WO2020121455A1 - Terminal device, wireless communication device, wireless communication system, and wireless communication method - Google Patents

Terminal device, wireless communication device, wireless communication system, and wireless communication method Download PDF

Info

Publication number
WO2020121455A1
WO2020121455A1 PCT/JP2018/045771 JP2018045771W WO2020121455A1 WO 2020121455 A1 WO2020121455 A1 WO 2020121455A1 JP 2018045771 W JP2018045771 W JP 2018045771W WO 2020121455 A1 WO2020121455 A1 WO 2020121455A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
security
terminal device
wireless communication
base station
Prior art date
Application number
PCT/JP2018/045771
Other languages
French (fr)
Japanese (ja)
Inventor
陽平 工口
大出 高義
義博 河▲崎▼
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to JP2020559620A priority Critical patent/JP7160114B2/en
Priority to PCT/JP2018/045771 priority patent/WO2020121455A1/en
Publication of WO2020121455A1 publication Critical patent/WO2020121455A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Definitions

  • the present invention relates to a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method.
  • LTE Long Term Evolution
  • signal integrity guarantee and encryption are performed between the terminal device (User Equipment: UE) and the base station (evolved Node-B: eNB).
  • UE User Equipment
  • eNB evolved Node-B
  • keys used for integrity assurance and encryption of the C (Control)-Plane signal and the U (User)-Plane signal are managed by the UE and the eNB, respectively. ..
  • a security algorithm for signal integrity guarantee and encryption an algorithm that can be used by both the UE and the eNB is used.
  • the security algorithm may be simply referred to as an algorithm.
  • Algorithms used in LTE include SNOW 3G, ASE (Advanced Encryption Standard), and ZUC.
  • the processing related to security between the UE and the eNB in LET is executed as follows.
  • the UE sends an algorithm that can be used by itself to the MME (Mobility Management Entity) as UE Security Capability.
  • the MME sends the acquired UE Security Capability to the eNB.
  • the security-related processing is executed as follows.
  • a case will be described where there are two eNBs, a first eNB and a second eNB.
  • the UE connected to the first eNB moves in the serving area and connects to the second eNB
  • the UE sends one or more available algorithms to the second eNB as UE Security Capability.
  • the second eNB that has received the UE Security Capability selects an algorithm and establishes a wireless connection with the UE.
  • the second eNB fails to establish a connection with the UE.
  • RRC_inactive As the state of RRC (Radio Resource Control). This is a state in which the wireless channel (Wireless Channel) between the base station and the terminal device is disconnected while maintaining the AS context including AS (Access Stratum) information such as security and the upper level circuit. Is a state equivalent to the conventional RRC_idle. However, unlike the case where the base station shifts from RRC_idel (standby state) to RRC_connection (connected state) when the base station holds the AS context, the terminal device in this case does not perform the upper line setting and does not perform RRC-inactive( It is possible to shift to RRC_connection from the wireless line disconnection and the upper line connection state).
  • RRC_inactive location registration is performed in a RAN (Radio Access Network) area that is narrower than the conventional tracking area (TA: Tracking Area).
  • TA Tracking Area
  • the tracking area and the RAN area may be referred to as a location registration area.
  • TAU Tracking Area Update
  • RAU Radio Access Area Update
  • the TAU is a process in which the terminal periodically (periodically) reports the existing area to the network so that the base station recognizes the existing area of the terminal device at the time of an incoming call (incoming call).
  • the RAU is a process in which the terminal device periodically performs location registration in a RAN area smaller than TA in the RRC_inactive state. As described above, the terminal device uses RA when transitioning from RRC-inactive to RRC_connection.
  • the source base station determines whether or not communication with the destination base station is possible based on the security capability information received from the terminal device, and communicates with the destination base station.
  • a terminal device receives a list of corresponding security algorithms from a network at the time of handover to another network and selects a security algorithm.
  • 3GPP TS 23.501 V15.3.0 (2018-09) 3GPP TS 36.211 V15.2.0 (2018-06) 3GPP TS 36.212 V15.2.1 (2018-07) 3GPP TS 36.213 V15.2.0 (2018-06) 3GPP TS 36.300 V15.2.0 (2018-06) 3GPP TS 36.321 V15.2.0 (2018-07) 3GPP TS 36.322 V15.1.0 (2018-07) 3GPP TS 36.323 V15.0.0 (2018-07) 3GPP TS 36.331 V15.2.2 (2018-06) 3GPP TS 36.413 V15.2.0 (2018-06) 3GPP TS 36.423 V15.2.0 (2018-06) 3GPP TS 36.425 V15.0.0 (2018-06) 3GPP TS 37.340 V15.2.0 (2018-06) 3GPP TS 38.201 V15.0.0 (2017-12) 3GPP TS 38.202 V15.2.0 (2018-06
  • the terminal (UE) connected to a certain base station (gNB) is in the RRC_inactive state and then the UE moves within the area (moves between areas), the gNB connected at the movement destination and before the movement
  • the algorithm that can be used differs from the gNB that was connected to.
  • the transition from the RRC_inactive state to RRC_connected may fail. If the transition to RRC_connected fails, the terminal device becomes RLF (Radio Link Failure).
  • the communication loss occurs for the time until the RLF is reached and the time from the RLF occurrence until the gNB reselection and connection to the selected gNB are added, and as a result, the transmission speed to the terminal device decreases. There is a risk that Therefore, the effect of shortening the reconnection time and improving the transmission rate by using RRC_inactive becomes small.
  • the source base station transmits information of the security key used for communication with the destination base station to the terminal device based on the information of the security capability received from the terminal device
  • information is transmitted to the terminal in the RRC_inactive state. Is difficult to convey. Therefore, it is difficult to improve the transmission speed even by using this conventional technique.
  • the conventional technique that selects a security algorithm based on the distributed list of corresponding security algorithms, secure information is notified, and it is difficult to transmit information to a terminal in the RRC_inactive state. Therefore, it is difficult to improve the transmission rate using this conventional technique.
  • the disclosed technique is made in view of the above, and an object thereof is to provide a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method that improve the transmission speed.
  • the receiving unit receives, from the wireless communication device, first information about a plurality of base stations according to security information of the terminal device. To receive.
  • the selection unit selects a base station to be connected from the plurality of base stations based on the first information.
  • the transmitting unit transmits the second information for restarting the wireless connection to the selected base station.
  • the terminal device the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application, it is possible to improve the transmission speed.
  • FIG. 1 is a system configuration diagram of a wireless communication system.
  • FIG. 2 is a block diagram of the UE.
  • FIG. 3 is a diagram illustrating an example of the terminal-specific cell list.
  • FIG. 4 is a block diagram of gNB.
  • FIG. 5 is a block diagram of AMF.
  • FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list.
  • FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that received paging from the UE does not support the available dark security algorithm.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that received paging from the UE does not support the available dark security algorithm.
  • FIG. 9 is a sequence diagram of the reconnection process when the security algorithm that can be used by the UE corresponds to the gNB that is the transmission destination of the TAU.
  • FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination.
  • FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive.
  • FIG. 12 is a hardware configuration diagram of the AMF.
  • FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment.
  • FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list.
  • the terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application are not limited to the embodiments described below. Further, the problems and examples in the present specification are merely examples, and do not limit the scope of rights of the present application. In particular, even if the described expressions are different, as long as they are technically equivalent, the technology of the present application can be applied even if the expressions are different, and the scope of rights is not limited. Then, the respective embodiments can be appropriately combined within a range in which the processing content is not inconsistent.
  • the wireless communication system 100 includes a UE 1, an AMF (Access and Mobility Management Function) 2, a gNB 3, an SMF (Session Management Function) 4 and an UPF (User Plane Function) 5.
  • a UE an AMF (Access and Mobility Management Function) 2
  • a gNB an SMF (Session Management Function) 4
  • an UPF User Plane Function
  • the UE1 is a terminal device and performs data transmission by wireless communication with gNB3. For example, the UE1 acquires the tracking area information from the AMF2 via the gNB3. Next, the UE1 selects a cell to be connected from the cells included in the tracking area, and connects to the gNB3 forming the cell. After that, the UE1 communicates with another UE1 via the connected gNB3. The state in which the UE 1 can communicate is a state called RRC_connected. Also, the UE1 periodically executes TAU to update the tracking area.
  • the state of UE1 transits from RRC_connected to RRC_inactive when the Inactive Timer or the data communication frequency satisfies a predetermined condition.
  • RRC_inactive the radio layer connection between the UE1 and the gNB3 is disconnected, but the upper layer remains connected.
  • the gNB3 and the AMF2 that are finally connected hold the AS context of the UE1.
  • the AS context includes AS information such as security including a security algorithm.
  • UE1 transmits location registration information (may be described as location information) and receives a RAN area, which is a location registration area, from AMF2 via gNB3.
  • the UE1 periodically executes RAU to update the RAN area.
  • UE1 acquires the information of the RAN area and the tracking area transmitted from AMF2 via gNB3.
  • the UE1 when transitioning from RRC_inactive to RRC_connected, the UE1 establishes communication by reconnecting the radio layer by performing random access, establishment of radio synchronization, RRC configuration, etc. with the gNB3 included in the RAN area. .. This connection processing when transitioning from RRC_inactive to RRC_connected will be described in detail later.
  • AMF2 is a wireless communication device that executes mobility management in C(control)-Plane.
  • the AMF 2 executes registration and control of the location registration information of the UE 1.
  • the AMF2 updates the tracking area of the UE1 by using the position information transmitted from the UE1 by the TAU.
  • the AMF2 updates the RAN area of the UE1 using the location registration information transmitted from the UE1 by the RAU.
  • AMF2 also controls incoming and outgoing calls. Further, the AMF2 manages security information of the UE1 and the gNB3. Further, when the AMF 2 receives the TAU from the UE 1, the AMF 2 transmits the information on the tracking area corresponding to the position information of the UE 1 to the UE 1 via the gNB 3. In addition, when the AMF 2 receives the RAU from the UE 1, the AMF 2 transmits the RAN area information corresponding to the location registration information of the UE 1 to the UE 1 via the gNB 3.
  • GNB3 is a radio base station that provides 5G radio.
  • the gNB3 executes data transfer by wireless communication with the UE1.
  • the gNB3 transmits information on the RAN area and the tracking area transmitted from the AMF2 to the UE1.
  • the SMF 4 is a communication control device that executes session management in C-Plane.
  • the SMF 4 controls setting and releasing of a session in wireless communication.
  • UPF5 controls communication in U(User)-Plane.
  • the UPF 5 processes data packets between the wireless communication network and the data network.
  • FIG. 2 is a block diagram of the UE.
  • the UE 1 includes an RRC processing unit 11, a PDCP (Packet Data Convergence Protocol) processing unit 12, an RLC (Radio Link Control) processing unit 13, a MAC (Media Access Control) processing unit 14, and a PHY (Physical). It has a processing unit 15. Furthermore, the UE 1 has a communication control unit 16.
  • the terminal-specific cell list for grasping the security algorithm that can be used by each gNB 3 at the time of paging (at the time of calling or notification of an incoming call) and at the time of updating the tracking area is sent to the UE 1.
  • the terminal-specific cell list may be sent to the UE1 when updating the RAN area.
  • the RRC processing unit 11 executes processing in the RRC layer such as system notification information distribution, paging distribution, NAS (Non Access Stratum) message distribution, RRC connection management, wireless security setting and handover control. Further, the RRC processing unit 11 periodically transmits a location registration request to the AMF2.
  • the location registration request is, for example, TAU for updating the tracking area or RAU for updating the RAN area.
  • the RRC processing unit 11 has a cell selection control unit 111 and a security information management unit 112.
  • the cell selection control unit 111 acquires a tracking area code indicating a tracking area during paging or TAU. Then, the cell selection control unit 111 acquires the terminal-specific cell list from SIB (System Information Block) which is system information (or system control information) included in the tracking area code.
  • SIB System Information Block
  • FIG. 3 is a diagram showing an example of a terminal individual cell list.
  • the terminal-specific cell list 201 is a list in which gNB3 in which the algorithm A can be used as the security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A from the terminal-specific cell list 201.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 201 that the gNB3 having the cell ID #3 can use the algorithm A.
  • the terminal-specific cell list 202 is a list in which gNB3 in which the algorithm B can be used as a security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm B from the terminal-specific cell list 202.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 202 that the gNB3 having the cell ID #1 or #2 can use the algorithm B.
  • the terminal-specific cell list 203 is a list in which gNB3 that can use algorithm A or B as a security algorithm is registered.
  • the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A or B from the terminal-specific cell list 203.
  • the cell selection control unit 111 can confirm from the terminal-specific cell list 203 that the gNB3 having the cell IDs #1 to #3 can use the algorithm A or B.
  • it is referred to as a terminal individual cell list 200.
  • the cell selection control unit 111 instructs the PHY processing unit 15 to measure the wireless line quality of the gNB3 registered in the terminal-specific cell list 200. After that, the cell selection control unit 111 acquires the measurement result of the wireless channel quality of each gNB3 registered in the terminal-specific cell list 200. Then, the cell selection control unit 111 selects the gNB3 to be connected using the wireless line quality of each gNB3, such as selecting the cell with the best wireless line quality. After that, the cell selection control unit 111 outputs the information of the selected gNB3 and the terminal-specific cell list 200 to the security information management unit 112.
  • the cell selection control unit 111 corresponds to an example of a “selection unit”.
  • the terminal individual cell list 200 corresponds to an example of “first information”.
  • the security information management unit 112 holds security information including information on security algorithms usable by the UE 1.
  • the security information management unit 112 registers the security algorithm information in the UE capability (terminal performance information) transmitted to the gNB3 connected to the RRC processing unit 11. Further, the security information management unit 112 creates an AS context including a security key for data communication and an algorithm. Then, the security information management unit 112 transmits the AS context to the AMF 2 via the PDCP processing unit 12, the RLC processing unit 13, the MAC processing unit 14, the PHY processing unit 15, and the communication control unit 16 when the connection is established. It should be noted that the terminal performance information does not change due to external factors such as wireless line quality, but is the capability of the terminal itself.
  • the security information management unit 112 receives from the cell selection control unit 111 the information of the gNB3 selected as the connection destination and the input of the terminal individual cell list 200. Then, the security information management unit 112 identifies a security algorithm that can be used by the gNB3 selected as the connection destination by using the terminal-specific cell list 200 for communication with the UE1. Next, the security information management unit 112 determines the security algorithm used for communication with the gNB3 selected as the connection destination. After that, the security information management unit 112 notifies the PDCP processing unit 12 of the security algorithm used for communication with the gNB3 selected as the connection destination.
  • the RRC processing unit 11 transmits an RRC Resume Request, which is a communication restart request, to the gNB 3 selected as the connection destination by the cell selection control unit 111. After that, the RRC processing unit 11 receives the RRC Resume from the connection destination gNB3, establishes the connection of the wireless layer, and establishes the communication connection with the gNB3.
  • the RRC processing unit 11 corresponds to an example of a “wireless connection management unit”.
  • Resume Request is an example of “second information”.
  • the PDCP processing unit 12 executes processing in the PDCP layer such as IP (Internet Protocol) packet header compression, decompression, and encryption.
  • the PDCP processing unit 12 has a security control unit 121.
  • the security control unit 121 performs signaling integrity assurance and encryption, and encryption cancellation.
  • the security control unit 121 acquires the information of the security algorithm used for communication notified from the security information management unit 112. Then, the security control unit 121 encrypts the data to be transmitted using the specified security algorithm and guarantees the integrity.
  • the security control unit 121 also decrypts the data input from the RLC processing unit 13 using a designated security algorithm.
  • the RLC processing unit 13 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
  • the MAC processing unit 14 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 14 performs radio resource allocation, data mapping, and the like on the data input from the RLC processing unit 13, and outputs the data to the PHY processing unit 15.
  • the PHY processing unit 15 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, antenna multiplexing, and quality measurement. For example, the PHY processing unit 15 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 14. Further, the PHY processing unit 15 performs modulation processing or coding processing on the signal input from the MAC processing unit 14 and outputs the signal to the communication control unit 16.
  • the communication control unit 16 performs conversion between a PHY baseband signal and a wireless signal.
  • the communication control unit 16 transmits a wireless signal to the gNB3 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the gNB3 that is the connection destination.
  • the communication control unit 16 corresponds to an example of the “reception unit”. Further, the communication control unit 16 may include a transmission unit (transmitter), a reception unit (receiver), or a communication unit (communication device).
  • FIG. 4 is a block diagram of gNB.
  • the gNB 3 has an RRC processing unit 31, a PDCP processing unit 32, an RLC processing unit 33, a MAC processing unit 34, a PHY processing unit 35, a communication control unit 36, and an SDAP (Service Discovery Adaptation Profile) processing unit 37.
  • RRC processing unit 31 a PDCP processing unit 32, an RLC processing unit 33, a MAC processing unit 34, a PHY processing unit 35, a communication control unit 36, and an SDAP (Service Discovery Adaptation Profile) processing unit 37.
  • the RRC processing unit 31 executes processes in the RRC layer such as RRC connection management, wireless security setting, and handover control.
  • the RRC processing unit 31 has a security information management unit 311.
  • the RRC processing unit 31 corresponds to an example of “connection control unit”.
  • the security information management unit 112 holds security information including information on security algorithms that can be used by gNB3. Further, when the UE1 connects to the gNB3, the security information management unit 112 receives the AS context of the connecting UE1 from the AMF2. Then, the security information management unit 112 holds the AS context of the UE1 when the connected UE1 is in the RRC_connected state or when it transits to RRC_inactive. That is, the security information management unit 112 holds security information including information on security algorithms that can be used by the UE1. Further, the security information management unit 311 notifies the security control unit 321 of the security information including the information of the security algorithm included in the AS context of the UE1.
  • the RRC processing unit 31 receives the RRC Resume Request from the UE1 when the UE 1 in the RRC_inactive state selects its own device gNB3 as the connection destination for resuming communication. Then, the RRC processing unit 31 transmits a Retrieve AS Context Request, which is an acquisition request of the AS context of the UE 1, to the gNB 3 holding the AS context of the UE 1, such as the anchor gNB. After that, the RRC processing unit 31 receives the Retrieve AS Context Response from the gNB 3 that has transmitted the acquisition request. Then, the RRC processing unit 31 sets the cell formed by the gNB3, which is the own device, as the anchor cell or the serving cell of the UE1. After that, the RRC processing unit 31 transmits the RRC Resume to the UE 1. After that, the RRC processing unit 31 establishes a wireless layer connection with the UE1 and a communication connection with the UE1.
  • the PDCP processing unit 32 executes processing in the PDCP layer such as IP packet header compression, decompression, and encryption.
  • the PDCP processing unit 32 has a security control unit 321. Further, the PDCP processing unit 32 receives from the SDAP processing unit 37 the input of the IP packet transmitted from the other gNB3 and AMF2. Further, the PDCP processing unit 32 outputs to the SDAP processing unit 37 the IP packet to be transmitted to the other gNB3, AMF2 and the like.
  • the security control unit 321 performs signaling integrity assurance and encryption, and decryption.
  • the security control unit 321 acquires the information of the security algorithm used for communication notified from the security information management unit 311. Then, the security control unit 321 encrypts the data to be transmitted to the UE1 using the designated security algorithm and guarantees the integrity.
  • the security control unit 221 also decrypts the transmission data from the UE 1 input from the RLC processing unit 33, using a designated security algorithm.
  • the RLC processing unit 33 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
  • the MAC processing unit 34 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 34 performs radio resource allocation and data mapping for the data input from the RLC processing unit 33, and outputs the data to the PHY processing unit 35.
  • the PHY processing unit 35 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, and antenna multiplexing. For example, the PHY processing unit 35 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 34. Further, the PHY processing unit 35 performs modulation processing and coding processing on the signal input from the MAC processing unit 34 and outputs the signal to the communication control unit 36.
  • the communication control unit 36 performs conversion between PHY baseband signals and wireless signals.
  • the communication control unit 36 transmits a radio signal to the UE1 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the UE 1 that is the connection destination.
  • the SDAP processing unit 37 Manages user data QoS (Quality Of Service). For example, the SDAP processing unit 37 receives the input of the IP packet received from the core network 6 from the PDCP processing unit 32. Then, the SDAP processing unit 37 maps the acquired IP packet on a radio bearer corresponding to QoS, and outputs it to the PDCP processing unit 32. Further, the SDAP processing unit 37 maps the IP packet acquired from the PDCP processing unit 32 to a radio bearer corresponding to QoS and sends it to the core network 6.
  • QoS Quality Of Service
  • FIG. 5 is a block diagram of AMF.
  • the AMF 2 has a communication control unit 21, a mobility control unit 22, a path control unit 23, a base station management unit 24, a cell list management unit 25, and a security management unit 26.
  • the communication control unit 21 transmits/receives data to/from the gNB3.
  • the communication control unit 21 mediates communication between the gNB 3 and the mobility control unit 22, the path control unit 23, and the base station management unit 24.
  • the communication control unit 21 adds the terminal individual cell list 200 of the paging destination UE1 acquired from the cell list management unit 25 to the paging transmitted from the path control unit 23, and sends the paging destination to the gNB3.
  • the communication control unit 21 corresponds to an example of “information receiving unit”.
  • the path control unit 23 controls incoming and outgoing calls. For example, the path control unit 23 receives the information on the tracking area and the RAN area of the UE 1 from the mobility control unit 22. The path control unit 23 also receives the paging request from the gNB3. Next, the path control unit 23 determines the communication route to the UE 1 that is the paging destination using the tracking area or the RAN area. Then, the path control unit 23 transmits the paging to the gNB3 of the determined communication route. Further, the path control unit 23 notifies the cell list management unit 25 of the execution of paging when performing paging. At this time, the path control unit 23 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
  • the base station management unit 24 manages base station information including cell information in TA or RA units.
  • the base station management unit 24 transmits a Cell Information Request, which is a cell information notification request, to each gNB 3 when the network is constructed.
  • This Cell Information Request also includes a notification request of a security algorithm that can be used by each gNB3.
  • the base station management unit 24 receives the cell information from each gNB3. Then, the base station management unit 24 notifies the security management unit 26 of the security algorithm that can be used by each gNB 3.
  • the base station management unit 24 sets a tracking area and a RAN area from the acquired cell information. Then, the base station management unit 24 outputs the information on the tracking area and the RAN area together with the cell information to the mobility control unit 22. Further, the base station management unit 24 outputs information on the tracking area to the cell list management unit 25.
  • the mobility control unit 22 executes registration and control of the location information of the UE1. Specifically, the mobility control unit 22 receives the information on the tracking area and the RAN area together with the cell information from the base station management unit 24. The mobility control unit 22 also periodically receives a report of the area in which the UE 1 is located. Then, the mobility control unit 22 specifies the tracking area of the UE1. Further, when the UE1 is RRC_inactive, the mobility control unit 22 specifies the RAN area. The mobility controller 22 notifies the path controller 23 of the tracking area and RAN area of the UE 1. The mobility control unit 22 also notifies the cell list management unit 25 of the update of the tracking area. At this time, the mobility control unit 22 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
  • the security management unit 26 receives the performance information transmitted from each UE 1.
  • the performance information also includes information on a security algorithm that can be used by each UE 1.
  • the security management unit 26 Based on this, the security management unit 26 generates AS context information of each UE1. Further, the security management unit 26 receives from the base station management unit 24 the information of the security algorithm that can be used by each gNB 3. Then, the security management unit 26 stores the information of the security algorithm that can be used for each UE1 and each gNB3.
  • the security management unit 26 generates each UEAS context information based on the performance information of the UE1 establishing the connection with the gNB3. Then, the security management unit 26 transmits the AS context information to the gNB 3 which establishes the connection with the UE 1 and sets the AS context.
  • the cell list management unit 25 receives input of tracking area information from the base station management unit 24. Further, the cell list management unit 25 acquires information on the security algorithm of each gNB 3 from the security management unit 26. Then, the cell list management unit 25 creates the terminal-specific cell list 200 for each security algorithm pattern for each tracking area. In the present embodiment, the terminal-specific cell list 200 generates a white cell list indicating gNB3 that can be used for each security algorithm or gNB3 that can be line-configured by using the security algorithm.
  • the cell list management unit 25 executes the following processing.
  • the cell list management unit 25 acquires, from the security management unit 26, information on the security algorithm that can be used by the UE 1 that is the target of paging, tracking area update, or location registration area update. Then, the cell list management unit 25 selects the terminal-specific cell list 200 in the tracking area (location registration area) in which the UE 1 is located and has a pattern corresponding to the security algorithm usable by the UE 1, and transmits the cell list 200 to the UE 1. .
  • the cell list management unit 25 corresponds to an example of “information management unit”.
  • the cell list management unit 25 uses the white cell list as the terminal-specific cell list 200.
  • the cell list management unit 25 may use, as the terminal individual cell list 200, a gNB3 that does not correspond to each security algorithm, or a black cell list in which gNB3 in which line setting is difficult because the security algorithm does not correspond is used. Good.
  • the UE1 detects the connectable gNB3 by performing radio channel quality measurement on the gNB3 excluding the gNB3 registered in the acquired terminal-specific cell list 200.
  • the black cell list can reduce the amount of information.
  • the cell list management unit 25 may determine whether the terminal individual cell list 200 to be transmitted is the white cell list or the black cell list according to the amount of information.
  • the UE1 determines whether the received terminal-specific cell list 200 is the white cell list or the black cell list. Therefore, the cell list management unit 25 preferably uses the terminal-specific cell list 200 in which the 1-bit identification flag 212 is added to the cell ID information 211 as shown in FIG.
  • FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list. The UE 1 can determine whether the cell ID information 211 is the white cell list or the black cell list by checking the identification flag 212 of the received terminal-specific cell list 200.
  • the cell list management unit 25 also transmits the terminal-specific cell list 200 to the gNB3 that is used for transmitting the TAU signal when the UE1 moves or is transmitted together with paging.
  • the gNB3 used for paging and transmitting the TAU signal does not correspond to the security algorithm used by the UE1. Therefore, in this embodiment, an unencrypted or common security algorithm is used for paging and TAU signal transmission.
  • the common algorithm is a security algorithm which is predetermined to be used on the network.
  • the terminal individual cell list 200 is transmitted using encryption that is not encrypted or that is easy to decipher.
  • the terminal-specific cell list 200 only needs to describe cell identification information.
  • the cell selected by the UE1 has the highest line quality in the terminal-specific cell list 200 and cannot be easily specified by a third party. From these things, it can be said that the terminal-specific cell list 200 does not include secure information. Therefore, there is no problem in transmitting the terminal-specific cell list 200 by the cell list managing unit 25 without encrypting.
  • the security algorithms used for the C-plane signal and the U-plane signal may be the same. However, if the same security algorithm is used for the C-plane signal and the U-plane signal, if the C-plane signal such as the TAU signal is not encrypted or a common algorithm is used, the U-plane signal is May be leaked to the three parties. Therefore, in this embodiment, it is preferable to use different security algorithms for the C-plane signal and the U-plane signal.
  • FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE.
  • FIG. 8 is a sequence diagram of the reconnection process when the gNB that receives the paging does not correspond to the security algorithm usable by the UE.
  • the description will be given assuming that the operation subjects are UE1, gNB3A to 3C, and AMF2.
  • the gNB3C is an anchor gNB that serves as a relay device in the C-plane connection.
  • the gNB3A and the gNB3B have the same tracking area (position registration area), but the gNB3C has a different tracking area (position registration area). Further, in this embodiment, AMF2 is used in all of gNB3A to 3C, but this may be different.
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S101).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S102).
  • the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S103).
  • the AMF 2 receives the downlink signal whose destination is the UE 1 (step S104).
  • AMF2 confirms the UE context of UE1 (step S105).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S106).
  • the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S107).
  • the UE1 receives the paging (step S108). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
  • the UE1 receives a reference signal (Reference Signal: RS) from the gNB 3A and 3B (steps S109 and S110).
  • RS Reference Signal
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use.
  • the UE1 uses the reference signals of the gNB 3A and 3B to perform the radio channel quality measurement (step S111).
  • the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S112).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S113).
  • the gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S114).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3A (step S115).
  • the gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S116).
  • the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S117).
  • the UE1 and the gNB3A perform transmission of user data using the established communication connection (step S118).
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S201).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transitions to the RRC_inactive state (step S202).
  • the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S203).
  • the AMF 2 receives the downlink signal whose destination is the UE 1 (step S204).
  • AMF2 confirms the UE context of UE1 (step S205).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S206).
  • the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S207).
  • the UE1 receives the paging (step S208). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
  • the UE1 receives the reference signal from the gNB 3A and 3B (steps S209 and S210).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID.
  • the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the wireless channel quality of the reference signal of gNB3B (step S211).
  • the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S212).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S213).
  • the gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S214).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S215).
  • the gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3B sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S216).
  • the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S217).
  • the UE 1 and the gNB 3B transmit user data using the established communication connection (step S218).
  • FIG. 9 is a sequence diagram of a reconnection process in the case where the destination gNB of the TAU (location registration area update) corresponds to the security algorithm usable by the UE.
  • FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination.
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S301).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S302).
  • the UE1 executes the movement across the tracking area (step S303).
  • the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S304).
  • UE1 transmits TAU to AMF2 via the selected gNB3A (step S305).
  • AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Further, the AMF 2 confirms the UE context (step S306).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S307).
  • the AMF 2 transmits the Tracking Area Update Accept, which is the update completion notification of the tracking area (location registration area), and the terminal individual cell list 200 to the UE 1 via the gNB 3C and 3A (step S308).
  • UE1 receives Tracking Area Update Accept and terminal individual cell list 200 from AMF2. Next, UE1 receives a reference signal from gNB3A and 3B (steps S309 and S310).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use. Then, the UE1 executes the wireless channel quality measurement using the reference signals of the gNB 3A and 3B (step S311).
  • the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S312).
  • the UE1 sends an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S313).
  • the gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S314).
  • the gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response, which transmits the context information of the UE1, to the gNB3A (step S315).
  • the gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S316).
  • the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S317).
  • the UE1 and the gNB3A transmit user data using the established communication connection (step S318).
  • the gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S401).
  • UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S402).
  • the UE1 executes movement across the tracking area (or movement to a different tracking area) (step S403).
  • the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S404).
  • UE1 transmits TAU to AMF2 via the selected gNB3A (step S405).
  • AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Also, the AMF 2 confirms the UE context (step S406).
  • the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S407).
  • the AMF 2 transmits the Tracking Area Update Accept, which is a notification of the completion of updating the tracking area, and the terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S408).
  • the UE1 receives the reference signal from the gNB 3A and 3B (steps S409 and S410).
  • the UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B.
  • the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID.
  • the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the radio channel quality of the reference signal of gNB3B (step S411).
  • the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S412).
  • the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S413).
  • the gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S414).
  • the gNB3C receives the Retrieve UE Context Request and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S415).
  • the gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, gNB3B sets the cell formed by itself as the anchor cell or the serving cell of UE1 (step S416).
  • the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S417).
  • the UE1 and the gNB3B transmit user data using the established communication connection (step S418).
  • FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive.
  • the AMF 2 transmits a Call Information Request, which is a cell information notification request, to the gNBs 3A to 3C (step S501).
  • the Call Information Request also includes a notification request of a security algorithm that can be used by each of the gNBs 3A to 3C.
  • the gNBs 3A to 3C transmit the cell information including the information of the security algorithm that can be used by each to the AMF 2 (step S502).
  • the AMF 2 creates a terminal-specific cell list 200 for each pattern (step S503).
  • UE1 executes random access to gNB3A to 3C. Then, the UE1 transmits the UE context and sets the UE context of the UE1 in the gNBs 3A to 3C (step S504).
  • UE1 transmits the UE performance information including the security algorithm of UE1 to AMF2 (step S505).
  • the UE1 transmits TAU or location information to the AMF (step S506).
  • the gNB3C sends a paging notification to the UE1 by paging occurrence (step S507).
  • the AMF 2 After that, the AMF 2 generates each UEAS context information based on the UE performance information of the UE 1. Then, the security management unit 26 transmits the AS context information to the connected base station among the gNBs 3A to 3B and sets the AS context (step S508).
  • UE1 moves to RRC_connected (step S509).
  • the UE 1 and the base station connected to one of the gNBs 3A to 3B release the wireless link and release the UE context when a specific condition is satisfied (step S510).
  • the UE1 transits to RRC_inactive (step S511).
  • FIG. 12 is a hardware configuration diagram of the AMF.
  • the AMF 2 has a CPU (Central Processing Unit) 291, a memory 292, a hard disk 293, and a communication interface 294.
  • the CPU 291 is connected to the memory 292, the hard disk 293, and the communication interface 294 by a bus.
  • the CPU 291 communicates with the memory 292, the hard disk 293, and the communication interface 294 via the bus.
  • CPU Central Processing Unit
  • the communication interface 294 is an interface for communication between the communication control unit 21 and gNB3.
  • the hard disk 293 includes various programs including programs that implement the functions of the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security management unit 26 illustrated in FIG. To store.
  • the CPU 291 reads various programs from the hard disk 293, loads the programs into the memory 292, and executes the programs to execute the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security.
  • the function of the management unit 26 is realized.
  • the acquisition timing of the terminal individual cell list 200 may be another timing.
  • the configuration may be such that the UE1 cell list 200 is acquired from the AMF2 when the UE1 performs RAU. Even when the terminal individual cell list 200 is acquired at the RAU timing, the UE1, gNB3, and AMF2 perform the same processing as each of the above-described processings, only at the different acquisition timings.
  • the UE acquires information for determining the security algorithm that can be used by the connectable gNB. Then, when the UE reconnects to the gNB in the RRC_inactive state, the UE establishes a connection with the gNB selected from the gNBs whose usable security algorithms match the own device. As a result, it is possible to avoid the connection failure due to the mismatch of the security algorithms at the time of reconnection from the RRC_inactive state and reduce the occurrence of RLF. Therefore, it is possible to reduce the time until the occurrence of RLF and the occurrence of communication interruption for the time from the occurrence of RLF to the reselection of gNB, and it is possible to improve the transmission speed. In addition, it is possible to take full advantage of using RRC_inactive.
  • UE1, gNB3 and AMF2 according to this embodiment are also represented in FIGS. 2, 4 and 5, respectively.
  • the UE 1 according to the present embodiment differs from the first embodiment in that the UE 1 according to the present embodiment stops the transmission of the terminal-specific cell list 200 from the AMF 2 in a predetermined case.
  • the description of the operation of each unit similar to that of the first embodiment is omitted.
  • the security control unit 121 of the UE 1 acquires the information of the security algorithm to be used from the security information management unit 112 when changing the security algorithm to be used due to the change of the service to be provided. Then, when changing the security algorithm to be used, the security control unit 121 transmits a cell list transmission stop request to the AMF2 via the gNB3.
  • the cell list management unit 25 of the AMF2 receives the cell list transmission stop request from the UE1. After that, the cell list management unit 25 stops the transmission of the terminal-specific cell list 200 at the time of TAU to the UE1.
  • FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment.
  • UE1 changes the service to be used according to an instruction from the user (step S601).
  • the UE1 changes the security algorithm to be used (step S602).
  • UE1 transmits a cell list transmission stop request to AMF2 via gNB3 (step S603).
  • AMF2 receives the cell list transmission stop request. Then, the AMF2 transmits ACK, which is a reception response of the cell list transmission stop request, to the UE1 (step S604). After this, the AMF2 stops the transmission of the terminal-specific cell list 200 to the UE1.
  • the UE according to the present embodiment stops receiving the individual terminal cell list when the service to be used is changed. As a result, unnecessary communication can be reduced, and it is possible to omit the process of confirming the mismatched security algorithm and improve the transmission speed.
  • the identification information of the gNB3 corresponding to the security algorithm usable by the UE1 is registered in the terminal individual cell list 200, but other information is also registered in the terminal individual cell list 200. May be done.
  • the information registered in the terminal-specific cell list 200 may be customized by a request from the UE1 side.
  • the security control unit 121 of the UE1 receives the instruction from the user and notifies the AMF2 of the information to be additionally registered in the terminal-specific cell list 200.
  • the cell list management unit 25 of the AMF 2 acquires information to be additionally registered in the terminal-specific cell list 200 transmitted from the UE 1. Then, the cell list management unit 25 adds the information specified at the time of creating the terminal-specific cell list 200, in addition to the identification information of the gNB3 corresponding to the security algorithm usable by the UE1.
  • FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list.
  • the information of the corresponding security algorithm is additionally registered will be described as an example.
  • UE1 transmits a cell list customization request for adding security algorithm information to AMF2 via gNB3 (step S611).
  • AMF2 receives the cell list customization request. Then, the AMF 2 transmits ACK, which is a reception response of the cell list customization request, to the UE 1 (step S612).
  • ACK which is a reception response of the cell list customization request
  • AMF2 registers information of the security algorithm corresponding to each gNB3 in the terminal-specific cell list 200 and transmits it to UE1.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a terminal device, wireless communication device, wireless communication system, and wireless communication method that improve transmission speed. A UE1 comprises a communication control unit 16, a cell selection control unit 111, and a security control unit 121. The communication control unit 16 receives, from an AMF, first information pertaining to a plurality of gNBs corresponding to security information for the UE1. On the basis of the first information, the cell selection control unit 111 selects a gnB to connect from among the plurality of gNBs. The security control unit121 transmits second information, for resuming wireless connection, to the selected gNB.

Description

端末装置、無線通信装置、無線通信システム及び無線通信方法Terminal device, wireless communication device, wireless communication system, and wireless communication method
 本発明は、端末装置、無線通信装置、無線通信システム及び無線通信方法に関する。 The present invention relates to a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method.
 LTE(Long Term Evolution)において、端末装置(User Equipment:UE)と基地局(evolved Node-B:eNB)との間で、信号の完全性保証及び暗号化が行われる。端末装置とeNBとの間の無線通信において、C(Control)-Plane信号及びU(User)-Plane信号それぞれの完全性保証及び暗号化に使用する鍵は、UE及びeNBのそれぞれで管理される。 In LTE (Long Term Evolution), signal integrity guarantee and encryption are performed between the terminal device (User Equipment: UE) and the base station (evolved Node-B: eNB). In wireless communication between the terminal device and the eNB, keys used for integrity assurance and encryption of the C (Control)-Plane signal and the U (User)-Plane signal are managed by the UE and the eNB, respectively. ..
 ここで、信号の完全性保証及び暗号化のためのセキュリティアルゴリズムは、UE及びeNBの両方で使用可能なアルゴリズムが使用される。以下では、セキュリティアルゴリズムを単にアルゴリズムと言う場合がある。LTEで使用されるアルゴリズムにはSNOW 3G、ASE(Advanced Encryption Standard)、ZUCなどがある。 Here, as a security algorithm for signal integrity guarantee and encryption, an algorithm that can be used by both the UE and the eNB is used. In the following, the security algorithm may be simply referred to as an algorithm. Algorithms used in LTE include SNOW 3G, ASE (Advanced Encryption Standard), and ZUC.
 LETにおけるUEとeNBとの間のセキュリティに関する処理は、以下のように実行される。初回接続時に、UEは、自装置が使用可能なアルゴリズムをUE Security CapabilityとしてMME(Mobility Management Entity)へ送信する。MMEは、取得したUE Security CapabilityをeNBへ送信する。 -The processing related to security between the UE and the eNB in LET is executed as follows. When connecting for the first time, the UE sends an algorithm that can be used by itself to the MME (Mobility Management Entity) as UE Security Capability. The MME sends the acquired UE Security Capability to the eNB.
 また、X2ハンドオーバにより接続する基地局を切替える場合、セキュリティに関する処理は以下のように実行される。ここでは、第1eNB及び第2eNBという2つのeNBが存在する場合で説明する。第1eNBに接続中のUEが在圏エリアを移動して、第2eNBと接続する場合、UEは使用可能な1つ又は複数のアルゴリズムをUE Security Capabilityとして第2eNBに送信する。UE Security Capabilityを受信した第2eNBは、アルゴリズムを選択してUEと無線接続を確立する。この時、UEが使用可能なアルゴリズムに第2eNBが対応していない場合、第2eNBは、UEとの接続の確立に失敗する。 Also, when switching the connected base station by X2 handover, the security-related processing is executed as follows. Here, a case will be described where there are two eNBs, a first eNB and a second eNB. When the UE connected to the first eNB moves in the serving area and connects to the second eNB, the UE sends one or more available algorithms to the second eNB as UE Security Capability. The second eNB that has received the UE Security Capability selects an algorithm and establishes a wireless connection with the UE. At this time, if the second eNB does not support the algorithm usable by the UE, the second eNB fails to establish a connection with the UE.
 また、5G(Generation)と呼ばれる第5世代移動通信システムでは、超高信頼性低遅延通信であるURLLC(Ultra-Reliable and Low Latency Communications)などを活用した、LET以上に多種多様なサービスが提供されることが想定される。加えて、より安全性の高いサービスを実現するために、信号の完全性保証及び暗号化に使用するアルゴリズムについてもサービス毎に異なることが想定される。さらには、サービスの多様化によって、新たなアルゴリズムが追加される可能性もある。例えば、各gNBが特定のサービスに使用され、gNB毎に使用可能なアルゴリズムが異なる運用が想定される。 In addition, in the 5th generation mobile communication system called 5G (Generation), a wide variety of services are provided beyond LET utilizing URLLC (Ultra-Reliable and Low Latency Communications), which is ultra-reliable and low-delay communication. It is assumed that In addition, in order to realize a more secure service, it is assumed that the algorithms used for signal integrity guarantee and encryption are different for each service. Furthermore, new algorithms may be added due to the diversification of services. For example, it is assumed that each gNB is used for a specific service, and the algorithms that can be used are different for each gNB.
 5Gにおいて、RRC(Radio Resource Control)の状態としてRRC_inactiveという状態がある。これは、セキュリティなどのAS(Access Stratum)情報を含むASコンテキストと上位回線を保持しつつ、基地局と端末装置と間の無線回線(Wireless Channel)が切断されている状態であり、無線回線については従来のRRC_idleと同等の状態である。ただし、この場合の端末装置は、基地局がASコンテキストを保持することで、RRC_idel(待ち受け状態)からRRC_connection(接続状態)へ移行する場合と異なり、上位回線設定を実施せずにRRC-inactive(無線回線断かつ上位回線接続状態)からRRC_connectionへ移行することができる。すなわち、RRC_inactiveを用いることで、手順及び信号数を削減でき、ユーザデータの伝送を開始するまでの時間を短くすることができる。さらには、低消費電力化も可能である。なお、RRC_inactiveでは、従来のトラッキングエリア(TA:Tracking Area)よりも狭いRAN(Radio Access Network)エリアにおける位置登録が実施される。なお、トラッキングエリア及びRANエリアを位置登録エリアと呼ぶことがある。 In 5G, there is a state called RRC_inactive as the state of RRC (Radio Resource Control). This is a state in which the wireless channel (Wireless Channel) between the base station and the terminal device is disconnected while maintaining the AS context including AS (Access Stratum) information such as security and the upper level circuit. Is a state equivalent to the conventional RRC_idle. However, unlike the case where the base station shifts from RRC_idel (standby state) to RRC_connection (connected state) when the base station holds the AS context, the terminal device in this case does not perform the upper line setting and does not perform RRC-inactive( It is possible to shift to RRC_connection from the wireless line disconnection and the upper line connection state). That is, by using RRC_inactive, the procedure and the number of signals can be reduced, and the time until the transmission of user data can be shortened. Furthermore, low power consumption is possible. In RRC_inactive, location registration is performed in a RAN (Radio Access Network) area that is narrower than the conventional tracking area (TA: Tracking Area). The tracking area and the RAN area may be referred to as a location registration area.
 ここで、位置登録エリアの更新には、TAU(Tracking Area Update)とRAU(RAN Area Update)という2つの更新手順が存在する。TAUは、着呼(着信)に際して端末装置の在圏エリアを基地局に把握させるために、端末が、周期的(定期的)に在圏エリアをネットワークに報告する処理にあたる。また、RAUは、RRC_inactiveの状態で、端末装置が、TAよりも狭いRANエリアで、周期的に位置登録を実施する処理にあたる。上述したように、端末装置は、RRC-inactiveからRRC_connectionへ移行する際に、RAを利用する。 Here, there are two update procedures for updating the location registration area: TAU (Tracking Area Update) and RAU (RAN Area Update). The TAU is a process in which the terminal periodically (periodically) reports the existing area to the network so that the base station recognizes the existing area of the terminal device at the time of an incoming call (incoming call). Further, the RAU is a process in which the terminal device periodically performs location registration in a RAN area smaller than TA in the RRC_inactive state. As described above, the terminal device uses RA when transitioning from RRC-inactive to RRC_connection.
 なお、無線通信のセキュリティに関する技術として、移動元基地局が、端末装置から受信したセキュリティ能力の情報を基に、移動先基地局との通信の可否を判定して、移動先基地局との通信に用いるセキュリティ鍵の情報を端末装置へ送信する従来技術がある。また、端末装置が別ネットワークへのハンドオーバ時にネットワークから対応セキュリティアルゴリズムのリストの配信を受けて、セキュリティアルゴリズムを選択する従来技術がある。 As a technique related to the security of wireless communication, the source base station determines whether or not communication with the destination base station is possible based on the security capability information received from the terminal device, and communicates with the destination base station. There is a conventional technique of transmitting information on a security key used for the terminal device to a terminal device. In addition, there is a conventional technique in which a terminal device receives a list of corresponding security algorithms from a network at the time of handover to another network and selects a security algorithm.
国際公開第2018/079692号International Publication No. 2018/079692 特表2012-531792号公報Special table 2012-531792 gazette
 しかしながら、ある基地局(gNB)に接続中の端末(UE)が、RRC_inactiveの状態となった後に、UEが在圏移動した(エリア間で移動した)場合、移動先で接続するgNBと移動前に接続していたgNBとで使用可能なアルゴリズムが異なることが考えられる。この場合、RRC_inactiveの状態からRRC_connectedへの遷移が失敗するおそれがある。RRC_connectedへの遷移に失敗すると、端末装置は、RLF(Radio Link Failure)となる。この場合、RLFとなるまでの時間、RLF発生からgNB再選択及び選択したgNBに接続するまでの時間とを加算した時間分の通信断が発生し、結果として端末装置に対する伝送速度が低下してしまうおそれがある。そのため、RRC_inactiveを利用することによる再接続時間短縮や伝送速度向上の効果が小さくなってしまう。 However, if the terminal (UE) connected to a certain base station (gNB) is in the RRC_inactive state and then the UE moves within the area (moves between areas), the gNB connected at the movement destination and before the movement It is conceivable that the algorithm that can be used differs from the gNB that was connected to. In this case, the transition from the RRC_inactive state to RRC_connected may fail. If the transition to RRC_connected fails, the terminal device becomes RLF (Radio Link Failure). In this case, the communication loss occurs for the time until the RLF is reached and the time from the RLF occurrence until the gNB reselection and connection to the selected gNB are added, and as a result, the transmission speed to the terminal device decreases. There is a risk that Therefore, the effect of shortening the reconnection time and improving the transmission rate by using RRC_inactive becomes small.
 また、移動元基地局が、端末装置から受信したセキュリティ能力の情報を基に移動先基地局との通信に用いるセキュリティ鍵の情報を端末装置へ送信する従来技術では、RRC_inactiveの状態の端末に情報を伝えることは困難である。そのため、この従来技術を用いても、伝送速度を向上させることは困難である。また、配信された対応セキュリティアルゴリズムのリストを基にセキュリティアルゴリズムを選択する従来技術では、セキュアな情報を通知することになりRRC_inactiveの状態の端末に情報を伝えることは困難である。そのため、この従来技術を用いて伝送速度を向上させることは困難である。 Further, in the conventional technology in which the source base station transmits information of the security key used for communication with the destination base station to the terminal device based on the information of the security capability received from the terminal device, in the prior art, information is transmitted to the terminal in the RRC_inactive state. Is difficult to convey. Therefore, it is difficult to improve the transmission speed even by using this conventional technique. Further, in the conventional technique that selects a security algorithm based on the distributed list of corresponding security algorithms, secure information is notified, and it is difficult to transmit information to a terminal in the RRC_inactive state. Therefore, it is difficult to improve the transmission rate using this conventional technique.
 開示の技術は、上記に鑑みてなされたものであって、伝送速度を向上させる端末装置、無線通信装置、無線通信システム及び無線通信方法を提供することを目的とする。 The disclosed technique is made in view of the above, and an object thereof is to provide a terminal device, a wireless communication device, a wireless communication system, and a wireless communication method that improve the transmission speed.
 本願の開示する端末装置、無線通信装置、無線通信システム及び無線通信方法の一つの態様において、受信部は、端末装置のセキュリティ情報に応じた複数の基地局に関する第1の情報を無線通信装置から受信する。選択部は、前記第1の情報を基に前記複数の基地局の中から接続する基地局を選択する。送信部は、選択した前記基地局に対して無線接続を再開するための第2の情報を送信する。 In one aspect of the terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application, the receiving unit receives, from the wireless communication device, first information about a plurality of base stations according to security information of the terminal device. To receive. The selection unit selects a base station to be connected from the plurality of base stations based on the first information. The transmitting unit transmits the second information for restarting the wireless connection to the selected base station.
 本願の開示する端末装置、無線通信装置、無線通信システム及び無線通信方法の一つの態様によれば、伝送速度を向上させることができるという効果を奏する。 According to one aspect of the terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application, it is possible to improve the transmission speed.
図1は、無線通信システムのシステム構成図である。FIG. 1 is a system configuration diagram of a wireless communication system. 図2は、UEのブロック図である。FIG. 2 is a block diagram of the UE. 図3は、端末個別セルリストの一例を表す図である。FIG. 3 is a diagram illustrating an example of the terminal-specific cell list. 図4は、gNBのブロック図である。FIG. 4 is a block diagram of gNB. 図5は、AMFのブロック図である。FIG. 5 is a block diagram of AMF. 図6は、端末個別セルリストのフォーマットの一例を示す図である。FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list. 図7は、UEが使用可能なセキュリティアルゴリズムにページングを受信したgNBが対応している場合の再接続処理のシーケンス図である。FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE. 図8は、UEが使用可能暗セキュリティアルゴリズムにページングを受信したgNBが対応していない場合の再接続処理のシーケンス図である。FIG. 8 is a sequence diagram of the reconnection process when the gNB that received paging from the UE does not support the available dark security algorithm. 図9は、UEが使用可能なセキュリティアルゴリズムにTAUの送信先のgNBが対応している場合の再接続処理のシーケンス図である。FIG. 9 is a sequence diagram of the reconnection process when the security algorithm that can be used by the UE corresponds to the gNB that is the transmission destination of the TAU. 図10は、UEが使用可能暗セキュリティアルゴリズムにTAUの送信先のgNBが対応していない場合の再接続処理のシーケンス図である。FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination. 図11は、ネットワークの構築からUEがRRC_inactiveになるまでの処理のシーケンス図である。FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive. 図12は、AMFのハードウェア構成図である。FIG. 12 is a hardware configuration diagram of the AMF. 図13は、実施例2に係る無線通信システムにおけるセルリスト送信停止処理のフローチャートである。FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment. 図14は、端末個別セルリストに登録される情報のカスタマイズ処理の一例のフローチャートである。FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list.
 以下に、本願の開示する端末装置、無線通信装置、無線通信システム及び無線通信方法の実施例を図面に基づいて詳細に説明する。なお、以下の実施例により本願の開示する端末装置、無線通信装置、無線通信システム及び無線通信方法が限定されるものではない。また、本明細書における課題及び実施例は一例であり、本願の権利範囲を限定するものではない。特に、記載の表現が異なっていたとしても技術的に同等であれば、異なる表現であっても本願の技術を適用可能であり、権利範囲を限定するものではない。そして、各実施の形態は、処理内容を矛盾させない範囲で適宜組み合わせることが可能である。 Hereinafter, embodiments of the terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application will be described in detail with reference to the drawings. The terminal device, the wireless communication device, the wireless communication system, and the wireless communication method disclosed in the present application are not limited to the embodiments described below. Further, the problems and examples in the present specification are merely examples, and do not limit the scope of rights of the present application. In particular, even if the described expressions are different, as long as they are technically equivalent, the technology of the present application can be applied even if the expressions are different, and the scope of rights is not limited. Then, the respective embodiments can be appropriately combined within a range in which the processing content is not inconsistent.
 また、本明細書で使用している用語や記載した技術的内容は、3GPPなど通信に関する規格として仕様書や寄書に記載された用語や技術的内容が適宜用いられてもよい。 The terms and technical contents described in the present specification may appropriately use the terms and technical contents described in specifications and contributions as a communication standard such as 3GPP.
 図1は、無線通信システムのシステム構成図である。無線通信システム100は、UE1、AMF(Access and Mobility Management Function)2、gNB3、SMF(Session Management Function)4及びUPF(User Plane Function)5を含む。ここで、gNB3は、複数存在する。 1 is a system configuration diagram of a wireless communication system. The wireless communication system 100 includes a UE 1, an AMF (Access and Mobility Management Function) 2, a gNB 3, an SMF (Session Management Function) 4 and an UPF (User Plane Function) 5. Here, there are a plurality of gNB3s.
 UE1は、端末装置であり、gNB3との間で無線通信によるデータ伝送を行う。例えば、UE1は、gNB3を介して、AMF2からトラッキングエリアの情報を取得する。次に、UE1は、トラッキングエリアに含まれるセルの中から接続するセルを選択し、そのセルを形成するgNB3に接続する。その後、UE1は、接続したgNB3を介して他のUE1と通信を行う。このUE1が通信可能な状態が、RRC_connectedと呼ばれる状態である。また、UE1は、周期的にTAUを実行してトラッキングエリアを更新する。 UE1 is a terminal device and performs data transmission by wireless communication with gNB3. For example, the UE1 acquires the tracking area information from the AMF2 via the gNB3. Next, the UE1 selects a cell to be connected from the cells included in the tracking area, and connects to the gNB3 forming the cell. After that, the UE1 communicates with another UE1 via the connected gNB3. The state in which the UE 1 can communicate is a state called RRC_connected. Also, the UE1 periodically executes TAU to update the tracking area.
 また、UE1は、Inactive Timerやデータ通信頻度が所定の条件を満たした場合に、RRC_connectedからRRC_inactiveに状態が遷移する。RRC_inactiveに遷移した場合、UE1とgNB3との間の無線層の接続は切れるが、上位層は接続したままとなる。また、最後に接続したgNB3及びAMF2は、UE1のASコンテキストを保持する。ASコンテキストには、セキュリティアルゴリズムを含むセキュリティ等のAS情報が含まれる。 Further, the state of UE1 transits from RRC_connected to RRC_inactive when the Inactive Timer or the data communication frequency satisfies a predetermined condition. When transitioning to RRC_inactive, the radio layer connection between the UE1 and the gNB3 is disconnected, but the upper layer remains connected. In addition, the gNB3 and the AMF2 that are finally connected hold the AS context of the UE1. The AS context includes AS information such as security including a security algorithm.
 UE1は、位置登録情報(位置情報と記載しても良い)を送信し位置登録エリアであるRANエリアをgNB3を介してAMF2から受信する。UE1は、周期的にRAUを実行してRANエリアの更新を行う。UE1は、AMF2から送信されたRANエリアやトラッキングエリアの情報をgNB3を介して取得する。 UE1 transmits location registration information (may be described as location information) and receives a RAN area, which is a location registration area, from AMF2 via gNB3. The UE1 periodically executes RAU to update the RAN area. UE1 acquires the information of the RAN area and the tracking area transmitted from AMF2 via gNB3.
 そして、RRC_inactiveからRRC_connectedに遷移する場合、UE1は、RANエリアに含まれるgNB3との間でランダムアクセス、無線同期の確立及びRRCコンフィグなどを実行して無線層を再接続することで通信を確立する。この、RRC_inactiveからRRC_connectedに遷移する際の接続処理については後で詳細に説明する。 Then, when transitioning from RRC_inactive to RRC_connected, the UE1 establishes communication by reconnecting the radio layer by performing random access, establishment of radio synchronization, RRC configuration, etc. with the gNB3 included in the RAN area. .. This connection processing when transitioning from RRC_inactive to RRC_connected will be described in detail later.
 AMF2は、C(control)-Planeにおけるモビリティ管理を実行する無線通信置である。AMF2は、UE1の位置登録情報の登録や制御を実行する。例えば、AMF2は、TAUによりUE1から送信された位置情報を用いてUE1のトラッキングエリアを更新する。また、AMF2は、RAUによりUE1から送信された位置登録情報を用いてUE1のRANエリアを更新する。 AMF2 is a wireless communication device that executes mobility management in C(control)-Plane. The AMF 2 executes registration and control of the location registration information of the UE 1. For example, the AMF2 updates the tracking area of the UE1 by using the position information transmitted from the UE1 by the TAU. Also, the AMF2 updates the RAN area of the UE1 using the location registration information transmitted from the UE1 by the RAU.
 また、AMF2は、発着信の制御を行う。また、AMF2は、UE1及びgNB3のセキュリティ情報を管理する。さらに、AMF2は、UE1からTAUを受信した場合、UE1の位置情報に応じたトラッキングエリアの情報をgNB3を介してUE1へ送信する。また、AMF2は、UE1からRAUを受信した場合、UE1の位置登録情報に応じたRANエリアの情報をgNB3を介してUE1へ送信する。 AMF2 also controls incoming and outgoing calls. Further, the AMF2 manages security information of the UE1 and the gNB3. Further, when the AMF 2 receives the TAU from the UE 1, the AMF 2 transmits the information on the tracking area corresponding to the position information of the UE 1 to the UE 1 via the gNB 3. In addition, when the AMF 2 receives the RAU from the UE 1, the AMF 2 transmits the RAN area information corresponding to the location registration information of the UE 1 to the UE 1 via the gNB 3.
 gNB3は、5G無線を提供する無線基地局である。gNB3は、UE1との間で無線通信よるデータ転送を実行する。また、gNB3は、AMF2から送信されたRANエリアやトラッキングエリアの情報をUE1へ送信する。 GNB3 is a radio base station that provides 5G radio. The gNB3 executes data transfer by wireless communication with the UE1. In addition, the gNB3 transmits information on the RAN area and the tracking area transmitted from the AMF2 to the UE1.
 SMF4は、C-Planeにおけるセッション管理を実行する通信制御装置である。SMF4は、無線通信におけるセッションの設定及び解放の制御を行う。 The SMF 4 is a communication control device that executes session management in C-Plane. The SMF 4 controls setting and releasing of a session in wireless communication.
 UPF5は、U(User)-Planeにおける通信制御を行う。UPF5は、無線通信ネットワークとデータネットワークとの間のデータパケットを処理する。 UPF5 controls communication in U(User)-Plane. The UPF 5 processes data packets between the wireless communication network and the data network.
 次に、UE1、gNB3及びAMF2のそれぞれの機能について詳細に説明する。図2は、UEのブロック図である。 Next, the functions of the UE1, gNB3, and AMF2 will be described in detail. FIG. 2 is a block diagram of the UE.
 図2に示すように、UE1は、RRC処理部11、PDCP(Packet Data Convergence Protocol)処理部12、RLC(Radio Link Control)処理部13、MAC(Media Access Control)処理部14及びPHY(Physical)処理部15を有する。さらに、UE1は、通信制御部16を有する。本実施例では、ページング時(呼び出し時又は着信通知時)及びトラッキングエリアの更新時に各gNB3が使用可能なセキュリティアルゴリズムを把握するための端末個別セルリストがUE1に送られる場合で説明する。ただし、トラッキングエリアの更新時の代わりにRANエリアの更新時に端末個別セルリストがUE1に送られてもよい。 As shown in FIG. 2, the UE 1 includes an RRC processing unit 11, a PDCP (Packet Data Convergence Protocol) processing unit 12, an RLC (Radio Link Control) processing unit 13, a MAC (Media Access Control) processing unit 14, and a PHY (Physical). It has a processing unit 15. Furthermore, the UE 1 has a communication control unit 16. In the present embodiment, a case will be described in which the terminal-specific cell list for grasping the security algorithm that can be used by each gNB 3 at the time of paging (at the time of calling or notification of an incoming call) and at the time of updating the tracking area is sent to the UE 1. However, instead of updating the tracking area, the terminal-specific cell list may be sent to the UE1 when updating the RAN area.
 RRC処理部11は、システム報知情報配信、ページング配信、NAS(Non Access Stratum)メッセージ配信、RRCコネクション管理、無線セキュリティ設定及びハンドオーバ制御などのRRC層における処理を実行する。また、RRC処理部11は、周期的に位置登録要求をAMF2へ送信する。位置登録要求は、例えば、トラッキングエリアの更新であるTAUや、RANエリアの更新であるRAUである。さらに、RRC処理部11は、セル選択制御部111及びセキュリティ情報管理部112を有する。 The RRC processing unit 11 executes processing in the RRC layer such as system notification information distribution, paging distribution, NAS (Non Access Stratum) message distribution, RRC connection management, wireless security setting and handover control. Further, the RRC processing unit 11 periodically transmits a location registration request to the AMF2. The location registration request is, for example, TAU for updating the tracking area or RAU for updating the RAN area. Further, the RRC processing unit 11 has a cell selection control unit 111 and a security information management unit 112.
 セル選択制御部111は、ページング時又はTAU時にトラッキングエリアを表すトラッキングエリアコードを取得する。そしてセル選択制御部111は、トラッキングエリアコードに含まれるシステム情報(又はシステム制御情報)であるSIB(System Information Block)の中から端末個別セルリストを取得する。 The cell selection control unit 111 acquires a tracking area code indicating a tracking area during paging or TAU. Then, the cell selection control unit 111 acquires the terminal-specific cell list from SIB (System Information Block) which is system information (or system control information) included in the tracking area code.
 図3は、端末個別セルリストの一例を表す図である。端末個別セルリスト201は、セキュリティアルゴリズムとしてアルゴリズムAが使用可能なgNB3が登録されたリストである。例えば、セル選択制御部111は、端末個別セルリスト201からアルゴリズムAが使用可能なgNB3を特定できる。ここでは、セル選択制御部111は、セルID#3を有するgNB3はアルゴリズムAが使用可能であることが端末個別セルリスト201から確認できる。また、端末個別セルリスト202は、セキュリティアルゴリズムとしてアルゴリズムBが使用可能なgNB3が登録されたリストである。例えば、セル選択制御部111は、端末個別セルリスト202からアルゴリズムBが使用可能なgNB3を特定できる。ここでは、セル選択制御部111は、セルID#1又は#2を有するgNB3はアルゴリズムBが使用可能であることが端末個別セルリスト202から確認できる。また、端末個別セルリスト203は、セキュリティアルゴリズムとしてアルゴリズムA又はBが使用可能なgNB3が登録されたリストである。例えば、セル選択制御部111は、端末個別セルリスト203からアルゴリズムA又はBが使用可能なgNB3を特定できる。ここでは、セル選択制御部111は、セルID#1~#3を有するgNB3はアルゴリズムA又はBが使用可能であることが端末個別セルリスト203から確認できる。以下では、端末個別セルリスト200という。 FIG. 3 is a diagram showing an example of a terminal individual cell list. The terminal-specific cell list 201 is a list in which gNB3 in which the algorithm A can be used as the security algorithm is registered. For example, the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A from the terminal-specific cell list 201. Here, the cell selection control unit 111 can confirm from the terminal-specific cell list 201 that the gNB3 having the cell ID #3 can use the algorithm A. Further, the terminal-specific cell list 202 is a list in which gNB3 in which the algorithm B can be used as a security algorithm is registered. For example, the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm B from the terminal-specific cell list 202. Here, the cell selection control unit 111 can confirm from the terminal-specific cell list 202 that the gNB3 having the cell ID #1 or #2 can use the algorithm B. Further, the terminal-specific cell list 203 is a list in which gNB3 that can use algorithm A or B as a security algorithm is registered. For example, the cell selection control unit 111 can specify the gNB3 that can be used by the algorithm A or B from the terminal-specific cell list 203. Here, the cell selection control unit 111 can confirm from the terminal-specific cell list 203 that the gNB3 having the cell IDs #1 to #3 can use the algorithm A or B. Hereinafter, it is referred to as a terminal individual cell list 200.
 次に、セル選択制御部111は、端末個別セルリスト200に登録されたgNB3の無線回線品質の計測をPHY処理部15に指示する。その後、セル選択制御部111は、端末個別セルリスト200に登録された各gNB3の無線回線品質の測定結果を取得する。そして、セル選択制御部111は、最も無線回線品質の良いセルを選択するなど、各gNB3の無線回線品質を用いて接続するgNB3の選択を行う。その後、セル選択制御部111は、選択したgNB3の情報及び端末個別セルリスト200をセキュリティ情報管理部112へ出力する。このセル選択制御部111が、「選択部」の一例にあたる。そして、端末個別セルリスト200が、「第1の情報」の一例にあたる。 Next, the cell selection control unit 111 instructs the PHY processing unit 15 to measure the wireless line quality of the gNB3 registered in the terminal-specific cell list 200. After that, the cell selection control unit 111 acquires the measurement result of the wireless channel quality of each gNB3 registered in the terminal-specific cell list 200. Then, the cell selection control unit 111 selects the gNB3 to be connected using the wireless line quality of each gNB3, such as selecting the cell with the best wireless line quality. After that, the cell selection control unit 111 outputs the information of the selected gNB3 and the terminal-specific cell list 200 to the security information management unit 112. The cell selection control unit 111 corresponds to an example of a “selection unit”. The terminal individual cell list 200 corresponds to an example of “first information”.
 セキュリティ情報管理部112は、UE1が使用可能なセキュリティアルゴリズムの情報を含むセキュリティ情報を保持する。セキュリティ情報管理部112は、RRC処理部11が接続するgNB3へ送信するUE capability(端末性能情報)の中にセキュリティアルゴリズムの情報を登録する。また、セキュリティ情報管理部112は、データ通信用のセキュリティ鍵及びアルゴリズムを含むASコンテキストを作成する。そして、セキュリティ情報管理部112は、接続確立時に、PDCP処理部12、RLC処理部13、MAC処理部14、PHY処理部15及び通信制御部16を介して、ASコンテキストをAMF2へ送信する。なお、端末性能情報は、無線回線品質などの外的な要因によって変わるものではなく、端末それ自体の能力である。 The security information management unit 112 holds security information including information on security algorithms usable by the UE 1. The security information management unit 112 registers the security algorithm information in the UE capability (terminal performance information) transmitted to the gNB3 connected to the RRC processing unit 11. Further, the security information management unit 112 creates an AS context including a security key for data communication and an algorithm. Then, the security information management unit 112 transmits the AS context to the AMF 2 via the PDCP processing unit 12, the RLC processing unit 13, the MAC processing unit 14, the PHY processing unit 15, and the communication control unit 16 when the connection is established. It should be noted that the terminal performance information does not change due to external factors such as wireless line quality, but is the capability of the terminal itself.
 また、セキュリティ情報管理部112は、接続先として選択されたgNB3の情報及び端末個別セルリスト200の入力をセル選択制御部111から受ける。そして、セキュリティ情報管理部112は、端末個別セルリスト200を用いて接続先として選択されたgNB3がUE1との通信に用いることができるセキュリティアルゴリズムを特定する。次に、セキュリティ情報管理部112は、接続先として選択されたgNB3との通信に用いるセキュリティアルゴリズムを決定する。その後、セキュリティ情報管理部112は、接続先として選択されたgNB3との通信に用いるセキュリティアルゴリズムをPDCP処理部12に通知する。 Further, the security information management unit 112 receives from the cell selection control unit 111 the information of the gNB3 selected as the connection destination and the input of the terminal individual cell list 200. Then, the security information management unit 112 identifies a security algorithm that can be used by the gNB3 selected as the connection destination by using the terminal-specific cell list 200 for communication with the UE1. Next, the security information management unit 112 determines the security algorithm used for communication with the gNB3 selected as the connection destination. After that, the security information management unit 112 notifies the PDCP processing unit 12 of the security algorithm used for communication with the gNB3 selected as the connection destination.
 また、RRC処理部11は、セル選択制御部111により接続先として選択されたgNB3へ通信の再開要求であるRRC Resume Requestを送信する。その後、RRC処理部11は、RRC Resumeを接続先のgNB3から受信して無線層の接続を確立し、gNB3との間の通信接続を確立する。このRRC処理部11が、「無線接続管理部」の一例にあたる。また、Resume Requestが、「第2の情報」の一例にあたる。 Also, the RRC processing unit 11 transmits an RRC Resume Request, which is a communication restart request, to the gNB 3 selected as the connection destination by the cell selection control unit 111. After that, the RRC processing unit 11 receives the RRC Resume from the connection destination gNB3, establishes the connection of the wireless layer, and establishes the communication connection with the gNB3. The RRC processing unit 11 corresponds to an example of a “wireless connection management unit”. In addition, Resume Request is an example of “second information”.
 PDCP処理部12は、IP(Internet Protocol)パケットヘッダ圧縮、解凍、暗号化などのPDCP層における処理を実行する。PDCP処理部12は、セキュリティ制御部121を有する。 The PDCP processing unit 12 executes processing in the PDCP layer such as IP (Internet Protocol) packet header compression, decompression, and encryption. The PDCP processing unit 12 has a security control unit 121.
 セキュリティ制御部121は、シグナリングの完全性保証及び暗号化、並びに、暗号の解除を行う。セキュリティ制御部121は、セキュリティ情報管理部112から通知された通信に用いるセキュリティアルゴリズムの情報を取得する。そして、セキュリティ制御部121は、指定されたセキュリティアルゴリズムを用いて送信するデータを暗号化し且つ完全性保証を行う。また、セキュリティ制御部121は、RLC処理部13から入力されたデータに対して、指定されたセキュリティアルゴリズムを用いて暗号化を解除する。 The security control unit 121 performs signaling integrity assurance and encryption, and encryption cancellation. The security control unit 121 acquires the information of the security algorithm used for communication notified from the security information management unit 112. Then, the security control unit 121 encrypts the data to be transmitted using the specified security algorithm and guarantees the integrity. The security control unit 121 also decrypts the data input from the RLC processing unit 13 using a designated security algorithm.
 RLC処理部13は、再送制御,重複検出及び順序整列などのRLC層における処理を実行する。 The RLC processing unit 13 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
 MAC処理部14は、無線リソース割り当て、データマッピング及び再送制御などのMAC層における処理を実行する。例えば、MAC処理部14は、RLC処理部13から入力されたデータに対して無線リソースの割り当て及びデータマッピングなどを行いPHY処理部15へ出力する。 The MAC processing unit 14 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 14 performs radio resource allocation, data mapping, and the like on the data input from the RLC processing unit 13, and outputs the data to the PHY processing unit 15.
 PHY処理部15は、変調及び復調、符号化及び復号化、アンテナ多重化、並びに、品質測定などのPHY層における処理を実行する。例えば、PHY処理部15は、通信制御部16から入力された信号に復調処理や復号化処理を施してMAC処理部14へ出力する。また、PHY処理部15は、MAC処理部14から入力された信号に変調処理や符号化処理を施して通信制御部16へ出力する。 The PHY processing unit 15 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, antenna multiplexing, and quality measurement. For example, the PHY processing unit 15 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 14. Further, the PHY processing unit 15 performs modulation processing or coding processing on the signal input from the MAC processing unit 14 and outputs the signal to the communication control unit 16.
 通信制御部16は、PHYベースバンド信号と無線信号との変換などを行う。通信制御部16は、接続先のgNB3に対して無線信号を送信する。また、通信制御部16は、接続先のgNB3から無線信号を受信する。この通信制御部16が、「受信部」の一例にあたる。また、通信制御部16に送信部(送信機)、受信部(受信機)又は通信部(通信機)を含んでもよい。 The communication control unit 16 performs conversion between a PHY baseband signal and a wireless signal. The communication control unit 16 transmits a wireless signal to the gNB3 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the gNB3 that is the connection destination. The communication control unit 16 corresponds to an example of the “reception unit”. Further, the communication control unit 16 may include a transmission unit (transmitter), a reception unit (receiver), or a communication unit (communication device).
 次に、図4を参照して、gNB3について説明する。図4は、gNBのブロック図である。gNB3は、RRC処理部31、PDCP処理部32、RLC処理部33、MAC処理部34、PHY処理部35、通信制御部36及びSDAP(Service Discovery Adaptation Profile)処理部37を有する。 Next, gNB3 will be described with reference to FIG. FIG. 4 is a block diagram of gNB. The gNB 3 has an RRC processing unit 31, a PDCP processing unit 32, an RLC processing unit 33, a MAC processing unit 34, a PHY processing unit 35, a communication control unit 36, and an SDAP (Service Discovery Adaptation Profile) processing unit 37.
 RRC処理部31は、RRCコネクション管理、無線セキュリティ設定及びハンドオーバ制御などのRRC層における処理を実行する。RRC処理部31は、セキュリティ情報管理部311を有する。このRRC処理部31が、「接続制御部」の一例にあたる。 The RRC processing unit 31 executes processes in the RRC layer such as RRC connection management, wireless security setting, and handover control. The RRC processing unit 31 has a security information management unit 311. The RRC processing unit 31 corresponds to an example of “connection control unit”.
 セキュリティ情報管理部112は、gNB3が使用可能なセキュリティアルゴリズムの情報を含むセキュリティ情報を保持する。また、セキュリティ情報管理部112は、UE1がgNB3に接続した場合、接続するUE1のASコンテキストをAMF2から受信する。そして、セキュリティ情報管理部112は、接続したUE1がRRC_connectedの状態にある場合又はRRC_inactiveに遷移した場合、UE1のASコンテキストを保持する。すなわち、セキュリティ情報管理部112は、UE1が使用可能なセキュリティアルゴリズムの情報を含むセキュリティ情報を保持する。さらに、セキュリティ情報管理部311は、UE1のASコンテキストに含まれるセキュリティアルゴリズムの情報を含むセキュリティ情報をセキュリティ制御部321へ通知する。 The security information management unit 112 holds security information including information on security algorithms that can be used by gNB3. Further, when the UE1 connects to the gNB3, the security information management unit 112 receives the AS context of the connecting UE1 from the AMF2. Then, the security information management unit 112 holds the AS context of the UE1 when the connected UE1 is in the RRC_connected state or when it transits to RRC_inactive. That is, the security information management unit 112 holds security information including information on security algorithms that can be used by the UE1. Further, the security information management unit 311 notifies the security control unit 321 of the security information including the information of the security algorithm included in the AS context of the UE1.
 また、RRC処理部31は、RRC_inactiveの状態にあるUE1により自装置であるgNB3が通信の再開における接続先として選択された場合、RRC Resume RequestをUE1から受信する。そして、RRC処理部31は、UE1のASコンテキストの取得要求であるRetrive AS Context Reqestを、アンカーgNBなどのそのUE1のASコンテキストを保持するgNB3へ送信する。その後、RRC処理部31は、取得要求を送信したgNB3からRetrive AS Context Responseを受信する。そして、RRC処理部31は、自装置であるgNB3が形成するセルをUE1のアンカーセル又はサービングセルとして設定する。その後、RRC処理部31は、RRC ResumeをUE1へ送信する。その後、RRC処理部31は、UE1との間で無線層の接続を確立し、UE1との間の通信接続を確立する。 Also, the RRC processing unit 31 receives the RRC Resume Request from the UE1 when the UE 1 in the RRC_inactive state selects its own device gNB3 as the connection destination for resuming communication. Then, the RRC processing unit 31 transmits a Retrieve AS Context Request, which is an acquisition request of the AS context of the UE 1, to the gNB 3 holding the AS context of the UE 1, such as the anchor gNB. After that, the RRC processing unit 31 receives the Retrieve AS Context Response from the gNB 3 that has transmitted the acquisition request. Then, the RRC processing unit 31 sets the cell formed by the gNB3, which is the own device, as the anchor cell or the serving cell of the UE1. After that, the RRC processing unit 31 transmits the RRC Resume to the UE 1. After that, the RRC processing unit 31 establishes a wireless layer connection with the UE1 and a communication connection with the UE1.
 PDCP処理部32は、IPパケットヘッダ圧縮、解凍、暗号化などのPDCP層における処理を実行する。PDCP処理部32は、セキュリティ制御部321を有する。また、PDCP処理部32は、他のgNB3及びAMF2などから送信されたIPパケットの入力をSDAP処理部37から受ける。また、PDCP処理部32は、他のgNB3及びAMF2などへ送信するIPパケットをSDAP処理部37へ出力する。 The PDCP processing unit 32 executes processing in the PDCP layer such as IP packet header compression, decompression, and encryption. The PDCP processing unit 32 has a security control unit 321. Further, the PDCP processing unit 32 receives from the SDAP processing unit 37 the input of the IP packet transmitted from the other gNB3 and AMF2. Further, the PDCP processing unit 32 outputs to the SDAP processing unit 37 the IP packet to be transmitted to the other gNB3, AMF2 and the like.
 セキュリティ制御部321は、シグナリングの完全性保証及び暗号化、並びに、暗号の解除を行う。セキュリティ制御部321は、セキュリティ情報管理部311から通知された通信に用いるセキュリティアルゴリズムの情報を取得する。そして、セキュリティ制御部321は、指定されたセキュリティアルゴリズムを用いてUE1へ送信するデータを暗号化し且つ完全性保証を行う。また、セキュリティ制御部221は、RLC処理部33から入力されたUE1からの送信データに対して、指定されたセキュリティアルゴリズムを用いて暗号化を解除する。 The security control unit 321 performs signaling integrity assurance and encryption, and decryption. The security control unit 321 acquires the information of the security algorithm used for communication notified from the security information management unit 311. Then, the security control unit 321 encrypts the data to be transmitted to the UE1 using the designated security algorithm and guarantees the integrity. The security control unit 221 also decrypts the transmission data from the UE 1 input from the RLC processing unit 33, using a designated security algorithm.
 RLC処理部33は、再送制御,重複検出及び順序整列などのRLC層における処理を実行する。 The RLC processing unit 33 executes processing in the RLC layer such as retransmission control, duplicate detection, and order alignment.
 MAC処理部34は、無線リソース割り当て、データマッピング及び再送制御などのMAC層における処理を実行する。例えば、MAC処理部34は、RLC処理部33から入力されたデータに対して無線リソースの割り当て及びデータマッピングなどを行いPHY処理部35へ出力する。 The MAC processing unit 34 executes processing in the MAC layer such as radio resource allocation, data mapping and retransmission control. For example, the MAC processing unit 34 performs radio resource allocation and data mapping for the data input from the RLC processing unit 33, and outputs the data to the PHY processing unit 35.
 PHY処理部35は、変調及び復調、符号化及び復号化、並びに、アンテナ多重化などのPHY層における処理を実行する。例えば、PHY処理部35は、通信制御部16から入力された信号に復調処理や復号化処理を施してMAC処理部34へ出力する。また、PHY処理部35は、MAC処理部34から入力された信号に変調処理や符号化処理を施して通信制御部36へ出力する。 The PHY processing unit 35 executes processing in the PHY layer such as modulation and demodulation, encoding and decoding, and antenna multiplexing. For example, the PHY processing unit 35 performs demodulation processing or decoding processing on the signal input from the communication control unit 16 and outputs the signal to the MAC processing unit 34. Further, the PHY processing unit 35 performs modulation processing and coding processing on the signal input from the MAC processing unit 34 and outputs the signal to the communication control unit 36.
 通信制御部36は、PHYベースバンド信号と無線信号との変換などを行う。通信制御部36は、接続先のUE1に対して無線信号を送信する。また、通信制御部16は、接続先のUE1から無線信号を受信する。 The communication control unit 36 performs conversion between PHY baseband signals and wireless signals. The communication control unit 36 transmits a radio signal to the UE1 of the connection destination. Further, the communication control unit 16 receives a wireless signal from the UE 1 that is the connection destination.
 SDAP処理部37は。ユーザデータのQoS(Quality Of Service)の管理を行う。例えば、SDAP処理部37は、コアネットワーク6から受信したIPパケットの入力をPDCP処理部32から受ける。そして、SDAP処理部37は、取得したIPパケットをQoSに対応する無線ベアラにマッピングし、PDCP処理部32へ出力する。また、SDAP処理部37は、PDCP処理部32から取得したIPパケットをQoSに対応する無線ベアラにマッピングしてコアネットワーク6へ送出する。 SDAP processing unit 37. Manages user data QoS (Quality Of Service). For example, the SDAP processing unit 37 receives the input of the IP packet received from the core network 6 from the PDCP processing unit 32. Then, the SDAP processing unit 37 maps the acquired IP packet on a radio bearer corresponding to QoS, and outputs it to the PDCP processing unit 32. Further, the SDAP processing unit 37 maps the IP packet acquired from the PDCP processing unit 32 to a radio bearer corresponding to QoS and sends it to the core network 6.
 次に、図5を参照して、AMF2について説明する。図5は、AMFのブロック図である。図5に示すように、AMF2は、通信制御部21、モビリティ制御部22、パス制御部23、基地局管理部24、セルリスト管理部25及びセキュリティ管理部26を有する。 Next, AMF2 will be described with reference to FIG. FIG. 5 is a block diagram of AMF. As shown in FIG. 5, the AMF 2 has a communication control unit 21, a mobility control unit 22, a path control unit 23, a base station management unit 24, a cell list management unit 25, and a security management unit 26.
 通信制御部21は、gNB3とデータの送受信を行う。通信制御部21は、gNB3とモビリティ制御部22、パス制御部23及び基地局管理部24との間の通信を仲介する。例えば、通信制御部21は、パス制御部23から送信されたページングにセルリスト管理部25から取得したページングの宛先のUE1の端末個別セルリスト200を付加して、gNB3へ送出する。この通信制御部21が、「情報受信部」の一例にあたる。 The communication control unit 21 transmits/receives data to/from the gNB3. The communication control unit 21 mediates communication between the gNB 3 and the mobility control unit 22, the path control unit 23, and the base station management unit 24. For example, the communication control unit 21 adds the terminal individual cell list 200 of the paging destination UE1 acquired from the cell list management unit 25 to the paging transmitted from the path control unit 23, and sends the paging destination to the gNB3. The communication control unit 21 corresponds to an example of “information receiving unit”.
 パス制御部23は、発着信の制御を行う。例えば、パス制御部23は、UE1のトラッキングエリア及びRANエリアの情報をモビリティ制御部22から受信する。また、パス制御部23は、gNB3からのページング要求を受信する。次に、パス制御部23は、ページングの宛先のUE1への通信経路をトラッキングエリア又はRANエリアを用いて決定する。そして、パス制御部23は、決定した通信経路のgNB3へページングを送信する。また、パス制御部23は、ページングを行う際にセルリスト管理部25にページングの実行を通知する。の際、パス制御部23は、UE1が在圏するトラッキングエリアの情報をセルリスト管理部25に通知する。 The path control unit 23 controls incoming and outgoing calls. For example, the path control unit 23 receives the information on the tracking area and the RAN area of the UE 1 from the mobility control unit 22. The path control unit 23 also receives the paging request from the gNB3. Next, the path control unit 23 determines the communication route to the UE 1 that is the paging destination using the tracking area or the RAN area. Then, the path control unit 23 transmits the paging to the gNB3 of the determined communication route. Further, the path control unit 23 notifies the cell list management unit 25 of the execution of paging when performing paging. At this time, the path control unit 23 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
 基地局管理部24は、TA又はRA単位でセル情報を含む基地局情報を管理する。基地局管理部24は、ネットワーク構築時に、各gNB3に対してセル情報の通知要求であるCell Information Requestを送信する。このCell Information Requestには、各gNB3が使用可能なセキュリティアルゴリズムの通知要求も含む。その後、基地局管理部24は、セル情報を各gNB3から受信する。そして、基地局管理部24は、各gNB3が使用可能なセキュリティアルゴリズムをセキュリティ管理部26へ通知する。 The base station management unit 24 manages base station information including cell information in TA or RA units. The base station management unit 24 transmits a Cell Information Request, which is a cell information notification request, to each gNB 3 when the network is constructed. This Cell Information Request also includes a notification request of a security algorithm that can be used by each gNB3. After that, the base station management unit 24 receives the cell information from each gNB3. Then, the base station management unit 24 notifies the security management unit 26 of the security algorithm that can be used by each gNB 3.
 また、基地局管理部24は、取得したセル情報からトラッキングエリア及びRANエリアを設定する。そして、基地局管理部24は、セル情報とともにトラッキングエリア及びRANエリアの情報をモビリティ制御部22へ出力する。また、基地局管理部24は、トラッキングエリアの情報をセルリスト管理部25へ出力する。 Also, the base station management unit 24 sets a tracking area and a RAN area from the acquired cell information. Then, the base station management unit 24 outputs the information on the tracking area and the RAN area together with the cell information to the mobility control unit 22. Further, the base station management unit 24 outputs information on the tracking area to the cell list management unit 25.
 モビリティ制御部22は、UE1の位置情報の登録及び制御を実行する。具体的には、モビリティ制御部22は、セル情報とともにトラッキングエリア及びRANエリアの情報を基地局管理部24から受信する。また、モビリティ制御部22は、UE1の在圏エリアの報告を定期的に受信する。そして、モビリティ制御部22は、UE1のトラッキングエリアを特定する。また、UE1がRRC_inactiveの場合、モビリティ制御部22は、RANエリアを特定する。モビリティ制御部22は、UE1のトラッキングエリア及びRANエリアをパス制御部23へ通知する。また、モビリティ制御部22は、トラッキングエリアの更新をセルリスト管理部25に通知する。この際、モビリティ制御部22は、UE1が在圏するトラッキングエリアの情報をセルリスト管理部25に通知する。 The mobility control unit 22 executes registration and control of the location information of the UE1. Specifically, the mobility control unit 22 receives the information on the tracking area and the RAN area together with the cell information from the base station management unit 24. The mobility control unit 22 also periodically receives a report of the area in which the UE 1 is located. Then, the mobility control unit 22 specifies the tracking area of the UE1. Further, when the UE1 is RRC_inactive, the mobility control unit 22 specifies the RAN area. The mobility controller 22 notifies the path controller 23 of the tracking area and RAN area of the UE 1. The mobility control unit 22 also notifies the cell list management unit 25 of the update of the tracking area. At this time, the mobility control unit 22 notifies the cell list management unit 25 of information on the tracking area in which the UE 1 is located.
 セキュリティ管理部26は、各UE1から送信された性能情報を受信する。ここで、性能情報には、各UE1が使用可能なセキュリティアルゴリズムの情報も含まれる。これを基に、セキュリティ管理部26は、各UE1のASコンテキスト情報を生成する。また、セキュリティ管理部26は、各gNB3が使用可能なセキュリティアルゴリズムの情報を基地局管理部24から受信する。そして、セキュリティ管理部26は、各UE1及び各gNB3のそれぞれについて使用可能なセキュリティアルゴリズムの情報を記憶する。 The security management unit 26 receives the performance information transmitted from each UE 1. Here, the performance information also includes information on a security algorithm that can be used by each UE 1. Based on this, the security management unit 26 generates AS context information of each UE1. Further, the security management unit 26 receives from the base station management unit 24 the information of the security algorithm that can be used by each gNB 3. Then, the security management unit 26 stores the information of the security algorithm that can be used for each UE1 and each gNB3.
 さらに、セキュリティ管理部26は、gNB3との間で接続を確立するUE1の性能情報を基に各UEASコンテキスト情報を生成する。そして、セキュリティ管理部26は、そのUE1との間で接続を確立するgNB3へASコンテキスト情報を送信して、ASコンテキストの設定を行う。 Further, the security management unit 26 generates each UEAS context information based on the performance information of the UE1 establishing the connection with the gNB3. Then, the security management unit 26 transmits the AS context information to the gNB 3 which establishes the connection with the UE 1 and sets the AS context.
 セルリスト管理部25は、トラッキングエリアの情報の入力を基地局管理部24から受ける。また、セルリスト管理部25は、各gNB3のセキュリティアルゴリズムの情報をセキュリティ管理部26から取得する。そして、セルリスト管理部25は、トラッキングエリア毎に、セキュリティアルゴリズムのパターン毎に端末個別セルリスト200を生成する。本実施例では、端末個別セルリスト200は、各セキュリティアルゴリズムについて使用することが可能なgNB3、又はセキュリティアルゴリズムを使用できることで回線設定が可能なgNB3を示すホワイトセルリストを生成する。 The cell list management unit 25 receives input of tracking area information from the base station management unit 24. Further, the cell list management unit 25 acquires information on the security algorithm of each gNB 3 from the security management unit 26. Then, the cell list management unit 25 creates the terminal-specific cell list 200 for each security algorithm pattern for each tracking area. In the present embodiment, the terminal-specific cell list 200 generates a white cell list indicating gNB3 that can be used for each security algorithm or gNB3 that can be line-configured by using the security algorithm.
 ここで、端末個別セルリスト200は、5Gの通信で使用されるアルゴリズムの数によってパターン化される。そのため、端末個別セルリスト200の作成処理は、AMF2やgNB3の処理を大きく圧迫するものではない。例えば、セキュリティアルゴリズムの数が5の場合、各セキュリティアルゴリズムについてUE1が使用可能か否かの2パターンとなるので、UE1が使用可能なセキュリティアルゴリズムのパターンは2^5-1=31通りとなる。すなわち、セキュリティアルゴリズムの数が5であれば、AMF2が作成する端末個別セルリスト200のパターンは31通りとなる。なお、UE1は少なくとも1つのセキュリティアルゴリズムに対応するため31通りとなる。仮にいずれのセキュリティアルゴリズムにも対応しない場合があるならば32通りとなる。 Here, the terminal-specific cell list 200 is patterned according to the number of algorithms used in 5G communication. Therefore, the process of creating the terminal individual cell list 200 does not significantly impose the process of AMF2 and gNB3. For example, when the number of security algorithms is 5, there are two patterns of whether or not UE1 can be used for each security algorithm, and therefore there are 2^5-1=31 patterns of security algorithms that can be used by UE1. That is, if the number of security algorithms is 5, there are 31 patterns in the terminal-specific cell list 200 created by the AMF 2. There are 31 types of UE1 since it corresponds to at least one security algorithm. If there is a case where it does not support any security algorithm, there are 32 ways.
 その後、セルリスト管理部25は、パス制御部23からページングの実行の通知を受けた場合、もしくは、モビリティ制御部22からトラッキングエリアの更新の通知を受けた場合、以下の処理を実行する。セルリスト管理部25は、ページング、トラッキングエリア又は位置登録エリアの更新の対象となるUE1が使用可能なセキュリティアルゴリズムの情報をセキュリティ管理部26から取得する。そして、セルリスト管理部25は、そのUE1が在圏するトラッキングエリア(位置登録エリア)における、そのUE1が使用可能なセキュリティアルゴリズムに応じたパターンの端末個別セルリスト200を選択し、UE1へ送信する。このセルリスト管理部25が、「情報管理部」の一例にあたる。 After that, when the cell list management unit 25 receives a notification of paging execution from the path control unit 23 or a notification of tracking area update from the mobility control unit 22, the cell list management unit 25 executes the following processing. The cell list management unit 25 acquires, from the security management unit 26, information on the security algorithm that can be used by the UE 1 that is the target of paging, tracking area update, or location registration area update. Then, the cell list management unit 25 selects the terminal-specific cell list 200 in the tracking area (location registration area) in which the UE 1 is located and has a pattern corresponding to the security algorithm usable by the UE 1, and transmits the cell list 200 to the UE 1. .. The cell list management unit 25 corresponds to an example of “information management unit”.
 ここで、本実施例では、セルリスト管理部25は、端末個別セルリスト200としてホワイトセルリストを用いた。ただし、セルリスト管理部25は、端末個別セルリスト200として各セキュリティアルゴリズムについて対応していないgNB3、又はセキュリティアルゴリズムが対応しないことで回線設定が困難なgNB3が登録されたブラックセルリストを用いてもよい。ブラックセルリストを用いた場合、UE1は、取得した端末個別セルリスト200に登録されたgNB3を除いたgNB3に対して無線回線品質測定を行い接続可能なgNB3を検出する。特に、トラッキングエリア又はRANエリア内で特定のアルゴリズムについて使用可能とするgNB3の数が少ない場合、ブラックセルリストを用いた方がより情報量を少なくすることができる。 Here, in the present embodiment, the cell list management unit 25 uses the white cell list as the terminal-specific cell list 200. However, the cell list management unit 25 may use, as the terminal individual cell list 200, a gNB3 that does not correspond to each security algorithm, or a black cell list in which gNB3 in which line setting is difficult because the security algorithm does not correspond is used. Good. When the black cell list is used, the UE1 detects the connectable gNB3 by performing radio channel quality measurement on the gNB3 excluding the gNB3 registered in the acquired terminal-specific cell list 200. In particular, when the number of gNB3s that can be used for a particular algorithm in the tracking area or the RAN area is small, the black cell list can reduce the amount of information.
 そこで、セルリスト管理部25は、送信する端末個別セルリスト200をホワイトセルリストにするかブラックセルリストにするかを、情報量に応じて決定してもよい。この場合、UE1は受信した端末個別セルリスト200がホワイトセルリストかブラックセルリストかを判定することになる。そこで、セルリスト管理部25は、図6に示すような、1ビットの識別フラグ212をセルID情報211に付加した端末個別セルリスト200を使用することが好ましい。図6は、端末個別セルリストのフォーマットの一例を示す図である。UE1は、受信した端末個別セルリスト200の識別フラグ212を確認することで、セルID情報211がホワイトセルリストかブラックセルリストかを判定することができる。 Therefore, the cell list management unit 25 may determine whether the terminal individual cell list 200 to be transmitted is the white cell list or the black cell list according to the amount of information. In this case, the UE1 determines whether the received terminal-specific cell list 200 is the white cell list or the black cell list. Therefore, the cell list management unit 25 preferably uses the terminal-specific cell list 200 in which the 1-bit identification flag 212 is added to the cell ID information 211 as shown in FIG. FIG. 6 is a diagram showing an example of the format of the terminal-specific cell list. The UE 1 can determine whether the cell ID information 211 is the white cell list or the black cell list by checking the identification flag 212 of the received terminal-specific cell list 200.
 また、セルリスト管理部25は、端末個別セルリスト200を、ページングとともに送信するもしくUE1が移動した際のTAU信号の送信に使用されるgNB3へ送信する。ここで、ページングやTAU信号の送信に使用されるgNB3は、UE1が使用するセキュリティアルゴリズムに対応していないことが考えられる。そのため、本実施例では、ページング及びTAU信号の送信については、暗号化されていない又は共通的なセキュリティアルゴリズムが使用される。共通的なアルゴリズムとは、ネットワーク上で予め使用が決められたセキュリティアルゴリズムである。 The cell list management unit 25 also transmits the terminal-specific cell list 200 to the gNB3 that is used for transmitting the TAU signal when the UE1 moves or is transmitted together with paging. Here, it is conceivable that the gNB3 used for paging and transmitting the TAU signal does not correspond to the security algorithm used by the UE1. Therefore, in this embodiment, an unencrypted or common security algorithm is used for paging and TAU signal transmission. The common algorithm is a security algorithm which is predetermined to be used on the network.
 そのため、本実施例では、端末個別セルリスト200は、暗号化されずもしくは解読が容易な暗号化を用いて送信される。この点、端末個別セルリスト200は、セルの識別情報が記載されていればよい。また、UE1が選択するセルは、端末個別セルリスト200の中で最も回線品質が高いものであり、第三者が容易に特定できるものではない。これらのことから、端末個別セルリスト200は、セキュアな情報を含まないといえる。そこで、セルリスト管理部25による端末個別セルリスト200の送信で、暗号化せずに送信しても問題はない。 Therefore, in the present embodiment, the terminal individual cell list 200 is transmitted using encryption that is not encrypted or that is easy to decipher. In this respect, the terminal-specific cell list 200 only needs to describe cell identification information. The cell selected by the UE1 has the highest line quality in the terminal-specific cell list 200 and cannot be easily specified by a third party. From these things, it can be said that the terminal-specific cell list 200 does not include secure information. Therefore, there is no problem in transmitting the terminal-specific cell list 200 by the cell list managing unit 25 without encrypting.
 また、一般的に、C-plane信号とU-plane信号とで使用するセキュリティアルゴリズムが同じである可能性がある。しかし、使用するセキュリティアルゴリズムがC-plane信号とU-plane信号とで同じであると、TAU信号などのC-plane信号を暗号化しない又は共通的なアルゴリズムを用いる場合、U-plane信号が第三者に漏洩するおそれがある。そこで、本実施例では、C-plane信号とU-plane信号とのそれぞれで使用するセキュリティアルゴリズムを異ならせることが好ましい。 Also, generally, the security algorithms used for the C-plane signal and the U-plane signal may be the same. However, if the same security algorithm is used for the C-plane signal and the U-plane signal, if the C-plane signal such as the TAU signal is not encrypted or a common algorithm is used, the U-plane signal is May be leaked to the three parties. Therefore, in this embodiment, it is preferable to use different security algorithms for the C-plane signal and the U-plane signal.
 次に、図7及び図8を参照して、ページング時に端末個別セルリスト200を送信する場合の再接続処理の流れを説明する。図7は、UEが使用可能なセキュリティアルゴリズムにページングを受信したgNBが対応している場合の再接続処理のシーケンス図である。また、図8は、UEが使用可能なセキュリティアルゴリズムにページングを受信したgNBが対応していない場合の再接続処理のシーケンス図である。ここでは、動作主体をUE1、gNB3A~3C及びAMF2として説明する。gNB3Cは、C-plane接続における中継装置となるアンカーgNBである。そして、gNB3AとgNB3Bとのトラッキングエリア(位置登録エリア)は同一であるが、gNB3Cのトラッキングエリア(位置登録エリア)は異なる。また、本実施例では、gNB3A~3CのいずれもAMF2を使用するが、これも異なってもよい。 Next, the flow of reconnection processing when the terminal-specific cell list 200 is transmitted during paging will be described with reference to FIGS. 7 and 8. FIG. 7 is a sequence diagram of the reconnection process when the gNB that receives the paging corresponds to the security algorithm that can be used by the UE. FIG. 8 is a sequence diagram of the reconnection process when the gNB that receives the paging does not correspond to the security algorithm usable by the UE. Here, the description will be given assuming that the operation subjects are UE1, gNB3A to 3C, and AMF2. The gNB3C is an anchor gNB that serves as a relay device in the C-plane connection. The gNB3A and the gNB3B have the same tracking area (position registration area), but the gNB3C has a different tracking area (position registration area). Further, in this embodiment, AMF2 is used in all of gNB3A to 3C, but this may be different.
 まず、図7を参照して、UE1が使用可能なセキュリティアルゴリズムにページングを受信したgNB3Aが対応している場合の再接続処理を説明する。gNB3A~3Cは、それぞれのセル情報をAMF2に送信する。そして、AMF2は、gNB3A~3Cの各セル情報を取得する(ステップS101)。 First, with reference to FIG. 7, a reconnection process when the gNB 3A receiving the paging corresponds to the security algorithm usable by the UE 1 will be described. The gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S101).
 次に、UE1は、電源オン等によりランダムアクセスが開始され、gNB3A~3C及びAMF2が配置されたネットワークにアタッチされる。その後、所定条件を満たすことで、UE1は、RRC_inactiveの状態に遷移する(ステップS102)。 Next, UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S102).
 その後、UE1は、TAU又はRAUの処理を実行し、トラッキングエリア、RANエリア又は位置登録エリアの更新を行う(ステップS103)。 After that, the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S103).
 その後、AMF2は、UE1を宛先とする下り信号を受信する(ステップS104)。 After that, the AMF 2 receives the downlink signal whose destination is the UE 1 (step S104).
 次に、AMF2は、UE1のUEコンテキストを確認する(ステップS105)。 Next, AMF2 confirms the UE context of UE1 (step S105).
 そして、AMF2は、UE1が対応するセキュリティアルゴリズムを基に端末個別セルリスト200を作成する(ステップS106)。 Then, the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S106).
 次に、AMF2は、gNB3C及び3Aを介してUE1にページング及び端末個別セルリスト200を送信する(ステップS107)。 Next, the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S107).
 UE1は、ページングを受信する(ステップS108)。さらに、UE1は、ページングとともに端末個別セルリスト200を受信する。 UE1 receives the paging (step S108). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
 次に、UE1は、参照信号(Reference Signal:RS)をgNB3A及び3Bから受信する(ステップS109及びS110)。 Next, the UE1 receives a reference signal (Reference Signal: RS) from the gNB 3A and 3B (steps S109 and S110).
 また、UE1は、gNB3A及び3Bから同期信号を受信してgNB3A及び3BのセルIDを特定する。次に、UE1は、端末個別セルリスト200を参照し、特定したセルIDを用いてgNB3A及び3BがUE1が使用可能なセキュリティアルゴリズムに対応する基地局であることを確認する。そして、UE1は、gNB3A及び3Bの参照信号を用いて無線回線品質測定を実行する(ステップS111)。 UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use. Then, the UE1 uses the reference signals of the gNB 3A and 3B to perform the radio channel quality measurement (step S111).
 次に、UE1は、無線回線品質測定の結果からgNB3Aが形成するセルと接続セルとして選択する(ステップS112)。 Next, the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S112).
 そして、UE1は、RRCの再接続要求であるRRC Resume RequestをgNB3Aに送信する(ステップS113)。 Then, the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S113).
 gNB3Aは、RRC Resume Requestを受信して、UE1のUEコンテキスト情報の送信要求であるRetrieve UE Context RequestをgNB3Cへ送信する(ステップS114)。 The gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S114).
 gNB3Cは、Retrieve UE Context Requestを受信して、UE1のコンテキスト情報を送信するRetrieve UE Context ResponseをgNB3Aへ送信する(ステップS115)。 The gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3A (step S115).
 gNB3Aは、Retrieve UE Context Responseを受信してUE1のUEコンテキストを取得する。そして、gNB3Aは、UE1のアンカーセル又はサービングセルに自己か形成するセルを設定する(ステップS116)。 The gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S116).
 そして、gNB3Aは、RRC ResumeをUE1へ送信して、無線接続を確立させて、UE1との間の通信接続を確立する(ステップS117)。 Then, the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S117).
 その後、UE1とgNB3Aとは、確立した通信接続を用いてユーザデータの伝送を行う(ステップS118)。 After that, the UE1 and the gNB3A perform transmission of user data using the established communication connection (step S118).
 次に、図8を参照して、UE1が使用可能なセキュリティアルゴリズムにページングを受信したgNB3Aが対応していない場合の再接続処理を説明する。gNB3A~3Cは、それぞれのセル情報をAMF2に送信する。そして、AMF2は、gNB3A~3Cの各セル情報を取得する(ステップS201)。 Next, with reference to FIG. 8, a reconnection process when the gNB 3A receiving the paging does not correspond to the security algorithm usable by the UE 1 will be described. The gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires the cell information of gNB 3A to 3C (step S201).
 次に、UE1は、電源オン等によりランダムアクセスが開始され、gNB3A~3C及びAMF2が配置されたネットワークにアタッチされる。その後、所定条件を満たすことで、UE1は、RRC_inactiveの状態に遷移する(ステップS202)。 Next, UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transitions to the RRC_inactive state (step S202).
 その後、UE1は、TAU又はRAUの処理を実行し、トラッキングエリア、RANエリア又は位置登録エリアの更新を行う(ステップS203)。 After that, the UE1 executes the process of TAU or RAU to update the tracking area, the RAN area or the location registration area (step S203).
 その後、AMF2は、UE1を宛先とする下り信号を受信する(ステップS204)。 After that, the AMF 2 receives the downlink signal whose destination is the UE 1 (step S204).
 次に、AMF2は、UE1のUEコンテキストを確認する(ステップS205)。 Next, AMF2 confirms the UE context of UE1 (step S205).
 そして、AMF2は、UE1が対応するセキュリティアルゴリズムを基に端末個別セルリスト200を作成する(ステップS206)。 Then, the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S206).
 次に、AMF2は、gNB3C及び3Aを介してUE1にページング及び端末個別セルリスト200を送信する(ステップS207)。 Next, the AMF 2 transmits the paging and terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S207).
 UE1は、ページングを受信する(ステップS208)。さらに、UE1は、ページングとともに端末個別セルリスト200を受信する。 UE1 receives the paging (step S208). Furthermore, the UE1 receives the terminal-specific cell list 200 together with paging.
 次に、UE1は、参照信号をgNB3A及び3Bから受信する(ステップS209及びS210)。 Next, the UE1 receives the reference signal from the gNB 3A and 3B (steps S209 and S210).
 また、UE1は、gNB3A及び3Bから同期信号を受信してgNB3A及び3BのセルIDを特定する。次に、UE1は、端末個別セルリスト200を参照し、特定したセルIDを用いてgNB3BはUE1が使用可能なセキュリティアルゴリズムに対応する基地局であり、gNB3Aは対応していないことを確認する。そして、UE1は、gNB3Bの参照信号を用いて無線回線品質測定を実行する。この場合、UE1は、gNB3Bの参照信号の無線回線品質測定は行わない(ステップS211)。 UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID. Then, the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the wireless channel quality of the reference signal of gNB3B (step S211).
 次に、UE1は、無線回線品質測定の結果からgNB3Bが形成するセルと接続セルとして選択する(ステップS212)。 Next, the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S212).
 そして、UE1は、RRCの再接続要求であるRRC Resume RequestをgNB3Bに送信する(ステップS213)。 Then, the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S213).
 gNB3Bは、RRC Resume Requestを受信して、UE1のUEコンテキスト情報の送信要求であるRetrieve UE Context RequestをgNB3Cへ送信する(ステップS214)。 The gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S214).
 gNB3Cは、Retrieve UE Context Requestを受信して、UE1のコンテキスト情報を送信するRetrieve UE Context ResponseをgNB3Bへ送信する(ステップS215)。 The gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S215).
 gNB3Bは、Retrieve UE Context Responseを受信してUE1のUEコンテキストを取得する。そして、gNB3Bは、UE1のアンカーセル又はサービングセルに自己か形成するセルを設定する(ステップS216)。 The gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3B sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S216).
 そして、gNB3Bは、RRC ResumeをUE1へ送信して、無線接続を確立させて、UE1との間の通信接続を確立する(ステップS217)。 Then, the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S217).
 その後、UE1とgNB3Bとは、確立した通信接続を用いてユーザデータの伝送を行う(ステップS218)。 After that, the UE 1 and the gNB 3B transmit user data using the established communication connection (step S218).
 次に、図9及び図10を参照して、TAU時に端末個別セルリスト200を送信する場合の再接続処理の流れを説明する。図9は、UEが使用可能なセキュリティアルゴリズムにTAU(位置登録エリア更新)の送信先のgNBが対応している場合の再接続処理のシーケンス図である。また、図10は、UEが使用可能暗セキュリティアルゴリズムにTAUの送信先のgNBが対応していない場合の再接続処理のシーケンス図である。 Next, the flow of reconnection processing when the terminal-specific cell list 200 is transmitted during TAU will be described with reference to FIGS. 9 and 10. FIG. 9 is a sequence diagram of a reconnection process in the case where the destination gNB of the TAU (location registration area update) corresponds to the security algorithm usable by the UE. FIG. 10 is a sequence diagram of the reconnection process when the UE-enabled dark security algorithm is not supported by the gNB of the TAU transmission destination.
 まず、図9を参照して、UE1が使用可能なセキュリティアルゴリズムにTAUの送信先のgNB3Aが対応している場合の再接続処理を説明する。gNB3A~3Cは、それぞれのセル情報をAMF2に送信する。そして、AMF2は、gNB3A~3Cの各セル情報を取得する(ステップS301)。 First, referring to FIG. 9, a reconnection process when the security algorithm that can be used by the UE1 is supported by the gNB3A that is the transmission destination of the TAU will be described. The gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S301).
 次に、UE1は、電源オン等によりランダムアクセスが開始され、gNB3A~3C及びAMF2が配置されたネットワークにアタッチされる。その後、所定条件を満たすことで、UE1は、RRC_inactiveの状態に遷移する(ステップS302)。 Next, UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S302).
 その後、UE1は、トラッキングエリアを跨ぐ移動を実行する(ステップS303)。 After that, the UE1 executes the movement across the tracking area (step S303).
 そして、UE1は、セキュリティアルゴリズムを考慮せずにC-plane信号を送受信するgNB3Aを選択する(ステップS304)。 Then, the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S304).
 次に、UE1は、選択したgNB3Aを介してAMF2へTAUを送信する(ステップS305)。 Next, UE1 transmits TAU to AMF2 via the selected gNB3A (step S305).
 AMF2は、TAUをUE1から受信する。そして、AMF2は、UE1のトラッキングエリアを更新する。また、AMF2は、UEコンテキストを確認する(ステップS306)。 AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Further, the AMF 2 confirms the UE context (step S306).
 そして、AMF2は、UE1が対応するセキュリティアルゴリズムを基に端末個別セルリスト200を作成する(ステップS307)。 Then, the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S307).
 次に、AMF2は、gNB3C及び3Aを介してUE1にトラッキングエリア(位置登録エリア)の更新完了通知であるTracking Area Update Accept及び端末個別セルリスト200を送信する(ステップS308)。 Next, the AMF 2 transmits the Tracking Area Update Accept, which is the update completion notification of the tracking area (location registration area), and the terminal individual cell list 200 to the UE 1 via the gNB 3C and 3A (step S308).
 UE1は、Tracking Area Update Accept及び端末個別セルリスト200をAMF2から受信する。次に、UE1は、参照信号をgNB3A及び3Bから受信する(ステップS309及びS310)。 UE1 receives Tracking Area Update Accept and terminal individual cell list 200 from AMF2. Next, UE1 receives a reference signal from gNB3A and 3B (steps S309 and S310).
 また、UE1は、gNB3A及び3Bから同期信号を受信してgNB3A及び3BのセルIDを特定する。次に、UE1は、端末個別セルリスト200を参照し、特定したセルIDを用いてgNB3A及び3BがUE1が使用可能なセキュリティアルゴリズムに対応する基地局であることを確認する。そして、UE1は、gNB3A及び3Bの参照信号を用いて無線回線品質測定を実行する(ステップS311)。 UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200 and uses the specified cell ID to confirm that the gNB 3A and 3B are base stations corresponding to the security algorithms that the UE1 can use. Then, the UE1 executes the wireless channel quality measurement using the reference signals of the gNB 3A and 3B (step S311).
 次に、UE1は、無線回線品質測定の結果からgNB3Aが形成するセルと接続セルとして選択する(ステップS312)。 Next, the UE1 selects the cell formed by the gNB3A and the connecting cell from the result of the wireless channel quality measurement (step S312).
 そして、UE1は、RRCの再接続要求であるRRC Resume RequestをgNB3Aに送信する(ステップS313)。 Then, the UE1 sends an RRC Resume Request, which is an RRC reconnection request, to the gNB 3A (step S313).
 gNB3Aは、RRC Resume Requestを受信して、UE1のUEコンテキスト情報の送信要求であるRetrieve UE Context RequestをgNB3Cへ送信する(ステップS314)。 The gNB3A receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S314).
 gNB3Cは、Retrieve UE Context Requestを受信して、UE1のコンテキスト情報を送信するRetrieve UE Context ResponseをgNB3Aへ送信する(ステップS315)。 The gNB3C receives the Retrieve UE Context Request, and transmits the Retrieve UE Context Response, which transmits the context information of the UE1, to the gNB3A (step S315).
 gNB3Aは、Retrieve UE Context Responseを受信してUE1のUEコンテキストを取得する。そして、gNB3Aは、UE1のアンカーセル又はサービングセルに自己か形成するセルを設定する(ステップS316)。 The gNB3A receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, the gNB 3A sets a self-forming cell as the anchor cell or the serving cell of the UE 1 (step S316).
 そして、gNB3Aは、RRC ResumeをUE1へ送信して、無線接続を確立させて、UE1との間の通信接続を確立する(ステップS317)。 Then, the gNB 3A transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S317).
 その後、UE1とgNB3Aとは、確立した通信接続を用いてユーザデータの伝送を行う(ステップS318)。 After that, the UE1 and the gNB3A transmit user data using the established communication connection (step S318).
 次に、図10を参照して、UE1が使用可能なセキュリティアルゴリズムにTAUの送信先のgNB3Aが対応していない場合の再接続処理を説明する。gNB3A~3Cは、それぞれのセル情報をAMF2に送信する。そして、AMF2は、gNB3A~3Cの各セル情報を取得する(ステップS401)。 Next, with reference to FIG. 10, a reconnection process when the gNB3A, which is the transmission destination of the TAU, does not correspond to the security algorithm usable by the UE1, will be described. The gNBs 3A to 3C transmit their cell information to the AMF2. Then, the AMF 2 acquires each cell information of gNB 3A to 3C (step S401).
 次に、UE1は、電源オン等によりランダムアクセスが開始され、gNB3A~3C及びAMF2が配置されたネットワークにアタッチされる。その後、所定条件を満たすことで、UE1は、RRC_inactiveの状態に遷移する(ステップS402)。 Next, UE1 starts random access by turning on the power, etc., and is attached to the network in which gNB3A to 3C and AMF2 are arranged. After that, by satisfying the predetermined condition, the UE1 transits to the RRC_inactive state (step S402).
 その後、UE1は、トラッキングエリアを跨ぐ移動(又は異なるトラッキングエリアへの移動)を実行する(ステップS403)。 After that, the UE1 executes movement across the tracking area (or movement to a different tracking area) (step S403).
 そして、UE1は、セキュリティアルゴリズムを考慮せずにC-plane信号を送受信するgNB3Aを選択する(ステップS404)。 Then, the UE1 selects the gNB3A that transmits/receives the C-plane signal without considering the security algorithm (step S404).
 次に、UE1は、選択したgNB3Aを介してAMF2へTAUを送信する(ステップS405)。 Next, UE1 transmits TAU to AMF2 via the selected gNB3A (step S405).
 AMF2は、TAUをUE1から受信する。そして、AMF2は、UE1のトラッキングエリアを更新する。また、AMF2は、UEコンテキストを確認する(ステップS406)。 AMF2 receives TAU from UE1. Then, the AMF2 updates the tracking area of the UE1. Also, the AMF 2 confirms the UE context (step S406).
 そして、AMF2は、UE1が対応するセキュリティアルゴリズムを基に端末個別セルリスト200を作成する(ステップS407)。 Then, the AMF 2 creates the terminal-specific cell list 200 based on the security algorithm supported by the UE 1 (step S407).
 次に、AMF2は、gNB3C及び3Aを介してUE1にトラッキングエリアの更新完了通知であるTracking Area Update Accept及び端末個別セルリスト200を送信する(ステップS408)。 Next, the AMF 2 transmits the Tracking Area Update Accept, which is a notification of the completion of updating the tracking area, and the terminal-specific cell list 200 to the UE 1 via the gNB 3C and 3A (step S408).
 次に、UE1は、参照信号をgNB3A及び3Bから受信する(ステップS409及びS410)。 Next, the UE1 receives the reference signal from the gNB 3A and 3B (steps S409 and S410).
 また、UE1は、gNB3A及び3Bから同期信号を受信してgNB3A及び3BのセルIDを特定する。次に、UE1は、端末個別セルリスト200を参照し、特定したセルIDを用いてgNB3BはUE1が使用可能なセキュリティアルゴリズムに対応する基地局であり、gNB3Aは対応していないことを確認する。そして、UE1は、gNB3Bの参照信号を用いて無線回線品質測定を実行する。この場合、UE1は、gNB3Bの参照信号の無線回線品質測定は行わない(ステップS411)。 UE1 also receives a synchronization signal from gNB3A and 3B and specifies the cell ID of gNB3A and 3B. Next, the UE1 refers to the terminal-specific cell list 200, and confirms that the gNB3B is a base station corresponding to the security algorithm usable by the UE1 and the gNB3A is not compatible by using the specified cell ID. Then, the UE1 executes the wireless channel quality measurement using the reference signal of the gNB3B. In this case, UE1 does not measure the radio channel quality of the reference signal of gNB3B (step S411).
 次に、UE1は、無線回線品質測定の結果からgNB3Bが形成するセルと接続セルとして選択する(ステップS412)。 Next, the UE1 selects the cell formed by the gNB3B and the connecting cell from the result of the wireless channel quality measurement (step S412).
 そして、UE1は、RRCの再接続要求であるRRC Resume RequestをgNB3Bに送信する(ステップS413)。 Then, the UE1 transmits an RRC Resume Request, which is an RRC reconnection request, to the gNB 3B (step S413).
 gNB3Bは、RRC Resume Requestを受信して、UE1のUEコンテキスト情報の送信要求であるRetrieve UE Context RequestをgNB3Cへ送信する(ステップS414)。 The gNB3B receives the RRC Resume Request and transmits a Retrieve UE Context Request, which is a transmission request of the UE context information of the UE1, to the gNB3C (step S414).
 gNB3Cは、Retrieve UE Context Requestを受信して、UE1のコンテキスト情報を送信するRetrieve UE Context ResponseをgNB3Bへ送信する(ステップS415)。 The gNB3C receives the Retrieve UE Context Request and transmits the Retrieve UE Context Response for transmitting the context information of the UE1 to the gNB3B (step S415).
 gNB3Bは、Retrieve UE Context Responseを受信してUE1のUEコンテキストを取得する。そして、gNB3Bは、自身が形成するセルをUE1のアンカーセル又はサービングセルに設定する(ステップS416)。 The gNB3B receives the Retrieve UE Context Response and acquires the UE context of the UE1. Then, gNB3B sets the cell formed by itself as the anchor cell or the serving cell of UE1 (step S416).
 そして、gNB3Bは、RRC ResumeをUE1へ送信して、無線接続を確立させて、UE1との間の通信接続を確立する(ステップS417)。 Then, the gNB 3B transmits an RRC Resume to the UE 1, establishes a wireless connection, and establishes a communication connection with the UE 1 (step S417).
 その後、UE1とgNB3Bとは、確立した通信接続を用いてユーザデータの伝送を行う(ステップS418)。 After that, the UE1 and the gNB3B transmit user data using the established communication connection (step S418).
 ここで、図11を参照して、ネットワークの構築からUE1がRRC_inactiveになるまでの処理を詳細に説明する。図11は、ネットワークの構築からUEがRRC_inactiveになるまでの処理のシーケンス図である。 Here, with reference to FIG. 11, a detailed description will be given of the processing from the network construction to the UE1 becoming RRC_inactive. FIG. 11 is a sequence diagram of processing from network construction to UE becoming RRC_inactive.
 AMF2は、セル情報の通知要求であるCall Information RequestをgNB3A~3Cへ送信する(ステップS501)。ここで、Call Information Requestには、gNB3A~3Cのそれぞれが使用可能なセキュリティアルゴリズムの通知要求も含まれる。 The AMF 2 transmits a Call Information Request, which is a cell information notification request, to the gNBs 3A to 3C (step S501). Here, the Call Information Request also includes a notification request of a security algorithm that can be used by each of the gNBs 3A to 3C.
 そして、gNB3A~3Cは、各々が使用可能なセキュリティアルゴリズムの情報を含むセル情報をAMF2へ送信する(ステップS502)。 Then, the gNBs 3A to 3C transmit the cell information including the information of the security algorithm that can be used by each to the AMF 2 (step S502).
 次に、AMF2は、パターン毎の端末個別セルリスト200を作成する(ステップS503)。 Next, the AMF 2 creates a terminal-specific cell list 200 for each pattern (step S503).
 次に、UE1は、gNB3A~3Cに対してランダムアクセスを実行する。そして、UE1は、UEコンテキストを送信してgNB3A~3CにUE1のUEコンテキストを設定する(ステップS504)。 Next, UE1 executes random access to gNB3A to 3C. Then, the UE1 transmits the UE context and sets the UE context of the UE1 in the gNBs 3A to 3C (step S504).
 次に、UE1は、UE1のセキュリティアルゴリズムを含むUE性能情報をAMF2へ送信する(ステップS505)。 Next, UE1 transmits the UE performance information including the security algorithm of UE1 to AMF2 (step S505).
 その後、UE1は、位置登録周期にしたがった位置登録タイミングが到来するとTAU又は位置情報をAMFへ送信する(ステップS506)。 After that, when the location registration timing according to the location registration period arrives, the UE1 transmits TAU or location information to the AMF (step S506).
 gNB3Cは、ページング通知をPaging occationによりUE1へ送信する(ステップS507)。 The gNB3C sends a paging notification to the UE1 by paging occurrence (step S507).
 その後、AMF2は、UE1のUE性能情報を基に各UEASコンテキスト情報を生成する。そして、セキュリティ管理部26は、gNB3A~3Bの内の接続する基地局へASコンテキスト情報を送信して、ASコンテキストの設定を行う(ステップS508)。 After that, the AMF 2 generates each UEAS context information based on the UE performance information of the UE 1. Then, the security management unit 26 transmits the AS context information to the connected base station among the gNBs 3A to 3B and sets the AS context (step S508).
 UE1は、RRC_connectedへ移行する(ステップS509)。 UE1 moves to RRC_connected (step S509).
 その後、UE1とgNB3A~3Bの内の接続する基地局とは、特定の条件が満たされると、無線回線開放及びUEコンテキストの解放を行う(ステップS510)。 After that, the UE 1 and the base station connected to one of the gNBs 3A to 3B release the wireless link and release the UE context when a specific condition is satisfied (step S510).
 そして、UE1は、RRC_inactiveへ遷移する(ステップS511)。 Then, the UE1 transits to RRC_inactive (step S511).
 次に、AMF2のハードウェア構成について説明する。図12は、AMFのハードウェア構成図である。図12に示すように、AMF2は、CPU(Central Processing Unit)291、メモリ292、ハードディスク293及び通信インタフェース294を有する。CPU291は、メモリ292、ハードディスク293及び通信インタフェース294とバスで接続される。CPU291は、バスを介して、メモリ292、ハードディスク293及び通信インタフェース294と通信を行う。 Next, the hardware configuration of AMF2 will be described. FIG. 12 is a hardware configuration diagram of the AMF. As shown in FIG. 12, the AMF 2 has a CPU (Central Processing Unit) 291, a memory 292, a hard disk 293, and a communication interface 294. The CPU 291 is connected to the memory 292, the hard disk 293, and the communication interface 294 by a bus. The CPU 291 communicates with the memory 292, the hard disk 293, and the communication interface 294 via the bus.
 通信インタフェース294は、通信制御部21とgNB3との間の通信におけるインタフェースである。 The communication interface 294 is an interface for communication between the communication control unit 21 and gNB3.
 ハードディスク293は、図5に例示した通信制御部21、モビリティ制御部22、パス制御部23、基地局管理部24、セルリスト管理部25及びセキュリティ管理部26の機能を実現するプログラムを含む各種プログラムを格納する。 The hard disk 293 includes various programs including programs that implement the functions of the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security management unit 26 illustrated in FIG. To store.
 CPU291は、ハードディスク293から各種プログラムを読み出し、メモリ292へ展開して実行することで、通信制御部21、モビリティ制御部22、パス制御部23、基地局管理部24、セルリスト管理部25及びセキュリティ管理部26の機能を実現する。 The CPU 291 reads various programs from the hard disk 293, loads the programs into the memory 292, and executes the programs to execute the communication control unit 21, the mobility control unit 22, the path control unit 23, the base station management unit 24, the cell list management unit 25, and the security. The function of the management unit 26 is realized.
 ここで、以上の説明では、UE1は、TAUを行った際に端末個別セルリスト200をAMF2から取得する場合で説明したが、この端末個別セルリスト200の取得タイミングは他のタイミングでもよい。例えば、UE1がRAUを行う際に端末個別セルリスト200をAMF2から取得する構成でもよい。RAUのタイミングで端末個別セルリスト200を取得する場合であっても、取得のタイミングが異なるだけで、UE1、gNB3及びAMF2は上述した各処理と同様の処理を行う。 Here, in the above description, the case where the UE1 acquires the terminal individual cell list 200 from the AMF2 when performing the TAU has been described, but the acquisition timing of the terminal individual cell list 200 may be another timing. For example, the configuration may be such that the UE1 cell list 200 is acquired from the AMF2 when the UE1 performs RAU. Even when the terminal individual cell list 200 is acquired at the RAU timing, the UE1, gNB3, and AMF2 perform the same processing as each of the above-described processings, only at the different acquisition timings.
 以上に説明したように、本実施例に係るUEは、接続可能なgNBが使用可能なセキュリティアルゴリズムを判定する情報を取得する。そして、UEは、RRC_inactiveの状態でgNBへ再接続を行う際に、使用可能なセキュリティアルゴリズムが自装置と一致するgNBの中から選択したgNBと接続を確立する。これにより、RRC_inactiveの状態からの再接続時にセキュリティアルゴリズムの不一致による接続の失敗を回避してRLFの発生を低減することができる。したがって、RLFの発生までの時間及びRLFの発生からgNB再選択までの時間分の通信断の発生を低減でき、伝送速度を向上させることができる。また、RRC_inactiveを利用する利点を十分に生かすことが可能となる。 As described above, the UE according to the present embodiment acquires information for determining the security algorithm that can be used by the connectable gNB. Then, when the UE reconnects to the gNB in the RRC_inactive state, the UE establishes a connection with the gNB selected from the gNBs whose usable security algorithms match the own device. As a result, it is possible to avoid the connection failure due to the mismatch of the security algorithms at the time of reconnection from the RRC_inactive state and reduce the occurrence of RLF. Therefore, it is possible to reduce the time until the occurrence of RLF and the occurrence of communication interruption for the time from the occurrence of RLF to the reselection of gNB, and it is possible to improve the transmission speed. In addition, it is possible to take full advantage of using RRC_inactive.
 次に、実施例2について説明する。本実施例に係るUE1、gNB3及びAMF2も、それぞれ図2,4及び5で表される。本実施例に係るUE1は、所定の場合にAMF2からの端末個別セルリスト200の送信を停止させることが実施例1と異なる。以下の説明では、実施例1と同様の各部の動作については説明を省略する。 Next, the second embodiment will be described. UE1, gNB3 and AMF2 according to this embodiment are also represented in FIGS. 2, 4 and 5, respectively. The UE 1 according to the present embodiment differs from the first embodiment in that the UE 1 according to the present embodiment stops the transmission of the terminal-specific cell list 200 from the AMF 2 in a predetermined case. In the following description, the description of the operation of each unit similar to that of the first embodiment is omitted.
 UE1のセキュリティ制御部121は、提供を受けるサービスの変更などにより使用するセキュリティアルゴリズムを変更する場合、セキュリティ情報管理部112から使用するセキュリティアルゴリズムの情報を取得する。そして、セキュリティ制御部121は、使用するセキュリティアルゴリズムを変更する場合、gNB3介してセルリスト送信停止要求をAMF2に送信する。 The security control unit 121 of the UE 1 acquires the information of the security algorithm to be used from the security information management unit 112 when changing the security algorithm to be used due to the change of the service to be provided. Then, when changing the security algorithm to be used, the security control unit 121 transmits a cell list transmission stop request to the AMF2 via the gNB3.
 AMF2のセルリスト管理部25は、UE1からセルリスト送信停止要求を受信する。その後、セルリスト管理部25は、TAU時の端末個別セルリスト200のUE1への送信を停止する。 The cell list management unit 25 of the AMF2 receives the cell list transmission stop request from the UE1. After that, the cell list management unit 25 stops the transmission of the terminal-specific cell list 200 at the time of TAU to the UE1.
 図13は、実施例2に係る無線通信システムにおけるセルリスト送信停止処理のフローチャートである。 FIG. 13 is a flowchart of cell list transmission stop processing in the wireless communication system according to the second embodiment.
 UE1は、利用者からの指示などにより利用サービスを変更する(ステップS601)。 UE1 changes the service to be used according to an instruction from the user (step S601).
 次に、UE1は、使用するセキュリティアルゴリズムを変更する(ステップS602)。 Next, the UE1 changes the security algorithm to be used (step S602).
 次に、UE1は、セルリスト送信停止要求をgNB3を介して、AMF2へ送信する(ステップS603)。 Next, UE1 transmits a cell list transmission stop request to AMF2 via gNB3 (step S603).
 AMF2は、セルリスト送信停止要求を受信する。そして、AMF2は、セルリスト送信停止要求の受信応答であるACKをUE1へ送信する(ステップS604)。この後、AMF2は、端末個別セルリスト200のUE1への送信を停止する。 AMF2 receives the cell list transmission stop request. Then, the AMF2 transmits ACK, which is a reception response of the cell list transmission stop request, to the UE1 (step S604). After this, the AMF2 stops the transmission of the terminal-specific cell list 200 to the UE1.
 以上に説明したように、本実施例に係るUEは、利用するサービスが変更された場合に、個別端末セルリストの受信を停止する。これにより、不要な通信を減らすことができるとともに、不一致となるセキュリティアルゴリズムの確認処理を省くことができ、伝送速度を向上させることができる。 As described above, the UE according to the present embodiment stops receiving the individual terminal cell list when the service to be used is changed. As a result, unnecessary communication can be reduced, and it is possible to omit the process of confirming the mismatched security algorithm and improve the transmission speed.
 (変形例)
 さらに、以上の各実施例では端末個別セルリスト200に、UE1が使用可能なセキュリティアルゴリズムに対応するgNB3の識別情報が登録されたが、これ以外にも他の情報が端末個別セルリスト200に登録されてもよい。例えば、UE1側からの要求で端末個別セルリスト200に登録される情報がカスタマイズされてもよい。
(Modification)
Further, in each of the above embodiments, the identification information of the gNB3 corresponding to the security algorithm usable by the UE1 is registered in the terminal individual cell list 200, but other information is also registered in the terminal individual cell list 200. May be done. For example, the information registered in the terminal-specific cell list 200 may be customized by a request from the UE1 side.
 例えば、UE1のセキュリティ制御部121が、利用者からの指示を受けて、端末個別セルリスト200に追加登録させる情報をAMF2に通知する。 For example, the security control unit 121 of the UE1 receives the instruction from the user and notifies the AMF2 of the information to be additionally registered in the terminal-specific cell list 200.
 AMF2のセルリスト管理部25は、UE1から送信された端末個別セルリスト200に追加登録させる情報を取得する。そして、セルリスト管理部25は、端末個別セルリスト200の作成の際に指定された情報をUE1が使用可能なセキュリティアルゴリズムに対応するgNB3の識別情報に加えて登録する。 The cell list management unit 25 of the AMF 2 acquires information to be additionally registered in the terminal-specific cell list 200 transmitted from the UE 1. Then, the cell list management unit 25 adds the information specified at the time of creating the terminal-specific cell list 200, in addition to the identification information of the gNB3 corresponding to the security algorithm usable by the UE1.
 図14は、端末個別セルリストに登録される情報のカスタマイズ処理の一例のフローチャートである。ここでは、対応するセキュリティアルゴリズムの情報を追加登録する場合を例に説明する。 FIG. 14 is a flowchart of an example of a customization process of information registered in the terminal individual cell list. Here, a case where the information of the corresponding security algorithm is additionally registered will be described as an example.
 UE1は、セキュリティアルゴリズムの情報を追加するセルリストのカスタマイズ要求をgNB3を介してAMF2へ送信する(ステップS611)。 UE1 transmits a cell list customization request for adding security algorithm information to AMF2 via gNB3 (step S611).
 AMF2は、セルリストのカスタマイズ要求を受信する。そして、AMF2は、セルリストのカスタマイズ要求の受信応答であるACKをUE1へ送信する(ステップS612)。この簿、AMF2は、gNB3の識別情報に加えて各gNB3が対応するセキュリティアルゴリズムの情報を端末個別セルリスト200に登録してUE1へ送信する。 AMF2 receives the cell list customization request. Then, the AMF 2 transmits ACK, which is a reception response of the cell list customization request, to the UE 1 (step S612). In addition to the identification information of gNB3, this book, AMF2 registers information of the security algorithm corresponding to each gNB3 in the terminal-specific cell list 200 and transmits it to UE1.
 1 UE
 2 AMF
 3 gNB
 4 SMF
 5 UPF
 11 RRC処理部
 12 PDCP処理部
 13 RLC処理部
 14 MAC処理部
 15 PHY処理部
 16 通信制御部
 21 通信制御部
 22 モビリティ制御部
 23 パス制御部
 24 基地局管理部
 25 セルリスト管理部
 26 セキュリティ管理部
 31 RRC処理部
 32 PDCP処理部
 33 RLC処理部
 34 MAC処理部
 35 PHY処理部
 36 通信制御部
 111 セル選択制御部
 112 セキュリティ情報管理部
 121 セキュリティ制御部
 100 無線通信システム
 200~203 端末個別セルリスト
 311 セキュリティ情報管理部
 321 セキュリティ制御部
1 UE
2 AMF
3 gNB
4 SMF
5 UPF
11 RRC processing unit 12 PDCP processing unit 13 RLC processing unit 14 MAC processing unit 15 PHY processing unit 16 communication control unit 21 communication control unit 22 mobility control unit 23 path control unit 24 base station management unit 25 cell list management unit 26 security management unit 31 RRC processing unit 32 PDCP processing unit 33 RLC processing unit 34 MAC processing unit 35 PHY processing unit 36 communication control unit 111 cell selection control unit 112 security information management unit 121 security control unit 100 wireless communication system 200 to 203 terminal individual cell list 311 Security information management unit 321 Security control unit

Claims (7)

  1.  基地局のセキュリティに関する第1の情報を無線通信装置から受信する受信部と、
     前記基地局から接続する基地局を選択する選択部と、
     選択した前記基地局に対して無線接続を再開するための第2の情報を送信する無線接続管理部と
     を備えたことを特徴とする端末装置。
    A receiving unit for receiving first information regarding the security of the base station from the wireless communication device;
    A selection unit for selecting a base station to be connected from the base station,
    And a wireless connection management unit that transmits second information for restarting wireless connection to the selected base station.
  2.  前記第1の情報は、前記端末装置が対応可能なセキュリティアルゴリズムに対応可能な基地局を選択するための情報であることを特徴とする請求項1に記載の端末装置。 The terminal device according to claim 1, wherein the first information is information for selecting a base station compatible with a security algorithm compatible with the terminal device.
  3.  前記受信部は、着信時に前記第1の情報を前記無線通信装置から受信することを特徴とする請求項1に記載の端末装置。 The terminal device according to claim 1, wherein the receiving unit receives the first information from the wireless communication device when an incoming call is received.
  4.  前記無線接続管理部は、位置登録情報の更新を前記無線通信装置へ要求し、
     前記受信部は、前記無線接続管理部による位置登録情報の更新の要求への応答として前記第1の情報を受信することを特徴とする請求項1に記載の端末装置。
    The wireless connection management unit requests the wireless communication device to update location registration information,
    The terminal device according to claim 1, wherein the receiving unit receives the first information as a response to a request for updating the location registration information by the wireless connection management unit.
  5.  端末装置から前記端末装置のセキュリティ情報を受信する情報受信部と、
     前記セキュリティ情報に含まれるセキュリティアルゴリズムに対応可能な基地局に関する第1の情報を生成し、生成した前記第1の情報を前記端末装置へ送信する情報管理部と
     を備えたことを特徴とする無線通信装置。
    An information receiving unit for receiving security information of the terminal device from the terminal device,
    An information management unit configured to generate first information about a base station compatible with a security algorithm included in the security information and to transmit the generated first information to the terminal device. Communication device.
  6.  端末装置、無線通信装置及び複数の基地局を有する無線通信システムであって、
     前記端末装置は、
     前記端末装置のセキュリティ情報に含まれるセキュリティアルゴリズムに対応可能な基地局に関する第1の情報を前記無線通信装置から受信する受信部と、
     前記基地局の中から接続する基地局を選択する選択部と、
     選択した前記基地局に対して無線接続を再開するための第2の情報を送信する無線接続管理部とを備え、
     前記無線通信装置は、
     前記端末装置のセキュリティ情報を受信し、前記第1の情報を生成し、生成した前記第1の情報を前記端末装置へ送信する情報管理部とを備え、
     前記基地局は、
     前記第2の情報を前記端末装置から受信し、前記端末装置との接続を確立する接続制御部を備えた
     ことを特徴とする無線通信システム。
    A wireless communication system having a terminal device, a wireless communication device, and a plurality of base stations,
    The terminal device,
    A receiving unit for receiving, from the wireless communication device, first information about a base station that is compatible with the security algorithm included in the security information of the terminal device;
    A selection unit for selecting a base station to be connected from the base stations,
    A wireless connection management unit that transmits second information for restarting wireless connection to the selected base station,
    The wireless communication device,
    An information management unit that receives security information of the terminal device, generates the first information, and transmits the generated first information to the terminal device,
    The base station is
    A wireless communication system comprising: a connection control unit that receives the second information from the terminal device and establishes a connection with the terminal device.
  7.  端末装置、無線通信装置及び複数の基地局における無線通信方法であって、
     前記端末装置に、前記端末装置のセキュリティ情報を前記無線通信装置に対して送信させ、
     前記無線通信装置に、前記端末装置から取得した前記端末装置のセキュリティ情報に含まれるセキュリティアルゴリズムに対応可能な基地局に関する第1の情報を生成させ、前記端末装置に対して送信させ、
     前記端末装置に、前記無線通信装置から通信された前記第1の情報を受信させ、前記第1の情報を基に前記基地局から接続する接続基地局を選択させ、前記接続基地局に対して無線接続を再開するための第2の情報を送信させ、
     前記接続基地局に、前記第2の情報を取得させ、前記端末装置のセキュリティ情報に応じて前記端末装置との接続を確立させる
     ことを特徴とする無線通信方法。
    A wireless communication method in a terminal device, a wireless communication device, and a plurality of base stations, comprising:
    Causing the terminal device to transmit security information of the terminal device to the wireless communication device,
    Causing the wireless communication device to generate first information regarding a base station that is compatible with a security algorithm included in the security information of the terminal device acquired from the terminal device, and transmit the first information to the terminal device;
    With respect to the connection base station, the terminal device is caused to receive the first information communicated from the wireless communication device, and a connection base station to be connected from the base station is selected based on the first information. Send the second information to restart the wireless connection,
    A wireless communication method comprising causing the connection base station to acquire the second information and establishing a connection with the terminal device according to security information of the terminal device.
PCT/JP2018/045771 2018-12-12 2018-12-12 Terminal device, wireless communication device, wireless communication system, and wireless communication method WO2020121455A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2020559620A JP7160114B2 (en) 2018-12-12 2018-12-12 Terminal device, wireless communication device, wireless communication system and wireless communication method
PCT/JP2018/045771 WO2020121455A1 (en) 2018-12-12 2018-12-12 Terminal device, wireless communication device, wireless communication system, and wireless communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2018/045771 WO2020121455A1 (en) 2018-12-12 2018-12-12 Terminal device, wireless communication device, wireless communication system, and wireless communication method

Publications (1)

Publication Number Publication Date
WO2020121455A1 true WO2020121455A1 (en) 2020-06-18

Family

ID=71076041

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2018/045771 WO2020121455A1 (en) 2018-12-12 2018-12-12 Terminal device, wireless communication device, wireless communication system, and wireless communication method

Country Status (2)

Country Link
JP (1) JP7160114B2 (en)
WO (1) WO2020121455A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007246A1 (en) * 2007-06-28 2009-01-01 Motorola, Inc. Security based network access selection
JP2018504834A (en) * 2014-12-31 2018-02-15 華為技術有限公司Huawei Technologies Co.,Ltd. Wireless communication method, apparatus, and system
WO2018110274A1 (en) * 2016-12-16 2018-06-21 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Terminal and communication method
WO2018128021A1 (en) * 2017-01-05 2018-07-12 日本電気株式会社 Wireless terminal, base station, methods therefor, and non-temporary computer-readable medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112889317A (en) 2018-10-23 2021-06-01 Oppo广东移动通信有限公司 Security algorithm processing method and device and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090007246A1 (en) * 2007-06-28 2009-01-01 Motorola, Inc. Security based network access selection
JP2018504834A (en) * 2014-12-31 2018-02-15 華為技術有限公司Huawei Technologies Co.,Ltd. Wireless communication method, apparatus, and system
WO2018110274A1 (en) * 2016-12-16 2018-06-21 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Terminal and communication method
WO2018128021A1 (en) * 2017-01-05 2018-07-12 日本電気株式会社 Wireless terminal, base station, methods therefor, and non-temporary computer-readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
3GPP TR 33.860, no. V13.1.0, June 2016 (2016-06-01), pages 14 - 16, XP051123604 *

Also Published As

Publication number Publication date
JPWO2020121455A1 (en) 2021-09-27
JP7160114B2 (en) 2022-10-25

Similar Documents

Publication Publication Date Title
JP5787971B2 (en) Method for updating UE capability information in a mobile telecommunications network
CN105557006B (en) User equipment in communication system and method for communication by same
US8787317B2 (en) Wireless handover optimization
KR101078615B1 (en) Encryption in a wireless telecommunications
US20080285538A1 (en) Communication system, user device therof and synchronization method thereof
US9370039B2 (en) Radio base station and method
US9832699B2 (en) Communication control method, user terminal, cellular base station, and access point
JP2018093515A (en) Base station, method and system
JPWO2017195862A1 (en) Base station and user terminal
JP2019510432A (en) Communication method, network side device, and user terminal
US11910232B2 (en) Schemes and methods of integrity protection in mobile communication
JPWO2015005256A1 (en) Mobile communication system and user terminal
CN101841810A (en) Update method, core network node and wireless access system for air interface secrete key
JPWO2015076345A1 (en) Communication control method, user terminal, and processor
CN101540981A (en) Method and system for performing safety ability negotiation during emergent call
US8068451B2 (en) Communication system, user device thereof and synchronization method thereof
JP7160114B2 (en) Terminal device, wireless communication device, wireless communication system and wireless communication method
WO2022151086A1 (en) Integrated access and backhaul communication method and apparatus
CN113557699B (en) Communication apparatus, infrastructure equipment, core network equipment and method
US20160249215A1 (en) Communication control method, authentication server, and user terminal
CN101902736B (en) Update method, core net node and the wireless access system of air interface key
CN112055984A (en) Recovery of 5G non-access stratum from non-access stratum transparent container failure
WO2014111049A1 (en) Cell optimization method and device
CN109792602B (en) Method, device and system for supporting data transmission
EP4211912A1 (en) Source and target network nodes and methods therein for preventing agents from illegitimately identifying the source network node when resuming a wireless terminal in a target network node in a wireless communications network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18942998

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020559620

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18942998

Country of ref document: EP

Kind code of ref document: A1