WO2024036530A1 - 态势感知的处理方法、装置、通信设备及存储介质 - Google Patents

态势感知的处理方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024036530A1
WO2024036530A1 PCT/CN2022/113141 CN2022113141W WO2024036530A1 WO 2024036530 A1 WO2024036530 A1 WO 2024036530A1 CN 2022113141 W CN2022113141 W CN 2022113141W WO 2024036530 A1 WO2024036530 A1 WO 2024036530A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
network function
indication information
iot device
abnormal
Prior art date
Application number
PCT/CN2022/113141
Other languages
English (en)
French (fr)
Inventor
毛玉欣
沈洋
吴锦花
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/113141 priority Critical patent/WO2024036530A1/zh
Priority to CN202280003192.4A priority patent/CN117917109A/zh
Publication of WO2024036530A1 publication Critical patent/WO2024036530A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular, to a situation awareness processing method, device, communication equipment and storage medium.
  • the Internet of Things refers to the connection of any object to the network through information sensing equipment in accordance with an agreed protocol.
  • the objects exchange and communicate information through information media to realize functions such as intelligent identification, positioning, tracking and supervision.
  • Data analysis refers to using appropriate statistical analysis methods to analyze, summarize, understand and digest the large amounts of data collected in order to maximize the function of the data and play the role of the data. Data analysis is the process of studying and summarizing data in detail to extract useful information and form conclusions.
  • IoT devices may perform unusual behaviors, such as being abused by malicious applications or hijacked or otherwise misappropriated.
  • the embodiments of the present disclosure disclose a situation awareness processing method, device, communication equipment and storage medium.
  • a situation awareness processing method is provided, wherein the method is executed by a first network function, and the method includes:
  • the first network function is the Situation Awareness Processing Open Function SATE.
  • the method further includes:
  • the receiving situation awareness information sent by a predetermined object includes:
  • the situational awareness information includes at least one of the following:
  • the second network function is Unified Data Management (UDM).
  • UDM Unified Data Management
  • the first indication information is also used to indicate the device identification ID of the IoT device.
  • a situation awareness processing method is provided, wherein the method is executed by a first network function, and the method includes:
  • the first network function is the Situation Awareness Processing Open Function SATE.
  • the method further includes:
  • the receiving situation awareness information sent by a predetermined object includes:
  • the situational awareness information includes at least one of the following:
  • the second indication information is also used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • a situation awareness processing method is provided, wherein the method is executed by a predetermined object, and the method includes:
  • receiving situation awareness rule information sent by the first network function receiving situation awareness rule information sent by the first network function
  • the situation awareness information is obtained based on the situation awareness rule information.
  • the first network function is the Situation Awareness Processing Open Function SATE.
  • the situational awareness information includes at least one of the following:
  • a situation awareness processing method is provided, wherein the method is executed by a second network function, and the method includes:
  • the first network function is SATE; the second network function is UDM.
  • the first indication information is also used to indicate the device identification ID of the IoT device.
  • the method further includes:
  • the method further includes:
  • the third network function is the access and mobility management function AMF.
  • the third indication information is also used to indicate the device identification of the IoT device.
  • a situation awareness processing method is provided, wherein the method is executed by a third network function, and the method includes:
  • the second network function is UDM
  • the third network function is AMF
  • the third indication information is also used to indicate the device identification of the IoT device.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • a situation awareness processing method is provided, wherein the method is executed by an application function AF, and the method includes:
  • the first network function is SATE.
  • the second indication information is also used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • the method further includes:
  • a situation awareness processing system includes: a first network function, a second network function, and a third network function; wherein the first network function executes The method for executing the first network function is as described in any one of the disclosure; the second network function is executed as the method for executing the second network function as any one of the disclosure; the third network function is executed as any one of the methods as described in the disclosure. The method for executing the third network function is described.
  • a situational awareness processing device wherein the device includes:
  • the receiving module is used to receive situational awareness information sent by the predetermined object
  • a processing module used to determine compromised and/or abnormal IoT devices based on situational awareness information
  • a sending module configured to send first indication information to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • a situational awareness processing device includes:
  • the receiving module is used to receive situational awareness information sent by the predetermined object
  • a determination module configured to determine invaded and/or abnormal Internet of Things IoT devices based on the situational awareness information
  • a sending module configured to send second indication information to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • a situation awareness processing device includes:
  • a sending module configured to send situational awareness information to the first network function, where the situational awareness information is used to determine invaded and/or abnormal Internet of Things IoT devices.
  • a situational awareness processing device wherein the device includes:
  • a receiving module configured to receive first indication information sent by the first network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device;
  • a sending module configured to send third indication information to a third network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • a situational awareness processing device wherein the device includes:
  • a receiving module configured to receive third indication information sent by the second network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • a situational awareness processing device includes:
  • a receiving module configured to receive the second instruction information sent by the first network function
  • the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • a communication device includes:
  • memory for storing instructions executable by the processor
  • the processor is configured to implement the method described in any embodiment of the present disclosure when running the executable instructions.
  • a computer storage medium stores a computer executable program.
  • the executable program is executed by a processor, the method described in any embodiment of the present disclosure is implemented. .
  • situational awareness information sent by a predetermined object is received; based on the situational awareness information, an intruded and/or abnormal IoT device is determined; first indication information is sent to the second network function, and the first indication information is sent to the second network function.
  • An indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first network function can determine the invaded and/or abnormal IoT device based on the situational awareness information obtained from the predetermined object, after determining the invaded and/or abnormal IoT device, After the device is installed, the first instruction information is sent to the second network function, and the second network function can safely handle the IoT device in a timely manner.
  • Figure 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment.
  • FIG. 2 is an architectural schematic diagram of situation awareness according to an exemplary embodiment.
  • FIG. 3 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 4 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 5 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 6 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 7 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 8 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 9 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 10 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 11 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 12 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • FIG. 13 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 14 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 15 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 16 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 17 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 18 is a schematic flowchart of a situation awareness processing method according to an exemplary embodiment.
  • Figure 19 is a schematic diagram of a situation awareness processing system according to an exemplary embodiment.
  • Figure 20 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • FIG. 21 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • Figure 22 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • Figure 23 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • Figure 24 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • Figure 25 is a schematic diagram of a situation awareness processing device according to an exemplary embodiment.
  • Figure 26 is a schematic structural diagram of a terminal according to an exemplary embodiment.
  • Figure 27 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • this article uses the terms “greater than” or “less than” when characterizing the size relationship. However, those skilled in the art can understand that the term “greater than” also encompasses the meaning of “greater than or equal to”, and “less than” also encompasses the meaning of “less than or equal to”.
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on mobile communication technology.
  • the wireless communication system may include several user equipments 110 and several base stations 120.
  • user equipment 110 may be a device that provides voice and/or data connectivity to a user.
  • the user equipment 110 may communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the user equipment 110 may be an Internet of Things user equipment, such as a sensor device, a mobile phone, and a computer with an Internet of Things user equipment. , for example, it can be a fixed, portable, pocket-sized, handheld, computer-built-in or vehicle-mounted device.
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, it may be an on-board computer with a wireless communication function, or a wireless user equipment connected to an external on-board computer.
  • the user equipment 110 may also be a roadside device, for example, it may be a streetlight, a signal light or other roadside device with a wireless communication function.
  • the base station 120 may be a network-side device in a wireless communication system.
  • the wireless communication system can be the 4th generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as the Long Term Evolution (LTE) system; or the wireless communication system can also be a 5G system, Also called new air interface system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network).
  • the base station 120 may be an evolved base station (eNB) used in the 4G system.
  • the base station 120 may also be a base station (gNB) that adopts a centralized distributed architecture in the 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Media Access Control, MAC) layer; distributed
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • the unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the base station 120.
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an E2E (End to End, end-to-end) connection can also be established between user equipments 110 .
  • V2V vehicle to vehicle, vehicle to vehicle
  • V2I vehicle to infrastructure, vehicle to roadside equipment
  • V2P vehicle to pedestrian, vehicle to person
  • the above user equipment can be considered as the terminal equipment of the following embodiments.
  • the above-mentioned wireless communication system may also include a network management device 130.
  • the network management device 130 may be a core network device in a wireless communication system.
  • the network management device 130 may be a mobility management entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC). MME).
  • the network management device can also be other core network devices, such as serving gateway (Serving GateWay, SGW), public data network gateway (Public Data Network GateWay, PGW), policy and charging rules functional unit (Policy and Charging Rules) Function, PCRF) or Home Subscriber Server (HSS), etc.
  • serving gateway Serving GateWay, SGW
  • public data network gateway Public Data Network GateWay, PGW
  • Policy and Charging Rules Policy and Charging Rules
  • PCRF Policy and Charging Rules
  • HSS Home Subscriber Server
  • the embodiments of the present disclosure enumerate multiple implementations to clearly describe the technical solutions of the embodiments of the present disclosure.
  • the multiple embodiments provided in the embodiments of the present disclosure can be executed alone or in combination with the methods of other embodiments in the embodiments of the present disclosure. They can also be executed alone or in combination. It is then executed together with some methods in other related technologies; the embodiments of the present disclosure do not limit this.
  • the IoT device management architecture based on data analysis may include three parts: situation opening, situation processing, and situation awareness.
  • the situation opening part can include untrusted application functions (Untrusted AF), network exposure functions (NEF, Network Exposure Function) and trusted application functions (Trusted AF);
  • the situation processing part includes access and mobility management functions (AMF, Access and Mobility Management Function) and Unified Data Management (UDM, Unified Data Management);
  • the situational awareness part includes IoT devices, wireless access networks, core networks and application servers.
  • SATE Situation Awareness Treatment Exposure Function
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 31 Based on the situational awareness information, determine the invaded and/or abnormal IoT devices.
  • the IoT device involved in the present disclosure may be a terminal, and the terminal may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a roadside unit (RSU, Road Side Unit), a smart home terminal, or an industrial sensor. equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of the new air interface NR terminal (for example, an R17 NR terminal).
  • the access network involved in the present disclosure may include base stations, and the base stations may be various types of base stations, for example, base stations of the third generation mobile communication (3G) network, base stations of the fourth generation mobile communication (4G) network, Base stations for fifth-generation mobile communications (5G) networks or other evolved base stations.
  • 3G third generation mobile communication
  • 4G fourth generation mobile communication
  • 5G fifth-generation mobile communications
  • the network elements involved in this disclosure may be AMF, UDM, NEF, etc.
  • the first network function may be SATE
  • the second network function may be UDM
  • the third network function may be AMF.
  • the network elements are not limited to the above examples.
  • the first network function may be any network element that has the function of opening situational awareness processing.
  • a network element with the open function of situational awareness processing can be deployed as a communication node alone, or can be deployed uniformly in an existing network element.
  • network elements with open functions for situational awareness processing can be understood as logical nodes that can be flexibly deployed in a network, and are not limited here.
  • the IoT device being invaded may mean that the IoT device is controlled by an illegal device.
  • the IoT device abnormality may be a functional abnormality of the IoT device.
  • situational awareness information sent by a predetermined object is received, and the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device; based on the situational awareness information, it is determined that the invaded and /or an abnormal IoT device; sending first indication information to the second network function, the first indication information being used to indicate that the IoT device is an invaded and/or abnormal IoT device, or, to the application
  • the function AF sends second indication information, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the situation awareness information obtained based on the situation awareness rule information sent by the predetermined object is received. Based on situational awareness information, identify compromised and/or abnormal IoT devices.
  • the situation awareness rule information may be pre-configured or may be sent by the first network function to the predetermined object according to needs.
  • the first network function may periodically send the predetermined object the Situational awareness rule information. It should be noted that the predetermined object may also periodically send the situation awareness information to the first network function.
  • situation awareness rule information is sent to a predetermined object, where the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the situational awareness information includes at least one of the following:
  • the information of sending data packets and/or the information of receiving data packets may include source Internet Protocol IP address, destination IP address, time point of data transmission, duration of data transmission, amount of data packets, etc.
  • situational awareness rule information is periodically sent to a predetermined object, where the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the situation awareness information obtained based on the situation awareness rule information sent by the predetermined object is periodically received. Based on situational awareness information, identify compromised and/or abnormal IoT devices.
  • compromised and/or abnormal IoT devices are determined based on situational awareness information.
  • first indication information is sent to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first indication information may be used to indicate the device identification ID of the IoT device.
  • compromised and/or abnormal IoT devices are determined based on situational awareness information.
  • second indication information is sent to an application function (AF, Application Function), where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the second indication information may be used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • situational awareness information sent by a predetermined object is received, and the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device; based on the situational awareness information, it is determined that the intrusion has been and/or abnormal IoT devices; sending first indication information to the second network function, the first indication information being used to indicate that the IoT device is an invaded and/or abnormal IoT device, or, to The application function AF sends second indication information, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first network function can determine the invaded and/or abnormal IoT device based on the situational awareness information obtained from the predetermined object, after determining the invaded and/or abnormal IoT device, After the device is installed, the first instruction information is sent to the second network function or the second instruction information is sent to the AF, and the second network function and/or the AF can promptly respond to the IoT device. Safe disposal improves the security of IoT communications and reduces security risks caused by intrusions and IoT device anomalies compared to the method of not being able to identify the IoT devices described in IoT.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 41 Receive situational awareness information sent by the predetermined object
  • Step 42 Based on the situational awareness information, determine the invaded and/or abnormal IoT devices
  • Step 43 Send first indication information to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the core network CN device may be a device in the core network that can obtain the situation awareness information.
  • the first network function is the Situation Awareness Processing Open Function SATE.
  • the second network function is unified data management UDM.
  • the situational awareness information includes at least one of the following:
  • situational awareness rule information is sent to the predetermined object. Receive the situation awareness information obtained based on the situation awareness rule information sent by the predetermined object. Based on the situational awareness information, determine the invaded and/or abnormal Internet of Things IoT device; send first indication information to the second network function, the first indication information is used to indicate that the IoT device is invaded and/or Unusual Internet of Things IoT devices. In one embodiment, the first indication information is also used to indicate the device identification ID of the IoT device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 51 Receive situational awareness information sent by the predetermined object
  • Step 52 Based on the situational awareness information, determine the invaded and/or abnormal IoT devices
  • Step 53 Send second indication information to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the core network CN device may be a device in the core network that can obtain the situation awareness information.
  • the first network function is the Situation Awareness Processing Open Function SATE.
  • the situational awareness information includes at least one of the following:
  • situation awareness rule information is sent to the predetermined object; and the situation awareness information obtained based on the situation awareness rule information sent by the predetermined object is received. Based on the situational awareness information, determine the invaded and/or abnormal Internet of Things IoT device; send second indication information to the application function AF, the second indication information is used to indicate that the IoT device is invaded and/or abnormal Internet of Things IoT devices. In one embodiment, the second indication information is also used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 61 Send situational awareness rule information to a predetermined object, where the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • Step 62 Receive the situational awareness information obtained based on the situational awareness rule information sent by the predetermined object.
  • the situational awareness information includes at least one of the following:
  • situational awareness rule information is sent to the predetermined object.
  • Request information is sent to the predetermined object, and the request information is used to request situation awareness information.
  • situational awareness rule information is sent to the predetermined object.
  • Request information is periodically sent to the predetermined object, and the request information is used to request situation awareness information.
  • the situation awareness information obtained based on the situation awareness rule information sent by the predetermined object is periodically received. Based on the situational awareness information, intruded and/or abnormal IoT devices are determined.
  • situational awareness information sent by a predetermined object is received, and the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device; based on the situational awareness information, it is determined that the invaded and /or an abnormal IoT device; sending first indication information to the second network function, the first indication information being used to indicate that the IoT device is an invaded and/or abnormal IoT device, or, to the application
  • the function AF sends second indication information, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 71 Send first indication information to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first network function is SATE.
  • the first network function is SATE
  • the second network function is UDM
  • compromised and/or abnormal IoT devices are determined based on situational awareness information.
  • first indication information is sent to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first indication information may be used to indicate the device identification ID of the IoT device.
  • compromised and/or abnormal IoT devices are periodically determined based on situational awareness information.
  • first indication information is sent to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • the first indication information may be used to indicate the device identification ID of the IoT device.
  • the first indication information is used to indicate the device identification ID of the IoT device.
  • the ID may be a User Permanent Identifier (SUPI, Subscription Permanent Identifier).
  • situational awareness information sent by a predetermined object is received, and the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device; based on the situational awareness information, it is determined that the invaded and /or an abnormal IoT device; sending first indication information to the second network function, the first indication information being used to indicate that the IoT device is an invaded and/or abnormal IoT device, or, to the application
  • the function AF sends second indication information, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the first network function, and the method includes:
  • Step 81 Send second indication information to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the first network function is SATE.
  • compromised and/or abnormal IoT devices are determined based on situational awareness information.
  • second indication information is sent to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the second indication information may be used to indicate the device identification ID of the IoT device.
  • compromised and/or abnormal IoT devices are periodically determined based on situational awareness information.
  • second indication information is sent to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the second indication information may be used to indicate the device identification ID of the IoT device.
  • the second indication information is used to indicate the device identification ID of the IoT device.
  • the ID may be a User Permanent Identifier (SUPI, Subscription Permanent Identifier).
  • the second indication information is used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • situational awareness information sent by a predetermined object is received, and the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device; based on the situational awareness information, it is determined that the invaded and /or an abnormal IoT device; sending first indication information to the second network function, the first indication information being used to indicate that the IoT device is an invaded and/or abnormal IoT device, or, to the application
  • the function AF sends second indication information, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by a predetermined object, and the method includes:
  • Step 91 Receive situational awareness rule information sent by the first network function
  • Step 92 Send the situation awareness information obtained based on the situation awareness rule information to the first network function.
  • the IoT device involved in the present disclosure may be a terminal, and the terminal may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a roadside unit (RSU, Road Side Unit), a smart home terminal, or an industrial sensor. equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the access network involved in the present disclosure may include base stations, and the base stations may be various types of base stations, for example, base stations of the third generation mobile communication (3G) network, base stations of the fourth generation mobile communication (4G) network, Base stations for fifth-generation mobile communications (5G) networks or other evolved base stations.
  • 3G third generation mobile communication
  • 4G fourth generation mobile communication
  • 5G fifth-generation mobile communications
  • the network elements involved in this disclosure may be AMF, UDM, NEF, etc.
  • the first network function may be SATE
  • the second network function may be UDM
  • the third network function may be AMF.
  • the network elements are not limited to the above examples.
  • the first network function may be any network element that has the function of opening situational awareness processing.
  • a network element with the open function of situational awareness processing can be deployed as a communication node alone, or can be deployed uniformly in an existing network element.
  • network elements with open functions for situational awareness processing can be understood as logical nodes that can be flexibly deployed in a network, and are not limited here.
  • the first network function is SATE.
  • the predetermined object includes at least one of an IoT device, an access network RAN device, and a core network CN device.
  • the situational awareness information includes at least one of the following:
  • situational awareness rule information sent by the first network function is received.
  • the situation awareness information is obtained based on the situation awareness rule information.
  • situational awareness rule information sent by the first network function is received. Periodically receive request information sent by the first network function, where the request information is used to request the situation awareness information. The situation awareness information is periodically acquired based on the situation awareness rule information. The situational awareness information is periodically sent to the first network function.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the second network function, and the method includes:
  • Step 101 Receive first indication information sent by the first network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device;
  • Step 102 Send third indication information to the third network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the IoT device involved in the present disclosure may be a terminal, and the terminal may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a roadside unit (RSU, Road Side Unit), a smart home terminal, or an industrial sensor. equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the access network involved in the present disclosure may include base stations, and the base stations may be various types of base stations, for example, base stations of the third generation mobile communication (3G) network, base stations of the fourth generation mobile communication (4G) network, Base stations for fifth-generation mobile communications (5G) networks or other evolved base stations.
  • 3G third generation mobile communication
  • 4G fourth generation mobile communication
  • 5G fifth-generation mobile communications
  • the network elements involved in this disclosure may be AMF, UDM, NEF, etc.
  • the first network function may be SATE
  • the second network function may be UDM
  • the third network function may be AMF.
  • the network elements are not limited to the above examples.
  • the first network function may be any network element that has the function of opening situational awareness processing.
  • a network element with the open function of situational awareness processing can be deployed as a communication node alone, or can be deployed uniformly in an existing network element.
  • network elements with open functions for situational awareness processing can be understood as logical nodes that can be flexibly deployed in a network, and are not limited here.
  • the first network function is SATE; the second network function is UDM; and the third network function is AMF.
  • first indication information sent by the first network function is received, and the first indication information indicates that the IoT device is an invaded and/or abnormal device.
  • Send third indication information to the third network function where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the first indication information may be used to indicate the device identification ID of the IoT device.
  • the third indication information is used to indicate the device identification of the IoT device.
  • first indication information sent by the first network function is periodically received, and the first indication information indicates that the IoT device is an invaded and/or abnormal device.
  • Third indication information is periodically sent to the third network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • first indication information sent by the first network function is received, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the second network function, and the method includes:
  • Step 111 Receive the registration request of the IoT device
  • Step 112 Reject the registration request.
  • the second network function is UDM.
  • first indication information sent by the first network function is received, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • rejecting the registration request may prohibit the IoT device from accessing the IoT.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by the second network function, and the method includes:
  • Step 121 Send third indication information to the third network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the second network function is UDM; the third network function is AMF.
  • first indication information sent by the first network function is received, and the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • Send third indication information to the third network function where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the third indication information is used to indicate the device identification of the IoT device.
  • first indication information sent by the first network function is received, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by a third network function, and the method includes:
  • Step 131 Receive third indication information sent by the second network function, where the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • the IoT device involved in the present disclosure may be a terminal, and the terminal may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a roadside unit (RSU, Road Side Unit), a smart home terminal, or an industrial sensor. equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the access network involved in the present disclosure may include base stations, and the base stations may be various types of base stations, for example, base stations of the third generation mobile communication (3G) network, base stations of the fourth generation mobile communication (4G) network, Base stations for fifth-generation mobile communications (5G) networks or other evolved base stations.
  • 3G third generation mobile communication
  • 4G fourth generation mobile communication
  • 5G fifth-generation mobile communications
  • the network elements involved in this disclosure may be AMF, UDM, NEF, etc.
  • the first network function may be SATE
  • the second network function may be UDM
  • the third network function may be AMF.
  • the network elements are not limited to the above examples.
  • the first network function may be any network element that has the function of opening situational awareness processing.
  • a network element with the open function of situational awareness processing can be deployed as a communication node alone, or can be deployed uniformly in an existing network element.
  • network elements with open functions for situational awareness processing can be understood as logical nodes that can be flexibly deployed in a network, and are not limited here.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device. Set and/or store the status of the IoT device based on the exception identification.
  • the third indication information may indicate the device identification of the IoT device.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device. Log out the IoT device from the network.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by a third network function, and the method includes:
  • Step 141 Receive the registration request of the IoT device
  • Step 142 Reject the registration request.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • third indication information sent by the second network function is received, and the third indication information indicates that the IoT device is an invaded and/or abnormal device.
  • this embodiment provides a situation awareness processing method, wherein the method is executed by AF, and the method includes:
  • Step 151 Receive second indication information sent by the first network function, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the IoT device involved in the present disclosure may be a terminal, and the terminal may be, but is not limited to, a mobile phone, a wearable device, a vehicle-mounted terminal, a roadside unit (RSU, Road Side Unit), a smart home terminal, or an industrial sensor. equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the access network involved in the present disclosure may include base stations, and the base stations may be various types of base stations, for example, base stations of the third generation mobile communication (3G) network, base stations of the fourth generation mobile communication (4G) network, Base stations for fifth-generation mobile communications (5G) networks or other evolved base stations.
  • 3G third generation mobile communication
  • 4G fourth generation mobile communication
  • 5G fifth-generation mobile communications
  • the network elements involved in this disclosure may be AMF, UDM, NEF, etc.
  • the first network function may be SATE
  • the second network function may be UDM
  • the third network function may be AMF.
  • the network elements are not limited to the above examples.
  • the first network function may be any network element that has the function of opening situational awareness processing.
  • a network element with the open function of situational awareness processing can be deployed as a communication node alone, or can be deployed uniformly in an existing network element.
  • network elements with open functions for situational awareness processing can be understood as logical nodes that can be flexibly deployed in a network, and are not limited here.
  • the situation awareness service of the IoT device is subscribed.
  • Receive second indication information sent by the first network function where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • the second indication information is used to indicate at least one of the following: the time and attack behavior of the IoT device attacking the network.
  • the time of attacking the network can be the time point of attacking the network or the duration of attacking the network.
  • a situation awareness processing method includes at least one of the following:
  • Step 161 SATE can contact the IoT device and set situational awareness rules, such as the behavior of the IoT device and the situation of sending and receiving data packets (including original IP address and destination IP address, etc.). IoT devices should report situational awareness information as required.
  • situational awareness rules such as the behavior of the IoT device and the situation of sending and receiving data packets (including original IP address and destination IP address, etc.). IoT devices should report situational awareness information as required.
  • Step 162 SATE can contact the RAN to set situational awareness rules, such as: behavior of IoT devices, sending and receiving data packets (including time point, duration and data packet volume, etc.). RAN should report situational awareness information as required.
  • situational awareness rules such as: behavior of IoT devices, sending and receiving data packets (including time point, duration and data packet volume, etc.).
  • RAN should report situational awareness information as required.
  • SATE can contact 5GC (for example, AMF, SMF, UPF) to set situational awareness rules, such as: the behavior of IoT devices and sending and receiving control plane signaling and user plane data packets (including time points, duration and data packet volume, etc.).
  • 5GC should report situational awareness information as required.
  • Step 164 SATE can contact the application server AF to set situational awareness rules, such as: the behavior of IoT devices and the situation of sending and receiving data packets (original and destination IP addresses, time points and duration, data packet volume).
  • situational awareness rules such as: the behavior of IoT devices and the situation of sending and receiving data packets (original and destination IP addresses, time points and duration, data packet volume).
  • Application servers should report situational awareness information as required.
  • the method includes:
  • Step 171 SATE analyzes the reporting results (corresponding to the situational awareness information of this disclosure) based on the user plane data situational awareness and control plane signaling reports, and identifies intrusion behavior and abnormal IoT devices. SATE notifies (corresponding to sending the first indication information in this disclosure) the IoT device with UDM abnormality through the device ID (such as SUPI). UDM uses exception flags to set and store IoT device state.
  • Step 172 The UDM sends a notification to the AMF (corresponding to sending the second instruction information in this disclosure), notifying the IoT device of an abnormality and carrying the device ID (such as SUPI).
  • AMF can set and store IoT device status with exception flags.
  • Step 173 AMF initiates a logout procedure to the IoT device to remove the IoT device from the network.
  • Step 174 If the UE simulates a new registration process to the network, the AMF or UDM stores the IoT device status with an abnormal flag and will reject the registration.
  • the method includes:
  • Step 181 The AF may subscribe to the situation awareness service for the IoT device indicated by the IoT device ID (for example, GPSI).
  • the IoT device ID for example, GPSI
  • Step 182 When SATE generates situational awareness of the IoT device, SATE should notify the untrusted AF of the report of the abnormal IoT device (sending the third instruction information through NEF).
  • the content of the notification may include the time point and duration. Behavioral details attack the network.
  • this embodiment provides a situation awareness processing system, wherein the system includes: a first network function 191, a second network function 192, and a third network function 193; wherein the first network function
  • the network function is executed as any method of executing the first network function of this disclosure
  • the second network function is executed as any method of executing the second network function of this disclosure
  • the third network function is executed as any third method of this disclosure. The method by which network functions are performed.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the receiving module 201 is used to receive situational awareness information sent by a predetermined object
  • the processing module 202 is used to determine the invaded and/or abnormal Internet of Things IoT devices based on situational awareness information;
  • the sending module 203 is configured to send first indication information to the second network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the receiving module 211 is used to receive situational awareness information sent by a predetermined object
  • the processing module 212 is used to determine the invaded and/or abnormal IoT devices based on situational awareness information
  • the sending module 213 is configured to send second indication information to the application function AF, where the second indication information is used to indicate that the IoT device is an invaded and/or abnormal IoT device.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the sending module 221 is configured to send the situation awareness information obtained based on the situation awareness rule information to the first network function.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the receiving module 231 is configured to receive first indication information sent by the first network function, where the first indication information is used to indicate that the IoT device is an invaded and/or abnormal device;
  • the sending module 232 is configured to send third indication information to the third network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the receiving module 241 is configured to receive third indication information sent by the second network function, where the third indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • an embodiment of the present disclosure provides a situation awareness processing device, wherein the device includes:
  • the receiving module 251 is used to receive the second indication information sent by the first network function
  • the second indication information is used to indicate that the IoT device is an invaded and/or abnormal device.
  • An embodiment of the present disclosure provides a communication device.
  • the communication device includes:
  • Memory used to store instructions executable by the processor
  • the processor is configured to: when executing executable instructions, implement the method applied to any embodiment of the present disclosure.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to memorize information stored on the communication device after the communication device is powered off.
  • the processor can be connected to the memory through a bus, etc., and is used to read the executable program stored in the memory.
  • An embodiment of the present disclosure also provides a computer storage medium, wherein the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method of any embodiment of the present disclosure is implemented.
  • one embodiment of the present disclosure provides a structure of a terminal.
  • the terminal 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc. .
  • the terminal 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communications component 816.
  • Processing component 802 generally controls the overall operations of terminal 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations at device 800 . Examples of such data include instructions for any application or method operating on the terminal 800, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 806 provides power to various components of terminal 800.
  • Power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to terminal 800.
  • Multimedia component 808 includes a screen that provides an output interface between terminal 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. A touch sensor can not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera.
  • the front camera and/or the rear camera may receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when terminal 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors that provide various aspects of status assessment for terminal 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the terminal 800, the sensor component 814 can also detect the position change of the terminal 800 or a component of the terminal 800, the user The presence or absence of contact with the terminal 800, the terminal 800 orientation or acceleration/deceleration and the temperature change of the terminal 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the terminal 800 and other devices.
  • the terminal 800 can access a wireless network based on a communication standard, such as Wi-Fi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • terminal 800 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Gate array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • non-transitory computer-readable storage medium including instructions, such as a memory 804 including instructions, which can be executed by the processor 820 of the terminal 800 to complete the above method is also provided.
  • non-transitory computer-readable storage media may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the base station.
  • Base station 900 may also include a power supply component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input/output (I/O) interface 958.
  • Base station 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

提供了一种态势感知的处理方法,其中,方法由第一网络功能执行,方法包括:接收预定对象发送的态势感知信息;基于态势感知信息,确定被入侵和/或异常的物联网IoT设备(步骤31);向第二网络功能发送第一指示信息,第一指示信息用于指示IoT设备为被入侵和/或异常的物联网IoT设备。这里,相较于不能确定出IoT中IoT设备的方式,提升了IoT通信的安全性,降低了因为入侵行为和IoT设备异常带来的安全风险。

Description

态势感知的处理方法、装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种态势感知的处理方法、装置、通信设备及存储介质。
背景技术
物联网(IoT,Internet of Things)是指将任何物体通过信息传感设备按照约定的协议连接到网络上,物体通过信息媒介进行信息交换和通信,实现智能识别、定位、跟踪和监督等功能。数据分析是指采用适当的统计分析方法,对收集到的大量数据进行分析、总结、理解和消化,以最大限度地发挥数据的功能,发挥数据的作用。数据分析是对数据进行详细研究和总结以提取有用信息并形成结论的过程。物联网设备可能会执行异常行为,例如被恶意应用程序滥用或劫持或被盗用。相关技术中,移动网络中没有解决方案来自动识别具有异常行为的特定物联网设备,这会给IoT网络带来安全隐患。
发明内容
本公开实施例公开了一种态势感知的处理方法、装置、通信设备及存储介质。
根据本公开实施例的第一方面,提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
接收预定对象发送的态势感知信息;
基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述第一网络功能为态势感知处理开放功能SATE。
在一个实施例中,所述方法还包括:
向所述预定对象发送态势感知规则信息;
所述接收预定对象发送的态势感知信息,包括:
接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,所述第二网络功能为统一数据管理UDM。
在一个实施例中,所述第一指示信息还用于指示所述IoT设备的设备标识ID。
根据本公开实施例的第二方面,提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
接收预定对象发送的态势感知信息;
基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述第一网络功能为态势感知处理开放功能SATE。
在一个实施例中,所述方法还包括:
向所述预定对象发送态势感知规则信息;
所述接收预定对象发送的态势感知信息,包括:
接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,所述第二指示信息还用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
根据本公开实施例的第三方面,提供一种态势感知的处理方法,其中,所述方法由预定对象执行,所述方法包括:
向第一网络功能发送态势感知信息,所述态势感知信息用于确定被入侵和/或异常的物联网IoT设备。
在一个实施例中,接收所述第一网络功能发送的态势感知规则信息;
基于所述态势感知规则信息获取所述态势感知信息。
在一个实施例中,所述第一网络功能为态势感知处理开放功能SATE。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
根据本公开实施例的第四方面,提供一种态势感知的处理方法,其中,所述方法由第二网络功能执行,所述方法包括:
接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
在一个实施例中,所述第一网络功能为SATE;所述第二网络功能为UDM。
在一个实施例中,所述第一指示信息还用于指示所述IoT设备的设备标识ID。
在一个实施例中,所述方法还包括:
基于异常标识设置和/或存储所述IoT设备的状态。
在一个实施例中,所述方法还包括:
接收所述IoT设备的注册请求;
拒绝所述注册请求。
在一个实施例中,所述第三网络功能为接入与移动管理功能AMF。
在一个实施例中,所述第三指示信息还用于指示所述IoT设备的设备标识。
根据本公开实施例的第五方面,提供一种态势感知的处理方法,其中,所述方法由第三网络功能执行,所述方法包括:
接收第二网络功能发送的第三指示信息,所述第三指示信息用于指示IoT设备为被入侵和/或异常的设备。
在一个实施例中,所述第二网络功能为UDM,所述第三网络功能为AMF。
在一个实施例中,所述第三指示信息还用于指示所述IoT设备的设备标识。
在一个实施例中,所述方法还包括:
基于异常标识设置和/或存储所述IoT设备的状态。
在一个实施例中,所述方法还包括:
接收所述IoT设备的注册请求;
拒绝所述注册请求。
在一个实施例中,所述方法还包括:
将所述IoT设备从网络中注销。
根据本公开实施例的第六方面,提供一种态势感知的处理方法,其中,所述方法由应用功能AF执行,所述方法包括:
接收第一网络功能发送的第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
在一个实施例中,所述第一网络功能为SATE。
在一个实施例中,所述第二指示信息还用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
在一个实施例中,所述方法还包括:
订阅所述IoT设备的态势感知业务。
根据本公开实施例的第七方面,提供一种态势感知的处理系统,其中,所述系统包括:第一网络功能、第二网络功能和第三网络功能;其中,所述第一网络功能执行如本公开任一所述第一网络功能执行的方法;所述第二网络功能执行如本公开任一所述第二网络功能执行的方法;所述第三网络功能执行如本公开任一所述第三网络功能执行的方法。
根据本公开实施例的第八方面,提供一种态势感知的处理装置,其中,所述装置包括:
接收模块,用于接收预定对象发送的态势感知信息;
处理模块,用于基于态势感知信息,确定被入侵和/或异常的物联网IoT设备;
发送模块,用于向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
根据本公开实施例的第九方面,提供一种态势感知的处理装置,其中,所述装置包括:
接收模块,用于接收预定对象发送的态势感知信息;
确定模块,用于基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
发送模块,用于向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
根据本公开实施例的第十方面,提供一种态势感知的处理装置,其中,所述装置包括:
发送模块,用于向第一网络功能发送态势感知信息,所述态势感知信息用于确定被入侵和/或异常的物联网IoT设备。
根据本公开实施例的第十一方面,提供一种态势感知的处理装置,其中,所述装置包括:
接收模块,用于接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
发送模块,用于向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
根据本公开实施例的第十二方面,提供一种态势感知的处理装置,其中,所述装置包括:
接收模块,用于接收第二网络功能发送的第三指示信息,所述第三指示信息用于指示IoT设备为被入侵和/或异常的设备。
根据本公开实施例的第十三方面,提供一种态势感知的处理装置,其中,所述装置包括:
接收模块,用于接收第一网络功能发送的第二指示信息;
其中,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
根据本公开实施例的第十四方面,提供一种通信设备,所述通信设备,包括:
处理器;
用于存储所述处理器可执行指令的存储器;
其中,所述处理器被配置为:用于运行所述可执行指令时,实现本公开任意实施例所述的方法。
根据本公开实施例的第十五方面,提供一种计算机存储介质,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现本公开任意实施例所述的方法。
在本公开实施例中,接收预定对象发送的态势感知信息;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。这里,由于所述第一网络功能可以基于从所述预定对象获取到的所述态势感知信息确定被入侵和/或异常的物联网IoT设备,在确定出所述被入侵和/或异常的IoT设备后,向所述第二网络功能发送所述第一指示信息,所述第二网络功能就可以及时对所述IoT设备进行安全处置,相较于不能确定出IoT中所述IoT设备的方式,提升了IoT通信的安全性,降低了因为入 侵行为和IoT设备异常带来的安全风险。
附图说明
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种态势感知的架构示意图。
图3是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图4是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图5是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图6是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图7是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图8是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图9是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图10是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图11是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图12是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图13是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图14是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图15是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图16是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图17是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图18是根据一示例性实施例示出的一种态势感知的处理方法的流程示意图。
图19是根据一示例性实施例示出的一种态势感知的处理系统的示意图。
图20是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图21是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图22是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图23是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图24是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图25是根据一示例性实施例示出的一种态势感知的处理装置的示意图。
图26是根据一示例性实施例示出的一种终端的结构示意图。
图27是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表 与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
出于简洁和便于理解的目的,本文在表征大小关系时,所使用的术语为“大于”或“小于”。但对于本领域技术人员来说,可以理解:术语“大于”也涵盖了“大于等于”的含义,“小于”也涵盖了“小于等于”的含义。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控 制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的V2V(vehicle to vehicle,车对车)通信、V2I(vehicle to Infrastructure,车对路边设备)通信和V2P(vehicle to pedestrian,车对人)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
为了更好地理解本公开任一个实施例所描述的技术方案,首先,对相关技术中的应用场景进行说明:
在一个实施例中,请参见图2,基于数据分析的物联网设备管理架构可以包括态势开放、态势处理和态势感知三部分。其中,态势开放部分可以包括不被信任的应用功能(Untrusted AF)、网络开放功能(NEF,Network Exposure Function)和受信任的应用功能(Trusted AF);态势处理部分包括接入与移动性管理功能(AMF,Access and Mobility Management Function)和统一数据管理(UDM,Unified Data Management);态势感知部分包括IoT设备、无线接入网、核心网和应用服务器。需要说明的是,本公开实施例新增态势感知处理开放功能(SATE,Situation Awareness Treatment Exposure Function)。
如图3所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤31、基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。
这里,本公开所涉及的IoT设备可以是终端,所述终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实 施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
本公开中涉及的接入网可以包括基站,所述基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
本公开中涉及的网元可以是AMF、UDM和NEF等,第一网络功能可以是SATE,第二网络功能可以是UDM,第三网络功能可以是AMF。需要说明的是,网元并不限于上述例举。示例性地,第一网络功能可以是任一具备态势感知处理开放功能的网元。在本公开的一些实施方式中,具备态势感知处理开放功能的网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将具备态势感知处理开放功能的网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
需要说明的是,所述IoT设备被入侵为可以是所述IoT设备被非法设备控制。所述IoT设备异常可以是所述IoT设备的功能异常。
在一个实施例中,接收预定对象发送的态势感知信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备,或者,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。这里,所述态势感知规则信息可以是预先配置的也可以是所述第一网络功能根据需求向所述预定对象发送的,例如,第一网络功能可以周期性地向所述预定对象发送所述态势感知规则信息。需要说明的是,所述预定对象也可以是周期性的向所述第一网络功能发送所述态势感知信息。
在一个实施例中,向预定对象发送态势感知规则信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
其中,所述发送数据包的信息和/或所述接收数据包的信息可以包括源互联网协议IP地址、目标IP地址、传输数据的时间点、传输数据的持续时间和数据包的量等。
在一个实施例中,周期性地向预定对象发送态势感知规则信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。周期性地接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。
在一个实施例中,基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和 /或异常的物联网IoT设备。这里,所述第一指示信息可以用于指示所述IoT设备的设备标识ID。
在一个实施例中,基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向应用功能(AF,Application Function)发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第二指示信息可以用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
在本公开实施例中,接收预定对象发送的态势感知信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备,或者,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。这里,由于所述第一网络功能可以基于从所述预定对象获取到的所述态势感知信息确定被入侵和/或异常的物联网IoT设备,在确定出所述被入侵和/或异常的IoT设备后,向所述第二网络功能发送所述第一指示信息或者向所述AF发送所述第二指示信息,所述第二网络功能和/或所述AF就可以及时对所述IoT设备进行安全处置,相较于不能确定出IoT中所述IoT设备的方式,提升了IoT通信的安全性,降低了因为入侵行为和IoT设备异常带来的安全风险。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图4所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤41、接收预定对象发送的态势感知信息;
步骤42、基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
步骤43、向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。这里,所述核心网CN设备可以是核心网络中能够获取所述态势感知信息的设备。
在一个实施例中,所述第一网络功能为态势感知处理开放功能SATE。所述第二网络功能为统一数据管理UDM。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,向所述预定对象发送态势感知规则信息。接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。在一个实施例中,所述第一指示信息还用于指示所述IoT设备的设备标识ID。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图5所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤51、接收预定对象发送的态势感知信息;
步骤52、基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
步骤53、向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。这里,所述核心网CN设备可以是核心网络中能够获取所述态势感知信息的设备。
在一个实施例中,所述第一网络功能为态势感知处理开放功能SATE。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,向所述预定对象发送态势感知规则信息;接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。在一个实施例中,所述第二指示信息还用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图6所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤61、向预定对象发送态势感知规则信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。
步骤62、接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,向所述预定对象发送态势感知规则信息。向所述预定对象发送请求信息,所述请 求信息用于请求态势感知信息。接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备。
在一个实施例中,向所述预定对象发送态势感知规则信息。周期性地向所述预定对象发送请求信息,所述请求信息用于请求态势感知信息。周期性地接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备。
在一个实施例中,接收预定对象发送的态势感知信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备,或者,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图7所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤71、向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
在一个实施例中,所述第一网络功能为SATE。
在一个实施例中,所述第一网络功能为SATE,所述第二网络功能为UDM。
在一个实施例中,基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。这里,所述第一指示信息可以用于指示所述IoT设备的设备标识ID。
在一个实施例中,基于态势感知信息,周期性地确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。这里,所述第一指示信息可以用于指示所述IoT设备的设备标识ID。
在一个实施例中,所述第一指示信息用于指示所述IoT设备的设备标识ID。这里,所述ID可以是用户永久标识符(SUPI,Subscription Permanent Identifier)。
在一个实施例中,接收预定对象发送的态势感知信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备,或者,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图8所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
步骤81、向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
在一个实施例中,所述第一网络功能为SATE。
在一个实施例中,基于态势感知信息,确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第二指示信息可以用于指示所述IoT设备的设备标识ID。
在一个实施例中,基于态势感知信息,周期性地确定被入侵和/或异常的物联网IoT设备。响应于确定出所述IoT设备,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第二指示信息可以用于指示所述IoT设备的设备标识ID。
在一个实施例中,所述第二指示信息用于指示所述IoT设备的设备标识ID。这里,所述ID可以是用户永久标识符(SUPI,Subscription Permanent Identifier)。
在一个实施例中,所述第二指示信息用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
在一个实施例中,接收预定对象发送的态势感知信息,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一;基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备,或者,向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图9所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由预定对象执行,所述方法包括:
步骤91、接收第一网络功能发送的态势感知规则信息;
步骤92、向所述第一网络功能发送基于所述态势感知规则信息获取的所述态势感知信息。
这里,本公开所涉及的IoT设备可以是终端,所述终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
本公开中涉及的接入网可以包括基站,所述基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
本公开中涉及的网元可以是AMF、UDM和NEF等,第一网络功能可以是SATE,第二网络功能 可以是UDM,第三网络功能可以是AMF。需要说明的是,网元并不限于上述例举。示例性地,第一网络功能可以是任一具备态势感知处理开放功能的网元。在本公开的一些实施方式中,具备态势感知处理开放功能的网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将具备态势感知处理开放功能的网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,所述第一网络功能为SATE。
在一个实施例中,所述预定对象包括IoT设备、接入网RAN设备和核心网CN设备中的至少之一。
在一个实施例中,所述态势感知信息包括以下至少之一:
IoT设备的行为信息;
发送数据包的信息;以及
接收数据包的信息。
在一个实施例中,接收第一网络功能发送的态势感知规则信息。接收所述第一网络功能发送的请求信息,其中,所述请求信息用于请求所述态势感知信息。基于所述态势感知规则信息获取所述态势感知信息。向所述第一网络功能发送所述态势感知信息。
在一个实施例中,接收第一网络功能发送的态势感知规则信息。周期性地接收所述第一网络功能发送的请求信息,其中,所述请求信息用于请求所述态势感知信息。基于所述态势感知规则信息周期性地获取所述态势感知信息。周期性地向所述第一网络功能发送所述态势感知信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图10所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第二网络功能执行,所述方法包括:
步骤101、接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
步骤102、向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
这里,本公开所涉及的IoT设备可以是终端,所述终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
本公开中涉及的接入网可以包括基站,所述基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
本公开中涉及的网元可以是AMF、UDM和NEF等,第一网络功能可以是SATE,第二网络功能可以是UDM,第三网络功能可以是AMF。需要说明的是,网元并不限于上述例举。示例性地,第一网络功能可以是任一具备态势感知处理开放功能的网元。在本公开的一些实施方式中,具备态势感知处理开放功能的网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将具备态 势感知处理开放功能的网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,所述第一网络功能为SATE;所述第二网络功能为UDM;第三网络功能为AMF。
在一个实施例中,接收第一网络功能发送的第一指示信息,所述第一指示信息指示所述IoT设备为被入侵和/或异常的设备。向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第一指示信息可以用于指示所述IoT设备的设备标识ID。所述第三指示信息用于指示所述IoT设备的设备标识。
在一个实施例中,周期性地接收第一网络功能发送的第一指示信息,所述第一指示信息指示所述IoT设备为被入侵和/或异常的设备。周期性地向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。
在一个实施例中,接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。接收所述IoT设备的注册请求;拒绝所述注册请求。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图11所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第二网络功能执行,所述方法包括:
步骤111、接收所述IoT设备的注册请求;
步骤112、拒绝所述注册请求。
在一个实施例中,所述第二网络功能为UDM。
在一个实施例中,接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。接收所述IoT设备的注册请求;响应于确定所述IoT设备为所述第一指示信息指示的设备,拒绝所述注册请求。这里,拒绝所述注册请求可以是禁止所述IoT设备接入IoT。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图12所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第二网络功能执行,所述方法包括:
步骤121、向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
在一个实施例中,所述第二网络功能为UDM;所述第三网络功能为AMF。
在一个实施例中,接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设 备为被入侵和/或异常的设备。向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第三指示信息用于指示所述IoT设备的设备标识。
在一个实施例中,接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图13所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第三网络功能执行,所述方法包括:
步骤131、接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。
这里,本公开所涉及的IoT设备可以是终端,所述终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
本公开中涉及的接入网可以包括基站,所述基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
本公开中涉及的网元可以是AMF、UDM和NEF等,第一网络功能可以是SATE,第二网络功能可以是UDM,第三网络功能可以是AMF。需要说明的是,网元并不限于上述例举。示例性地,第一网络功能可以是任一具备态势感知处理开放功能的网元。在本公开的一些实施方式中,具备态势感知处理开放功能的网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将具备态势感知处理开放功能的网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。这里,所述第三指示信息可以指示所述IoT设备的设备标识。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。接收所述IoT设备的注册请求;拒绝所述注册请求。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。接收所述IoT设备的注册请求;拒绝所述注册请求。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。将所述IoT设备从网络中注销。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。将所述IoT设备从网络中注销。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图14所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由第三网络功能执行,所述方法包括:
步骤141、接收所述IoT设备的注册请求;
步骤142、拒绝所述注册请求。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。接收所述IoT设备的注册请求;拒绝所述注册请求。
在一个实施例中,接收第二网络功能发送的第三指示信息,所述第三指示信息指示IoT设备为被入侵和/或异常的设备。基于异常标识设置和/或存储所述IoT设备的状态。接收所述IoT设备的注册请求;拒绝所述注册请求。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图15所示,本实施例中提供一种态势感知的处理方法,其中,所述方法由AF执行,所述方法包括:
步骤151、接收第一网络功能发送的第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
这里,本公开所涉及的IoT设备可以是终端,所述终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。
本公开中涉及的接入网可以包括基站,所述基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
本公开中涉及的网元可以是AMF、UDM和NEF等,第一网络功能可以是SATE,第二网络功能可以是UDM,第三网络功能可以是AMF。需要说明的是,网元并不限于上述例举。示例性地,第一网络功能可以是任一具备态势感知处理开放功能的网元。在本公开的一些实施方式中,具备态势感知处理开放功能的网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将具备态势感知处理开放功能的网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,订阅所述IoT设备的态势感知业务。接收第一网络功能发送的第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。这里,所述第二指示信息用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。这里,攻击网络的时间可以是攻击网络的时间点也可以是攻击网络的持续时间。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以 与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了更好地理解本公开技术方案,以下通过3个示例性实施例对本公开技术方案进行示例性说明:
示例1:
请参见图16,提供一种态势感知的处理方法,所述方法包括以下至少之一:
步骤161、SATE可以与物联网设备联系,设置态势感知规则,例如:物联网设备的行为和发送和接收数据包的情况(包括原始IP地址和目标IP地址等)。物联网设备应按规定上报态势感知信息。
步骤162、SATE可以与RAN联系,设置态势感知的规则,例如:物联网设备的行为、发送和接收数据包情况(包括时间点、持续时间和数据包量等)。RAN应按规定上报态势感知信息。
步骤163、SATE可以与5GC(例如,AMF、SMF、UPF)联系,设置态势感知规则,例如:物联网设备的行为和发送和接收控制平面信令和用户平面数据包(包括时间点、持续时间和数据包量等)。5GC应当按规定上报态势感知信息。
步骤164、SATE可以与应用服务器AF联系,设置态势感知规则,例如:物联网设备的行为和发送和接收数据包情况(原始和目标IP地址,时间点和持续时间,数据包量)。应用服务器应按规定上报态势感知信息。
示例2:
请参见图17,提供一种态势感知的处理方法,所述方法包括:
步骤171、SATE根据用户面数据态势感知和控制面信令的上报,对上报结果(对应本公开的态势感知信息)进行分析,识别入侵行为和异常的物联网设备。SATE通过设备ID(例如SUPI)通知(对应本公开中发送第一指示信息)UDM异常的IoT设备。UDM使用异常标志设置和存储IoT设备状态。
步骤172、UDM向AMF发送通知(对应本公开中发送第二指示信息),告知IoT设备异常,并带有设备ID(例如SUPI)。AMF可以设置和存储带有异常标志的IoT设备状态。
步骤173、AMF向IoT设备发起注销程序,以将IoT设备从网络中剔除。
步骤174、如果UE向网络模拟一个新的注册过程,AMF或UDM存储带有异常标志的IoT设备状态将拒绝注册。
示例3:
请参见图18,提供一种态势感知的处理方法,所述方法包括:
步骤181、AF可以为IoT设备ID(例如GPSI)指示的IoT设备订阅态势感知业务。
步骤182、当SATE产生IoT设备的态势感知时,SATE应将异常IoT设备的报告通知给不被信任的AF(通过NEF发送第三指示信息),通知的内容可以包括在时间点和持续时间用行为细节攻击了网络。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图19所示,本实施例中提供一种态势感知的处理系统,其中,所述系统包括:第一网络功能191、第二网络功能192和第三网络功能193;其中,所述第一网络功能执行如本公开任一第一网络功能执行的方法;所述第二网络功能执行如本公开任一第二网络功能执行的方法;所述第三网络功能执行如本公开任一第三网络功能执行的方法。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图20所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
接收模块201,用于接收预定对象发送的态势感知信息;
处理模块202,用于基于态势感知信息,确定被入侵和/或异常的物联网IoT设备;
发送模块203,用于向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图21所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
接收模块211,用于接收预定对象发送的态势感知信息;
处理模块212,用于基于态势感知信息,确定被入侵和/或异常的物联网IoT设备;
发送模块213,用于向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图22所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
发送模块221,用于向所述第一网络功能发送基于所述态势感知规则信息获取的所述态势感知信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图23所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
接收模块231,用于接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
发送模块232,用于向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图24所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
接收模块241,用于接收第二网络功能发送的第三指示信息,所述第三指示信息用于指示IoT设备为被入侵和/或异常的设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图25所示,本公开实施例中提供一种态势感知的处理装置,其中,所述装置包括:
接收模块251,用于接收第一网络功能发送的第二指示信息;
其中,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
本公开实施例提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现应用于本公开任意实施例的方法。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序。
本公开实施例还提供一种计算机存储介质,其中,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的方法。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
如图26所示,本公开一个实施例提供一种终端的结构。
参照图26所示终端800本实施例提供一种终端800,该终端具体可是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图26,终端800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制终端800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全 部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在设备800的操作。这些数据的示例包括用于在终端800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为终端800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为终端800生成、管理和分配电力相关联的组件。
多媒体组件808包括在终端800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当终端800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为终端800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如组件为终端800的显示器和小键盘,传感器组件814还可以检测终端800或终端800一个组件的位置改变,用户与终端800接触的存在或不存在,终端800方位或加速/减速和终端800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于终端800和其他设备之间有线或无线方式的通信。终端800可以接入基于通信标准的无线网络,如Wi-Fi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,终端800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、 数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由终端800的处理器820执行以完成上述方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图27所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图27,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (41)

  1. 一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
    接收预定对象发送的态势感知信息;
    基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
    向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
  2. 根据权利要求1所述的方法,其中,所述第一网络功能为态势感知处理开放功能SATE。
  3. 根据权利要求1所述的方法,其中,所述方法还包括:
    向所述预定对象发送态势感知规则信息;
    所述接收预定对象发送的态势感知信息,包括:
    接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。
  4. 根据权利要求1所述的方法,其中,所述态势感知信息包括以下至少之一:
    IoT设备的行为信息;
    发送数据包的信息;以及
    接收数据包的信息。
  5. 根据权利要求1所述的方法,其中,所述第二网络功能为统一数据管理UDM。
  6. 根据权利要求1所述的方法,其中,所述第一指示信息还用于指示所述IoT设备的设备标识ID。
  7. 一种态势感知的处理方法,其中,所述方法由第一网络功能执行,所述方法包括:
    接收预定对象发送的态势感知信息;
    基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
    向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
  8. 根据权利要求7所述的方法,其中,所述第一网络功能为态势感知处理开放功能SATE。
  9. 根据权利要求7所述的方法,其中,所述方法还包括:
    向所述预定对象发送态势感知规则信息;
    所述接收预定对象发送的态势感知信息,包括:
    接收所述预定对象发送的基于所述态势感知规则信息获取的所述态势感知信息。
  10. 根据权利要求7所述的方法,其中,所述态势感知信息包括以下至少之一:
    IoT设备的行为信息;
    发送数据包的信息;以及
    接收数据包的信息。
  11. 根据权利要求7所述的方法,其中,所述第二指示信息还用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
  12. 一种态势感知的处理方法,其中,所述方法由预定对象执行,所述方法包括:
    向第一网络功能发送态势感知信息,所述态势感知信息用于确定被入侵和/或异常的物联网IoT设备。
  13. 根据权利要求12所述的方法,其中,所述方法还包括:
    接收所述第一网络功能发送的态势感知规则信息;
    基于所述态势感知规则信息获取所述态势感知信息。
  14. 根据权利要求12所述的方法,其中,所述第一网络功能为态势感知处理开放功能SATE。
  15. 根据权利要求12所述的方法,其中,所述态势感知信息包括以下至少之一:
    IoT设备的行为信息;
    发送数据包的信息;以及
    接收数据包的信息。
  16. 一种态势感知的处理方法,其中,所述方法由第二网络功能执行,所述方法包括:
    接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
    向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
  17. 根据权利要求16所述的方法,其中,所述第一网络功能为SATE,所述第二网络功能为UDM。
  18. 根据权利要求16所述的方法,其中,所述第一指示信息还用于指示所述IoT设备的设备标识ID。
  19. 根据权利要求16所述的方法,其中,所述方法还包括:
    基于异常标识设置和/或存储所述IoT设备的状态。
  20. 根据权利要求19所述的方法,其中,所述方法还包括:
    接收所述IoT设备的注册请求;
    拒绝所述注册请求。
  21. 根据权利要求16所述的方法,其中,所述第三网络功能为接入与移动管理功能AMF。
  22. 根据权利要求16所述的方法,其中,所述第三指示信息用于指示所述IoT设备的设备标识。
  23. 一种态势感知的处理方法,其中,所述方法由第三网络功能执行,所述方法包括:
    接收第二网络功能发送的第三指示信息,所述第三指示信息用于指示IoT设备为被入侵和/或异常的设备。
  24. 根据权利要求23所述的方法,其中,所述第二网络功能为UDM,所述第三网络功能为AMF。
  25. 根据权利要求23所述的方法,其中,所述第三指示信息还用于指示所述IoT设备的设备标识。
  26. 根据权利要求23所述的方法,其中,所述方法还包括:
    基于异常标识设置和/或存储所述IoT设备的状态。
  27. 根据权利要求23所述的方法,其中,所述方法还包括:
    接收所述IoT设备的注册请求;
    拒绝所述注册请求。
  28. 根据权利要求23所述的方法,其中,所述方法还包括:
    将所述IoT设备从网络中注销。
  29. 一种态势感知的处理方法,其中,所述方法由应用功能AF执行,所述方法包括:
    接收第一网络功能发送的第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
  30. 根据权利要求29所述的方法,其中,所述第一网络功能为SATE。
  31. 根据权利要求29所述的方法,其中,所述第二指示信息还用于指示以下至少之一:所述IoT设备攻击网络的时间和攻击行为。
  32. 根据权利要求29所述的方法,其中,所述方法还包括:
    订阅所述IoT设备的态势感知业务。
  33. 一种通信系统,所述系统包括第一网络功能、第二网络功能和第三网络功能,其中,
    所述第一网络功能执行如权利要求1至6或者7至11任一所述的方法,
    所述第二网络功能执行如权利要求16至22任一所述的方法,
    所述第三网络功能执行如权利要求29至32任一所述的方法。
  34. 一种态势感知的处理装置,其中,所述装置包括:
    接收模块,用于接收预定对象发送的态势感知信息;
    处理模块,用于基于态势感知信息,确定被入侵和/或异常的物联网IoT设备;
    发送模块,用于向第二网络功能发送第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
  35. 一种态势感知的处理装置,其中,所述装置包括:
    接收模块,用于接收预定对象发送的态势感知信息;
    确定模块,用于基于所述态势感知信息,确定被入侵和/或异常的物联网IoT设备;
    发送模块,用于向应用功能AF发送第二指示信息,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的物联网IoT设备。
  36. 一种态势感知的处理装置,其中,所述装置包括:
    发送模块,用于向第一网络功能发送态势感知信息,所述态势感知信息用于确定被入侵和/或异常的物联网IoT设备。
  37. 一种态势感知的处理装置,其中,所述装置包括:
    接收模块,用于接收第一网络功能发送的第一指示信息,所述第一指示信息用于指示所述IoT设备为被入侵和/或异常的设备;
    发送模块,用于向第三网络功能发送第三指示信息,所述第三指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
  38. 一种态势感知的处理装置,其中,所述装置包括:
    接收模块,用于接收第二网络功能发送的第三指示信息,所述第三指示信息用于指示IoT设备为被入侵和/或异常的设备。
  39. 一种态势感知的处理装置,其中,所述装置包括:
    接收模块,用于接收第一网络功能发送的第二指示信息;
    其中,所述第二指示信息用于指示所述IoT设备为被入侵和/或异常的设备。
  40. 一种通信设备,其中,包括:
    天线;
    存储器;
    处理器,分别与所述天线及存储器连接,被配置为通过执行存储在所述存储器上的计算机可执行指令,控制所述天线的收发,并能够实现权利要求1至6、7至11、12至15、16至22、23至28和29至32任一项提供的方法。
  41. 一种计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令被处理器执行后能够实现权利要求1至6、7至11、12至15、16至22、23至28和29至32任一项提供的方法。
PCT/CN2022/113141 2022-08-17 2022-08-17 态势感知的处理方法、装置、通信设备及存储介质 WO2024036530A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/113141 WO2024036530A1 (zh) 2022-08-17 2022-08-17 态势感知的处理方法、装置、通信设备及存储介质
CN202280003192.4A CN117917109A (zh) 2022-08-17 2022-08-17 态势感知的处理方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/113141 WO2024036530A1 (zh) 2022-08-17 2022-08-17 态势感知的处理方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024036530A1 true WO2024036530A1 (zh) 2024-02-22

Family

ID=89940438

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/113141 WO2024036530A1 (zh) 2022-08-17 2022-08-17 态势感知的处理方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN117917109A (zh)
WO (1) WO2024036530A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190078685A (ko) * 2017-12-13 2019-07-05 (주) 엠투유테크널러지 점진적 군집화를 이용한 센서 데이터의 이상 패턴 감지 방법
CN110351229A (zh) * 2018-04-04 2019-10-18 电信科学技术研究院有限公司 一种终端ue管控方法及装置
CN111770490A (zh) * 2019-04-02 2020-10-13 电信科学技术研究院有限公司 一种确定终端行为分析的方法和设备
US20220167171A1 (en) * 2020-11-20 2022-05-26 At&T Intellectual Property I, L.P. Security anomaly detection for internet of things devices
CN114727295A (zh) * 2021-01-04 2022-07-08 中国移动通信有限公司研究院 检测蜂窝物联网终端被僵尸网络控制的方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190078685A (ko) * 2017-12-13 2019-07-05 (주) 엠투유테크널러지 점진적 군집화를 이용한 센서 데이터의 이상 패턴 감지 방법
CN110351229A (zh) * 2018-04-04 2019-10-18 电信科学技术研究院有限公司 一种终端ue管控方法及装置
CN111770490A (zh) * 2019-04-02 2020-10-13 电信科学技术研究院有限公司 一种确定终端行为分析的方法和设备
US20220167171A1 (en) * 2020-11-20 2022-05-26 At&T Intellectual Property I, L.P. Security anomaly detection for internet of things devices
CN114727295A (zh) * 2021-01-04 2022-07-08 中国移动通信有限公司研究院 检测蜂窝物联网终端被僵尸网络控制的方法及装置

Also Published As

Publication number Publication date
CN117917109A (zh) 2024-04-19

Similar Documents

Publication Publication Date Title
WO2021159492A1 (zh) 接入控制方法、装置、通信设备及存储介质
WO2019192366A1 (zh) 一种终端ue管控方法及装置
WO2022120544A1 (zh) 通信方法及装置、无线接入网、终端及存储介质
WO2023028782A1 (zh) 上报信息的方法、装置、通信设备及存储介质
WO2023065255A1 (zh) 小区重选方法、装置、通信设备及存储介质
WO2024036530A1 (zh) 态势感知的处理方法、装置、通信设备及存储介质
WO2022032540A1 (zh) Uav飞行控制、管控策略处理方法及装置、设备及介质
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2022000514A1 (zh) 接入控制的方法、装置、通信设备及存储介质
WO2023184172A1 (zh) 创建pin的方法、装置、通信设备及存储介质
WO2024055334A1 (zh) 丢包处理方法、装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2023220893A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2023216259A1 (zh) 卫星覆盖信息确定方法、装置、通信设备和存储介质
WO2024031702A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2024031392A1 (zh) 个人物联网信息更新方法、装置、通信设备及存储介质
WO2023216257A1 (zh) 信号覆盖信息确定方法、装置、通信设备和存储介质
WO2023065080A1 (zh) 测距能力开放的方法、装置、通信设备及存储介质
WO2023077524A1 (zh) 一种寻呼过滤的方法、装置、通信设备及存储介质
WO2022032541A1 (zh) 接入控制的方法、装置、通信设备及存储介质
WO2023092598A1 (zh) 信息处理方法、装置、通信设备及存储介质
WO2024031728A1 (zh) 信息处理方法、系统及装置、通信设备及存储介质
WO2023102926A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2024031399A1 (zh) Ue加入pin的方法及装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280003192.4

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22955311

Country of ref document: EP

Kind code of ref document: A1