WO2023011315A1 - 建立安全传输通道的方法、确定密钥的方法及通信装置 - Google Patents
建立安全传输通道的方法、确定密钥的方法及通信装置 Download PDFInfo
- Publication number
- WO2023011315A1 WO2023011315A1 PCT/CN2022/108633 CN2022108633W WO2023011315A1 WO 2023011315 A1 WO2023011315 A1 WO 2023011315A1 CN 2022108633 W CN2022108633 W CN 2022108633W WO 2023011315 A1 WO2023011315 A1 WO 2023011315A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- iab
- key
- donor
- node
- address
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 430
- 230000005540 biological transmission Effects 0.000 title claims abstract description 226
- 238000004891 communication Methods 0.000 title claims abstract description 158
- 230000008569 process Effects 0.000 claims abstract description 107
- 230000004044 response Effects 0.000 claims description 93
- 230000004048 modification Effects 0.000 claims description 70
- 238000012986 modification Methods 0.000 claims description 70
- 230000015654 memory Effects 0.000 claims description 67
- 238000004590 computer program Methods 0.000 claims description 19
- 230000010354 integration Effects 0.000 claims description 12
- 239000013256 coordination polymer Substances 0.000 description 422
- 238000012545 processing Methods 0.000 description 73
- 230000006870 function Effects 0.000 description 27
- 238000007726 management method Methods 0.000 description 11
- 230000011664 signaling Effects 0.000 description 11
- 238000009795 derivation Methods 0.000 description 9
- 238000004422 calculation algorithm Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 8
- 230000000977 initiatory effect Effects 0.000 description 6
- 238000000926 separation method Methods 0.000 description 6
- 238000013461 design Methods 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000002955 isolation Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 239000013307 optical fiber Substances 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000002427 irreversible effect Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
- H04W84/047—Public Land Mobile systems, e.g. cellular systems using dedicated repeater stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
- H04W88/085—Access point devices with remote components
Definitions
- the present application relates to an integrated access and backhaul network, and in particular to a method for establishing a secure transmission channel, a method for determining a key, and a communication device.
- IAB Integrated access and backhaul
- an F1 interface needs to be established between the IAB node and the host node.
- an Internet Protocol (internet protocol, IP) security IP security, IPSec) secure connection can be established between the IAB node and the IAB host.
- This application provides a method for establishing a secure transmission channel, with a view to establishing a user plane entity (donor centralized unit user plane, donor-CU-UP) of a donor node and a distributed unit of an IAB node (IAB-distributed unit, The user plane secure transmission channel between IAB-DU).
- donor-CU-UP user plane entity
- IAB-distributed unit IAB-distributed unit
- a method for establishing a secure transmission channel is provided, the method is applied to donor-CU-UP, and the method includes: receiving a control plane entity (donor centralized unit control plane, donor- CU-CP) the first message, the first message includes the first key, the first key is different from the root key, the root key is the donor-CU-CP in the process of IAB node registration to the network from The key obtained by the network; according to the first key, a user plane secure transmission channel between the donor-CU-UP and the IAB-DU is established.
- a control plane entity donor centralized unit control plane, donor- CU-CP
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the first message received by the donor-CU-UP from the donor-CU-CP includes the first key, which helps the donor-CU-UP to establish a user plane secure transmission with the IAB-DU according to the first key channel, and helps to avoid authentication errors when donor-CU-UP and IAB-DU establish a user plane secure transmission channel.
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP, where the bearer context request message includes the first key.
- the first message is a bearer context modification request message.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP, where the bearer context modification request message includes the first key.
- the first message further includes the first IP address of the donor-CU-UP; the method further includes: determining the first IP address of the donor-CU-UP IP address, establishing the user plane secure transmission channel; determining the first key according to the first IP address.
- the first message further includes the IP address of the IAB-DU.
- the first message includes a one-to-one correspondence between multiple keys and multiple Internet protocol (internet protocol, IP) addresses of the donor-CU-UP; wherein , the multiple keys include the first key; and the first key corresponds to the first IP address; the method further includes: determining to use the first IP address of the donor-CU-UP, and establishing the user plane A secure transmission channel; determine the first key according to the first IP address.
- IP Internet protocol
- the donor-CU-UP determines the key corresponding to the first IP address among the multiple keys included in the first message as the first key.
- the donor-CU-UP when the donor-CU-UP has multiple IP addresses, the donor-CU-UP can receive keys corresponding to the multiple IP addresses, which is beneficial for the donor-CU-UP to The key and the multiple IP addresses establish different user plane secure transmission channels with the IAB-DU.
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a message to the donor-CU - the UP sends a bearer context establishment request message
- the bearer context request message includes a one-to-one correspondence between multiple keys and multiple IP addresses of the donor-CU-UP.
- the donor-DU, donor-CU-UP, and donor-CU-CP belong to the same host node, and the IAB-DU and IAB-MT belong to the same IAB node.
- the first message further includes the IP address of the IAB-DU, and the multiple keys are all corresponding to the IP address of the IAB-DU. That is, each of the multiple keys corresponds to an IP address of the donor-CU-UP and an IP address of the IAB-DU.
- the method further includes: receiving first indication information from the donor-CU-CP; according to the first indication information, sending the donor-CU-CP the Multiple IP addresses for donor-CU-UP.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the method further includes: saving the correspondence between the first key and the IP address of the IAB-DU.
- the donor-CU-UP saves the correspondence between the first key and the IP address of the IAB-DU in the context of the donor-CU-UP.
- the first message further includes first indication information, where the first indication information is used to indicate that the IAB-DU belongs to an IAB node.
- the donor-CU-UP determines that the IAB-DU belongs to the IAB node according to the first indication information, so as to receive and store the first key included in the first message as required.
- a method for establishing a secure transmission channel is provided, the method is applied to an IAB-DU, and the method includes: receiving a second message from the donor-CU-CP, the second message including the donor-CU-UP The first IP address; send a first request message to the IAB-MT, the first request message is used to request the first key, the first key is different from the root key, the root key is the IAB-MT registered in To the key generated by the process of the network, the first request message includes the first IP address; receives the first response message from the IAB-MT, the first response message includes the first key; according to the first key key to establish a user plane secure transmission channel between the IAB-DU and the donor-CU-UP.
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the IAB-DU when the IAB-DU receives the first IP address of the donor-CU-UP, it carries the first IP address of the donor-CU-UP in the first request message and sends it to the IAB-MT, so that The IAB-MT may determine the first key according to the first IP address of the donor-CU-UP, and send the first key to the IAB-DU.
- the IAB-DU receives the first key, it helps the IAB-DU to establish a user plane secure transmission channel with the donor-CU-UP based on the first key, and helps to avoid donor-CU-UP and IAB - The problem of authentication error when DU establishes the user plane secure transmission channel.
- the method before sending the first request message to the IAB-MT, the method further includes: receiving a user plane data request message from the terminal device, and the user plane securely transmits The channel is used to transmit user plane data of the terminal device.
- the IAB-DU can request the first key from the IAB-MT as needed according to the user plane data request message.
- the method before sending the first request message to the IAB-MT, the method further includes: receiving an authentication request message from the donor-CU-UP, the authentication request The message is used to establish the user plane secure transmission channel.
- the IAB-DU can request the first key from the IAB-MT according to the authentication request message as needed.
- the method further includes: saving the correspondence between the first key and the first IP address of the donor-CU-UP.
- the corresponding relationship between the first key of the IAB-DU and the first IP address of the donor-CU-UP is stored in the context of the IAB-DU.
- a method for establishing a secure transmission channel is provided, the method is applied to an IAB-DU, and the method includes: receiving a second message from the donor-CU-CP, the second message including the donor-CU-UP First IP address; send a second request message to the IAB-MT, the second request message is used to request a root key, the root key is used to generate a first key, the first key is different from the root key , the root key is the key generated by the IAB-MT in the process of registering to the network; receiving a second response message from the IAB-MT, the second response message includes the root key; according to the root key, The IP address of the IAB-DU and the first IP address are deduced to obtain the first key; according to the first key, a user plane secure transmission channel between the IAB-DU and the donor-CU-UP is established.
- the IAB-DU uses the root key as an input key, and uses the IP address of the IAB-DU and the first IP address as input parameters to derive the first key.
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the IAB-DU when the IAB-DU receives the first IP address of the donor-CU-UP, it obtains the root key used to generate the first key from the IAB-MT, and can The first IP address, the root key, and the IP address of the IAB-DU determine the first key, which helps the IAB-DU establish a user plane secure transmission channel with the donor-CU-UP based on the first key, and helps It is used to avoid the problem of authentication error when the donor-CU-UP and the IAB-DU establish a user plane secure transmission channel.
- the method before sending the second request message to the IAB-MT, the method further includes: receiving a user plane data request message from the terminal device, and the user plane securely transmits The channel is used to transmit user plane data of the terminal device.
- the IAB-DU can request the root key of the host node from the IAB-MT as needed according to the user plane data request message.
- the method before sending the second request message to the IAB-MT, the method further includes: receiving an authentication request message from the donor-CU-UP, the authentication request The message is used to establish the user plane secure transmission channel.
- the IAB-DU can request the root key of the host node from the IAB-MT according to the authentication request message as needed.
- the method further includes: saving the correspondence between the first key and the first IP address of the donor-CU-UP.
- the IAB-DU stores the corresponding relationship between the first key and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- a method for determining a key is provided, the method is applied to the donor-CU-CP, and the method includes: according to the root key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP, Deduce the first key, which is different from the root key.
- the root key is obtained from the network during the process of the donor-CU-CP’s access and backhaul integration node registering with the network the key; sending a first message to the donor-CU-UP, where the first message includes the first key.
- the IAB-DU uses the root key as an input key, and uses the IP address of the IAB-DU and the first IP address as input parameters to derive the first key.
- the first key is K IAB and the root key is K gNB .
- the donor-CU-CP derives the first key according to the root key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP, and carries the first key in the first
- the message is sent to the donor-CU-UP, which helps the donor-CU-UP to establish a user plane secure transmission channel with the IAB-DU based on the first key, and helps to avoid donor-CU-UP and IAB-DU
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP, where the bearer context request message includes the first key.
- the first message is a bearer context modification request message.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP, where the bearer context modification request message includes the first key.
- the first message further includes the first IP address of the donor-CU-UP.
- the first message also includes the IP address of the IAB-DU.
- the method further includes: sending first indication information to the donor-CU-UP; receiving one or more IP addresses from the donor-CU-UP; Wherein, the one or more IP addresses include the first IP address.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the method further includes: according to the root key, the IP address of the IAB-DU and the second IP address, deduce the second key; wherein, the first message includes the correspondence between the first key and the first IP address and the correspondence between the second key and the second IP address relation.
- the donor-CU-UP may send the multiple IP addresses to the donor-CU-CP according to the first indication information.
- the donor-CU-UP can receive keys corresponding to multiple IP addresses, which is beneficial for the donor-CU-UP to establish different user planes with the IAB-DU according to the multiple keys and the multiple IP addresses. Secure transmission channel.
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the bearer context request message includes multiple keys and the donor-CU-UP One-to-one correspondence between multiple IP addresses. It should be understood that the donor-DU, donor-CU-UP, and donor-CU-CP belong to the same host node, and the IAB-DU and IAB-MT belong to the same IAB node.
- the method further includes: deriving a third key according to the root key, the IP address of the IAB-DU, and the IP address of the donor-CU-CP ; Establish a control plane secure transmission channel between the donor-CU-CP and the IAB-DU according to the third key.
- the donor-CU-CP uses the root key as an input key, takes the IP address of the IAB-DU and the IP address of the donor-CU-CP as input parameters, and derives the third key.
- the donor-CU-CP can also derive the third key used to establish a secure transmission channel on the control plane between the donor-CU-CP and the IAB-DU, thereby effectively avoiding the - The problem of authentication error when DU establishes a secure transmission channel on the control plane.
- the method further includes: determining that the IAB-DU belongs to an IAB node according to the first identifier in the context of the IAB-DU.
- the donor-CU-CP can deduce the first key on demand according to the first identifier.
- the method further includes: sending first indication information to the donor-CU-UP, where the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-CP sends the first indication information to the donor-CU-UP, so that the donor-CU-UP can receive and store the first key as required according to the first indication information.
- a method for establishing a secure transmission channel includes: the donor-CU-UP receives first information from the donor-CU-CP; the donor-CU-UP determines the first information according to the first information Key, the first key is different from the root key, the root key is the key obtained by the donor-CU-CP from the network during the registration process of the IAB node to the network; the donor-CU-UP according to The first key establishes a user plane secure transmission channel between the donor-CU-UP and the IAB node.
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the donor-CU-UP determines the first key according to the received first information, which helps the donor-CU-UP and IAB-DU to establish a user plane secure transmission channel based on the first key, and effectively It helps to avoid the problem of authentication error when donor-CU-UP and IAB-DU establish a user plane secure transmission channel.
- the first information is carried in the bearer context modification request message.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP, where the bearer context modification message includes the first information.
- the donor-DU, donor-CU-UP, and donor-CU-CP belong to the same host node, and the IAB-DU and IAB-MT belong to the same IAB node.
- the first information includes at least one of the following: an intermediate key, a user plane key used between the host node and the IAB node, the intermediate key and the The user plane key is used to determine the first key.
- the host node includes the donor-CU-CP and donor-CU-UP
- the IAB node includes the IAB-DU.
- the first information includes the intermediate key
- the intermediate key includes any of the following: a key determined according to the root key and the second parameter, Random number
- the second parameter includes one or more of the following: physical cell identity, downlink absolute radio frequency channel number, secondary node count value, constant, freshness parameter
- the donor-CU-UP determines the first Keys include: the donor-CU-UP derives the first key according to the intermediate key, the IP address of the IAB-DU, and the IP address of the donor-CU-UP.
- the donor-CU-UP uses the intermediate key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the donor-CU-UP deduces the first key based on the intermediate key, and can maintain the independence between the derivation of the user plane key, the signaling plane key, and the input key used for the first key , ensuring the security of data transmission.
- the first information includes the user plane key
- the donor-CU-UP determines the first key according to the first information, including: the donor-CU-UP
- the UP derives the first key according to the user plane key, the IP address of the IAB-DU and the IP address of the donor-CU-UP.
- the donor-CU-UP uses the user plane key as an input key, takes the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters, and derives the first key .
- the donor-CU-UP deduces the first key according to the user plane key, without adding additional signaling transmission, which simplifies the management and implementation of the first key.
- the first information includes the user plane key
- the donor-CU-UP determines the first key according to the first information, including: the donor-CU -UP determines the fourth key according to the user plane key; the donor-CU-UP derives the first key.
- the donor-CU-UP uses the fourth key as an input key, takes the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters, and derives the first key .
- the method further includes: saving the correspondence between the first key and the IP address of the IAB-DU.
- the donor-CU-UP saves the correspondence between the first key and the IP address of the IAB-DU in the context of the donor-CU-UP.
- the method further includes: the donor-CU-UP receives first indication information; when receiving the first indication information, determines the first indication information according to the first information a key.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-UP can determine that the IAB-DU belongs to the IAB node according to the first indication information, so that the first key can be deduced according to the first information as required.
- a method for establishing a secure transmission channel includes: the IAB-DU receives a second message from the donor-CU-CP, and the second message includes the IP address of the donor-CU-UP; the IAB - the DU sends a third request message to the IAB-MT, the third request message is used to request the second information; the IAB-DU receives a third response message from the IAB-MT, the third response message includes the second information ; The IAB-DU determines the first key according to the second information, the first key is different from the root key, the root key is the key generated by the IAB-MT in the process of registering to the network; the IAB- The DU establishes a user plane secure transmission channel between the IAB-DU and the donor-CU-UP according to the first key.
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the IAB-DU when the IAB-DU receives the IP address of the donor-CU-UP, it obtains the second information from the IAB-MT, and the IAB-DU determines the first key according to the received second information, so that It helps the donor-CU-UP establish a user plane secure transmission channel with the IAB-DU based on the first key, and helps to avoid authentication errors when the donor-CU-UP and the IAB-DU establish the user plane secure transmission channel.
- the second information includes at least one of the following: an intermediate key, the root key and the second parameter, and a user plane used between the host node and the IAB node key, the intermediate key and the user plane key are used to determine the first key, the second parameter is used to determine the intermediate key, and the second parameter includes one or more of the following: physical cell identity, Downlink absolute RF channel number, secondary node count value, constant, and freshness parameter.
- the host node includes the donor-CU-CP and donor-CU-UP
- the IAB node includes the IAB-DU.
- the second information includes the intermediate key, and the intermediate key includes any of the following: a key determined according to the root key and the second parameter , a random number; the IAB-DU determines the first key according to the second information, including: the IAB-DU according to the intermediate key, the IP address of the IAB-DU and the IP address of the donor-CU-UP, Deduce the first key.
- the IAB-DU uses the intermediate key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the IAB-DU deduces the first key according to the intermediate key, which can maintain the independence between the derivation of the user plane key, the signaling plane key and the input key used for the first key, ensuring Security of data transmission.
- the second information includes the user plane key
- the IAB-DU determines the first key according to the second information, including: the IAB-DU determines the first key according to the The user plane key, the IP address of the IAB-DU and the IP address of the donor-CU-UP are derived to obtain the first key.
- the IAB-DU uses the user plane key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the IAB-DU deduces the first key according to the user plane key, without adding additional signaling transmission, which simplifies the management and implementation of the first key.
- the second information includes the user plane key
- the IAB-DU determines the first key according to the second information, including: the IAB-DU determines the first key according to the The user plane key determines the fourth key; the IAB-DU derives the first key according to the fourth key, the IP address of the IAB-DU, and the IP address of the donor-CU-UP.
- the IAB-DU uses the fourth key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the method before the IAB-DU sends the third request message to the IAB-MT, the method further includes: the IAB-DU receives user plane data from the terminal device A request message, the user plane secure transmission channel is used to transmit user plane data of the terminal device.
- the IAB-DU can request the second information from the IAB-MT as needed according to the user plane data request message.
- the method before the IAB-DU sends the third request message to the IAB-MT, the method further includes: the IAB-DU receives a message from the donor-CU-UP An authentication request message, where the authentication request message is used to establish the user plane secure transmission channel.
- the IAB-DU can request the second information from the IAB-MT according to the authentication request message as needed.
- the method further includes: the IAB-DU stores the correspondence between the first key and the IP address of the donor-CU-UP.
- the IAB-DU stores the correspondence between the first key and the IP address of the donor-CU-UP in the context of the IAB-DU.
- a method for determining a key includes: the IAB-MT receives a third request message from the IAB-DU, where the third request message is used to request second information, and the second information is used to determine The first key, the first key is different from the root key, the root key is the key generated during the registration process of the IAB-MT to the network; the IAB-MT sends a third response message to the IAB-DU , the third response message includes the second information.
- the first key is K IAB
- the root key is K gNB .
- the IAB-MT sends the second information to the IAB-DU according to the third request message, so that the IAB-DU can determine the first key according to the second information, which in turn helps the IAB-DU to use the first key and
- the donor-CU-UP establishes a user plane secure transmission channel.
- the second information includes at least one of the following: an intermediate key, the root key and the second parameter, and a user plane used between the host node and the IAB node key, the intermediate key and the user plane key are used to determine the first key, the second parameter is used to determine the intermediate key, and the second parameter includes one or more of the following: physical cell identity, Downlink absolute RF channel number, secondary node count value, constant, and freshness parameter.
- the host node includes the donor-CU-CP and donor-CU-UP
- the IAB node includes the IAB-DU.
- the intermediate key includes any of the following: a key and a random number determined according to the root key and the second parameter; the method further includes: the The IAB-MT receives a fourth message from the donor-CU-CP, the fourth message including the intermediate key or the second parameter.
- the donor-CU-CP when the second parameter used for deriving the intermediate key includes a parameter unknown to the IAB-MT, the donor-CU-CP sends the fourth message to the IAB-MT.
- the fourth message includes parameters unknown to the IAB-MT among the second parameters used for deriving the intermediate key.
- the donor-CU-CP sends a fourth message to the IAB-MT, where the fourth message includes the intermediate key.
- the fourth message is a radio resource control (radio resource control, RRC) reconfiguration message sent by the donor-CU-CP to the IAB-MT during the process of the IAB-MT accessing the network through the donor-DU.
- RRC radio resource control
- a method for determining a key includes: the IAB-MT receives a first request message from the IAB-DU, where the first request message is used to request a first key, and the first key Different from the root key, the root key is the key generated by the IAB-MT during the process of registering to the network, the first request message includes the IP address of the donor-CU-UP; the IAB-MT according to the intermediate key , the IP address of the IAB-DU and the IP address of the donor-CU-UP, and derive the first key; the IAB-MT sends a first response message to the IAB-DU, and the first response message includes the first a key.
- the IAB-MT uses the intermediate key as an input key, and takes the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the first key is K IAB
- the root key is K gNB .
- the IAB-MT deduces the first key according to the IP address of the donor-CU-UP included in the first request message, and sends the first key to the IAB-DU, so that the IAB-DU can key and donor-CU-UP to establish a user plane secure transmission channel.
- IAB-MT deduces the first key based on the intermediate key, which can maintain the independence between the derivation of the user plane key, the signaling plane key and the input key used for the first key, ensuring the integrity of data transmission. safety.
- the intermediate key includes any of the following: a key and a random number determined according to the root key and the second parameter, and the second parameter includes one of the following or multiple items: physical cell identifier, downlink absolute radio frequency channel number, secondary node count value, constant, and freshness parameter.
- the host node includes the donor-CU-CP and the donor-CU-UP.
- the intermediate key includes a key determined according to the root key and the second parameter
- the method further includes: the IAB-MT receives the - A fourth message of the CP, the fourth message comprising the intermediate key or the second parameter.
- the donor-CU-CP when the second parameter used for deriving the intermediate key includes a parameter unknown to the IAB-MT, the donor-CU-CP sends the fourth message to the IAB-MT.
- the fourth message includes the intermediate key or a parameter unknown to the IAB-MT among the second parameters used for deriving the intermediate key.
- the fourth message is an RRC reconfiguration message sent by the donor-CU-CP to the IAB-MT during the process of the IAB-MT accessing the network through the donor-DU. It should be understood that the donor-DU and the donor-CU-CP belong to the same host node.
- the intermediate key includes a random number
- the method further includes: the IAB-MT receives a fourth message from the donor-CU-CP, and the fourth message includes the intermediate key.
- a method for determining a key includes: the IAB-MT receives a first request message from the IAB-DU, where the first request message is used to request a first key, and the first key Different from the root key, the root key is the key generated by the IAB-MT during the process of registering to the network, and the first request message includes the IP address of the donor-CU-UP; key, the IP address of the IAB-DU and the IP address of the donor-CU-UP, and derive the first key, the user plane key is the user plane key used between the host node and the IAB node; the The IAB-MT sends a first response message to the IAB-DU, where the first response message includes the first key.
- the IAB-MT uses the user plane key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the first key is K IAB
- the root key is K gNB .
- the IAB-MT deduces the first key according to the IP address of the donor-CU-UP included in the first request message, and sends the first key to the IAB-DU, so that the IAB-DU can key and donor-CU-UP to establish a user plane secure transmission channel.
- the IAB-MT deduces the first key based on the user plane key, without adding additional signaling transmission, which simplifies the management and implementation of the first key.
- a method for determining a key includes: the IAB-MT receives a first request message from the IAB-DU, where the first request message is used to request a first key, and the first key Different from the root key, the root key is the key generated by the IAB-MT during the process of registering to the network, the first request message includes the IP address of the donor-CU-UP; the IAB-MT according to the user plane The key determines the fourth key, the user plane key is the user plane key used between the host node and the IAB node; the IAB-MT according to the fourth key, the IP address of the IAB-DU and the donor - the IP address of the CU-UP, deduced to obtain the first key; the IAB-MT sends a first response message to the IAB-DU, and the first response message includes the first key.
- the IAB-MT uses the fourth key as an input key, and uses the IP address of the IAB-DU and the IP address of the donor-CU-UP as input parameters to derive the first key.
- the first key is K IAB
- the root key is K gNB .
- the IAB-MT deduces the first key according to the IP address of the donor-CU-UP included in the first request message, and sends the first key to the IAB-DU, so that the IAB-DU can key and donor-CU-UP to establish a user plane secure transmission channel.
- the IAB-MT deduces the first key based on the fourth key deduced from the user plane key, without adding additional signaling transmission, which simplifies the management and implementation of the first key.
- a method for determining a key includes: the donor-CU-CP determines first information, the first information is used to determine a first key, and the first key is different from the root key Key, the root key is the key obtained by the donor-CU-CP from the network during the registration process of the IAB node to the network; the donor-CU-CP sends the first information to the donor-CU-UP.
- the first key is K IAB
- the root key is K gNB .
- the donor-CU-CP sends the first information to the donor-CU-UP, so that the donor-CU-UP determines the first key according to the received first information, thereby helping the donor-CU-UP to A key establishes a user plane secure transmission channel with the IAB-DU, and helps avoid authentication errors when the donor-CU-UP and the IAB-DU establish the user plane secure transmission channel.
- the first information is carried in the bearer context modification request message.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP, and the bearer context modification message includes the first information.
- the donor-DU, donor-CU-UP, and donor-CU-CP belong to the same host node, and the IAB-DU and IAB-MT belong to the same IAB node.
- the first information includes at least one of the following: an intermediate key, a user plane key used between the hosting node and the IAB node, the intermediate The key and the user plane key are used to determine the first key.
- the first information includes the intermediate key
- the intermediate key includes a key determined according to the root key and the second parameter
- the donor- The CU-UP determines the first information, including: the donor-CU-CP derives the intermediate key according to the root key and the second parameter
- the second parameter includes one or more of the following: physical cell identity, Downlink absolute RF channel number, secondary node count value, constant, and freshness parameter.
- the donor-CU-CP uses the root key as an input key and the second parameter as an input parameter to derive the intermediate key.
- the method further includes: the donor-CU-CP sends a fourth message to the IAB-MT, where the fourth message includes the intermediate key or the first Two parameters.
- the donor-CU-CP when the second parameter used for deriving the intermediate key includes a parameter unknown to the IAB-MT, the donor-CU-CP sends the fourth message to the IAB-MT.
- the fourth message includes parameters unknown to the IAB-MT among the second parameters used for deriving the intermediate key.
- the fourth message is an RRC reconfiguration message sent by the donor-CU-CP to the IAB-MT during the process of the IAB-MT accessing the network through the donor-DU. It should be understood that the donor-DU and the donor-CU-CP belong to the same host node.
- the first information includes the intermediate key
- the intermediate key includes a random number
- the donor-CU-UP determines the first information, including: the The donor-CU-CP generates the random number.
- the method further includes: the donor-CU-CP sending a fourth message to the IAB-MT, where the fourth message includes the intermediate key.
- the first information includes the user plane key
- the donor-CU-CP determining the first information includes: the donor-CU-CP according to the The root key is deduced to obtain the user plane key.
- the method further includes: the donor-CU-CP receives second indication information, where the second indication information is used to indicate that the IAB-DU belongs to an IAB node .
- the donor-CU-CP can determine the first information as needed according to the second indication information.
- the donor-CU-CP receives second indication information from the IAB-MT, where the second indication information is an "IAB-indication" information element.
- the IAB-MT accesses the network through the donor-DU
- the IAB-MT sends the "IAB-indication" information element to the donor-CU-UP through the donor-DU.
- the donor-CU-CP receives second indication information from a network element of the core network, where the second indication information is an "IAB-authorized" information element.
- the initial context establishment request message sent by the AMF to the donor-CU-CP includes the "IAB-authorized" information element.
- the method further includes: the donor-CU-CP sending first indication information to the donor-CU-UP.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-CP sends the first indication information to the donor-CU-UP, so that the donor-CU-UP can determine the first key according to the first information as required.
- a communication device in a twelfth aspect, includes a transceiver unit and a processing unit, the transceiver unit receives a first message from the donor-CU-CP, the first message includes a first key, and the first key The key is different from the root key, which is the key obtained by the donor-CU-CP from the network during the registration process of the IAB node to the network; the processing unit is used to establish the The user plane secure transmission channel between the donor-CU-UP and the IAB-DU.
- the first key is an authentication credential used by the communication device and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the communication device, where the bearer context request message includes the first key.
- the first message is a bearer context modification request message.
- the donor-CU-CP sends a bearer context modification request message to the communication device, where the bearer context modification request message includes the first key.
- the first message further includes the first IP address of the donor-CU-UP; the processing unit is further configured to determine to use the donor-CU-UP The first IP address to establish the user plane secure transmission channel; the processing unit is further configured to determine the first key according to the first IP address.
- the first message further includes the IP address of the IAB-DU.
- the first message includes a one-to-one correspondence between multiple keys and multiple IPs of the donor-CU-UP; wherein, the multiple keys
- the key includes the first key; and the first key corresponds to the first IP address;
- the processing unit is also used to determine the use of the first IP address of the donor-CU-UP to establish the user plane secure transmission channel;
- the processing unit is also used to determine a first key according to the first IP address.
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the communication device, and the bearer context request message includes multiple keys and multiple IP addresses.
- the first message further includes the IP address of the IAB-DU, and the multiple keys are all corresponding to the IP address of the IAB-DU. That is, each of the multiple keys corresponds to an IP address of the donor-CU-UP and an IP address of the IAB-DU.
- the transceiving unit is further configured to receive first indication information from the donor-CU-CP; according to the first indication information, the transceiving unit is further configured to Send multiple IP addresses of the donor-CU-UP to the donor-CU-CP.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the processing unit is further configured to save a correspondence between the first key and the IP address of the IAB-DU.
- the first message further includes first indication information.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- a communication device in a thirteenth aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a second message from the donor-CU-CP, the second message includes the donor-CU-UP The first IP address; send a first request message to the IAB-MT, the first request message is used to request the first key, the first key is different from the root key, the root key is the IAB-MT registered in The key generated by the process to the network, the first request message includes the first IP address; the transceiver unit is also used to receive a first response message from the IAB-MT, the first response message includes the first key ;
- the processing unit is used to establish a user plane secure transmission channel between the IAB-DU and the donor-CU-UP according to the first key.
- the first key is the authentication credential used by the donor-CU-UP and the communication device.
- the first key is K IAB
- the root key is K gNB .
- the transceiver unit before sending the first request message to the IAB-MT, is further configured to receive a user plane data request message from a terminal device, the user The plane security transmission channel is used to transmit user plane data of the terminal device.
- the transceiving unit before sending the first request message to the IAB-MT, the transceiving unit is further configured to receive an authentication request message from the donor-CU-UP, The authentication request message is used to establish the user plane secure transmission channel.
- the processing unit is further configured to store a correspondence between the first key and the first IP address of the donor-CU-UP.
- a communication device in a fourteenth aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a second message from the donor-CU-CP, the second message includes the donor-CU-UP The first IP address; the transceiver unit is also used to send a second request message to the IAB-MT, the second request message is used to request a root key, the root key is used to generate a first key, the first key Different from the root key, the root key is a key generated by the IAB-MT during the process of registering to the network; the transceiver unit is also used to receive a second response message from the IAB-MT, the second response message including the root key; the processing unit is used to derive the first key according to the root key, the IP address of the IAB-DU and the first IP address; the processing unit is also used to obtain the first key according to the first key key to establish a user plane secure transmission channel between the IAB-DU and the donor-CU-UP.
- the first key is the authentication credential used by the donor-CU-UP and the communication device.
- the first key is K IAB
- the root key is K gNB .
- the transceiver unit before sending the second request message to the IAB-MT, is further configured to receive a user plane data request message from the terminal device, the user The plane security transmission channel is used to transmit user plane data of the terminal device.
- the transceiving unit before sending the second request message to the IAB-MT, is further configured to receive an authentication request message from the donor-CU-UP, The authentication request message is used to establish the user plane secure transmission channel.
- the processing unit is further configured to store a correspondence between the first key and the first IP address of the donor-CU-UP.
- a communication device in a fifteenth aspect, includes a transceiver unit and a processing unit, and the processing unit is used to deduce according to the root key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP Obtain the first key, the first key is different from the root key, the root key is obtained from the network during the process of the donor-CU-CP's access backhaul integrated node registering with the network Key; the transceiving unit is used to send a first message to the donor-CU-UP, where the first message includes the first key.
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU.
- the first key is K IAB and the root key is K gNB .
- the first message is a bearer context establishment request message.
- the transceiver unit sends a bearer context establishment request message to the donor-CU-UP, where the bearer context request message includes the first key.
- the first message is a bearer context modification request message.
- the transceiver unit sends a bearer context modification request message to the donor-CU-UP, where the bearer context modification request message includes the first key.
- the first message further includes the first IP address of the donor-CU-UP.
- the first message also includes the IP address of the IAB-DU.
- the transceiving unit is further configured to send first indication information to the donor-CU-UP; the transceiving unit is further configured to receive information from the donor-CU-UP One or more IP addresses of the UP; where the one or more IP addresses include the first IP address.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the processing unit is further configured to, according to the root key, the IAB-DU The IP address and the second IP address are deduced to obtain the second key; wherein, the first message includes the correspondence between the first key and the first IP address and the second key and the second IP Address correspondence.
- the first message is a bearer context establishment request message.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the bearer context request message includes multiple keys and the donor-CU-UP One-to-one correspondence between multiple IP addresses. It should be understood that the donor-DU, donor-CU-UP, and donor-CU-CP belong to the same host node, and the IAB-DU and IAB-MT belong to the same IAB node.
- the processing unit is further configured to derive the third key according to the root key, the IP address of the IAB-DU, and the IP address of the communication device. key; the processing unit is further configured to establish a control plane secure transmission channel between the donor-CU-CP and the IAB-DU according to the third key.
- the processing unit is further configured to determine, according to the first identifier in the context of the IAB-DU, that the IAB-DU belongs to an IAB node.
- the transceiver unit is further configured to send first indication information to the donor-CU-UP, where the first indication information is used to indicate that the IAB-DU belongs to IAB node.
- a sixteenth aspect provides a communication device, the communication device includes a transceiver unit and a processing unit, the transceiver unit is used to receive the first information from the donor-CU-CP; the processing unit is used to determine according to the first information The first key, the first key is different from the root key, the root key is the key obtained by the donor-CU-CP from the network during the registration process of the IAB node to the network; the processing unit also uses Then, according to the first key, a user plane secure transmission channel between the communication device and the IAB node is established.
- the first key is an authentication credential used by the communication device and the IAB-DU.
- the first key is K IAB
- the root key is K gNB .
- the first information is carried in the bearer context modification request message.
- the transceiver unit is configured to send a bearer context modification request message, where the bearer context modification message includes the first information.
- the first information includes at least one of the following: an intermediate key, a user plane key used between the host node and the IAB node, and the intermediate key and the user plane key are used to determine the first key.
- the first information includes the intermediate key
- the intermediate key includes any of the following: an encryption key determined according to the root key and the second parameter Key, random number
- the second parameter includes one or more of the following: physical cell identity, downlink absolute radio frequency channel number, secondary node count value, constant, freshness parameter
- the processing unit is specifically configured to according to the intermediate key, The IP address of the IAB-DU and the IP address of the communication device are deduced to obtain the first key.
- the first information includes the user plane key
- the processing unit is specifically configured to use the user plane key, the IP address of the IAB-DU and The IP address of the communication device is deduced to obtain the first key.
- the first information includes the user plane key
- the processing unit is specifically configured to: determine a fourth key according to the user plane key; The fourth key, the IP address of the IAB-DU and the IP address of the communication device are derived to obtain the first key.
- the processing unit is further configured to store a correspondence between the first key and the IP address of the IAB-DU.
- the transceiving unit is further configured to receive the first indication information.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- a communication device in a seventeenth aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a second message from the donor-CU-CP, the second message includes the donor-CU-UP IP address; the transceiver unit is also used to send a third request message to the IAB-MT, the third request message is used to request the second information; the transceiver unit is also used to receive a third response message from the IAB-MT, the The third response message includes the second information; the processing unit is configured to determine a first key according to the second information, the first key is different from the root key, and the root key is the IAB-MT registered to the network The key generated by the process; the processing unit is further configured to establish a user plane secure transmission channel between the communication device and the donor-CU-UP according to the first key.
- the first key is the authentication credential used by the donor-CU-UP and the communication device.
- the first key is K IAB
- the root key is K gNB .
- the second information includes at least one of the following: an intermediate key, the root key and the second parameter, and the information used between the host node and the IAB node
- the user plane key, the intermediate key and the user plane key are used to determine the first key
- the second parameter is used to determine the intermediate key
- the second parameter includes one or more of the following: physical cell Identification, downlink absolute radio frequency channel number, secondary node count value, constant, and freshness parameter.
- the second information includes the intermediate key, and the intermediate key includes any of the following: key, random number; the processing unit is specifically configured to derive the first key according to the intermediate key, the IP address of the communication device, and the IP address of the donor-CU-UP.
- the second information includes the user plane key
- the processing unit is specifically configured to, according to the user plane key, the IP address of the communication device, and the The IP address of the donor-CU-UP is deduced to obtain the first key.
- the second information includes the user plane key
- the processing unit is specifically configured to: determine a fourth key according to the user plane key;
- the first key is obtained by deriving the fourth key, the IP address of the communication device, and the IP address of the donor-CU-UP.
- the transceiver unit before sending the third request message to the IAB-MT, is further configured to receive a user plane data request message from a terminal device, the user The plane security transmission channel is used to transmit user plane data of the terminal device.
- the transceiving unit before sending the third request message to the IAB-MT, is further configured to receive an authentication request message from the donor-CU-UP, The authentication request message is used to establish the user plane secure transmission channel.
- the processing unit is further configured to save the correspondence between the first key and the IP address of the donor-CU-UP.
- a communication device in an eighteenth aspect, includes a transceiver unit, the transceiver unit is used to receive a third request message from the IAB-DU, the third request message is used to request the second information, the second information Used to determine the first key, the first key is different from the root key, the root key is the key generated during the process of registering the communication device to the network; the transceiver unit is also used to send to the IAB-DU A third response message, where the third response message includes the second information.
- the first key is K IAB
- the root key is K gNB .
- the second information includes at least one of the following: an intermediate key, the root key and the second parameter, and the information used between the host node and the IAB node
- the user plane key, the intermediate key and the user plane key are used to determine the first key
- the second parameter is used to determine the intermediate key
- the second parameter includes one or more of the following: physical cell Identification, downlink absolute radio frequency channel number, secondary node count value, constant, and freshness parameter.
- the intermediate key includes any of the following: a key and a random number determined according to the root key of the host node and the second parameter; the The transceiver unit is further configured to receive a fourth message from the donor-CU-CP, where the fourth message includes the intermediate key or the second parameter.
- the donor-CU-CP when the second parameter used for deriving the intermediate key includes a parameter unknown to the communication device, the donor-CU-CP sends the fourth message.
- the fourth message includes parameters unknown to the communication device among the second parameters used for deriving the intermediate key.
- the donor-CU-CP sends a fourth message, where the fourth message includes the intermediate key.
- the fourth message is an RRC reconfiguration message sent by the donor-CU-CP during the communication device accessing the network through the donor-DU. It should be understood that the donor-DU and the donor-CU-CP belong to the same host node.
- a communication device in a nineteenth aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a first request message from the IAB-DU, the first request message is used to request a first key , the first key is different from the root key, the root key is a key generated by the communication device in the process of registering to the network, the first request message includes the IP address of the donor-CU-UP; the processing unit used to derive the first key according to the intermediate key, the IP address of the IAB-DU and the IP address of the donor-CU-UP; the transceiver unit is also used to send a first response message to the IAB-DU, The first response message includes the first key.
- the first key is K IAB
- the root key is K gNB .
- the intermediate key includes any of the following: a key and a random number determined according to the root key and a second parameter, and the second parameter includes the following One or more items: physical cell identity, downlink absolute radio frequency channel number, secondary node count value, constant, and freshness parameter.
- the intermediate key includes a key determined according to the root key and the second parameter
- the transceiving unit is further configured to receive information from the donor-CU- A fourth message of the CP, the fourth message including the intermediate key or the second parameter.
- the donor-CU-CP when the second parameter used for deriving the intermediate key includes a parameter unknown to the communication device, the donor-CU-CP sends the fourth message.
- the fourth message includes the intermediate key or a parameter unknown to the communication device among the second parameters used for deriving the intermediate key.
- the fourth message is an RRC reconfiguration message sent by the donor-CU-CP during the communication device accessing the network through the donor-DU. It should be understood that the donor-DU and the donor-CU-CP belong to the same host node.
- the intermediate key includes a random number
- the transceiver unit is further configured to receive a fourth message from the donor-CU-CP, where the fourth message includes the intermediate key.
- a communication device in a twentieth aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a first request message from the IAB-DU, the first request message is used to request a first key , the first key is different from the root key, the root key is a key generated by the communication device in the process of registering to the network, the first request message includes the IP address of the donor-CU-UP; the processing unit It is used to derive the first key according to the user plane key, the IP address of the IAB-DU and the IP address of the donor-CU-UP, and the user plane key is used between the host node and the IAB node the user plane key; the transceiving unit is further configured to send a first response message to the IAB-DU, where the first response message includes the first key.
- the first key is K IAB
- the root key is K gNB .
- a communication device in a twenty-first aspect, includes a transceiver unit and a processing unit, the transceiver unit is used to receive a first request message from the IAB-DU, the first request message is used to request a first encryption Key, the first key is different from the root key, the root key is the key generated by the communication device during the process of registering to the network, the first request message includes the IP address of the donor-CU-UP; the processing The unit is configured to determine a fourth key according to the user plane key, where the user plane key is a user plane key used between the hosting node and the IAB node; the processing unit is also configured to determine a fourth key based on the fourth key, The IP address of the IAB-DU and the IP address of the donor-CU-UP are deduced to obtain the first key; the transceiver unit is also used to send a first response message to the IAB-DU, the first response message includes the first key.
- the first key is K IAB
- the root key is K gNB .
- a twenty-second aspect provides a communication device, the communication device includes a transceiver unit and a processing unit, the processing unit is used to determine the first information, the first information is used to determine the first key, the first key Different from the root key, the root key is the key obtained by the donor-CU-CP from the network during the registration process of the IAB node to the network; the transceiver unit is used to send the first key to the donor-CU-UP a message.
- the first key is K IAB
- the root key is K gNB .
- the first information is carried in the bearer context modification request message.
- the transceiver unit is configured to send a bearer context modification request message to the donor-CU-UP, where the bearer context modification message includes the first information.
- the first information includes at least one of the following: an intermediate key, a user plane key used between the host node and the IAB node, The intermediate key and the user plane key are used to determine the first key.
- the first information includes the intermediate key
- the intermediate key includes a key determined according to the root key and a second parameter
- the The processing unit is specifically configured to derive the intermediate key according to the root key as the input key and the second parameter
- the second parameter includes one or more of the following: physical cell identity, downlink absolute radio frequency channel number, auxiliary Node count value, constant, freshness parameter.
- the transceiving unit is further configured to send a fourth message to the IAB-MT, where the fourth message includes the intermediate key or the second parameter.
- the transceiving unit is configured to send a fourth message to the IAB-MT.
- the fourth message includes parameters unknown to the IAB-MT among the second parameters used for deriving the intermediate key.
- the fourth message is an RRC reconfiguration message sent by the transceiver unit to the IAB-MT during the process of the IAB-MT accessing the network through the donor-DU.
- the first information includes the intermediate key
- the intermediate key includes a random number
- the processing unit is specifically configured to generate the random number
- the transceiving unit is further configured to send a fourth message to the IAB-MT, where the fourth message includes the intermediate key.
- the first information includes the user plane key
- the processing unit is specifically configured to derive the user plane key according to the root key.
- the transceiving unit is further configured to receive second indication information.
- the second indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the transceiving unit is further configured to send the first indication information to the donor-CU-UP.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the present application provides a communication device, including a processor.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to realize the method in the above-mentioned first aspect or any one of the possible implementations of the first aspect, or realize the above-mentioned fifth aspect or any one of the fifth aspects Methods in Possible Implementations.
- the communication device further includes a memory.
- the communication device further includes a communication interface, and the processor is coupled to the communication interface.
- the communication device is a donor-CU-UP.
- the communication interface may be a transceiver, or an input/output interface.
- the communication device is a chip or a chip system configured in the donor-CU-UP.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the present application provides a communication device, including a processor.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to realize the method in the second aspect or any possible implementation manner of the second aspect above, or realize the third aspect or any one of the third aspect above
- the communication device further includes a memory.
- the communication device further includes a communication interface, and the processor is coupled to the communication interface.
- the communication device is an access and IAB-DU.
- the communication interface may be a transceiver, or an input/output interface.
- the communication device is a chip or a chip system configured in the IAB-DU.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the present application provides a communication device, including a processor.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in the fourth aspect or any possible implementation manner of the fourth aspect above, or implement the eleventh aspect or any of the eleventh aspects above A method in one possible implementation.
- the communication device further includes a memory.
- the communication device further includes a communication interface, and the processor is coupled to the communication interface.
- the communication device is a donor-CU-CP.
- the communication interface may be a transceiver, or an input/output interface.
- the communication device is a chip or a chip system configured in the donor-CU-CP.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the present application provides a communication device, including a processor.
- the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in the seventh to tenth aspects or any possible implementation manners of the seventh to tenth aspects.
- the communication device further includes a memory.
- the communication device further includes a communication interface, and the processor is coupled to the communication interface.
- the communication device is an IAB-MT.
- the communication interface may be a transceiver, or an input/output interface.
- the communication device is a chip or a chip system configured in the IAB-MT.
- the communication interface may be an input/output interface.
- the transceiver may be a transceiver circuit.
- the input/output interface may be an input/output circuit.
- the present application provides a processor, including: an input circuit, an output circuit, and a processing circuit.
- the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in each aspect above.
- the above-mentioned processor can be a chip
- the input circuit can be an input pin
- the output circuit can be an output pin
- the processing circuit can be a transistor, a gate circuit, a flip-flop, and various logic circuits.
- the input signal received by the input circuit may be received and input by the receiver, for example but not limited to, the signal output by the output circuit may be output to the transmitter and transmitted by the transmitter, for example but not limited to, and the input circuit and the output
- the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
- the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
- the present application provides a processing device, including a communication interface and a processor.
- the communication interface is coupled with the processor.
- the communication interface is used for input and/or output of information.
- the information includes at least one of instructions or data.
- the processor is configured to execute a computer program, so that the processing device executes the methods in the various aspects above.
- the present application provides a processing device, including a processor and a memory.
- the processor is used to read instructions stored in the memory, and can receive signals through the receiver and transmit signals through the transmitter, so that the processing device executes the methods in the above aspects.
- processors there are one or more processors. If there is a memory, the memory can also be one or more.
- the memory may be integrated with the processor, or the memory may be set separately from the processor.
- the memory can be a non-transitory (non-transitory) memory, such as a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be respectively arranged in different On the chip, the embodiment of the present application does not limit the type of the memory and the configuration of the memory and the processor.
- a non-transitory memory such as a read-only memory (read only memory, ROM)
- ROM read only memory
- sending indication information may be a process of outputting indication information from a processor
- receiving indication information may be a process of inputting received indication information to a processor.
- the processed output information may be output to the transmitter, and the input information received by the processor may be from the receiver.
- the transmitter and the receiver may be collectively referred to as a transceiver.
- the device in the twenty-eighth and twenty-ninth aspects above can be a chip, and the processor can be implemented by hardware or software.
- the processor can be a logic circuit, an integrated circuit etc.; when implemented by software, the processor may be a general-purpose processor by reading software code stored in a memory, which may be integrated in the processor or may be located outside the processor and exist independently .
- the present application provides a computer program product, the computer program product including: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer is made to perform the above-mentioned various aspects method in .
- a computer program also referred to as code, or an instruction
- the present application provides a computer-readable medium, where the computer-readable medium stores a computer program (also referred to as code, or instruction) which, when run on a computer, causes the computer to perform the above-mentioned method in the aspect.
- a computer program also referred to as code, or instruction
- the present application provides a communication system, including the aforementioned donor-CU-UP, donor-CU-CP, IAB-MT, and IAB-DU.
- Fig. 1 is a schematic diagram of an architecture in which a centralized unit control plane entity and a centralized unit user plane entity are separated in a next-generation base station.
- Fig. 2 is an architecture diagram of an IAB system applicable to the technical solution of the present application.
- FIG. 3 is an example of a user plane protocol stack architecture of a multi-hop IAB network.
- FIG. 4 is an example of a control plane protocol stack architecture of a multi-hop IAB network.
- FIG. 5 to FIG. 11 show schematic flowcharts of the methods provided by the embodiments of the present application.
- Fig. 12 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- Fig. 13 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- the embodiments of the present application can be applied to various communication systems, such as a wireless local area network system (wireless local area network, WLAN), a narrowband Internet of Things system (narrow band-internet of things, NB-IoT), a global system for mobile communications (global system for mobile communications, GSM), enhanced data rate for GSM evolution system (enhanced data rate for gsm evolution, EDGE), wideband code division multiple access system (wideband code division multiple access, WCDMA), code division multiple access 2000 system (code division multiple access, CDMA2000), time division-synchronization code division multiple access system (time division-synchronization code division multiple access, TD-SCDMA), long term evolution system (long term evolution, LTE), satellite communication, fifth generation (5th generation, 5G) systems or new communication systems that will appear in the future.
- WLAN wireless local area network
- NB-IoT narrowband Internet of Things system
- GSM global system for mobile communications
- GSM global system for mobile communications
- enhanced data rate for GSM evolution system enhanced data rate for
- the terminal devices involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems.
- the terminal can be a mobile station (mobile station, MS), a subscriber unit (subscriber unit), a user equipment (user equipment, UE), a cellular phone (cellular phone), a smart phone (smart phone), a wireless data card, a personal digital assistant ( personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handset), laptop computer (laptop computer), machine type communication (machine type communication, MTC) terminal, etc.
- MS mobile station
- subscriber unit subscriber unit
- UE user equipment
- cellular phone cellular phone
- smart phone smart phone
- PDA personal digital assistant
- modem modem
- handheld device handset
- laptop computer laptop computer
- machine type communication machine type communication
- the network device in the embodiment of the present application may be a device for communicating with a terminal device, and the network device may be a global system of mobile communication (GSM) system or a code division multiple access (CDMA)
- GSM global system of mobile communication
- CDMA code division multiple access
- the base transceiver station (BTS) in the system can also be the base station (NodeB, NB) in the wideband code division multiple access (WCDMA) system, or it can be the evolved base station (evolutionary base station) in the LTE system.
- NodeB, NB base station
- WCDMA wideband code division multiple access
- evolutionary base station evolved base station
- NodeB, eNB or eNodeB can also be a next-generation wireless access base station (NR NodeB, gNB), or a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario, or the network device It can be a relay station, an access point, a vehicle-mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, etc., which is not limited in this embodiment of the application.
- NR NodeB, gNB next-generation wireless access base station
- CRAN cloud radio access network
- the network device It can be a relay station, an access point, a vehicle-mounted device, a wearable device, and a network device in a future 5G network or a network device in a future evolved PLMN network, etc., which is not limited in this embodiment of the application.
- a terminal device or a network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
- the hardware layer includes hardware such as a central processing unit (CPU), a memory management unit (MMU), and memory (also called main memory).
- the operating system may be any one or more computer operating systems that implement business processing through processes, for example, Linux operating system, Unix operating system, Android operating system, iOS operating system, or windows operating system.
- the application layer includes applications such as browsers, address books, word processing software, and instant messaging software.
- the embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as the program that records the code of the method provided by the embodiment of the present application can be run to provide the method according to the embodiment of the present application.
- the execution subject of the method provided by the embodiment of the present application may be a terminal device or a network device, or a functional module in a terminal device or a network device that can call a program and execute the program.
- various aspects or features of the present application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques.
- article of manufacture covers a computer program accessible from any computer readable device, carrier or media.
- computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disks, floppy disks, or tapes, etc.), optical disks (e.g., compact discs (compact discs, CDs), digital versatile discs (digital versatile discs, DVDs), etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), card, stick or key drive, etc.).
- magnetic storage devices e.g., hard disks, floppy disks, or tapes, etc.
- optical disks e.g., compact discs (compact discs, CDs), digital versatile discs (digital versatile discs, DVDs), etc.
- smart cards and flash memory devices for example, erasable programmable read-only
- various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
- the term "machine-readable medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
- an access network device for example, gNB may consist of a gNB centralized unit (CU) and one or more gNB distributed units (DU).
- gNB-CU and gNB-DU are different logical nodes and can be deployed on different physical devices or on the same physical device.
- gNB-CU can be further divided into centralized unit control plane (central unit-control plane, CU-CP) entity (or also called CU-CP node) and centralized unit user Plane (central unit-user plane, CU-UP) entity (or also called CU-UP node).
- CU-CP central unit-control plane
- CU-UP central unit-user plane
- gNB-CU-CP and gNB-CU-UP are connected through the E1 interface
- gNB-CU-CP and gNB-DU are connected through the F1-C interface
- gNB-CU-UP and gNB-DU are connected through the F1- The U interface. Its structure is shown in Figure 1.
- a gNB will contain a gNB-CU-CP, multiple gNB-CU-UP, multiple gNB-DU;
- One DU can only be connected to one gNB-CU-CP;
- One CU-UP can only be connected to one gNB-CU-CP;
- a DU can be connected to multiple gNB-CU-UPs under the control of the same CU-CP;
- One CU-UP can be connected to multiple gNB-DUs under the control of the same CU-CP.
- Fig. 1 is only exemplary, and should not impose any limitation on the architecture of the gNB.
- gNB may only include one gNB-CU-UP, one gNB-CU-CP, one gNB-DU, or may include more gNB-CUs -UP and gNB-DU. The application is not limited here.
- the fifth-generation mobile network puts forward more stringent requirements for various network performance indicators in all aspects.
- the capacity index has been increased by 1000 times, wider coverage requirements, ultra-high reliability and ultra-low latency, etc.
- the use of high-frequency small cell networking is becoming more and more popular.
- the propagation characteristics of high-frequency carriers are poor, the attenuation is serious due to occlusion, and the coverage area is not wide, so a large number of densely deployed small stations are required.
- the integrated access and backhaul (IAB) technology provides an idea to solve the above problems.
- Both the access link and the backhaul link adopt wireless transmission schemes, which can avoid optical fiber deploy.
- FIG. 2 a schematic diagram of a wireless relay scenario is shown.
- a relay node relay node, RN
- IAB node which can provide wireless access services for user equipment (UE), and the service transmission of the UE is connected by the IAB node through a wireless backhaul link
- the donor node is also called the donor base station (donor gnodeB, DgNB).
- the IAB node can play two roles of mobile terminal (mobile termination, MT) and DU; when the IAB node faces its parent node, it can be regarded as a terminal device, that is, the role of MT, where the parent node may be the host base station; when the IAB node When a node faces its child nodes, the IAB node can be regarded as a network device, that is, the role of a DU, where the child node may be another IAB node or an ordinary UE.
- the host base station may be an access network element with complete base station functions, or an access network element in the form of separation of centralized units and distributed units.
- the host base station is connected to the core network element serving the UE, for example, connected to the 5G core network, and provides the wireless backhaul function for the IAB node.
- the centralized unit of the host base station is referred to as the donor CU or CU directly
- the distributed unit of the host base station is referred to as the donor DU or DU directly.
- the donor CU may also be the control plane (control plane, CP) and the user plane (user plane, UP) are separated, for example: CU can be composed of one CU-CP and one or more CU-UP.
- F1 interface As shown in Figure 3 and Figure 4, between the IAB node (IAB-DU) and the donor node (IAB-donor-CU), it is necessary to establish an F1 interface (or called an F1* interface, which may be collectively referred to herein as F1 interface, but the name is not limited), this interface supports user plane protocol (F1-U/F1*-U) and control plane protocol (F1-C/F1*C).
- F1 interface or called an F1* interface, which may be collectively referred to herein as F1 interface, but the name is not limited
- this interface supports user plane protocol (F1-U/F1*-U) and control plane protocol (F1-C/F1*C).
- the user plane protocol includes one or more of the following protocol layers: general packet radio service tunneling protocol user plane (general packet radio service tunneling protocol user plane, GTP-U) layer, user datagram protocol (user datagram protocol, UDP) Layer, Internet Protocol (internet network, IP) layer, L2 layer (layer 2), L1 layer (layer 1), radio link control (radio link control, RLC) layer, medium access control (medium access control, MAC) layer, physical (PHY) layer, and backhaul adaptation protocol (BAP) layer.
- general packet radio service tunneling protocol user plane general packet radio service tunneling protocol user plane, GTP-U
- user datagram protocol user datagram protocol
- UDP Internet Protocol
- IP Internet Protocol
- L2 layer layer
- L1 layer layer
- radio link control radio link control
- MAC medium access control
- PHY physical
- BAP backhaul adaptation protocol
- the control plane protocol includes one or more of the following protocol layers: F1 application protocol (F1application protocol, F1AP) layer, stream control transport protocol (stream control transport protocol, SCTP) layer, IP layer, L2 layer, L1 layer, RLC layer, MAC layer, PHY layer, BAP layer.
- F1 application protocol F1application protocol, F1AP
- stream control transport protocol stream control transport protocol, SCTP
- the wireless backhaul link between the IAB node 2 and the IAB node 1, and the wireless backhaul link between the IAB node 1 and the IAB owner DU can be called a wireless backhaul radio link control channel ( backhaul radio link control channel, BH RLC CH).
- the IAB node and the IAB host can perform interface management, manage the IAB-DU, and perform UE context-related configuration, etc.
- functions such as user plane data transmission and downlink transmission status feedback can be performed between the IAB node and the IAB host.
- IP security IP security, IPSec
- the embodiment of the present application provides a method for establishing a secure transmission channel, in order to establish a user plane secure transmission channel between the donor-CU-UP and the IAB-DU.
- the first key at the donor-CU-UP is derived from the donor-CU-UP, or derived from the donor-CU-CP and sent to the donor-CU-UP
- the first key at the IAB-DU is deduced by the IAB-DU, or is deduced by the IAB-MT and sent to the IAB-DU. Since the first key at IAB-DU and the first key at donor-CU-UP are the same key, the key at IAB-DU and the key at donor-CU-UP are used in this application Both are named the first key.
- the key at the donor-CU-UP is derived from IAB-DU/IAB-MT, and it should not be understood that the key at the IAB-DU is donor-CU-UP/donor-CU-CP obtained by deduction.
- the key at the donor-CU-UP can also be named the first key
- the key at the IAB-DU can be named the fifth key
- the first key and the fifth key are the same key . This embodiment of the present application does not limit it.
- Fig. 5 is a method for establishing a secure transmission communication provided by an embodiment of the present application. As shown in FIG. 5 , the method 500 includes S510 to S550 , and each step will be described in detail below.
- the donor-CU-CP sends a third message.
- the donor-CU-UP receives the third message.
- the third message includes the root key of the host node (hereinafter denoted as K gNB ).
- K gNB is acquired from the network by the donor-CU-CP during the registration process of the IAB-MT of the IAB node to the network.
- An access and mobility management function AMF sends an initial context setup request (initial context setup request) message to the donor-CU-CP, where the initial context setup request message includes K gNB .
- the Donor-CU-CP may save the K gNB included in the initial context establishment request message in the context of the IAB node. It should be understood that the IAB-MT and the IAB-DU belong to the same IAB node. Donor-DU, donor-CU-UP, and donor-CU-CP belong to the same IAB host node.
- K gNB is used to derive the first key.
- the first key is an authentication credential used when the donor-CU-UP and the IAB-DU establish a user plane secure transmission channel, and the user plane secure transmission channel is used to transmit user plane data of the terminal device.
- the user plane secure transmission channel established between the Donor-CU-UP and the IAB-DU may be a secure transmission channel established by using an IPSec mechanism. It should be noted that the first key is different from K gNB .
- the embodiment of the present application does not limit the third message.
- the third message is a bearer context setup request message.
- the bearer context establishment request message is sent by the donor-CU-CP to the donor-CU-UP when the IAB-MT accesses the network through the donor-DU and the donor-CU-CP or through other IAB nodes and the donor-CU-CP of.
- the bearer context establishment request message is sent by the donor-CU-CP to the donor-CU-UP when the terminal device accesses the network through the IAB-DU.
- IAB-MT and IAB-DU belong to the same IAB node
- donor-DU, donor-CU-CP, and donor-CU-UP belong to the same IAB host node.
- the third message is a bearer context modification request message.
- the bearer context modification request message is sent by the donor-CU-CP to the donor-CU-UP when the IAB-MT accesses the network through the donor-DU and the donor-CU-CP or through other IAB nodes and the donor-CU-CP of.
- the bearer context modification request message is sent by the donor-CU-CP to the donor-CU-UP when the terminal device accesses the network through the IAB-DU.
- the third message further includes first indication information, where the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the first indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the first indication information may be the IP address or K gNB of the IAB-DU, that is, the IP address or K gNB of the IAB-DU may also be used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-UP deduces the first key.
- the Donor-CU-UP derives the first key according to K gNB , the IP address of the IAB-DU and the first IP address of the donor-CU-UP.
- the Donor-CU-UP uses the K gNB as an input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives the first key.
- the first IP address of the Donor-CU-UP is the IP address used by the Donor-CU-UP to establish the user plane secure transmission channel. It should be understood that the donor-CU-UP may have multiple IP addresses, and before establishing the user plane secure transmission channel, the donor-CU-UP determines a first IP address from the multiple IP addresses for establishing the user plane secure transmission channel . Exemplarily, when the terminal device accesses the network through the IAB-DU, after the donor-CU-UP receives the bearer context establishment request message from the donor-CU-CP, it determines the donor used to establish the user plane secure transmission channel. - The first IP address of the CU-UP.
- the IP address of the IAB-DU is obtained by the donor-CU-UP from the donor-CU-CP.
- the bearer context modification request message sent from the donor-CU-CP to the donor-CU-UP includes the IP address of the IAB-DU.
- the embodiment of the present application does not limit the triggering condition for the donor-CU-UP to deduce the first key.
- the donor-CU-UP may deduce the first key after obtaining the IP address of the IAB-DU and the K gNB .
- the donor-CU-UP deduces the first key when receiving the first indication information.
- the donor-CU-UP After the donor-CU-UP derives the first key, it saves the corresponding relationship between the first key and the IP address of the IAB-DU in the context of the donor-CU-UP.
- the donor-CU-CP sends the second message.
- the IAB-DU receives the second message.
- the second message includes the first IP address of the donor-CU-UP.
- the second message is a UE context setup request (UE context setup request) message.
- the UE context establishment request message is sent by the donor-CU-CP to the IAB-DU when the terminal device accesses the network through the IAB-DU.
- the IAB-DU determines the first key.
- the manner in which the IAB-DU determines the first key is described in method 600 below.
- the donor-CU-UP and the IAB-DU use the first key to establish a user plane secure transmission channel.
- the donor-CU-UP and the IAB node use the pre-shared key (pre-shared secret key, PSK) method supported in the Internet key exchange (internet key exchange, IKE) V2 protocol to establish a user plane secure transmission aisle.
- pre-shared secret key PSK
- IKE Internet key exchange
- the IAB node and the donor-CU-UP complete the IKE security management (security association, SA) parameter negotiation in plain text, including negotiating encryption and authentication algorithms, exchanging temporary random numbers and Diffie-Hellman (DH) exchange.
- SA security association
- the IAB node and the donor-CU-UP respectively use the first key to generate authentication parameters and send them to the peer end to complete identity verification.
- the IAB-DU and the donor-CU-UP use the IKEv2 PSK protocol to establish a user plane secure transmission channel
- the IAB-DU uses the first key stored in the context of the IAB-DU and the first IP address of the donor-CU-UP
- the corresponding relationship between the addresses determines that the first key is used as the authentication credential used when establishing the user plane secure transmission channel
- the donor-CU-UP uses the first key stored in the context of the donor-CU-UP and the IP address of the IAB-DU
- the corresponding relationship of the addresses determines that the first key is used as the authentication credential used when establishing the user plane secure transmission channel.
- the process of establishing a user plane secure transmission channel between the IAB-DU and the donor-CU-UP may be triggered by the IAB-DU or the donor-CU-UP.
- the IAB-DU triggers the establishment of the user plane secure transmission channel process.
- the donor-CU-UP receives the downlink data from the terminal device, the user plane secure transmission channel between the IAB-DU and the donor-CU-UP has not been established yet, then the donor-CU-UP triggers the establishment of the user plane secure transmission The flow of the channel.
- the donor-CU-CP sends the K gNB to the donor-CU-UP, so that the donor-CU-UP can use the K gNB as the input key to derive the first key, and at the same time, the IAB-DU can obtain Same first key.
- the donor-CU-UP and IAB-DU have the same first key, the donor-CU-UP and IAB-DU can establish a user plane secure transmission channel based on the first key, thereby effectively avoiding The problem of authentication error when IAB-DU establishes the secure transmission channel of F1-U interface.
- the initial context establishment request message received by the donor-CU-CP from the AMF includes K gNB .
- the Donor-CU-CP obtains the K gNB , it can deduce the key related to the control plane according to the K gNB . Therefore, based on method 500, after the donor-CU-CP sends the K gNB to the donor-CU-UP, the donor-CU-UP can not only deduce the first key according to the K gNB , but also obtain the control plane related key.
- the donor-CU-UP obtains the key related to the control plane based on K gNB deduction, it will affect the transmission security of the control plane, which does not meet the requirements of key isolation and privilege minimization.
- the deployment of donor-CU-UP can be distributed, that is, one donor-CU-CP can manage multiple donor-CU-UPs. If the donor-CU-CP sends K gNB to multiple donor-CU- UP will increase the risk of data key leakage.
- the user plane secure transmission channel between the donor-CU-UP and the IAB-DU can be established according to the method 500, there is a risk of key leakage in the method 500.
- Fig. 6 is a method for establishing a secure transmission channel provided by an embodiment of the present application. As shown in FIG. 6 , the method 600 includes S610 to S640 , and each step will be described in detail below.
- the donor-CU-CP sends the first message.
- the donor-CU-UP receives the first message.
- the first message includes a first key
- the first key is an authentication credential used when the donor-CU-UP establishes a user plane secure transmission channel with the IAB-DU
- the user plane secure transmission Channels are used to transmit user plane data of terminal devices.
- the user plane secure transmission channel established between the Donor-CU-UP and the IAB-DU may be a user plane secure transmission channel established by using an IPSec mechanism.
- the first key is different from the root key of the donor node (hereinafter referred to as K gNB ), and the K gNB is obtained from the network by the donor-CU-CP during the registration process of the IAB node to the network to the key.
- K gNB the root key of the donor node
- the K gNB is obtained from the network by the donor-CU-CP during the registration process of the IAB node to the network to the key.
- the IAB-MT of the IAB node accesses the network through the donor-DU and the donor-CU-CP or through other IAB nodes and the donor-CU-CP
- the AMF sends an initial context establishment request message to the donor-CU-CP, and the initial context establishment request message includes K gNB .
- the Donor-CU-CP may save the K gNB included in the initial context establishment request message in the context of the IAB node. It should be understood that the IAB-MT and the IAB-DU belong to the same IAB node, and the donor-DU and the donor-CU-CP belong to the same IAB host node.
- the first message further includes the first IP address of the donor-CU-UP.
- the donor-CU-UP receives the first message, after determining to establish a user plane secure transmission channel between the donor-CU-UP and the IAB-DU according to the first IP address, determine according to the first IP address that the The first key is used when establishing the user plane secure transmission channel.
- the first message further includes the IP address of the IAB-DU.
- the donor-CU-UP receives the first message, after determining to establish a user plane secure transmission channel between the donor-CU-UP and the IAB-DU according to the first IP address, according to the first IP address and the IAB-DU -
- the IP address of the DU determines that the first key is used when establishing the user plane secure transmission channel.
- the method 600 further includes S611a: the donor-CU-CP determines the first key.
- the Donor-CU-CP derives the first key according to K gNB , the first IP address of the donor-CU-UP, and the IP address of the IAB-DU.
- the Donor-CU-CP uses the K gNB as an input key, takes the first IP address of the donor-CU-UP and the IP address of the IAB-DU as input parameters, and derives the first key.
- K gNB is a key shared by the IAB-MT and the IAB-Donor.
- K gNB is acquired by the donor-CU-CP from the context of the locally saved IAB node.
- the first IP address of the Donor-CU-UP is the IP address used by the donor-CU-UP to establish the user plane secure transmission channel. It should be understood that the donor-CU-UP may have multiple IP addresses, and before establishing the user plane secure transmission channel, the donor-CU-UP determines a first IP address from the multiple IP addresses for establishing the user plane secure transmission channel . Exemplarily, during the process of the terminal device accessing the network through the IAB-DU, the donor-CU-CP receives a bearer context setup response (bearer context setup response) message from the donor-CU-UP, and the bearer context setup response message includes the donor - The first IP address of the CU-UP.
- bearer context setup response bearer context setup response
- the IP address of the IAB-DU may be assigned by the donor-CU-CP, or assigned by the operation administration and maintenance (OAM) for the IAB-DU.
- OAM operation administration and maintenance
- the donor-CU-CP can obtain the IP address of the IAB-DU from the OAM.
- the embodiment of the present application does not limit the trigger condition for the donor-CU-CP to determine the first key.
- the donor-CU-CP may determine the first key after obtaining the first IP address of the donor-CU-UP. That is to say, once the donor-CU-CP receives the bearer establishment context response message from the donor-CU-UP, it can determine the first encryption key according to the first IP address of the donor-CU-UP carried in the bearer establishment context response message. key.
- the donor-CU-CP determines the first key when it is determined that the IAB-DU belongs to the IAB node.
- the donor-CU-CP determines whether the IAB-DU belongs to the IAB node according to whether the context of the locally stored IAB-DU includes the first identifier, and the first identifier is used to indicate that the IAB-DU belongs to the IAB node. If the context of the IAB node includes the first identifier, the donor-CU-CP determines that the IAB-DU belongs to the IAB node; if the context of the IAB node does not include the first identifier, the donor-CU-CP determines that the IAB-DU does not belong to the IAB node.
- the first identifier is the IP address of the IAB-DU.
- the first message includes a one-to-one correspondence between multiple keys and multiple IP addresses of the donor-CU-UP, where the multiple keys include the first key, and the first The key corresponds to the first IP address of the donor-CU-UP.
- the first message further includes the IP address of the IAB-DU, and the multiple keys are all corresponding to the IP address of the IAB-DU. That is, each of the multiple keys corresponds to an IP address of the donor-CU-UP and an IP address of the IAB-DU.
- the method 600 further includes S611b: the donor-CU-CP according to K gNB , the IP address of the IAB-DU and multiple IP addresses of donor-CU-UP, deduce the multiple keys.
- the multiple IP addresses of the donor-CU-UP include a first IP address and a second IP address. Then the donor-CU-CP deduces the first key according to the IP addresses of K gNB and IAB-DU and the first IP address; and deduces the second key according to the IP addresses of K gNB and IAB-DU and the second IP address. key. Then carry the corresponding relationship between the first IP address and the first key and the corresponding relationship between the second IP address and the second key in the first message, and send it to the donor-CU-UP.
- the method further includes: the donor-CU-CP sends the first indication information to the donor-CU-UP; the donor-CU-CP receives the key information from the donor-CU-UP Multiple IP addresses of UP's donor-CU-UP.
- the donor-CU-UP sends multiple IP addresses of the donor-CU-UP to the donor-CU-CP according to the first indication information.
- the multiple IP addresses of the donor-CU-UP are all IP addresses of the donor-CU-UP. That is, after the donor-CU-UP receives the first indication information, it sends all the IP addresses of the donor-CU-UP to the donor-CU-CP according to the first indication information.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-UP has three IP addresses, which are respectively recorded as CU-UP IP1, CU-UP IP2 and CU-UP IP3, and the donor-CU-UP sends the three IP addresses to the donor-CU-CP.
- the donor-CU-CP deduces and obtains three keys according to K gNB , the IP address of the IAB-DU and the three IP addresses of the donor-CU-UP.
- donor-CU-CP deduces a key (denoted as K IAB-UP1 ) by taking K gNB as input key, the IP address of IAB-DU and CU-UP IP1 as input parameters; donor-CU-CP A key (denoted as K IAB-UP2 ) is deduced by taking K gNB as the input key, IAB-DU IP address and CU-UP IP2 as input parameters; donor-CU-CP uses K gNB as the input key, and The IAB-DU IP address and CU-UP IP3 are used as input parameters to deduce a key (K IAB-UP3 ).
- the donor-CU-CP sends the deduced three keys and the IP addresses of the donor-CU-UP respectively corresponding to the three keys to the donor-CU-UP.
- the donor-CU-UP sends the deduced three keys and three groups of first parameters corresponding to the three keys to the donor-CU-UP, and the first parameter corresponding to each key is the derived The input parameters used by this key.
- three keys and three sets of first parameters corresponding to the three keys can be expressed as: ⁇ K IAB-UP1 , CU-UP IP1 and IAB-DU IP ⁇ , ⁇ K IAB-UP2 , CU -UP IP2 and IAB-DU IP ⁇ and ⁇ K IAB-UP3 , CU-UP IP3 and IAB-DU IP ⁇ .
- the method 600 further includes S612: the donor-CU-UP determines to establish a user plane secure transmission channel between the donor-CU-UP and the IAB-DU according to the first IP address; The first IP address determines the first key.
- the donor-CU-UP determines the key corresponding to the first IP address among the multiple keys as the first key.
- the donor-CU-UP determines the key corresponding to the first IP address and the IP address of the IAB-DU among the multiple keys as the first key.
- the donor-CU-UP determines the donor-CU used to establish the user plane secure transmission channel after receiving the bearer context establishment request message from the donor-CU-CP -
- the IP address of the UP is the first IP address; further, the donor-CU-UP receives a bearer context modification request message from the donor-CU-CP, and the bearer context modification request message includes information for establishing a user plane secure transmission channel
- the donor-CU-UP will be the K IAB corresponding to the CU-UP IP2 and IAB-DU IP - UP2 is identified as the first key.
- the donor-CU-UP obtains the first key from the first message, or determines the first key from the multiple keys included in the first message, save the first key and the IAB-DU Correspondence between IP addresses.
- the donor-CU-UP saves the corresponding relationship between the first key and the IP address of the IAB-DU in the context of the donor-CU-UP.
- the IP address of the IAB-DU is acquired by the donor-CU-UP from the donor-CU-CP.
- the donor-CU-CP carries the IP address of the IAB-DU in the first message and sends it to the donor-CU-UP.
- the bearer context modification request message sent from the donor-CU-CP to the donor-CU-UP includes the first key and the IP address of the IAB-DU.
- the donor-CU-CP carries the IP address of the IAB-DU in a message other than the first message and sends it to the donor-CU-UP.
- the donor-CU-CP when the terminal device accesses the network through the IAB-DU, the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP, and the bearer context establishment request message includes the first key; further, the donor- The CU-CP sends a bearer context modification request message to the donor-CU-UP, and the bearer context modification request message includes the IP address of the IAB-DU.
- the embodiment of the present application does not limit the first message sent by the donor-CU-CP to the donor-CU-UP.
- the first message may be a bearer context modification request message.
- the bearer context modification request message is sent by the donor-CU-CP to the donor-CU-UP during the process of the terminal device accessing the network through the IAB-DU.
- the first key may be carried in security information (security information) included in the bearer context modification request message.
- the first key may be carried in a newly defined information element in the bearer context modification request message.
- the first message may be a bearer context establishment request message.
- the bearer context establishment request message is sent by the donor-CU-CP to the donor-CU-UP during the process of the terminal device accessing the network through the IAB-DU.
- the donor-CU-UP has only one IP address, and when establishing different user-plane secure transmission channels, the donor-CU-UP uses this IP address to establish the user-plane secure transmission channel.
- the donor-CU-UP and an IAB-DU have established a user plane secure transmission channel (denoted as user plane secure transmission channel 1), and during the process of establishing the user plane secure transmission channel 1, the donor - The CU-CP can obtain the IP address of the donor-CU-UP.
- the donor-CU-CP can according to the donor-CU-CP
- the IP address of the CU-UP determines the first key, and carries the first key in the bearer context establishment request message and sends it to the donor-CU-UP.
- the first message may be a bearer context modification request message.
- the bearer context request message is a process in which the IAB-MT accesses the network through the donor-DU and the donor-CU-CP or other IAB nodes and the donor-CU-CP, and the donor-CU-CP sends sent.
- Table 1 shows some information elements included in the security information.
- Table 2 shows the IE/group included in the "IAB Pre-Shared Key” information element.
- the one-to-one correspondence between the first key or multiple keys and multiple IP addresses of the donor-CU-UP may be included in the "security information" information element.
- Table 3 shows some information elements included in the bearer context establishment request message.
- Table 4 shows the IE/group included in the "IAB Pre-Shared Key” information element.
- Table 5 shows the IE/group included in the "IAB credential” information element.
- the first key or multiple keys and multiple sets of first parameters may be included in the "IAB Pre-Shared Key” information element.
- the first key or multiple keys and multiple sets of first parameters may be included in the "IAB credential" information element in the "IAB Pre-Shared Key” information element.
- the method 600 further includes S613: the donor-CU-CP derives the third key according to the K gNB , the IP address of the donor-CU-CP, and the IP address of the IAB-DU.
- the third key is the authentication credential used when the donor-CU-CP and the IAB-DU establish a secure transmission channel on the control plane.
- the control plane secure transmission channel established between the Donor-CU-CP and the IAB-DU may be a secure transmission channel established by using the IPSec mechanism.
- the donor-CU-CP uses the K gNB as an input key, and takes the IP address of the donor-CU-CP and the IP address of the IAB-DU as input parameters to derive the third key.
- the first message further includes first indication information.
- the donor-CU-UP uses the first key as the authentication credential used when establishing the user plane secure transmission channel with the IAB-DU. Otherwise, the method of establishing the user plane secure transmission channel between the donor-CU-UP and the IAB-DU will not rely on the first key as the authentication credential.
- the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the first indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the first indication information may be the IP address or the first key of the above-mentioned IAB-DU, that is, the IP address or the first key of the IAB-DU may also be used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-CP sends the second message.
- the IAB-DU receives the second message.
- the second message includes the first IP address of the donor-CU-UP.
- the second message is a UE context establishment request message.
- the UE context establishment request message is sent by the donor-CU-CP to the IAB-DU when the terminal device accesses the network through the IAB-DU.
- the IAB-DU determines the first key.
- S630 includes S631a to S633a:
- the IAB-DU sends a first request message to the IAB-MT.
- the first request message includes the first IP address of the donor-CU-UP, and the first request message is used to request the first key.
- the IAB-MT After the IAB-MT receives the first request message from the IAB-DU, it derives the first key according to K gNB , the IP address of the IAB-DU and the first IP address of the donor-CU-UP, and then uses the first key The key is sent to the IAB-DU. It can be understood that the IP address of the IAB-DU is obtained from the OAM or the donor-CU-CP after the IAB-MT completes the registration.
- the IAB-MT uses the K gNB as an input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives the first key.
- the IAB-MT sends a first response message to the IAB-DU.
- the first response message includes a first key.
- the IAB-DU saves the correspondence between the first key and the first IP address of the donor-CU-UP.
- the IAB-DU stores the corresponding relationship between the first key and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-MT stores K gNB , and the IAB-DU obtains the first IP address of the donor-CU-UP. Therefore, the above method solves the problem of obtaining the first key of the IAB-DU through the interaction between the IAB-MT and the IAB-DU. At the same time, the first key is different from K gNB , which meets the requirements of key isolation and authority minimization, and avoids key leakage.
- S630 includes S631b to S633b:
- the IAB-DU sends a second request message to the IAB-MT.
- the second request message is used to request K gNB .
- the IAB-MT sends a second response message to the IAB-DU.
- the second response message includes K gNB .
- S631b and S632b are optional steps. That is, if the IAB-DU stores K gNB locally, S630 only includes S633b.
- the K gNB locally stored by the IAB-DU is acquired from the IAB-MT after the IAB-DU is started. For example, after the IAB-DU is started, when the IAB-MT sends the IP address of the IAB-DU to the IAB-DU, K gNB is sent to the IAB-DU.
- the IAB-DU deduces the first key.
- the IAB-DU derives the first key according to the K gNB , the IP address of the IAB-DU, and the first IP address of the donor-CU-UP.
- the IAB-DU uses the K gNB as an input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives the first key. It can be understood that the IP address of the IAB-DU is obtained from the IAB-MT after the IAB-DU is started.
- the IAB-MT stores K gNB , and the IAB-DU obtains the first IP address of the donor-CU-UP. Therefore, the above method solves the problem of obtaining the first key of the IAB-DU through the interaction between the IAB-MT and the IAB-DU. At the same time, after the IAB-DU obtains the K gNB , when the first IP address of the donor-CU-UP changes, it does not need to repeatedly request the K gNB , which is convenient for local on-demand calculation of the first key.
- the IAB-DU saves the corresponding relationship between the first key and the first IP address of the donor-CU-UP.
- the IAB-DU stores the corresponding relationship between the first key and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-DU after obtaining the first IP address of the donor-CU-UP, obtains the first key. For example, if S630 includes S631a to S633a, the IAB-DU sends the first request message to the IAB-MT when the first IP address of the donor-CU-UP is acquired. For another example, if S630 includes S631b to S633b, the IAB-DU sends a second request message to the IAB-MT after obtaining the first IP address of the donor-CU-UP, or derives the first key.
- the IAB-DU acquires the first key before initiating a process of establishing a user plane secure transmission channel to the donor-CU-UP. For example, if S630 includes S631a to S633a, the IAB-DU sends the first request message to the IAB-MT before initiating the establishment process of the user plane secure transmission channel to the donor-CU-UP. For another example, if S630 includes S631b to S633b, the IAB-DU sends the second request message to the IAB-MT before initiating the establishment process of the user plane secure transmission channel to the donor-CU-UP, or obtains the first key after derivation.
- the IAB-DU after receiving the authentication request message from the donor-CU-UP, the IAB-DU obtains the first key, and the authentication request message is used to establish a user plane secure transmission channel. For example, if S630 includes S631a to S633a, the IAB-DU sends the first request message to the IAB-MT after receiving the authentication request message from the donor-CU-UP. For another example, if S630 includes S631b to S633b, after receiving the authentication request message from the donor-CU-UP, the IAB-DU sends the second request message to the IAB-MT, or derives the first key.
- the IAB-DU after receiving the user plane data request message from the terminal device, acquires the first key. For example, if S630 includes S631a to S633a, the IAB-DU sends the first request message to the IAB-MT after receiving the user plane data request message from the terminal device. For another example, if S630 includes S631b to S633b, after receiving the user plane data request message from the terminal device, the IAB-DU sends the second request message to the IAB-MT, or derives the first key.
- the donor-CU-UP and the IAB-DU use the first key to establish a user plane secure transmission channel.
- the donor-CU-UP and the IAB node use the PSK method supported in the IKEv2 PSK protocol to establish a user plane secure transmission channel.
- the IAB node and the donor-CU-UP complete the IKE SA parameter negotiation in plain text, including negotiating encryption and authentication algorithms, exchanging temporary random numbers and DH exchange.
- the IAB node and the donor-CU-UP respectively use the first key to generate authentication parameters and send them to the peer to complete identity verification.
- the IAB-DU and the donor-CU-UP use the IKEv2 PSK protocol to establish a user plane secure transmission communication
- the IAB-DU uses the first key stored in the context of the IAB-DU and the first IP address of the donor-CU-UP
- the corresponding relationship between the addresses determines that the first key is used as the authentication credential used when establishing the user plane secure transmission channel
- the donor-CU-UP uses the first key stored in the context of the donor-CU-UP and the IP address of the IAB-DU
- the corresponding relationship of the addresses determines that the first key is used as the authentication credential used when establishing the user plane secure transmission channel.
- the process of executing IKEv2 PSK between IAB-DU and donor-CU-UP can be triggered by IAB-DU or donor-CU-UP.
- IAB-DU the user plane secure transmission channel between the IAB-DU and donor-CU-UP has not been established when the IAB-DU receives the user plane data request from the terminal device
- the IAB-DU triggers the IKEv2 PSK process.
- the donor-CU-UP receives the downlink data from the terminal device, but the user plane secure transmission channel between the IAB-DU and the donor-CU-UP has not been established, the donor-CU-UP triggers the IKEv2 PSK process.
- the donor-CU-CP derives the first key according to K gNB , the first IP address of the donor-CU-UP, and the IP address of the IAB-DU, and sends the first key to the donor -CU-UP, at the same time, the IAB node also determines the first key in the same way, so that the donor-CU-UP and the IAB node have the same first key, effectively preventing the host node and IAB-DU from establishing F1-U The problem of authentication error in the secure transmission channel of the interface.
- the first key is different from K gNB , it meets the requirements of key isolation and authority minimization, and avoids key leakage.
- the IAB-MT and the core network may perform re-authentication.
- the AMF sends an initial context establishment request message to the donor-CU-CP, and the initial context establishment request message includes the new K gNB .
- the IAB-MT will also generate new K gNB .
- the donor-CU-CP may use the new K gNB as an input parameter, the IP address of the IAB-DU and the IP address of the donor-CU-CP as input parameters to derive a new second key.
- the donor-CU-CP can also send the new K gNB to the donor-CU-UP.
- the donor-CU-UP carries the new first key in the bearer context modification request message and sends it to the donor-CU-UP.
- the donor-CU-UP may generate a new first key according to the new K gNB , and update the user plane secure transmission channel established in S640 based on the new first key.
- Donor-CU-UP can also establish other user plane secure transmission channels according to the new K gNB .
- This new first key is different from the new K gNB .
- Fig. 7 is a method for establishing a secure transmission channel provided by another embodiment of the present application. As shown in FIG. 7 , the method 700 includes S710 to S760 , and each step will be described in detail below.
- the donor-CU-CP sends the first information.
- the donor-CU-UP receives the first information.
- the first information is used to determine the first key
- the first key is the authentication credential used by the donor-CU-UP and the IAB-DU to establish a user plane secure transmission channel
- the user plane secure transmission channel is used to transmit terminal equipment user plane data.
- the user plane secure transmission channel established by Donor-CU-UP and IAB-DU may be a secure transmission channel established by using the IPSec mechanism.
- the first key is different from the root key of the donor node (hereinafter referred to as K gNB ), and the K gNB is obtained from the network by the donor-CU-CP during the registration process of the IAB node to the network to the key.
- K gNB the root key of the donor node
- the K gNB is obtained from the network by the donor-CU-CP during the registration process of the IAB node to the network to the key.
- the IAB-MT of the IAB node accesses the network through the donor-DU and the donor-CU-CP or through other IAB nodes and the donor-CU-CP
- the AMF sends an initial context establishment request message to the donor-CU-CP, and the initial context establishment request message includes K gNB .
- the Donor-CU-CP may save the K gNB included in the initial context establishment request message in the context of the IAB node. It should be understood that the IAB-MT and the IAB-DU belong to the same IAB node, and the donor-DU and the donor-CU-CP belong to the same IAB host node.
- the first information includes at least one of the following: an intermediate key and a user plane key.
- the intermediate key is an intermediate key used to generate the first key.
- the intermediate key is derived according to K gNB and the second parameter.
- the intermediate key is a random number.
- the user plane key is the user plane key used between the IAB node and the IAB host node.
- the second parameter includes one or more of the following: physical cell identifier (physical cell identifier, PCI), downlink absolute radio frequency channel number (absolute radio frequency channel number-downlink, ARFCN-DL), secondary node count value (counter) , constant (constant), freshness (fresh) parameters.
- the first information includes an intermediate key.
- the donor-CU-CP sends the first information to the donor-CU-UP, including: the donor-CU-CP generates an intermediate key; the donor-CU-CP sends the intermediate key to the donor-CU-UP.
- the donor-CU-CP generates the intermediate key, including: the donor-CU-CP derives the intermediate key according to K gNB and the second parameter.
- the method 700 further includes S750: the donor-CU-CP sends a fourth message to the IAB-MT, where the fourth message includes the intermediate key or the second parameter.
- the fourth message includes the intermediate key or a parameter unknown to the IAB-MT among the second parameters used to generate the intermediate key. That is to say, if the second parameter used by the donor-CU-CP to generate the intermediate key includes parameters unknown to the IAB-MT, the donor-CU-CP sends the intermediate key or the second parameter used to generate the intermediate key to the IAB-MT. Parameters unknown to IAB-MT in the two parameters.
- PCI, ARFCN-DL, and secondary node counter included in the second parameter above are parameters known to the IAB-MT.
- the fourth message is sent by the donor-CU-CP to the IAB-MT when the IAB-MT accesses the network through the donor-DU and the donor-CU-CP or through other IAB nodes and the donor-CU-CP RRC reconfiguration message. It should be understood that the donor-DU and the donor-CU-CP belong to the same IAB host node.
- the donor-CU-CP generating the intermediate key includes: the donor-CU-CP generating a random number and using the random number as the intermediate key.
- the method 700 further includes S750: the donor-CU-CP sends a fourth message to the IAB-MT, where the fourth message includes the intermediate key.
- the first information includes a user plane key.
- the donor-CU-UP sends the first information to the donor-CU-UP, including: the donor-CU-CP generates a user plane key; the donor-CU-CP sends the user plane key to the donor-CU-UP.
- the donor-CU-CP generates the user plane key, including: the donor-CU-CP deduces the user plane key according to the K gNB .
- the AMF sends the donor -
- the initial context establishment request message sent by the CU-CP includes K gNB .
- the donor-CU-CP deduces the user plane key according to the K gNB , and sends the user plane key to the donor-CU-UP.
- the user plane key includes a user plane integrity protection key (denoted as Kupenc) and/or a user plane encryption protection key (denoted as Kupint).
- the embodiment of the present application does not limit the trigger condition for the donor-CU-CP to generate the first information.
- the donor-CU-CP generates the first information when receiving the second indication information.
- the second indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-CP receives second indication information from the IAB-MT, where the second indication information is an "IAB-indication" information element.
- IAB-MT transmits the "IAB-indication" signal through donor-DU or other IAB nodes Yuan sent to donor-CU-UP.
- the donor-CU-CP receives second indication information from a network element of the core network, where the second indication information is an "IAB-authorized” information element.
- the second indication information is an "IAB-authorized" information element.
- the embodiment of the present application does not limit the manner in which the donor-CU-CP sends the first information to the donor-CU-UP.
- the donor-CU-CP carries the first information in the bearer context establishment request message and sends it to the donor-CU-UP.
- the method further includes: the donor-CU-CP sends first indication information to the donor-CU-UP, where the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the first indication information and the second indication information may be the same or different, which is not limited in this embodiment of the present application.
- the first indication information is "IAB-indicator”.
- the first indication information is first information, that is, the first information is also used to indicate that the IAB-DU belongs to the IAB node.
- the Donor-CU-UP determines the first key according to the first information.
- the Donor-CU-UP After the Donor-CU-UP receives the first information from the donor-CU-CP, it determines the first key according to the first information. Specifically, during the process of the terminal device accessing the network through the donor-DU, the donor-CU-UP determines the first key according to the first information.
- the first information may include different parameters. It should be understood that, when the first information includes different parameters, the way the donor-CU-UP determines the first key according to the first information is also different.
- the first information includes an intermediate key.
- the donor-CU-UP after receiving the first information, derives the first key according to the intermediate key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP.
- the donor-CU-UP uses the intermediate key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- the first information includes a user plane key.
- the donor-CU-UP After the donor-CU-UP receives the first information, it derives the first key according to the user plane key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP
- the donor-CU-UP uses the user plane key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- the donor-CU-UP first deduces the fourth key based on the user plane key, and then deduces the fourth key based on the fourth key, the IP address of the IAB-DU, and the first IP address of the donor-CU-UP.
- the donor-CU-UP uses the fourth key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- the first IP address of the donor-CU-UP used by the donor-CU-UP to deduce the first key is the IP address used for establishing the user plane secure transmission channel.
- the donor-CU-UP may have multiple IP addresses, and before establishing the user plane secure transmission channel, the donor-CU-UP determines a first IP address from the multiple IP addresses for establishing the user plane secure transmission channel .
- the terminal device accesses the network through the IAB-DU, after the donor-CU-UP receives the bearer context establishment request message from the donor-CU-CP, it determines the donor used to establish the user plane secure transmission channel.
- the first IP address of the CU-UP is the IP address used for establishing the user plane secure transmission channel.
- the IP address of the IAB-DU is obtained by the donor-CU-UP from the donor-CU-CP.
- the bearer context modification request message sent by the donor-CU-CP to the donor-CU-UP includes the IP address of the IAB-DU.
- the embodiment of the present application does not limit the trigger condition for the donor-CU-UP to determine the first key according to the first information.
- the donor-CU-UP may deduce the first key after obtaining the IP address of the IAB-DU and the first information.
- the donor-CU-UP deduces the first key when receiving the first indication information.
- the donor-CU-UP determines the first key, it saves the correspondence between the first key and the IP address of the IAB-DU.
- the correspondence between the first key and the IP address of the IAB-DU is saved in the context of the donor-CU-UP.
- the donor-CU-CP sends the second message.
- the IAB-DU receives the second message.
- the second message includes the first IP address of the donor-CU-UP.
- the second message is a UE context establishment request message.
- the UE context establishment request message is sent by the donor-CU-CP to the IAB-DU when the terminal device accesses the network through the IAB-DU.
- the IAB-DU acquires the first key.
- S740 includes S741a to S743a:
- the IAB-DU sends a first request message to the IAB-MT.
- the first request message includes the first IP address of the donor-CU-UP, and the first request message is used to request the first key.
- the IAB-MT After receiving the first request message from the IAB-DU, the IAB-MT derives the first key according to the intermediate key, the IP address of the IAB-DU, and the first IP address of the donor-CU-UP.
- the IAN-MT uses the intermediate key as an input key, takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives the first key.
- the IAB-MT derives the first key according to the user plane key, the IP address of the IAB-DU, and the first IP address of the donor-CU-UP.
- the IAB-MT uses the user plane key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- the IAB-MT first derives the fourth key according to the user plane key, and then derives the first key according to the fourth key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP.
- the IAB-MT uses the fourth key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- IP address of the IAB-DU is obtained from the OAM or the donor-CU-CP after the IAB-MT completes the registration.
- the IAB-MT sends a first response message to the IAB-DU.
- the first response message includes a first key.
- the IAB-DU saves the correspondence between the first key and the first IP address of the donor-CU-UP.
- the IAB-DU stores the corresponding relationship between the first key and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- S740 includes S741b to S743b:
- the IAB-DU sends a third request message to the IAB-MT.
- the third request message is used to request second information, and the second information includes any one of the following: an intermediate key, K gNB and a second parameter, and a user plane key.
- the IAB-MT sends a third response message to the IAB-DU.
- the third response message includes the second information.
- the IAB-DU deduces the first key.
- the IAB-DU derives the first key according to the intermediate key, the IP address of the IAB-DU, and the first IP address of the donor-CU-UP.
- the IAB-DU uses the intermediate key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key.
- the IAB-DU first deduces the intermediate key according to the K gNB and the second parameter, and then uses the intermediate key as the input key, the IP address of the IAB-DU and the donor-CU - The first IP address of UP, deduced to obtain the first key.
- the IAB-DU derives the first key according to the user plane key, the IP address of the IAB-DU, and the first IP address of the donor-CU-UP; or, the IAB-DU First, the fourth key is deduced according to the user plane key, and then the first key is deduced according to the fourth key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP.
- the IAB-DU uses the user plane key as an input key, and uses the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive the first key; or, use The fourth key is the input key, and the first key is obtained by deriving the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters.
- IP address of the IAB-DU is obtained from the IAB-MT after the IAB-DU is started.
- the IAB-DU saves the corresponding relationship between the first key and the first IP address of the donor-CU-UP.
- the IAB-DU stores the corresponding relationship between the first key and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-DU obtains the first key.
- the IAB-DU acquires the first key before initiating a process of establishing a user plane secure transmission channel to the donor-CU-UP.
- the IAB-DU obtains the first key after receiving the authentication request message from the donor-CU-UP.
- the IAB-DU after receiving the user plane data request message from the terminal device, the IAB-DU acquires the first key.
- the donor-CU-UP and the IAB node use the first key to establish a user plane secure transmission channel.
- S760 is the same as S640 in the above method 600, and for the sake of brevity, details are not described here again.
- the donor-CU-CP sends the first information for generating the first key to the donor-CU-UP, so that the donor-CU-UP can generate the first key according to the first information, and at the same time
- the IAB node also determines the first key in the same manner.
- the donor-CU-UP and IAB-DU have the same first key
- the donor-CU-UP and IAB-DU can establish a user plane secure transmission channel based on the first key, thereby effectively avoiding The problem of authentication error when IAB-DU establishes the user plane secure transmission channel.
- the first key is different from K gNB , it meets the requirements of key isolation and authority minimization, and avoids key leakage.
- the donor-CU-UP and IAB-DU use the intermediate key as the input key for deriving the first key, they can keep deriving the user plane key, signaling plane key, and The input keys are independent of each other, which ensures the security of data transmission.
- the donor-CU-UP and the IAB-DU use the user plane key as the input key for deriving the first key, there is no need to add additional signaling transmission, which simplifies the management and implementation of the first key.
- the donor-CU-UP and IAB-DU use the fourth key deduced according to the user plane key as the input key for deriving the first key, there is no need to add additional signaling transmission, which simplifies the first Key management and implementation.
- the method for establishing a secure transmission channel provided by the embodiment of the present application is described below by taking Fig. 8 to Fig. 11 as an example. It should be noted that, in the following embodiments, the first key is denoted as K IAB-CP , and the intermediate key is denoted as for Km.
- FIG. 8 shows a schematic flowchart of a method for establishing a secure transmission channel provided by an embodiment of the present application. As shown in FIG. 8 , the method 800 includes S801 to S821 , and each step will be described in detail below.
- the registration process of IAB-MT includes the following steps:
- Step 1 The IAB-MT sends an RRC setup request (RRC setup request) message to the donor-DU.
- RRC setup request RRC setup request
- Step 2 The donor-DU sends an initial uplink (uplink, UL) RRC message transfer (initial UL RRC message transfer) to the donor-CU-CP.
- Step 3 The donor-CU-CP sends a downlink (DL) message transfer (DL message transfer) to the donor-DU.
- DL downlink
- Step 4 the donor-DU sends an RRC setup (RRC setup) message to the IAB-MT.
- RRC setup RRC setup
- the IAB node (the IAB-MT part) has some or all functions of the UE. After the IAB node is turned on, the IAB-MT selects the donor access that supports the IAB service, and establishes air interface resources.
- Step 5 The IAB-MT sends an RRC setup complete (RRC setup complete) message to the donor-DU.
- RRC setup complete RRC setup complete
- the RRC establishment complete message carries the IAB-indication, and the IAB-indication indicates that the current UE is an IAB node.
- Step 6 The donor-DU sends (RRC message transfer) to the donor-CU-CP.
- the "IAB-indication" information element is carried in the RRC message transmission.
- the Donor-CU-CP selects the AMF network element supporting the IAB service according to the "IAB-indication" information element.
- Step 7 The donor-CU-CP sends an initial UE message (initial UE message) to the AMF.
- the "IAB-indication" information element is carried in the initial UE message.
- Step 8 The AMF sends an initial context establishment request message to the donor-CU-CP.
- the initial context establishment request message carries the "IAB-authorized" indication, and also carries the first root key of the host node (denoted as ). After the Donor-CU-CP receives the initial context establishment request message, it sends the information carried in the initial context establishment request message Save to the context of the IAB node.
- an authentication process is performed between the core network and the IAB-MT.
- the core network checks the subscription data to determine whether the IAB-MT belongs to the IAB node. If the IAB-MT belongs to the IAB node, an "IAB-authorized" indication is sent to the donor-CU-CP, which indicates that the core network has authorized the IAB-MT to be the IAB node.
- the IAB-MT generates
- Step 9 The donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the bearer context establishment request message carries the user plane key #1.
- the Donor-CU-CP After the Donor-CU-CP receives the initial context establishment request message from the AMF, it selects the user plane algorithm, and according to Deduce the user plane key #1, and the user plane key #1 is used to establish the bearer context.
- User plane key #1 includes a user plane integrity protection key (denoted as Kupenc) and/or a user plane encryption protection key (denoted as Kupint).
- user plane key #1 is created by The derived key is irreversible. Therefore, the donor-CU-UP receives the user plane key #1, and cannot obtain it according to the user plane key #1. That is, there is no
- Step 10 the Donor-CU-UP sends a bearer context setup response (bearer context setup response) message to the donor-CU-CP.
- Step 11 the donor-CU-CP sends a UE context setup request (UE context setup request) message to the donor-DU.
- UE context setup request UE context setup request
- Step 12 the donor-DU sends a security mode command (security mode command) to the IAB-MT.
- Step 13 the donor-DU sends a UE context setup response (UE context setup response) message to the donor-CU-CP.
- UE context setup response UE context setup response
- Step 14 the donor-CU-CP sends a bearer context modification request (bearer context modification request) message to the donor-CU-UP.
- Step 15 the donor-CU-UP sends a bearer context modification response (bearer context modification response) message to the donor-CU-CP.
- bearer context modification response bearer context modification response
- Step 16 IAB-MT sends security mode complete to donor-DU.
- Step 17 the donor-DU sends an uplink RRC message transfer (UL RRC message transfer) to the donor-CU-CP.
- UL RRC message transfer UL RRC message transfer
- the donor-CU-CP and the IAB-MT perform a security mode command process, and negotiate the security algorithm and security key used.
- Step 18 the donor-CU-CP sends a downlink RRC message transmission to the donor-DU.
- Step 19 the donor-DU sends an RRC reconfiguration message to the IAB-MT.
- Step 20 the IAB-MT sends an RRC reconfiguration complete (RRC reconfiguration complete) message to the donor-DU.
- RRC reconfiguration complete RRC reconfiguration complete
- Step 21 the donor-DU sends an uplink RRC message transmission to the donor-CU-CP.
- the donor-CU-CP and the IAB-MT carry out the RRC reconfiguration process and complete the initial context establishment process.
- Step 22 the donor-CU-CP sends an initial context setup response (initial context setup response) message to the AMF.
- the IAB-DU starts, and establishes an F1-C interface security with the donor-CU-CP.
- the IAB-MT obtains the IP address of the IAB-DU and the IP address of the donor-CU-CP.
- the IAB-MT after the IAB-MT establishes a PDU session with the OAM through the core network, it obtains the IP address of the IAB-DU and the IP address of the donor-CU-CP from the OAM through the user plane.
- the IAB-MT acquires the IP address of the IAB-DU and the IP address of the donor-CU-CP from the donor-CU-CP. Specifically, after the donor-CU-CP establishes an IP connection with the OAM, it obtains the IP address of the IAB-DU and the IP address of the donor-CU-CP from the OAM; further, the donor-CU-CP sends an RRC message to the IAB-MT, The RRC message includes the IP address of the IAB-DU and the IP address of the donor-CU-CP.
- the IAB-MT After obtaining the IP address of the IAB-DU and the IP address of the donor-CU-CP, the IAB-MT sends the IP address of the IAB-DU and the IP address of the donor-CU-CP to the IAB-DU for use.
- the IAB-MT also starts with For the input key, the IP address of the IAB-DU and the IP address of the donor-CU-CP are used as input parameters to derive K IAB-CP and send K IAB-CP to the IAB-DU.
- the IAB-MT will Sent to IAB-DU.
- the IAB-DU starts with For the input key, the IP address of the IAB-DU and the IP address of the donor-CU-CP are used as input parameters, and K IAB-CP is deduced.
- donor-CU-CP also starts with For the input key, the IP address of the IAB-DU and the IP address of the donor-CU-CP are used as input parameters, and K IAB-CP is deduced.
- the IAB-DU establishes an F1-C interface with the donor-CU-CP, and negotiates to establish a secure transmission channel of the F1-C.
- the authentication credential used in the process of negotiating between the IAB-DU and the donor-CU-CP to establish a secure transmission channel on the F1-C interface is K IAB-CP .
- the donor-CU-CP can configure parameters to the IAB-DU through the F1-C interface.
- the IAB-DU can provide mobile network services to ordinary UEs.
- the donor-CU-CP After the Donor-CU-CP establishes the secure transmission channel of the F1-C interface with the IAB-DU, the donor-CU-CP marks the IAB-DU as an IAB node with the first identifier, and stores the first identifier as the context of the IAB node.
- the first identifier is the IP address of the IAB-DU.
- the UE accesses the network through the IAB-DU and performs authentication.
- S803 includes the following steps:
- Step 1 The UE sends an RRC establishment request message to the IAB-DU.
- Step 2 The IAB-DU sends an initial uplink RRC message transmission to the donor-CU-CP.
- Step 3 The IAB-CU-CP sends downlink message transmission to the donor-DU.
- Step 4 The IAB-DU sends an RRC setup message to the UE.
- steps 1-4 after the UE is powered on, it selects a base station to access, and establishes air interface resources.
- the base station selected by the UE is the IAB-DU.
- Step 5 The UE sends an RRC establishment complete message to the IAB-DU.
- Step 6 The IAB-DU sends an RRC message to the donor-CU-CP for transmission.
- Step 7 The donor-CU-CP sends an initial UE message to the AMF.
- Step 8 The AMF sends an initial context establishment request message to the donor-CU-CP.
- the UE initiates the registration process, establishes a connection with the core network through the IAB-DU, and completes the authentication process.
- the AMF sends an initial context establishment request message to the donor-CU-CP, and the initial context establishment request message carries the second root key of the host node (denoted as ).
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the Donor-CU-CP After the Donor-CU-CP receives the initial context establishment request message from the AMF, it triggers the donor-CU-CP to establish the bearer context.
- the Donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP, the bearer context establishment request message carries the user plane key #2, and the user plane key #2 is used for the communication between the donor-CU-UP and the UE Air interface user plane security protection.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- the first IP address of the donor-CU-UP is carried in the bearer context establishment response message, and the first IP address is used to establish a secure transmission channel of the F1-U interface between the IAB-DU and the donor-CU-UP for transferring user plane data.
- the donor-CU-CP sends a UE context establishment request message to the IAB-DU.
- the UE context establishment request message includes the first IP address of the donor-CU-UP.
- the IAB-DU sends a security mode command to the UE.
- the IAB-DU sends a UE context establishment response to the donor-CU-CP.
- the IAB-DU acquires K IAB_UP .
- S809 includes S8091a to S8093a:
- the IAB-DU sends a first request message to the IAB-MT.
- the first request message includes the first IP address of the donor-CU-UP, and the first request message is used to request K IAB_UP .
- the IAB-MT deduces K IAB_UP .
- the To input the key take the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, derive K IAB-UP , and then send K IAB-UP to the IAB-DU. It can be understood that the IP address of the IAB-DU is obtained from the OAM or the donor-CU-CP after the IAB-MT completes the registration.
- the IAB-MT sends a first response message to the IAB-DU.
- the first response message includes K IAB_UP .
- the IAB-DU saves K IAB_UP .
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- S809 includes S8091b to S8093b:
- the IAB-DU sends a second request message to the IAB-MT.
- the second request message is used to request
- the IAB-MT sends a second response message to the IAB-DU.
- the second response message includes
- S8091b and S8092b are optional steps. That is, if the IAB-DU locally saves Then S809 only includes S8093b. IAB-DU locally saved is obtained from the IAB-MT before executing S809. For example, after the IAB-DU is started, when the IAB-MT sends the IP address of the IAB-DU to the IAB-DU, a
- the IAB-DU deduces K IAB_UP .
- IAB-DU ends with For the input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP are used as input parameters to derive K IAB-UP . It can be understood that the IP address of the IAB-DU is obtained from the IAB-MT after the IAB-DU is started.
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-DU when the IAB-DU obtains the first IP address of the donor-CU-UP, it obtains K IAB_UP . For example, if S809 includes S8091a to S8093a, the IAB-DU sends the first request message to the IAB-MT when the first IP address of the donor-CU-UP is acquired. For another example, if S809 includes S8091b to S8093b, the IAB-DU sends a second request message to the IAB-MT after obtaining the first IP address of the donor-CU-UP, or derives K IAB_UP .
- the IAB-DU before the IAB-DU initiates the IPSec setup procedure to the donor-CU-UP, acquires K IAB_UP .
- the IAB-DU sends the first request message to the IAB-MT before initiating the IPSec establishment process to the donor-CU-UP.
- the IAB-DU sends the second request message to the IAB-MT before initiating the IPSec establishment procedure to the donor-CU-UP, or derives K IAB_UP .
- the IAB-DU after receiving the IPSec authentication request from the donor-CU-UP, acquires K IAB_UP . For example, if S809 includes S8091a to S8093a, the IAB-DU sends the first request message to the IAB-MT after receiving the IPSec authentication request from the donor-CU-UP. For another example, if S809 includes S8091b to S8093b, after receiving the IPSec authentication request from the donor-CU-UP, the IAB-DU sends a second request message to the IAB-MT, or derives K IAB_UP .
- the IAB-DU After the IAB-DU receives the user plane data request from the UE, it acquires K IAB_UP . For example, if S809 includes S8091a to S8093a, the IAB-DU sends the first request message to the IAB-MT after receiving the user plane data request from the UE. For another example, if S809 includes S8091b to S8093b, after receiving the user plane data request from the UE, the IAB-DU sends a second request message to the IAB-MT, or derives K IAB_UP .
- the donor-CU-CP deduces K IAB_UP .
- IAB-DU ends with For the input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP are used as input parameters to derive K IAB-UP .
- the donor-CU-CP after the donor-CU-CP receives the bearer context establishment response message from the donor-CU-UP, it deduces K IAB-UP according to the first IP address of the donor-CU-UP included in the bearer context establishment response message. That is, S810 may be executed after S805. Specifically, S810 may be performed after S805 and before S811.
- the donor-CU-UP deduces K IAB_UP after determining that the IAB-DU belongs to the IAB node.
- the donor-CU-CP may use the first identifier to mark that the IAB-DU belongs to the IAB node, and store the first identifier in the context of the IAB-DU. Based on this, before the donor-CU-CP deduces K IAB_UP , the donor-CU-CP may query whether the context of the IAB node includes the first identifier.
- the donor-CU-CP determines that the IAB-DU belongs to the IAB node; if the context of the IAB node does not include the first identifier, the donor-CU-CP determines that the IAB-DU does not belong to the IAB node. Further, the donor-CU-CP deduces K IAB_UP after determining that the IAB-DU belongs to the IAB node.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP.
- the bearer context modification request message includes the IP address of the IAB-DU and K IAB_UP .
- K IAB_UP may be carried in a security information (security information) information element included in the bearer context modification request message.
- K IAB_UP may be carried in a newly defined information element in the bearer context modification request message.
- the bearer context modification request message further includes first indication information, where the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the first indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the first indication information may be the IP address of the IAB-DU or K IAB_UP , that is, the IP address of the IAB-DU or K IAB_UP may also be used to indicate that the IAB-DU belongs to the IAB node.
- the embodiment of the present application is only illustrated by taking the donor-CU-CP sending the K IAB_UP in the bearer context modification request message to the donor-CU-UP as an example, which should not impose any limitation on the embodiment of the present application.
- the donor-CU-CP may also carry K IAB_UP in a newly defined message and send it to the donor-CU-UP.
- the donor-CU-UP can K IAB_UP is deduced before the context establishment request message, and K IAB_UP is carried in the bearer context establishment request message and sent to the donor-CU-UP.
- the donor-CU-UP saves K IAB_UP .
- the donor-CU-UP saves the corresponding relationship between the IP address of the IAB-DU and the K IAB_UP in the context of the donor-CU-UP.
- the donor-CU-UP saves K IAB_UP when receiving K IAB_UP .
- the donor-CU-UP saves K IAB_UP when receiving the first indication information and K IAB_UP .
- the donor-CU-UP sends a bearer context modification response message to the donor-CU-CP.
- the UE sends the security mode completion to the IAB-DU.
- the IAB-DU sends an uplink RRC message to the donor-CU-CP for transmission.
- the donor-CU-CP sends a downlink RRC message transmission to the IAB-DU.
- the IAB-DU sends an RRC reconfiguration message to the UE.
- the UE sends an RRC reconfiguration complete message to the IAB-DU.
- the IAB-DU sends an uplink RRC message transmission to the donor-CU-CP.
- the donor-CU-CP sends an initial context establishment response message to the AMF.
- the bearer of the F1-U interface is established between the IAB-DU and the donor-CU-UP, and a secure transmission channel of the F1-U interface is negotiated and established.
- IAB-DU and donor-CU-UP use the IKEv2 PSK protocol to establish an IPSec secure transmission channel.
- IAB-DU and Donor-CU-UP complete the IKE SA parameter negotiation in plain text, including negotiating encryption and authentication algorithms, exchanging temporary random numbers and DH exchange.
- IAB-DU and Donor-CU-UP respectively use K IAB_UP to generate authentication parameters and send them to the peer end to complete identity verification.
- the IAB-DU is based on the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP stored in the context of the IAB-DU relationship , determine K IAB_UP as the authentication credential used when establishing an IPSec secure transmission channel, and donor-CU-UP determines the K IAB_UP serves as the authentication credential used when establishing an IPSec secure transmission channel.
- the process of executing IKEv2 PSK between IAB-DU and donor-CU-UP can be triggered by IAB-DU or donor-CU-UP.
- IAB-DU the F1-U interface bearer between the IAB-DU and the donor-CU-UP has not been established when the IAB-DU receives the user plane data request from the UE
- the IAB-DU triggers the IKEv2PSK process.
- the bearer of the F1-U interface between the IAB-DU and the donor-CU-UP has not been established when the donor-CU-UP receives the downlink data from the UE
- the donor-CU-UP triggers the IKEv2 PSK process.
- S821 is performed before the UE completes the registration or after the UE completes the registration.
- S821 may be performed after S812, that is, after the IAB-DU and donor-CU-UP obtain K IAB_UP , S821 may be performed.
- S821 may be performed after S820. For example, after the UE completes the registration, when there is user plane data of the UE to be transmitted, S821 is executed again.
- FIG. 9 shows a schematic flowchart of a method for establishing a secure transmission channel provided by an embodiment of the present application. As shown in FIG. 9 , the method 900 includes S901 to S925 , and each step will be described in detail below.
- the IAB-MT registers with the core network.
- step 1 to step 7 included in step S801 in the method 800 above are executed.
- the AMF sends an initial context establishment request message to the donor-CU-CP.
- the initial context establishment request message carries the "IAB-authorized" indication, and also carries the first root key of the host node (denoted as ).
- the Donor-CU-CP After the Donor-CU-CP receives the initial context establishment request message, it sends the information carried in the initial context establishment request message Save to the context of the IAB node.
- the Donor-CU-CP can also determine that the IAB-MT belongs to the IAB node according to "IAB-authorized".
- the core network judges whether the IAB-MT belongs to the IAB node by checking the signing data. If the IAB-MT belongs to the IAB node, an "IAB-authorized" indication is sent to the donor-CU-CP, which indicates that the core network has authorized the IAB-MT to be the IAB node. Correspondingly, after the authentication between the core network and the IAB-MT is completed, the IAB-MT generates
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the bearer context establishment request message carries the user plane key #1.
- the Donor-CU-CP After the Donor-CU-CP receives the initial context establishment request message from the AMF, it selects the user plane algorithm, and according to Deduce the user plane key #1, and the user plane key #1 is used to establish the bearer context.
- User plane key #1 includes a user plane integrity protection key (denoted as Kupenc) and/or a user plane encryption protection key (denoted as Kupint).
- user plane key #1 is created by The derived key is irreversible. Therefore, the donor-CU-UP receives the user plane key #1, and cannot obtain it according to the user plane key #1. That is, there is no
- the bearer context establishment request message also includes first indication information, where the first indication information is used to indicate that the IAB-MT belongs to the IAB node.
- the indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node
- the first indication information is carried in the bearer context establishment request message.
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node.
- the RRC message transmission received by the donor-CU-CP from the donor-DU includes "IAB-indication”
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- the Bearer Context Establishment Response message includes all possible IP addresses of the donor-CU-UP. Specifically, the donor-CU-UP reports all possible IP addresses to the donor-CU-CP according to the first indication information included in the bearer context establishment request message.
- the donor-CU-UP has three IP addresses, namely CU-UP IP1, CU-UP IP2 and CU-UP IP3, and the donor-CU-UP reports the three IP addresses to the donor-CU-CP.
- the donor-CU-CP sends a UE context establishment request message to the donor-DU.
- the donor-DU sends a security mode command to the IAB-MT.
- the donor-DU sends a UE context establishment response message to the donor-CU-CP.
- the donor-CU-CP deduces a possible K IAB_UP .
- the donor-CU-UP reports all possible IP addresses to the donor-CU-CP according to the indication information.
- the donor-CU-CP deduces K IAB_UP corresponding to each IP address of the donor-CU-UP according to the received first IP address of the donor-CU-UP.
- the donor-CU-CP starts with For the input key, the IP address of IAB-DU and CU-UP IP1 are used as input parameters, and the K IAB-UP1 corresponding to CU-UP IP1 is deduced; the donor-CU-CP uses For the input key, the IP address of IAB-DU and CU-UP IP2 are used as input parameters, and the K IAB-UP2 corresponding to CU-UP IP2 is deduced; the donor-CU-CP uses To input the key, take the IP address of IAB-DU and CU-UP IP3 as input parameters, and deduce K IAB-UP3 corresponding to CU-UP IP3.
- S908 may be performed after S904, or may be performed after S905, or may be performed after S906, or may be performed after S907.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP.
- the bearer context modification request message includes multiple K IAB-UPs deduced by the donor-CU-CP, multiple sets of first parameters corresponding to multiple K IAB-UPs , and a set of first parameters corresponding to each K IAB-UP Including the input parameters used for deriving the K IAB-UP .
- the bearer context modification request message includes: ⁇ K IAB-UP1 , CU-UP1 and IAB-DU IP ⁇ , ⁇ K IAB-UP2 , CU-UP2 and IAB-DU IP ⁇ and ⁇ K IAB-UP3 , CU -UP3 and IAB-DU IP ⁇ .
- ⁇ K IAB-UP1 , CU-UP1 and IAB-DU IP ⁇ indicates the IP address of IAB-DU and the corresponding relationship between CU-UP IP1 and K IAB-UP1 ;
- ⁇ K IAB-UP2 , CU-UP2 and IAB-DU IP ⁇ indicates the IP address of IAB-DU and the corresponding relationship between CU-UP IP2 and K IAB-UP2 ;
- ⁇ K IAB-UP3 , CU-UP3 and IAB-DU IP ⁇ indicates the IP address of IAB-DU and the relationship between CU-UP IP3 and The K IAB-UP3 correspondence.
- the donor-CU-UP stores K IAB-UP .
- the donor-CU-UP saves the correspondence between multiple K IAB-UPs included in the bearer context modification request message and multiple sets of first parameters in the context of the donor-CU-UP.
- the donor-CU-UP sends a bearer context modification response message to the donor-CU-CP.
- step 16 to step 22 included in step S801 in the above method 800 are executed.
- the IAB-DU starts, and establishes an F1-C interface security with the donor-CU-CP.
- S913 is the same as S802 in the above method 800, and for the sake of brevity, details are not described here again.
- the UE accesses the network through the IAB-DU and performs authentication.
- S914 is the same as S803 in the above method 800, and for the sake of brevity, details are not described here again.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- S915 is the same as S804 in the above method 800, and for the sake of brevity, details are not described here again.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- the first IP address of the donor-CU-UP is carried in the bearer context establishment response message, and the first IP address is used to establish a secure transmission channel of the F1-U interface between the IAB-DU and the donor-CU-UP for transferring user plane data.
- the first IP address of the donor-CU-UP is CU-UP IP3 in S904 above.
- the donor-CU-CP sends a UE context establishment request message to the IAB-DU.
- the UE context establishment request message includes the first IP address of the donor-CU-UP.
- the first IP address of the donor-CU-UP is CU-UP IP3 in S904 above.
- the IAB-DU sends a security mode command to the UE.
- the IAB-DU sends a UE context establishment response to the donor-CU-CP.
- the IAB-DU acquires K IAB_UP .
- the way for the IAB-DU to acquire the K IAB_UP is described in S809 of the method 800 above.
- the first IP address of the donor-CU-UP received by the IAB-DU is CU-UP IP3
- the K IAB_UP obtained by the IAB-DU is To input the key, the IP address of the IAB-DU and the IP3 of the CU-UP are deduced as input parameters, that is, the K IAB_UP obtained by the IAB-DU is the K IAB_UP3 described in S908 above.
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP.
- the Bearer Context Modification Request message includes the IP address of the IAB-DU.
- the donor-CU-UP sends a bearer context modification response message to the donor-CU-CP.
- the donor-CU-UP searches for K IAB_UP .
- the donor-CU-UP determines in S916 the first IP address of the donor-CU-UP secure transmission channel used to establish the F1-U interface between the IAB-DU and the donor-CU-UP, and For the IP address of the IAB-DU received at S921, the corresponding K IAB_UP is searched from the locally saved context of the donor-CU-UP.
- the first IP address used to establish the secure transmission channel of the F1-U interface determined by the donor-CU-UP in S916 is CU-UP IP3, and then the donor-CU-UP is based on the saved multiple K IAB_UP and multiple groups
- the corresponding relationship of the first parameter determines that K IAB_UP3 corresponds to the address of the IAB-DU and the CU-UP IP3.
- the Donor-CU-UP After the Donor-CU-UP determines the K IAB_UP3 , it stores the corresponding relationship between the IP address of the IAB-DU and the K IAB_UP3 in the context of the donor-CU-UP.
- S925 is the same as S821 in the above method 800, and for the sake of brevity, details are not described here again.
- Fig. 10 shows a schematic flowchart illustrating a method for establishing a secure transmission channel provided by an embodiment of the present application. As shown in Fig. 10, the method 1000 includes S1001 to S1023, each step will be described in detail below.
- the IAB-MT registers with the core network.
- step 1 to step 7 included in step S801 in method 800 above are executed.
- the AMF sends an initial context establishment request message to the donor-CU-CP.
- S1002 is the same as S902 in the above method 900, and for the sake of brevity, details are not described here again.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the bearer context establishment request message carries the user plane key #1 and the intermediate key (denoted as Km).
- the Donor-CU-CP After the Donor-CU-CP receives the initial context establishment request message from the AMF, it selects the user plane algorithm, and according to Deduce the user plane key #1, and the user plane key #1 is used to establish the bearer context.
- User plane key #1 includes a user plane integrity protection key (denoted as Kupenc) and/or a user plane encryption protection key (denoted as Kupint).
- user plane key #1 is created by The derived key is irreversible. Therefore, the donor-CU-UP receives the user plane key #1, and cannot obtain it according to the user plane key #1. That is, there is no
- Km is used as an input key for generating K IAB_UP to generate K IAB_UP .
- Km is based on and derived from the second parameter.
- the second parameter includes one or more of the following: PCI, ARFCN-DL, secondary node counter, constant, and freshness parameter.
- Km is a random number generated by the donor-CU-UP.
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node, it generates Km, or sends Km to the donor-CU-UP.
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node.
- the RRC message transmission received by the donor-CU-CP from the donor-DU includes an IAB-indication, the donor-CU-CP determines that the IAB-MT belongs to the IAB node.
- the bearer context establishment request message further includes first indication information, where the first indication information is used to indicate that the IAB-MT belongs to the IAB node.
- the first indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the first indication information is Km, that is, Km is also used to indicate that the IAB-MT belongs to the IAB node.
- the donor-CU-CP determines that the IAB-MT belongs to the IAB node
- the first indication information is carried in the bearer context establishment request message.
- the donor-CU-UP stores Km in the donor-CU-UP context.
- the donor-CU-UP also stores the first indication information.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- step 11 to step 17 included in step S801 in the above method 800 are executed.
- the donor-CU-CP sends a downlink RRC message transmission to the donor-DU.
- RRC messaging includes RRC reconfiguration messages.
- the Km generated by the donor-CU-CP is a random number, then the RRC reconfiguration message includes Km.
- the RRC reconfiguration message includes Km or the second parameter used to generate Km is unknown to IAB-MT parameters.
- the second parameter used by the donor-CU-CP to generate Km includes a random number and PCI, wherein the random number is a parameter unknown to the IAB-MT, and the PCI is a parameter known to the IAB-MT, then the donor-CU-CP will Km or the random number included in the second parameter is carried in the RRC reconfiguration message.
- the donor-DU sends an RRC reconfiguration message to the IAB-MT.
- the Donor-DU sends the RRC reconfiguration message included in the downlink RRC message transmission to the IAB-MT.
- the IAB-MT stores Km or a parameter unknown to the IAB-MT among the second parameters used to generate the Km.
- the IAB-MT stores Km or a parameter unknown to the IAB-MT in the second parameter used to generate Km parameter.
- step 20 to step 22 included in step S801 in method 800 above are executed.
- the IAB-DU starts, and establishes an F1-C interface security with the donor-CU-CP.
- S913 is the same as S802 in the above method 800, and for the sake of brevity, details are not described here again.
- the UE accesses the network through the IAB-DU, and performs authentication.
- S1012 is the same as S803 in the above method 800, and for the sake of brevity, details are not described here again.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- S1013 is the same as S804 in the above method 800, and for the sake of brevity, details are not described here again.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- the first IP address of the donor-CU-UP is carried in the bearer context establishment response message, and the first IP address is used to establish a secure transmission channel of the F1-U interface between the IAB-DU and the donor-CU-UP for transferring user plane data.
- the donor-CU-CP sends a UE context establishment request message to the IAB-DU.
- the UE context establishment request message includes the first IP address of the donor-CU-UP.
- the IAB-DU sends a security mode command to the UE.
- the IAB-DU sends a UE context establishment response message to the donor-CU-CP.
- the IAB-DU acquires K IAB_UP .
- S1018 includes S10181a to S10183a:
- the IAB-DU sends a first request message to the IAB-MT.
- the first request message includes the first IP address of the donor-CU-UP, and the first request message is used to request K IAB_UP .
- the IAB-MT deduces K IAB_UP .
- IAB-MT After IAB-MT receives the first request message from IAB-DU, it takes Km as the input key, the IP address of IAB-DU and the first IP address of donor-CU-UP as input parameters, and derives K IAB- UP , and then send K IAB-UP to IAB-DU. It can be understood that the IP address of the IAB-DU is obtained from the OAM or the donor-CU-CP after the IAB-MT completes the registration.
- the IAB-MT sends a first response message to the IAB-DU.
- the first response message includes K IAB_UP .
- the IAB-DU saves K IAB_UP .
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- S1018 includes S10181b to S10183b:
- the IAB-DU sends a third request message to the IAB-MT.
- the third request message is used to request Km, or to request and the second parameter.
- the IAB-MT sends a third response message to the IAB-DU.
- the third response message includes Km, or includes and the second parameter.
- IAB-DU deduces K IAB_UP .
- the IAB-DU deduces K IAB-UP by using Km as an input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters. It can be understood that the IP address of the IAB-DU is obtained from the IAB-MT after the IAB-DU is started.
- the IAB-DU is first based on Deduce Km with the second parameter, and then use Km as the input key, the IP address of IAB-DU and the first IP address of donor-CU-UP as input parameters, and deduce K IAB-UP .
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-DU when the IAB-DU obtains the first IP address of the donor-CU-UP, it obtains K IAB_UP .
- the IAB-DU After receiving the IPSec authentication request from the donor-CU-UP, the IAB-DU acquires K IAB_UP .
- the IAB-DU After the IAB-DU receives the user plane data request from the UE, it acquires K IAB_UP .
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP.
- the Bearer Context Modification Request message includes the IP address of the IAB-DU.
- the donor-CU-UP sends a bearer context modification response message to the donor-CU-CP.
- the donor-CU-UP deduces K IAB_UP .
- Donor-CU-UP takes Km as the input key, the IP address of IAB-DU and the first IP address of donor-CU-UP as input parameters, and derives K IAB-UP .
- Km is obtained from the context of the locally saved donor-CU-UP.
- the first IP address of the Donor-CU-UP is determined at S1014.
- the Donor-CU-UP After the Donor-CU-UP derives the K IAB_UP , it saves the corresponding relationship between the IP address of the IAB-DU and the K IAB_UP in the context of the donor-CU-UP.
- the UE completes the registration procedure.
- S1023 is the same as S821 in the above method 800, and for the sake of brevity, details are not described here again.
- Fig. 11 shows a schematic flowchart illustrating a method for establishing a secure transmission channel provided by an embodiment of the present application. As shown in FIG. 11 , the method 1100 includes S1101 to S1114 , and each step will be described in detail below.
- S1101 is the same as S801 in the method 800, and will not be described in detail here for the sake of brevity.
- the initial context establishment request message sent by the AMF to the donor-CU-CP includes the first root key of the donor node (denoted as ), further, Donor-CU-CP according to Deduce the user plane key #1, and send the user plane key #1 to the donor-CU-UP.
- User plane key #1 is used to establish bearer context.
- User plane key #1 includes a user plane integrity protection key (denoted as Kupenc) and/or a user plane encryption protection key (denoted as Kupint).
- the IAB-MT completes the authentication with the core network, the IAB-MT generates and IAB-MT can be based on Deduce the user plane key #1.
- the IAB-DU starts, and establishes an F1-C interface security with the donor-CU-CP.
- S1102 is the same as S802 in the method 800, and will not be described in detail here for the sake of brevity.
- the donor-CU-CP marks the IAB-DU as an IAB node with the first identifier, and stores the first identifier as The context of the IAB node.
- the first identifier is the IP address of the IAB-DU.
- the UE accesses the network through the IAB-DU and performs authentication.
- S1103 is the same as S803 in the method 800, and for the sake of brevity, details are not described here again.
- the donor-CU-CP sends a bearer context establishment request message to the donor-CU-UP.
- the donor-CU-UP sends a bearer context establishment response message to the donor-CU-CP.
- the bearer context establishment response message carries the first IP address of the donor-CU-UP, which is used to establish a secure transmission channel on the F1-U interface between the IAB-DU and the donor-CU-UP, and is used to transfer the user plane data.
- the donor-CU-CP sends a UE context establishment request message to the IAB-DU.
- the UE context establishment request message includes the first IP address of the donor-CU-UP.
- the IAB-DU sends a security mode command to the UE.
- the IAB-DU sends a UE context establishment response to the donor-CU-CP.
- the IAB-DU acquires K IAB_UP .
- S1109 includes S11091a to S11093a:
- the IAB-DU sends a first request message to the IAB-MT.
- the first request message includes the first IP address of the donor-CU-UP, and the first request message is used to request K IAB_UP .
- the IAB-MT deduces K IAB_UP .
- the IAB-MT After receiving the first request message from the IAB-DU, the IAB-MT takes the user plane key #1 as the input key, takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, K IAB-UP is obtained through deduction, and then K IAB-UP is sent to the IAB-DU. It can be understood that the IP address of the IAB-DU is obtained from the OAM or the donor-CU-CP after the IAB-MT completes the registration.
- the IAB-MT uses the key deduced from the user plane key #1 as the input key, takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives K IAB-UP .
- the IAB-MT sends a first response message to the IAB-DU.
- the first response message includes K IAB_UP .
- the IAB-DU saves K IAB_UP .
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- S1109 includes S11091b to S11093b:
- the IAB-DU sends a third request message to the IAB-MT.
- the third request message is used to request user plane key #1.
- the IAB-MT sends a third response message to the IAB-DU.
- the third response message includes user plane key #1.
- S11091b and S11092b are optional steps. That is, if the IAB-DU locally saves Then S1109 only includes S11093b, that is, the IAB-DU can Deduce the user plane key #1. IAB-DU locally saved It is obtained from the IAB-MT before executing S1109. For example, after the IAB-DU is started, when the IAB-MT sends the IP address of the IAB-DU to the IAB-DU, it sends the IAB-DU the
- IAB-DU deduces K IAB_UP .
- the IAB-DU uses the user plane key #1 as the input key, and takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive K IAB-UP . It can be understood that the IP address of the IAB-DU is obtained from the IAB-MT after the IAB-DU is started.
- the IAB-DU uses the key deduced from the user plane key #1 as the input key, takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters, and derives K IAB-UP .
- the IAB-DU saves the correspondence between the K IAB_UP and the first IP address of the donor-CU-UP in the context of the IAB-DU.
- the IAB-DU when the IAB-DU obtains the first IP address of the donor-CU-UP, it obtains K IAB_UP .
- the IAB-DU After receiving the IPSec authentication request from the donor-CU-UP, the IAB-DU acquires K IAB_UP .
- the IAB-DU After the IAB-DU receives the user plane data request from the UE, it acquires K IAB_UP .
- the donor-CU-CP sends a bearer context modification request message to the donor-CU-UP.
- the Bearer Context Modification Request message includes the IP address of the IAB-DU.
- the bearer context modification request message further includes first indication information, where the first indication information is used to indicate that the IAB-DU belongs to the IAB node.
- the first indication information may be an independent information element, for example, the first indication information is an "IAB-indicator" information element.
- the first indication information may be the IP address of the IAB-DU, that is, the IP address of the IAB-DU may also be used to indicate that the IAB-DU belongs to the IAB node.
- the donor-CU-CP determines that the IAB-DU belongs to the IAB node, it carries the first indication information in the bearer context modification request message. As described in S1102 above, the donor-CU-CP may use the first identifier to mark that the IAB-DU belongs to the IAB node, and store the first identifier in the context of the IAB-DU. Based on this, the donor-CU-CP can query whether the context of the IAB node includes the first identifier.
- the donor-CU-CP determines that the IAB-DU belongs to the IAB node; if the context of the IAB node does not include the first identifier, the donor-CU-CP determines that the IAB-DU does not belong to the IAB node.
- the donor-CU-UP deduces K IAB_UP .
- Donor-CU-UP takes the user plane key as the input key, the IP address of the IAB-DU and the first IP address of the donor-CU-UP as the input parameters, and derives K IAB-UP .
- the donor-CU-UP uses the key deduced from the user plane key as the input key, and takes the IP address of the IAB-DU and the first IP address of the donor-CU-UP as input parameters to derive K IAB-UP .
- the donor-CU-UP after the donor-CU-UP receives the bearer context establishment request message from the donor-CU-CP, it deduces K IAB-UP according to the first IP address of the donor-CU-UP included in the bearer context establishment response message.
- the donor-CU-UP deduces K IAB-UP according to the first IP address of the donor-CU-UP included in the bearer context establishment response message. That is to say, the donor-CU-UP deduces K IAB-UP after determining that the IAB-DU belongs to the IAB node according to the first indication information.
- the Donor-CU-UP After the Donor-CU-UP derives the K IAB_UP , it saves the corresponding relationship between the IP address of the IAB-DU and the K IAB_UP in the context of the donor-CU-UP.
- the donor-CU-UP sends a bearer context modification response message to the donor-CU-CP.
- S1114 is the same as S821 in the above method 800, and for the sake of brevity, details are not described here again.
- the embodiment of the present application can divide the functional modules of the transmitting end device or the receiving end device according to the above method example, for example, each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module middle.
- the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation. The following is an example of dividing each functional module into each corresponding function.
- Fig. 12 is a schematic block diagram of a communication device 1200 provided by an embodiment of the present application.
- the communication device 1200 may include: a transceiver unit 1210 and a processing unit 1220 .
- the communication device 1200 may be the donor-CU-UP in the method embodiment above, or may be a chip for realizing the function of the donor-CU-UP in the method embodiment above.
- the communication device 1200 may correspond to the session management network element in the method 500 to the method 1100 according to the embodiment of the present application, and the communication device 1200 may include a method for executing the method 500 in FIG. 5 and the method 600 in FIG. 6 , method 700 in FIG. 7, method 800 in FIG. 8, method 900 in FIG. 9, method 1000 in FIG. 10, and method 1100 in FIG. Moreover, each unit in the communication device 1200 and the above-mentioned other operations and/or functions are respectively intended to implement the method 500 in FIG. 5 , the method 600 in FIG. 6 , the method 700 in FIG. 7 , the method 800 in FIG. The corresponding processes of method 900 in FIG. 9 , method 1000 in FIG. 10 and method 1100 in FIG. 11 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
- the communication device 1200 may be the donor-CU-CP in the above method embodiment, or may be a chip for realizing the function of the donor-CU-CP in the above method embodiment.
- the communication device 1200 may correspond to the donor-CU-CP in the method 500 to the method 1100 according to the embodiment of the present application, and the communication device 1200 may include a method for executing the method 500 in FIG. 5 and the method in FIG. 6 600, a unit of the method executed by the donor-CU-CP in the method 700 in FIG. 7 , the method 800 in FIG. 8 , the method 900 in FIG. 9 , the method 1000 in FIG. 10 , and the method 1100 in FIG. 11 .
- each unit in the communication device 1200 and the above-mentioned other operations and/or functions are respectively intended to implement the method 500 in FIG. 5 , the method 600 in FIG. 6 , the method 700 in FIG.
- the communication device 1200 may be the IAB-DU in the above method embodiment, or may be a chip for realizing the function of the IAB-DU in the above method embodiment.
- the communication device 1200 may correspond to the IAB-DU in the method 500 to the method 1100 according to the embodiment of the present application, and the communication device 1200 may include a method for executing the method 500 in FIG. 5, the method 600 in FIG.
- each unit in the communication device 1200 and the above-mentioned other operations and/or functions are respectively intended to implement the method 500 in FIG. 5 , the method 600 in FIG. 6 , the method 700 in FIG. 7 , the method 800 in FIG.
- the communication device 1200 may be the IAB-MT in the above method embodiment, or may be a chip for realizing the function of the IAB-MT in the above method embodiment.
- the communication device 1200 may correspond to the IAB-MT in the method 500 to the method 1100 according to the embodiment of the present application, and the communication device 1200 may include a method for executing the method 500 in FIG. 5 , the method 600 in FIG. 6 , Elements of the methods performed by the IAB-MT in the method 700 in FIG. 7 , the method 800 in FIG. 8 , the method 900 in FIG. 9 , the method 1000 in FIG. 10 , and the method 1100 in FIG. 11 .
- each unit in the communication device 1200 and the above-mentioned other operations and/or functions are respectively intended to implement the method 500 in FIG. 5 , the method 600 in FIG. 6 , the method 700 in FIG. 7 , the method 800 in FIG.
- transceiver unit 1210 in the communication device 1200 may correspond to the transceiver 1320 in the communication device 1300 shown in FIG. 13
- processing unit 1220 in the communication device 1200 may correspond to the communication Processor 1310 in device 1300 .
- the chip when the communication device 1200 is a chip, the chip includes a transceiver unit and a processing unit.
- the transceiver unit may be an input-output circuit or a communication interface;
- the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
- the transceiver unit 1210 is used to realize the signal sending and receiving operation of the communication device 1200
- the processing unit 1220 is used to realize the signal processing operation of the communication device 1200 .
- the communication device 1200 further includes a storage unit 1230, and the storage unit 1230 is used for storing instructions.
- Fig. 13 is a schematic block diagram of a communication device 1300 provided by an embodiment of the present application.
- the communication device 1300 includes: at least one processor 1310 and a transceiver 1320 .
- the processor 1310 is coupled with the memory, and is used for executing instructions stored in the memory to control the transceiver 1320 to send signals and/or receive signals.
- the communications device 1300 further includes a memory 1330 for storing instructions.
- processor 1310 and the memory 1330 may be combined into one processing device, and the processor 1310 is configured to execute program codes stored in the memory 1330 to implement the above functions.
- the memory 1330 may also be integrated in the processor 1310 , or be independent of the processor 1310 .
- the transceiver 1320 may include a receiver (or called a receiver) and a transmitter (or called a transmitter).
- the transceiver 1320 may further include antennas, and the number of antennas may be one or more.
- the transceiver 1320 may be a communication interface or an interface circuit.
- the chip When the communication device 1300 is a chip, the chip includes a transceiver unit and a processing unit.
- the transceiver unit may be an input-output circuit or a communication interface;
- the processing unit may be a processor or a microprocessor or an integrated circuit integrated on the chip.
- the embodiment of the present application also provides a processing device, including a processor and an interface.
- the processor may be used to execute the methods in the foregoing method embodiments.
- the above processing device may be a chip.
- the processing device may be a field programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC), or a system chip (system on chip, SoC). It can be a central processor unit (CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit) , MCU), can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
- CPU central processor unit
- NP network processor
- DSP digital signal processor
- microcontroller micro controller unit
- PLD programmable logic device
- each step of the above method can be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
- the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
- the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
- each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
- DSP digital signal processor
- ASIC application-specific integrated circuit
- FPGA field-programmable gate array
- a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
- the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
- the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- Volatile memory can be random access memory (RAM), which acts as external cache memory.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- DRAM synchronous dynamic random access memory
- SDRAM double data rate synchronous dynamic random access memory
- ESDRAM enhanced synchronous dynamic random access memory
- SLDRAM direct memory bus random access memory
- direct rambus RAM direct rambus RAM
- the present application also provides a computer program product, the computer program product including: computer program code, when the computer program code is run on the computer, the computer is made to execute the computer program described in Fig. 5 to Fig. 11 .
- the method of any one of the embodiments is illustrated.
- the present application also provides a computer-readable medium, the computer-readable medium stores program codes, and when the program codes are run on a computer, the computer executes the steps shown in FIGS. 5 to 11 .
- the method of any one of the embodiments is illustrated.
- the present application further provides a system, which includes the aforementioned donor-CU-CP, donor-CU-UP, IAB-DU, and IAB-MT.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
- the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc, SSD)) etc.
- a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
- an optical medium for example, a high-density digital video disc (digital video disc, DVD)
- a semiconductor medium for example, a solid state disk (solid state disc, SSD)
- the network-side equipment in each of the above device embodiments corresponds to the terminal equipment and the network-side equipment or terminal equipment in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication unit (transceiver) executes the receiving method in the method embodiments. Or the step of sending, other steps besides sending and receiving may be performed by a processing unit (processor). For the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a computing device and the computing device can be components.
- One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
- these components can execute from various computer readable media having various data structures stored thereon.
- a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
- packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
- the disclosed systems, devices and methods may be implemented in other ways.
- the device embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
- the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
- the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
IE/group名称 | presence | semantics description |
IAB凭证(credential) | 必选 |
IE/group名称 | presence | semantics description |
K IAB | 必选 | 参考3GPP TS33.501中的描述 |
Claims (41)
- 一种建立安全传输通道的方法,其特征在于,所述方法应用于宿主节点的集中式单元的用户面实体,所述方法包括:接收来自宿主节点的集中式单元的控制面实体的第一消息,所述第一消息包括第一密钥;所述第一密钥不同于根密钥,所述根密钥为所述宿主节点的集中式单元的控制面实体在接入回传一体化节点注册到网络的过程中从所述网络获取到的密钥;根据所述第一密钥,建立所述宿主节点的集中式单元的用户面实体与所述接入回传一体化节点的分布式单元之间的用户面安全传输通道。
- 根据权利要求1所述的方法,其特征在于,所述第一消息还包括所述宿主节点的集中式单元的用户面实体的第一因特网协议IP地址;所述方法还包括:确定使用所述宿主节点的集中式单元的用户面实体的第一IP地址,建立所述用户面安全传输通道;根据所述第一IP地址,确定所述第一密钥。
- 根据权利要求1所述的方法,其特征在于,所述第一消息包括多个密钥和所述宿主节点的集中式单元的用户面实体的多个IP地址的一一对应关系;其中,所述多个密钥包括所述第一密钥;且所述第一密钥与第一IP地址对应;所述方法还包括:确定使用所述宿主节点的集中式单元的用户面实体的第一IP地址,建立所述用户面安全传输通道;根据所述第一IP地址,确定所述第一密钥。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:接收来自所述宿主节点的集中式单元的控制面实体的第一指示信息;根据所述第一指示信息,向所述宿主节点的集中式单元的控制面实体发送所述宿主节点的集中式单元的用户面实体的多个IP地址。
- 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:保存所述第一密钥和所述接入回传一体化节点的分布式单元的IP地址的对应关系。
- 根据权利要求1至5中任一项所述的方法,其特征在于,所述第一密钥是K IAB,所述根密钥是K gNB。
- 根据权利要求1至6中任一项所述的方法,其特征在于,所述第一消息是承载上下文修改请求消息;或者,所述第一消息是承载上下文建立请求消息。
- 根据权利要求1至7中任一项所述的方法,其特征在于,所述第一消息还包括第一指示信息,所述第一指示信息用于指示所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 一种确定密钥的方法,其特征在于,所述方法应用于宿主节点的集中式单元的控制面实体,所述方法包括:根据根密钥、接入回传一体化节点的分布式单元的因特网协议IP地址和宿主节点的 集中式单元的用户面实体的第一IP地址,推演得到第一密钥,所述第一密钥不同于根密钥,所述根密钥为所述宿主节点的集中式单元的控制面实体在接入回传一体化节点注册到网络的过程中从所述网络获取到的密钥;向所述宿主节点的集中式单元的用户面实体发送第一消息,所述第一消息包括所述第一密钥。
- 根据权利要求9所述的方法,其特征在于,所述第一消息还包括所述宿主节点的集中式单元的用户面实体的第一IP地址。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:向所述宿主节点的集中式单元的用户面实体发送第一指示信息;接收来自所述宿主节点的集中式单元的用户面实体的一个或者多个IP地址;其中,所述一个或者多个IP地址包括所述第一IP地址。
- 根据权利要求11所述的方法,其特征在于,在所述一个或者多个IP地址还包括第二IP地址时,所述方法还包括:根据所述根密钥、所述接入回传一体化节点的分布式单元的IP地址和所述第二IP地址,推演得到第二密钥;其中,所述第一消息中包括所述第一密钥和所述第一IP地址的对应关系以及所述第二密钥和所述第二IP地址的对应关系。
- 根据权利要求9至12中任一项所述的方法,其特征在于,所述第一密钥是K IAB,所述根密钥是K gNB。
- 根据权利要求9至13中任一项所述的方法,其特征在于,所述方法还包括:根据所述根密钥、所述接入回传一体化节点的分布式单元的IP地址和所述宿主节点的集中式单元的控制面实体的IP地址,推演得到第三密钥;根据所述第三密钥,建立所述宿主节点的集中式单元的控制面实体和所述接入回传一体化节点的分布式单元之间的控制面安全传输通道。
- 根据权利要求9至14中任一项所述的方法,其特征在于,所述第一消息是承载上下文修改请求消息;或者,所述第一消息是承载上下文建立请求消息。
- 根据权利要求9至15中任一项所述的方法,其特征在于,所述方法还包括:根据所述接入回传一体化节点的分布式单元的上下文中的第一标识确定所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 根据权利要求9至16中任一项所述的方法,其特征在于,所述方法还包括:向所述宿主节点的集中式单元的用户面实体发送第一指示信息,所述第一指示信息用于指示所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 一种建立安全传输通道的方法,其特征在于,所述方法应用于接入回传一体化节点的分布式单元,所述方法包括:接收来自宿主节点的集中式单元的控制面实体的第二消息,所述第二消息包括宿主节点的集中式单元的用户面实体的第一因特网协议IP地址;向所述接入回传一体化节点的移动终端发送第一请求消息,所述第一请求消息用于请求第一密钥,所述第一请求消息包括所述第一IP地址;接收来自所述接入回传一体化节点的移动终端的第一响应消息,所述第一响应消息包括所述第一密钥;根据所述第一密钥,建立所述接入回传一体化节点的分布式单元与所述宿主节点的集中式单元的用户面实体之间的用户面安全传输通道。
- 根据权利要求18所述的方法,其特征在于,在向所述接入回传一体化节点的移动终端发送第一请求消息之前,所述方法还包括:接收来自终端设备的用户面数据请求消息,所述用户面安全传输通道用于传输所述终端设备的用户面数据。
- 根据权利要求18所述的方法,其特征在于,在向所述接入回传一体化节点的移动终端发送第一请求消息之前,所述方法还包括:接收来自所述宿主节点的集中式单元的用户面实体的认证请求消息,所述认证请求消息用于建立所述用户面安全传输通道。
- 根据权利要求18至20中任一项所述的方法,其特征在于,所述方法还包括:保存所述第一密钥与所述第一IP地址的对应关系。
- 一种建立安全传输通道的方法,其特征在于,所述方法应用于接入回传一体化节点的分布式单元,所述方法还包括:接收来自宿主节点的集中式单元的控制面实体的第二消息,所述第二消息包括宿主节点的集中式单元的用户面实体的第一因特网协议IP地址;向所述接入回传一体化节点的移动终端发送第二请求消息,所述第二请求消息用于请求根密钥,所述根密钥用于生成第一密钥;所述第一密钥不同于所述根密钥,所述根密钥为所述接入回传一体化节点的移动终端在注册到网络的过程生成的密钥;接收来自所述接入回传一体化节点的移动终端的第二响应消息,所述第二响应消息包括所述根密钥;根据所述根密钥、所述接入回传一体化节点的分布式单元的IP地址和所述第一IP地址,推演得到所述第一密钥;根据所述第一密钥,建立所述接入回传一体化节点的分布式单元与所述宿主节点的集中式单元的用户面实体之间的用户面安全传输通道。
- 根据权利要求22所述的方法,其特征在于,在向所述接入回传一体化节点的移动终端发送第二请求消息之前,所述方法还包括:接收来自终端设备的用户面数据请求消息,所述用户面安全传输通道用于传输所述终端设备的用户面数据。
- 根据权利要求22所述的方法,其特征在于,在向所述接入回传一体化节点的移动终端发送第二请求消息之前,所述方法还包括:接收来自所述宿主节点的集中式单元的用户面实体的认证请求消息,所述认证请求消息用于建立所述用户面安全传输通道。
- 根据权利要求22至24中任一项所述的方法,其特征在于,所述方法还包括:保存所述第一密钥与所述第一IP地址的对应关系。
- 一种建立安全传输通道的方法,其特征在于,所述方法包括:宿主节点的集中式单元的控制面实体根据根密钥、接入回传一体化节点的分布式单元 的因特网协议IP地址和宿主节点的集中式单元的用户面实体的第一IP地址,推演得到第一密钥,所述第一密钥不同于根密钥,所述根密钥为所述宿主节点的集中式单元的控制面实体在接入回传一体化节点注册到网络的过程中从所述网络获取到的密钥;所述宿主节点的集中式单元的控制面实体向所述宿主节点的集中式单元的用户面实体发送第一消息,所述第一消息包括所述第一密钥;所述宿主节点的集中式单元的用户面实体接收所述第一消息;以及所述宿主节点的集中式单元的用户面实体根据所述第一密钥,建立所述宿主节点的集中式单元的用户面实体与所述接入回传一体化节点的分布式单元之间的用户面安全传输通道。
- 根据权利要求26所述的方法,其特征在于,所述第一消息还包括所述宿主节点的集中式单元的用户面实体的第一因特网协议IP地址;所述方法还包括:所述宿主节点的集中式单元的用户面实体确定使用所述宿主节点的集中式单元的用户面实体的第一IP地址,建立所述用户面安全传输通道;所述宿主节点的集中式单元的用户面实体根据所述第一IP地址,确定所述第一密钥。
- 根据权利要求26所述的方法,其特征在于,所述第一消息包括多个密钥和所述宿主节点的集中式单元的用户面实体的多个IP地址的一一对应关系;其中,所述多个密钥包括所述第一密钥;且所述第一密钥与第一IP地址对应;所述方法还包括:所述宿主节点的集中式单元的用户面实体确定使用所述宿主节点的集中式单元的用户面实体的第一IP地址,建立所述用户面安全传输通道;所述宿主节点的集中式单元的用户面实体根据所述第一IP地址,确定所述第一密钥。
- 根据权利要求28所述的方法,其特征在于,所述方法还包括:所述宿主节点的集中式单元的控制面实体向所述宿主节点的集中式单元的用户面实体发送第一指示信息;所述宿主节点的集中式单元的用户面实体接收来自所述宿主节点的集中式单元的控制面实体的第一指示信息;所述宿主节点的集中式单元的用户面实体根据所述第一指示信息,向所述宿主节点的集中式单元的控制面实体发送所述宿主节点的集中式单元的用户面实体的一个或多个IP地址,所述第一个或多个IP地址包括所述第一IP地址;所述宿主节点的集中式单元的控制面实体接收来自所述宿主节点的集中式单元的用户面实体的一个或多个IP地址。
- 根据权利要求29所述的方法,其特征在于,在所述一个或者多个IP地址还包括第二IP地址时,所述方法还包括:所述宿主节点的集中式单元的控制面实体根据所述根密钥、所述接入回传一体化节点的分布式单元的IP地址和所述第二IP地址,推演得到第二密钥;其中,所述第一消息中包括所述第一密钥和所述第一IP地址的对应关系以及所述第二密钥和所述第二IP地址的对应关系。
- 根据权利要求26至30中任一项所述的方法,其特征在于,所述方法还包括:所述宿主节点的集中式单元的用户面实体保存所述第一密钥和所述接入回传一体化 节点的分布式单元的IP地址的对应关系。
- 根据权利要求26至31中任一项所述的方法,其特征在于,所述第一密钥是K IAB,所述根密钥是K gNB。
- 根据权利要求26至32中任一项所述的方法,其特征在于,所述方法还包括:根据所述根密钥、所述接入回传一体化节点的分布式单元的IP地址和所述宿主节点的集中式单元的控制面实体的IP地址,推演得到第三密钥;根据所述第三密钥,建立所述宿主节点的集中式单元的控制面实体和所述接入回传一体化节点的分布式单元之间的控制面安全传输通道。
- 根据权利要求26至33中任一项所述的方法,其特征在于,所述第一消息是承载上下文修改请求消息;或者,所述第一消息是承载上下文建立请求消息。
- 根据权利要求26至34中任一项所述的方法,其特征在于,所述方法还包括:根据所述接入回传一体化节点的分布式单元的上下文中的第一标识确定所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 根据权利要求26至35中任一项所述的方法,其特征在于,所述方法还包括:向所述宿主节点的集中式单元的用户面实体发送第一指示信息,所述第一指示信息用于指示所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 根据权利要求26至36中任一项所述的方法,其特征在于,所述第一消息还包括第一指示信息,所述第一指示信息用于指示所述接入回传一体化节点的分布式单元属于接入回传一体化节点。
- 一种通信装置,其特征在于,用于实现如权利要求1至25中任意一项所述的方法。
- 一种通信设备,其特征在于,包括:存储器,所述存储器用于存储计算机程序;收发器,所述收发器用于执行收发步骤;处理器,所述处理器用于从所述存储器中调用并运行所述计算机程序,使得所述通信设备执行权利要求1至25中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括:所述计算机可读介质存储有计算机程序;所述计算机程序在计算机上运行时,使得所述计算机执行权利要求1至25中任一项所述的方法。
- 一种通信系统,其特征在于,包括宿主节点的集中式单元的用户面实体和所述宿主节点的集中式单元的用户面实体,所述宿主节点的集中式单元的用户面实体用于执行权利要求1至8中任一项所述的方法,所述宿主节点的集中式单元的控制面实体用于执行权利要求9至17中任一项所述的方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2022323335A AU2022323335A1 (en) | 2021-07-31 | 2022-07-28 | Method for establishing secure transmission channel, key determining method, and communication apparatus |
KR1020247007194A KR20240034877A (ko) | 2021-07-31 | 2022-07-28 | 보안 송신 채널을 확립하기 위한 방법, 키 결정 방법, 및 통신 장치 |
EP22852029.2A EP4380212A1 (en) | 2021-07-31 | 2022-07-28 | Method for establishing secure transmission channel, method for determining key, and communication apparatus |
JP2024505612A JP2024530915A (ja) | 2021-07-31 | 2022-07-28 | 安全伝送チャネルを確立するための方法、鍵決定方法、および通信装置 |
US18/427,313 US20240171970A1 (en) | 2021-07-31 | 2024-01-30 | Method for establishing secure transmission channel, key determining method, and communication apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110877235.9 | 2021-07-31 | ||
CN202110877235.9A CN115701161A (zh) | 2021-07-31 | 2021-07-31 | 建立安全传输通道的方法、确定密钥的方法及通信装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/427,313 Continuation US20240171970A1 (en) | 2021-07-31 | 2024-01-30 | Method for establishing secure transmission channel, key determining method, and communication apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023011315A1 true WO2023011315A1 (zh) | 2023-02-09 |
Family
ID=85120773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/108633 WO2023011315A1 (zh) | 2021-07-31 | 2022-07-28 | 建立安全传输通道的方法、确定密钥的方法及通信装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20240171970A1 (zh) |
EP (1) | EP4380212A1 (zh) |
JP (1) | JP2024530915A (zh) |
KR (1) | KR20240034877A (zh) |
CN (1) | CN115701161A (zh) |
AU (1) | AU2022323335A1 (zh) |
WO (1) | WO2023011315A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024207929A1 (zh) * | 2023-04-06 | 2024-10-10 | 华为技术有限公司 | 一种通信方法及装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375992A (zh) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | 实现接入层安全的方法及用户设备和节点 |
CN110365470A (zh) * | 2018-03-26 | 2019-10-22 | 华为技术有限公司 | 一种密钥生成方法和相关装置 |
US20200100102A1 (en) * | 2017-06-17 | 2020-03-26 | Lg Electronics Inc. | Method and apparatus for supporting security for cu-cp and cu-up separation in wireless communication system |
WO2020164506A1 (en) * | 2019-02-14 | 2020-08-20 | JRD Communication (Shenzhen) Ltd. | Iab security |
CN112087754A (zh) * | 2019-06-14 | 2020-12-15 | 三星电子株式会社 | 动态提供在中继设备中用于认证的密钥的方法 |
CN112399409A (zh) * | 2019-08-16 | 2021-02-23 | 华为技术有限公司 | 一种安全加密的方法及装置 |
-
2021
- 2021-07-31 CN CN202110877235.9A patent/CN115701161A/zh active Pending
-
2022
- 2022-07-28 JP JP2024505612A patent/JP2024530915A/ja active Pending
- 2022-07-28 AU AU2022323335A patent/AU2022323335A1/en active Pending
- 2022-07-28 WO PCT/CN2022/108633 patent/WO2023011315A1/zh active Application Filing
- 2022-07-28 KR KR1020247007194A patent/KR20240034877A/ko active Search and Examination
- 2022-07-28 EP EP22852029.2A patent/EP4380212A1/en active Pending
-
2024
- 2024-01-30 US US18/427,313 patent/US20240171970A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375992A (zh) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | 实现接入层安全的方法及用户设备和节点 |
US20200100102A1 (en) * | 2017-06-17 | 2020-03-26 | Lg Electronics Inc. | Method and apparatus for supporting security for cu-cp and cu-up separation in wireless communication system |
CN110365470A (zh) * | 2018-03-26 | 2019-10-22 | 华为技术有限公司 | 一种密钥生成方法和相关装置 |
WO2020164506A1 (en) * | 2019-02-14 | 2020-08-20 | JRD Communication (Shenzhen) Ltd. | Iab security |
CN112087754A (zh) * | 2019-06-14 | 2020-12-15 | 三星电子株式会社 | 动态提供在中继设备中用于认证的密钥的方法 |
CN112399409A (zh) * | 2019-08-16 | 2021-02-23 | 华为技术有限公司 | 一种安全加密的方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024207929A1 (zh) * | 2023-04-06 | 2024-10-10 | 华为技术有限公司 | 一种通信方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
KR20240034877A (ko) | 2024-03-14 |
US20240171970A1 (en) | 2024-05-23 |
CN115701161A (zh) | 2023-02-07 |
AU2022323335A1 (en) | 2024-02-29 |
JP2024530915A (ja) | 2024-08-27 |
EP4380212A1 (en) | 2024-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3735018B1 (en) | Security negotiation method and apparatus | |
EP2813098B1 (en) | A fast-accessing method and apparatus | |
JP7255949B2 (ja) | 通信方法および装置 | |
CN112106393B (zh) | 无线通信系统中的安全保护方法和装置 | |
WO2018219181A1 (zh) | 确定终端设备的标识的方法和装置 | |
US9801052B2 (en) | Method and system for securing control packets and data packets in a mobile broadband network environment | |
WO2023011315A1 (zh) | 建立安全传输通道的方法、确定密钥的方法及通信装置 | |
US20240098830A1 (en) | Communication method and apparatus | |
WO2024032207A1 (zh) | 通信方法、装置和系统 | |
CN116368833A (zh) | 针对边缘计算服务的安全连接的建立和认证的方法和系统 | |
WO2022134089A1 (zh) | 一种安全上下文生成方法、装置及计算机可读存储介质 | |
CN115004638A (zh) | 用户设备、非公共网络认证授权计费服务器、认证服务器功能实体 | |
KR102642804B1 (ko) | 다중 대역 통신 방법 및 장치 | |
KR20190117136A (ko) | 무선 통신 시스템에서 정보 보안을 위한 장치 및 방법 | |
EP4014526A1 (en) | Providing secure communications between computing devices | |
WO2024131561A1 (zh) | 通信认证方法和装置 | |
WO2023205978A1 (zh) | 邻近通信业务的密钥生成方法、装置、设备及存储介质 | |
US20240244427A1 (en) | Method and apparatus for protecting privacy issue for authentication and key management for applications | |
WO2023083346A1 (zh) | 卫星通信系统、方法、装置、接收方网元及存储介质 | |
CN113556703B (zh) | 无线通信方法和通信装置 | |
WO2022104740A1 (zh) | 一种非公共网络签约信息更新方法及装置 | |
EP4336782A1 (en) | Communication method, apparatus, and system | |
WO2023185960A1 (zh) | 通信方法及装置 | |
US20230422106A1 (en) | Method for authenticating access layer on basis of public key infrastructure in consideration of handover in next-generation wireless communication system | |
CN108370607A (zh) | 数字单元、无线单元、基站及数据传输方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22852029 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2024505612 Country of ref document: JP Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112024001910 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202437008303 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: AU2022323335 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022852029 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20247007194 Country of ref document: KR Kind code of ref document: A Ref document number: 2022323335 Country of ref document: AU Date of ref document: 20220728 Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022852029 Country of ref document: EP Effective date: 20240227 |
|
ENP | Entry into the national phase |
Ref document number: 112024001910 Country of ref document: BR Kind code of ref document: A2 Effective date: 20240130 |