB, comprising at least a second wireless backhaul link processing module, configured to perform end-to-end wireless backhaul link access layer security with an initial access node.
  37. 根据权利要求36所述的MNB,其中,The MNB according to claim 36, wherein
    所述第二无线回程链路处理模块是设置为:执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护;The second wireless backhaul link processing module is configured to: perform end-to-end wireless backhaul link user plane encryption and user plane integrity protection with the initial access node;
    所述第二无线回程链路处理模块通过以下方式执行与初始接入节点之间的端到端无线回程链路用户面加密和用户面完整性保护:在所述MNB的数据包汇聚协议安全PDCP-s层和所述初始接入节点的PDCP-s层之间执行端到端无线回程链路接入层安全。The second wireless backhaul link processing module performs end-to-end wireless backhaul link user plane encryption and user plane integrity protection with an initial access node by: a packet aggregation protocol security PDCP in the MNB The end-to-end wireless backhaul link access layer security is performed between the -s layer and the PDCP-s layer of the initial access node.
  38. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现权利要求1至15任一项所述的方法。 A computer readable storage medium storing computer executable instructions that, when executed, implement the method of any one of claims 1 to 15.
PCT/CN2016/076290 2015-07-20 2016-03-14 Method, user equipment, and node for implementing access stratum security WO2016177107A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510428467.0 2015-07-20
CN201510428467.0A CN106375992B (en) 2015-07-20 2015-07-20 The method and user equipment and node of realization access layer safety

Publications (1)

Publication Number Publication Date
WO2016177107A1 true WO2016177107A1 (en) 2016-11-10

Family

ID=57218490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/076290 WO2016177107A1 (en) 2015-07-20 2016-03-14 Method, user equipment, and node for implementing access stratum security

Country Status (2)

Country Link
CN (1) CN106375992B (en)
WO (1) WO2016177107A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2743578C1 (en) * 2017-10-02 2021-02-20 Телефонактиеболагет Лм Эрикссон (Пабл) Security on the access level in wireless communications

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110268797B (en) * 2017-03-19 2022-07-29 上海朗帛通信技术有限公司 Method and device for downlink transmission
CN110313164B (en) * 2017-03-19 2022-07-26 上海朗帛通信技术有限公司 Method and device for uplink transmission
CN110365470B (en) * 2018-03-26 2023-10-10 华为技术有限公司 Key generation method and related device
WO2020164506A1 (en) * 2019-02-14 2020-08-20 JRD Communication (Shenzhen) Ltd. Iab security
CN111371798A (en) * 2020-02-24 2020-07-03 迈普通信技术股份有限公司 Data security transmission method, system, device and storage medium
CN115701161A (en) * 2021-07-31 2023-02-07 华为技术有限公司 Method for establishing secure transmission channel, method for determining secret key and communication device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056157A (en) * 2009-11-04 2011-05-11 大唐移动通信设备有限公司 Method, system and device for determining keys and ciphertexts
US20130273890A1 (en) * 2010-11-11 2013-10-17 Nokia Siemens Networks Oy Method and Apparatus for Handling Closed Subscriber Groups in Relay-Enhanced System
WO2014109603A1 (en) * 2013-01-11 2014-07-17 Lg Electronics Inc. Method and apparatus for transmitting indication in wireless communication system
CN104349312A (en) * 2013-08-02 2015-02-11 上海贝尔股份有限公司 Safe processing method for supporting dual connection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931953B (en) * 2010-09-20 2015-09-16 中兴通讯股份有限公司 Generate the method and system with the safe key of apparatus bound
CN103929740B (en) * 2013-01-15 2017-05-10 中兴通讯股份有限公司 Safe data transmission method and LTE access network system
GB2509937A (en) * 2013-01-17 2014-07-23 Nec Corp Providing security information to a mobile device in which user plane data and control plane signalling are communicated via different base stations
CN104519486B (en) * 2013-09-29 2018-05-04 中国电信股份有限公司 Method and system for wireless side key updating in heterogeneous network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056157A (en) * 2009-11-04 2011-05-11 大唐移动通信设备有限公司 Method, system and device for determining keys and ciphertexts
US20130273890A1 (en) * 2010-11-11 2013-10-17 Nokia Siemens Networks Oy Method and Apparatus for Handling Closed Subscriber Groups in Relay-Enhanced System
WO2014109603A1 (en) * 2013-01-11 2014-07-17 Lg Electronics Inc. Method and apparatus for transmitting indication in wireless communication system
CN104349312A (en) * 2013-08-02 2015-02-11 上海贝尔股份有限公司 Safe processing method for supporting dual connection

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2743578C1 (en) * 2017-10-02 2021-02-20 Телефонактиеболагет Лм Эрикссон (Пабл) Security on the access level in wireless communications

Also Published As

Publication number Publication date
CN106375992A (en) 2017-02-01
CN106375992B (en) 2019-08-06

Similar Documents

Publication Publication Date Title
WO2016177143A1 (en) Method for implementing access stratum security, user equipment, and small radio access network node
WO2016177107A1 (en) Method, user equipment, and node for implementing access stratum security
US9497673B2 (en) Method and apparatus to enable multiple wireless connections
US11026136B2 (en) Handovers with simplified network topology
KR20060126890A (en) Method for serving fast roamming in a wileless network
CN106465101B (en) System and method for wireless network access protection and security architecture
JP6218166B2 (en) Inter-base station handover method
KR20220019703A (en) How to dynamically provision a key for authentication on a relay device
US20220174761A1 (en) Communications method and apparatus
US9049693B2 (en) Gateway, communication system, method of controlling gateway, and computer readable medium therefor
Saldana et al. Attention to Wi-Fi diversity: Resource management in WLANs with heterogeneous APs
JP6452800B2 (en) Method, system, apparatus and computer storage medium for realizing hybrid networking
CN107925874B (en) Ultra-dense network security architecture and method
Cao et al. Seamless and secure communications over heterogeneous wireless networks
Khan et al. Wireless ad hoc networks with 5G technology
EP3520316B1 (en) Handovers with simplified network topology
WO2022094976A1 (en) Key generation method and apparatus
Chen et al. Usercentric ultra-dense networks for 5g
Ozhelvaci Secure and efficient authentication schemes for 5G heterogeneous networks
Sinha et al. A Device to Device Communication with Trusted Node Mapping in Cellular Network
Ramakrishna et al. A Study on Multi Wireless Technologies–Architectures and Security Mechanisms
Namal Enhanced communication security and mobility management in small-cell networks
Mulder LTE-WiFi Handover Strangelove
Zhang Jiannong Cao
KR20150061856A (en) Message processing method and apparatus for call setup and mobile telecommunication system for the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16789101

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16789101

Country of ref document: EP

Kind code of ref document: A1