HK1254125B - A network access identifier of cellular access network node based authentication method - Google Patents
A network access identifier of cellular access network node based authentication methodInfo
- Publication number
- HK1254125B HK1254125B HK18113196.5A HK18113196A HK1254125B HK 1254125 B HK1254125 B HK 1254125B HK 18113196 A HK18113196 A HK 18113196A HK 1254125 B HK1254125 B HK 1254125B
- Authority
- HK
- Hong Kong
- Prior art keywords
- authentication
- wlan
- node
- network node
- access network
- Prior art date
Links
Description
背景技术Background Art
诸如计算机、手持设备或其他类型设备的设备可以通过有线或无线网络进行通信。无线网络可以包括蜂窝网络,蜂窝网络包括小区和相关联的蜂窝接入网络节点。小区内的无线设备可以连接到对应的蜂窝接入网络节点,以允许设备与其他设备进行通信。Devices such as computers, handheld devices, or other types of devices can communicate over wired or wireless networks. Wireless networks can include cellular networks, which include cells and associated cellular access network nodes. Wireless devices within a cell can connect to corresponding cellular access network nodes to allow the devices to communicate with other devices.
另一类型的无线网络是无线局域网(WLAN),无线局域网包括能够与设备进行无线连接的无线接入点。Another type of wireless network is a wireless local area network (WLAN), which includes wireless access points that enable devices to connect wirelessly.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
关于以下附图描述了一些实施方式。Some embodiments are described with respect to the following figures.
图1A和图1B是可以结合根据一些实施方式的技术或机制的示例网络配置的示意图。1A and 1B are diagrams of example network configurations that may incorporate techniques or mechanisms according to some embodiments.
图2是根据一些实施方式的示例认证过程的消息流程图。2 is a message flow diagram of an example authentication process, according to some implementations.
图3是根据另外的实施方式的另一示例过程的消息流程图。3 is a message flow diagram of another example process according to further embodiments.
图4A和图4B是根据另外的实施方式用于在用户设备(UE)和归属订户服务器(HSS)之间路由认证消息的示例配置的框图。4A and 4B are block diagrams of example configurations for routing authentication messages between a user equipment (UE) and a home subscriber server (HSS) according to further embodiments.
图5是根据一些实施方式的蜂窝接入网络节点和控制节点之间的示例过程的消息流程图。5 is a message flow diagram of an example process between a cellular access network node and a control node according to some embodiments.
图6是根据一些实施方式的密钥导出函数的框图。6 is a block diagram of a key derivation function according to some embodiments.
图7A-图7B是根据一些实施方式的示例蜂窝附着和安全建立过程的消息流程图。7A-7B are message flow diagrams of example cellular attach and security establishment procedures according to some embodiments.
图8是根据一些实施方式的密钥导出函数的序列的框图。8 is a block diagram of a sequence of key derivation functions according to some embodiments.
图9和图10是根据一些实施方式的无线局域网中的蜂窝接入网络节点中的示例协议层的框图。9 and 10 are block diagrams of example protocol layers in a cellular access network node in a wireless local area network according to some embodiments.
图11是根据一些实施方式的示例系统的框图。FIG. 11 is a block diagram of an example system according to some implementations.
具体实施方式DETAILED DESCRIPTION
图1A示出了包括蜂窝网络102和无线局域网(WLAN)104的示例网络配置。图1A还示出处于蜂窝网络102和WLAN 104两者的覆盖区域内的位置处的用户设备(UE)106。UE 106可以是能够与不同类型的无线接入网络进行通信的双模式UE(或者更一般地,多模式UE),无线接入网络在图1A的示例中包括蜂窝网络102和WLAN 104。FIG1A illustrates an example network configuration including a cellular network 102 and a wireless local area network (WLAN) 104. FIG1A also illustrates a user equipment (UE) 106 at a location within the coverage area of both the cellular network 102 and the WLAN 104. The UE 106 may be a dual-mode UE (or more generally, a multi-mode UE) capable of communicating with different types of radio access networks, which in the example of FIG1A include the cellular network 102 and the WLAN 104.
UE可以指代以下任何一个:计算机(例如台式计算机、笔记本电脑、平板电脑、服务器计算机等)、手持设备(例如个人数字助理、智能手机等)、可穿戴在人身上的可穿戴设备、嵌入在车辆或设备中的计算机、存储设备、通信节点等等。UE may refer to any of the following: computers (e.g., desktop computers, laptops, tablet computers, server computers, etc.), handheld devices (e.g., personal digital assistants, smartphones, etc.), wearable devices that can be worn on a person, computers embedded in vehicles or equipment, storage devices, communication nodes, etc.
蜂窝网络102可以根据由第三代合作伙伴计划(3GPP)提供的长期演进(LTE)标准(或其他标准)来操作。LTE标准还被称为演进通用陆地无线接入(E-UTRA)标准。虽然在随后的讨论中参考了LTE或E-UTRA,但是应该注意的是,根据一些实施方式的技术或机制可被应用到其它无线接入技术,诸如5G(第五代)技术。The cellular network 102 may operate in accordance with the Long Term Evolution (LTE) standard (or other standards) provided by the Third Generation Partnership Project (3GPP). The LTE standard is also known as the Evolved Universal Terrestrial Radio Access (E-UTRA) standard. Although reference is made to LTE or E-UTRA in the subsequent discussion, it should be noted that techniques or mechanisms according to some embodiments may be applied to other wireless access technologies, such as 5G (fifth generation) technology.
蜂窝网络102包括蜂窝接入网络节点108,蜂窝接入网络节点108能够通过蜂窝无线电链路109与移动设备106进行无线通信。尽管在图1A中仅描绘了一个蜂窝接入网络节点,但应注意的是,蜂窝网络102可包括对应于蜂窝网络102的相应小区的多个蜂窝接入网络节点。小区可以指由相应的蜂窝接入网络节点提供的覆盖区域。UE可以在小区之间移动并连接到相应的蜂窝接入网络节点。The cellular network 102 includes a cellular access network node 108 that is capable of wirelessly communicating with the mobile device 106 via a cellular radio link 109. Although only one cellular access network node is depicted in FIG1A , it should be noted that the cellular network 102 may include multiple cellular access network nodes corresponding to respective cells of the cellular network 102. A cell may refer to a coverage area provided by a respective cellular access network node. A UE may move between cells and connect to a respective cellular access network node.
在E-UTRA网络中,无线接入网络节点108可以实现为E-UTRAN Node B(eNB),包括基站和基站控制器的功能。在随后的讨论中,蜂窝接入网络节点108也可互换地称为eNB108。尽管在随后的讨论中参考了eNB,但是应该注意,根据本公开的技术或机制可以与根据其他协议操作的其他类型的蜂窝接入网络节点一起应用。In an E-UTRA network, the radio access network node 108 may be implemented as an E-UTRAN Node B (eNB), which includes the functionality of a base station and a base station controller. In the subsequent discussion, the cellular access network node 108 may also be interchangeably referred to as an eNB 108. Although reference is made to an eNB in the subsequent discussion, it should be noted that the techniques or mechanisms according to the present disclosure may be applied to other types of cellular access network nodes operating according to other protocols.
蜂窝网络102还包括核心网络,核心网络包括各种核心网络节点。作为示例,在演进分组系统(EPS)蜂窝网络中,核心网络节点可以包括服务网关(SGW)110和分组数据网络网关(PDN-GW)112。PDN-GW 112是用于在E-UTRA网络中的UE与分组数据网络(PDN)114(例如因特网或另一网络)之间传送的数据的入口点和出口点。SGW 110在MeNB 108和PDN-GW 112之间路由和转发UE的业务数据分组。SGW 110还可以在切换过程期间充当用户面的移动锚点。The cellular network 102 also includes a core network, which includes various core network nodes. As an example, in an Evolved Packet System (EPS) cellular network, the core network nodes may include a Serving Gateway (SGW) 110 and a Packet Data Network Gateway (PDN-GW) 112. The PDN-GW 112 is an entry point and an exit point for data transmitted between a UE in an E-UTRA network and a Packet Data Network (PDN) 114 (e.g., the Internet or another network). The SGW 110 routes and forwards traffic data packets for the UE between the MeNB 108 and the PDN-GW 112. The SGW 110 may also serve as a mobility anchor point for the user plane during a handover process.
在演进的分组系统中,核心网络节点还可以包括被称为移动性管理实体(MME)116的控制节点。MME 116是用于执行与E-UTRA网络相关联的各种控制任务的控制节点。例如,MME 116可以执行空闲模式的移动设备跟踪和寻呼、承载激活和去激活、当移动设备初始附着到E-UTRA网络时对服务网关的选择、UE在eNB之间的切换、用户的认证、向移动设备生成和分配临时标识等。在其他示例中,MME 116可以执行其他或备选的任务。In an evolved packet system, the core network nodes may also include a control node called a mobility management entity (MME) 116. The MME 116 is a control node for performing various control tasks associated with the E-UTRA network. For example, the MME 116 may perform idle mode mobile device tracking and paging, bearer activation and deactivation, selection of a serving gateway when a mobile device initially attaches to the E-UTRA network, UE handover between eNBs, user authentication, generation and allocation of temporary identities to mobile devices, etc. In other examples, the MME 116 may perform other or alternative tasks.
核心网络节点还可以包括归属订户服务器(HSS)118,归属订户服务器(HSS)118是包含订阅相关信息(订户简档)的主用户数据库,并且在执行用户的认证和授权时使用,以及可以提供关于用户的位置和当前正在处理用户的核心网络实体的信息。The core network nodes may also include a Home Subscriber Server (HSS) 118, which is a master user database containing subscription-related information (subscriber profiles) and is used when performing authentication and authorization of users, as well as providing information about the user's location and the core network entity that is currently handling the user.
当连接到蜂窝接入网络节点108时,UE 106能够与其他设备通信,所述其他设备可以连接到蜂窝网络102或可以连接到包括有线和/或无线网络的其他网络。While connected to the cellular access network node 108, the UE 106 is able to communicate with other devices that may be connected to the cellular network 102 or to other networks including wired and/or wireless networks.
WLAN 104包括无线接入点(AP)110。UE 106可以通过WLAN无线电链路111与无线AP110进行通信。尽管在图1A中仅描绘了一个无线AP,但是注意到,WLAN 104可以包括提供相应覆盖区域的多个无线AP。在一些实施方式中,WLAN 104可以根据电气和电子工程师协会(IEEE)802.11标准进行操作。注意,根据802.11标准操作的WLAN 104也可以被称为Wi-Fi网络。在其他示例中,WLAN 104可以按照不同的标准操作。值得注意的是,IEEE 802.11也支持终端设备之间(例如移动设备之间)的直接通信。这种直接通信(不通过任何AP)可以被称为WLAN直接通信或Wi-Fi直接通信。WLAN 104 includes a wireless access point (AP) 110. UE 106 can communicate with wireless AP 110 via a WLAN radio link 111. Although only one wireless AP is depicted in FIG1A , it is noted that WLAN 104 can include multiple wireless APs providing corresponding coverage areas. In some embodiments, WLAN 104 can operate according to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard. Note that a WLAN 104 operating according to the 802.11 standard can also be referred to as a Wi-Fi network. In other examples, WLAN 104 can operate according to different standards. It is worth noting that IEEE 802.11 also supports direct communication between terminal devices (e.g., between mobile devices). This direct communication (not through any AP) can be referred to as WLAN direct communication or Wi-Fi direct communication.
WLAN 104可以可选地连接到认证、授权和计费AAA服务器120。AAA服务器用来进行接入控制,其中使用认证来识别用户,使用授权来实现确定用户可以接入哪些网络资源和服务的策略,以及使用计费来跟踪用于记账和分析目的的资源。AAA服务器可以指代提供AAA服务器的服务的节点或节点集合,或者备选地,AAA服务器可以指代提供AAA服务器的服务的机器可读指令。WLAN 104 can optionally be connected to an authentication, authorization, and accounting (AAA) server 120. AAA servers are used to perform access control, using authentication to identify users, authorization to implement policies that determine which network resources and services users can access, and accounting to track resources for billing and analytics purposes. An AAA server can refer to a node or collection of nodes that provides the services of an AAA server, or alternatively, an AAA server can refer to machine-readable instructions that provide the services of an AAA server.
在许可频谱中提供蜂窝网络的蜂窝网络运营商已经快要没有新频谱可购买,而可用频谱获得许可可能是高成本的。因此,蜂窝网络运营商正在寻求通过将一部分用户面业务卸载到WLAN来扩展蜂窝网络容量的方法。这样,UE可以同时连接到蜂窝网络和WLAN。将WLAN集成到LTE蜂窝网络中被称为LTE-WLAN聚合。利用LTE-WLAN聚合,用户面业务可以由UE经由WLAN发送到eNB,并且用户面业务可以由UE经由WLAN从eNB接收。Cellular network operators offering cellular networks in licensed spectrum are running out of new spectrum to purchase, and licensing available spectrum can be costly. Consequently, cellular network operators are seeking ways to expand cellular network capacity by offloading some user-plane traffic to WLAN. This allows UEs to connect to both the cellular network and WLAN simultaneously. Integrating WLAN into an LTE cellular network is known as LTE-WLAN aggregation. With LTE-WLAN aggregation, user-plane traffic can be sent by a UE to an eNB via WLAN, and user-plane traffic can be received by the UE from the eNB via WLAN.
在诸如图1A所示的LTE-WLAN聚合架构中,eNB 108可以被称为主eNB(MeNB),而WLAN 104中的AP 110可以被认为是提供小蜂窝,MeNB 108可以向该小型小区卸载用户面业务的一部分。In an LTE-WLAN aggregation architecture such as that shown in FIG1A , the eNB 108 may be referred to as a master eNB (MeNB), while the AP 110 in the WLAN 104 may be considered to provide a small cell to which the MeNB 108 may offload a portion of the user plane traffic.
图1A示出了AP 110通过链路122连接到MeNB 108的架构。图1B示出了LTE-WLAN聚合架构的备选示例配置,其中多个WLAN AP 110(其是WLAN 128的一部分)通过相应链路130连接到WLAN网关132,WLAN网关132进而通过链路134连接到MeNB 108。1A shows an architecture in which an AP 110 is connected to a MeNB 108 via a link 122. FIG1B shows an alternative example configuration of an LTE-WLAN aggregation architecture in which multiple WLAN APs 110 (which are part of a WLAN 128) are connected via respective links 130 to a WLAN gateway 132, which in turn is connected to the MeNB 108 via a link 134.
传统上,WLAN和蜂窝网络可以分别执行它们各自的认证过程,以分别对试图接入WLAN或蜂窝网络的UE的用户进行认证。WLAN使用的认证过程通常不同于蜂窝网络使用的认证过程。如果采用LTE-WLAN聚合,则可能会出现与执行认证过程相关的各种问题。Traditionally, WLAN and cellular networks have performed their own authentication processes to authenticate users of UEs attempting to access the WLAN or cellular networks, respectively. The authentication process used by WLAN is typically different from that used by cellular networks. If LTE-WLAN aggregation is employed, various issues associated with performing the authentication process may arise.
在随后的讨论中,注意到“认证过程”可以只包括认证任务,或认证和授权任务两者。认证通常是指对试图接入网络的UE或UE的用户进行认证。在随后的讨论中,参考“对UE进行认证”。需要说明的是,对UE进行认证可以是指对UE的身份进行认证,也可以是对UE的用户的身份进行认证。授权可以指代实现确定UE或UE的用户可以接入哪些网络资源和服务的策略。In the subsequent discussion, it is noted that the term "authentication process" can include only authentication tasks, or both authentication and authorization tasks. Authentication generally refers to authenticating a UE or a user of a UE attempting to access a network. In the subsequent discussion, reference is made to "authenticating the UE." It should be noted that authenticating the UE can refer to authenticating the identity of the UE or the identity of the user of the UE. Authorization can refer to implementing policies that determine which network resources and services a UE or a user of the UE can access.
在某些情况下,可能需要在LTE-WLAN聚合的背景下使用WLAN认证过程。与在LTE-WLAN聚合的背景中使用WLAN认证过程相关联的第一个问题(称为“问题1”)在于:用于执行认证过程的核心网络信令可能必须从WLAN通过eNB路由到核心网络的蜂窝网络。在某些情况下,如图1A和图1B所示,从WLAN到核心网络的唯一接口是通过eNB(例如MeNB 108)。指定进入核心网络的唯一接口是经由MeNB允许所谓的“一个网络”操作,其中使用单个核心网络来支持和传送(LTE蜂窝网络的)许可频谱和(WLAN的)非许可频谱上的业务。In some cases, it may be necessary to use the WLAN authentication procedure in the context of LTE-WLAN aggregation. The first problem associated with using the WLAN authentication procedure in the context of LTE-WLAN aggregation (referred to as "Problem 1") is that core network signaling for performing the authentication procedure may have to be routed from the WLAN through the eNB to the cellular network of the core network. In some cases, as shown in Figures 1A and 1B, the only interface from the WLAN to the core network is through the eNB (e.g., MeNB 108). Specifying that the only interface into the core network is via the MeNB allows so-called "one network" operation, where a single core network is used to support and deliver traffic on both the licensed spectrum (of the LTE cellular network) and the unlicensed spectrum (of the WLAN).
第二个问题(称为“问题2”)在于:在一些情况下,WLAN可以连接到AAA服务器(例如,图1A中的AAA服务器120),而在其他情况下,WLAN可能没有连接到AAA服务器。在WLAN连接到AAA服务器的情况下,可以采用使用AAA服务器的常规WLAN认证过程。但是,在WLAN没有连接到AAA服务器的情况下,则可以通过MeNB执行认证过程。因此,根据通信网络的具体配置,不同的运营商可以指定不同的认证过程。因此,问题2涉及如何通知UE使用哪个认证过程。The second issue (referred to as "Issue 2") is that in some cases, the WLAN may be connected to an AAA server (e.g., AAA server 120 in FIG. 1A ), while in other cases, the WLAN may not be connected to an AAA server. When the WLAN is connected to an AAA server, a conventional WLAN authentication process using the AAA server can be employed. However, when the WLAN is not connected to an AAA server, the authentication process can be performed by the MeNB. Therefore, depending on the specific configuration of the communication network, different operators may specify different authentication processes. Therefore, Problem 2 concerns how to inform the UE which authentication process to use.
第三个问题(称为“问题3”)在于:希望在认证过程信令通过MeNB进行路由的情况下,在添加UE与WLAN之间的连接性时,通过避免用于认证过程的与核心网络的额外交互来减少过多的信令开销。对于问题3,希望用于认证过程的与LTE核心网络的交互仅在UE附着到蜂窝网络时发生,而不发生在UE附着到WLAN时。The third problem (referred to as "Problem 3") is that it is desirable to reduce excessive signaling overhead when adding connectivity between the UE and the WLAN by avoiding additional interactions with the core network for the authentication process, when the authentication process signaling is routed through the MeNB. For Problem 3, it is desirable that the interaction with the LTE core network for the authentication process only occur when the UE is attached to the cellular network, and not when the UE is attached to the WLAN.
根据本公开的一些实施方式,提供了各种解决方案来解决一个或多个前述问题。According to some embodiments of the present disclosure, various solutions are provided to address one or more of the aforementioned problems.
从WLAN向MeNB路由认证消息Routing authentication messages from WLAN to MeNB
根据一些实施方式,修改网络接入标识符(NAI)以包括蜂窝接入网络节点(例如,eNB)的标识符,使得WLAN节点(诸如WLAN AP或WLAN网关)向特定的eNB(而不是AAA服务器)发送认证消息。NAI指代用于识别请求接入网络的用户的标识符。NAI在2015年5月的名为“网络接入标识符”的请求评论(RFC)7542中进行了描述。According to some embodiments, the Network Access Identifier (NAI) is modified to include the identifier of a cellular access network node (e.g., an eNB), so that a WLAN node (such as a WLAN AP or WLAN gateway) sends authentication messages to a specific eNB (rather than an AAA server). The NAI refers to an identifier used to identify a user requesting access to a network. The NAI is described in Request for Comments (RFC) 7542, entitled "Network Access Identifier," dated May 2015.
传统上,NAI的目的是允许WLAN确定要向哪个AAA服务器发送认证消息。NAI的另一个目的是识别请求认证和授权的用户(订户)。Traditionally, the purpose of the NAI is to allow the WLAN to determine to which AAA server to send authentication messages. Another purpose of the NAI is to identify the user (subscriber) requesting authentication and authorization.
根据本公开的一些实施方式,WLAN节点可以使用修改的NAI(其包括eNB的标识符)来(从多个eNB中)选择一个eNB以发送认证消息。如上所述,eNB的标识符可以是用于识别小区的小区标识符或用于识别eNB的eNB标识符(或者更一般地,蜂窝接入网络节点的标识符)。“标识符”可以指任何字母数字字符串、代码或可以用于识别实体的任何其他信息,例如上面提到的小区或蜂窝接入网络节点。According to some embodiments of the present disclosure, a WLAN node may use a modified NAI (which includes an eNB identifier) to select an eNB (from among multiple eNBs) to send an authentication message. As described above, the eNB identifier may be a cell identifier for identifying a cell or an eNB identifier for identifying an eNB (or more generally, an identifier of a cellular access network node). An "identifier" may refer to any alphanumeric string, code, or any other information that can be used to identify an entity, such as a cell or cellular access network node as mentioned above.
图2是示出由各种节点执行的消息和任务的消息流程图,各种节点包括UE106、WLAN节点202(例如,AP 110或WLAN网关132)和MeNB 108。根据图2,为了执行认证,UE 106可以根据可扩展认证协议(EAP)与WLAN节点202交换消息,所述EAP是支持被称为EAP技术的多种认证技术的认证框架。EAP在2004年6月发布的标题为“可扩展认证协议(EAP)”的RFC3748中进行了描述。尽管在一些示例中对EAP进行了引用,但是应该注意的是,在其他示例中,UE 106和WLAN节点202之间的认证消息可以是根据其他认证协议。FIG2 is a message flow diagram illustrating messages and tasks performed by various nodes, including UE 106, WLAN node 202 (e.g., AP 110 or WLAN gateway 132), and MeNB 108. According to FIG2 , to perform authentication, UE 106 may exchange messages with WLAN node 202 in accordance with the Extensible Authentication Protocol (EAP), an authentication framework that supports a variety of authentication techniques known as EAP technologies. EAP is described in RFC 3748, entitled "Extensible Authentication Protocol (EAP)," published in June 2004. While reference is made to EAP in some examples, it should be noted that in other examples, authentication messages between UE 106 and WLAN node 202 may be in accordance with other authentication protocols.
UE 106向WLAN节点202发送(在204)基于局域网的EAP(EAPOL)-开始消息。EAPOL-开始消息是发送到多播组的多播消息,UE 106使用该多播消息来确定是否存在认证者(更具体地,可以作为认证者操作的WLAN节点202)。响应于EAPOL-开始消息,WLAN节点202向UE106发送(在206)EAP-请求/标识消息。EAP-请求消息的标识字符串包含WLAN节点202的标识。UE 106 sends (at 204) an EAP over LAN (EAPOL)-Start message to WLAN node 202. The EAPOL-Start message is a multicast message sent to a multicast group that UE 106 uses to determine whether an authenticator (more specifically, WLAN node 202 that can operate as an authenticator) exists. In response to the EAPOL-Start message, WLAN node 202 sends (at 206) an EAP-Request/Identification message to UE 106. The identification string of the EAP-Request message contains the identification of WLAN node 202.
响应于EAP-请求/标识消息,UE 106发送(在208)EAP响应/标识消息,其中EAP响应/标识消息中的标识字符串可以包括根据上面讨论的一些实施方式的修改的NAI。可以包含在EAP-响应消息的标识字符串中的NAI示例如下:In response to the EAP-Request/Identity message, the UE 106 sends (at 208) an EAP-Response/Identity message, where the identity string in the EAP-Response/Identity message may include a modified NAI according to some embodiments discussed above. Examples of NAIs that may be included in the identity string of the EAP-Response message are as follows:
user@MeNB1.O2.co.uk。user@MeNB1.O2.co.uk.
在上面的示例NAI中,“user”可以是用于识别UE 106的用户(订户)的国际移动订户标识(IMSI)。在其他示例中,可以采用其他用户标识符。字符串“O2.co.uk”标识操作蜂窝网络的蜂窝运营商的域(例如,O2),而NAI中的字符串“MeNB1”标识特定的eNB或特定的eNB的小区,在这种情况下是MeNB 108。在另一个示例中,标识蜂窝网络运营商的域的字符串可以如在3GPP TS23.003中所描述的,并且可以采取例如wlan.mnc015.mcc234.3gppnetwork.org的形式,其中该字符串的mnc015.mcc234部分提供对移动网络代码为015、移动国家代码为234的蜂窝运营商订阅提供商的引用。In the example NAI above, "user" may be an International Mobile Subscriber Identity (IMSI) used to identify the user (subscriber) of UE 106. In other examples, other user identifiers may be employed. The string "O2.co.uk" identifies the domain of the cellular operator operating the cellular network (e.g., O2), while the string "MeNB1" in the NAI identifies a specific eNB or a cell of a specific eNB, in this case, MeNB 108. In another example, the string identifying the domain of the cellular network operator may be as described in 3GPP TS 23.003 and may take the form of, for example, wlan.mnc015.mcc234.3gppnetwork.org, where the mnc015.mcc234 portion of the string provides a reference to a cellular operator subscription provider with a mobile network code of 015 and a mobile country code of 234.
如在3GPP TS23.003中所描述的,NAI还可以包括附加的字符串(这里称为Auth_type),以向WLAN指示要执行的认证的类型。例如,如果在NAI的开始处放置“0”,则这表示将使用EAP-AKA认证,而“1”表示将使用EAP-SIM认证。附加的字符串可以被添加到NAI以指示WLAN预期与其他网络单元交互以便完成认证过程的方法,以及具体地认证消息是在WLAN和蜂窝接入节点之间还是在WLAN和AAA服务器之间传送。备选地,可以定义3GPP TS 23.003中描述的现有认证类型标识字符串的新值,以指示EAP方法的类型以及用于在WLAN与其他网络节点之间传送认证消息的方法的类型。尽管提供了具体示例NAI,但是应注意,在其他示例中,可以采用根据其他格式的NAI,其中根据这种其他格式的这种NAI还可以包括蜂窝接入网络节点(诸如MeNB 108)的标识符。As described in 3GPP TS 23.003, the NAI may also include an additional string (herein referred to as Auth_type) to indicate to the WLAN the type of authentication to be performed. For example, if a "0" is placed at the beginning of the NAI, this indicates that EAP-AKA authentication will be used, while a "1" indicates that EAP-SIM authentication will be used. The additional string may be added to the NAI to indicate the method by which the WLAN expects to interact with other network elements to complete the authentication process, and specifically whether authentication messages are transmitted between the WLAN and a cellular access node or between the WLAN and an AAA server. Alternatively, a new value of the existing authentication type identification string described in 3GPP TS 23.003 may be defined to indicate the type of EAP method and the type of method used to transmit authentication messages between the WLAN and other network nodes. While a specific example NAI is provided, it should be noted that in other examples, NAIs according to other formats may be employed, wherein such NAIs according to such other formats may also include an identifier of a cellular access network node (such as MeNB 108).
在EAP响应消息中接收到标识字符串后,WLAN节点202解析(在210)该标识字符串以识别将被用于执行认证过程的eNB。在根据图2的示例中,所识别的eNB是MeNB 108。After receiving the identification string in the EAP response message, the WLAN node 202 parses (at 210) the identification string to identify the eNB that will be used to perform the authentication process. In the example according to FIG2 , the identified eNB is the MeNB 108.
WLAN节点202随后向所识别的MeNB 108发送(在212)认证消息。由WLAN节点202向MeNB 108发送的认证消息可以包括标识字符串,该标识字符串可以是由WLAN节点202接收的NAI,或者备选地,可以是NAI的修改版本(例如移除子字符串MeNB1)。在一些实施方式中,所发送的认证消息(在212)可以根据协议来执行认证和授权。在一些示例中,这种协议可以是远程认证拨入用户服务(RADIUS)协议,该协议是用于为连接和使用网络服务的用户提供AAA管理的联网协议。RADIUS在2000年6月发布的标题为“远程认证拨入用户服务(RADIUS)”的RFC 2865中进行了描述。在其他示例中,认证消息(在212处发送)可以根据Diameter基础协议,如2012年10月发布的标题为“Diameter基础协议”的RFC 6733中所述。在进一步的示例中,可以采用其他认证协议。WLAN node 202 then sends (at 212) an authentication message to the identified MeNB 108. The authentication message sent by WLAN node 202 to MeNB 108 may include an identification string, which may be the NAI received by WLAN node 202, or alternatively, a modified version of the NAI (e.g., with the substring "MeNB1" removed). In some embodiments, the authentication message sent (at 212) may perform authentication and authorization according to a protocol. In some examples, such a protocol may be the Remote Authentication Dial-In User Service (RADIUS) protocol, which is a networking protocol used to provide AAA management for users connecting to and using network services. RADIUS is described in RFC 2865, entitled "Remote Authentication Dial-In User Service (RADIUS)," published in June 2000. In other examples, the authentication message (sent at 212) may be according to the Diameter base protocol, such as described in RFC 6733, entitled "Diameter Base Protocol," published in October 2012. In further examples, other authentication protocols may be employed.
响应于接收到在212发送的认证消息,MeNB 108可以响应于认证消息而自主地执行认证,或者备选地,MeNB 108可以充当认证代理并且包括用于执行认证过程的认证服务器(诸如在图1A中所示的HSS 118)。认证质询可以基于认证消息中的NAI而发布。In response to receiving the authentication message sent at 212, the MeNB 108 may autonomously perform authentication in response to the authentication message, or alternatively, the MeNB 108 may act as an authentication agent and include an authentication server (such as the HSS 118 shown in FIG. 1A ) for performing the authentication process. The authentication challenge may be issued based on the NAI in the authentication message.
响应于在212发送的认证消息,MeNB 108向WLAN节点202发送(在214)认证质询。在一些示例中,认证质询是根据RADIUS协议的RADIUS接入-质询消息。在其他示例中,认证质询可以根据不同的协议,例如Diameter基础协议或其他协议。更一般地,认证质询可以指代为了引起来自目标节点的响应而发送的任何消息,其中该响应被用于认证目标节点。In response to the authentication message sent at 212, the MeNB 108 sends (at 214) an authentication challenge to the WLAN node 202. In some examples, the authentication challenge is a RADIUS Access-Challenge message according to the RADIUS protocol. In other examples, the authentication challenge can be according to a different protocol, such as the Diameter-based protocol or other protocols. More generally, an authentication challenge can refer to any message sent to elicit a response from a target node, where the response is used to authenticate the target node.
响应于认证质询(在214处发送的),WLAN节点202向UE 106发送(在216)认证质询,其中该认证质询可以是EAP-请求/质询消息。In response to the authentication challenge (sent at 214 ), the WLAN node 202 sends (at 216 ) the authentication challenge to the UE 106 , where the authentication challenge may be an EAP-Request/Challenge message.
UE 106通过发送(在218)认证质询响应来对认证质询进行响应,在一些示例中,认证质询响应可以是EAP-响应/质询消息。响应于认证质询响应,WLAN节点202向MeNB 108发送(在220)认证质询响应。在一些示例中,WLAN节点202向MeNB 108发送的认证质询响应可以是RADIUS接入-请求(质询响应)消息,或者可以是根据不同协议的消息。UE 106 responds to the authentication challenge by sending (at 218) an authentication challenge response, which in some examples may be an EAP-Response/Challenge message. In response to the authentication challenge response, WLAN node 202 sends (at 220) an authentication challenge response to MeNB 108. In some examples, the authentication challenge response sent by WLAN node 202 to MeNB 108 may be a RADIUS Access-Request (Challenge Response) message, or may be a message according to a different protocol.
响应于来自WLAN节点202的认证质询响应,MeNB 108向WLAN节点202发送(在222)接入接受。在一些示例中,该接入接受可以是RADIUS接入-接受消息,或者是根据不同协议的接入接受。In response to the authentication challenge response from the WLAN node 202, the MeNB 108 sends (at 222) an Access Accept to the WLAN node 202. In some examples, the Access Accept may be a RADIUS Access-Accept message, or an Access Accept according to a different protocol.
响应于从MeNB 108接收到接入接受消息,WLAN节点202指示(在224)UE 106被认证,并且WLAN的接入被授权给UE 106。此时,WLAN打开WLAN的802.1X受控端口,其效果是使除了仅EAP消息之外的业务(包括例如IP业务)能够在UE和蜂窝网络之间传送。作为响应,WLAN节点202发送成功指示(在226处),诸如EAP-成功消息或某个其他消息。可以在UE 106和WLAN节点202之间执行消息的进一步交换(在228处),以生成加密密钥。In response to receiving the Access Accept message from MeNB 108, WLAN node 202 indicates (at 224) that UE 106 is authenticated and that access to the WLAN is granted to UE 106. At this point, WLAN opens the 802.1X controlled port of the WLAN, which effectively enables traffic (including, for example, IP traffic) other than just EAP messages to be transmitted between the UE and the cellular network. In response, WLAN node 202 sends (at 226) a success indication, such as an EAP-Success message or some other message. A further exchange of messages (at 228) may be performed between UE 106 and WLAN node 202 to generate encryption keys.
有多种方式可以在UE 106处获得eNB的标识符。作为示例,可以执行以下的任何或一些组合:There are many ways to obtain the identifier of the eNB at the UE 106. As an example, any or some combination of the following may be performed:
·UE基于诸如小区ID、公共陆地移动网络(PLMN)ID等的其他网络标识符来导出eNB标识符(ID)。• The UE derives the eNB identifier (ID) based on other network identifiers such as cell ID, Public Land Mobile Network (PLMN) ID, etc.
·eNB导出标识WLAN节点和eNB之间的可路由路径的ID,并且例如通过使用专用无线资源控制(RRC)消息来将导出的ID传送给UE。• The eNB derives an ID identifying the routable path between the WLAN node and the eNB, and transmits the derived ID to the UE, for example by using a dedicated Radio Resource Control (RRC) message.
·为了在系统信息广播消息中的WLAN聚合的目的,eNB发信号通知可路由eNB ID。• For the purpose of WLAN aggregation in the system information broadcast message, the eNB signals the routable eNB ID.
在其他示例中,可以使用导出eNB的标识符的其他技术。In other examples, other techniques for deriving an identifier for the eNB may be used.
以下提供了根据本公开的修改的NAI的示例,其中在每个示例NAI中eNB的标识符带有下划线。Examples of modified NAIs according to the present disclosure are provided below, where the identifier of the eNB is underlined in each example NAI.
例如,可以指定两种类型的NAI,如3GPP TS 23.003中所述。第一类型的NAI是根NAI,而第二类型的NAI是修饰NAI。For example, two types of NAIs may be specified, as described in 3GPP TS 23.003. The first type of NAI is a root NAI, while the second type of NAI is a modified NAI.
根NAI是UE在可直接接入用户的归属订阅提供商的AAA服务器的网络上尝试认证时使用的NAI的类型。根NAI可以有以下形式:Username@realm,其中username可以从IMSI导出,realm可以从订阅提供商的移动网络代码(MNC)和移动国家代码(MCC)(它们共同提供PLMN代码)导出。The root NAI is the type of NAI used by a UE when attempting authentication on a network that has direct access to the AAA server of the user's home subscription provider. The root NAI can be of the form: Username@realm, where username can be derived from the IMSI and realm can be derived from the subscription provider's Mobile Network Code (MNC) and Mobile Country Code (MCC), which together provide the PLMN code.
如果认证消息(例如,EAP消息)必须经由不同于用户的归属订阅提供商的AAA服务器的另一AAA服务器(在“otherrealm”中)来路由,则使用修饰NAI。举例来说,UE可以在访问PLMN(VPLMN)中漫游,并且想要使用由VPLMN提供的WLAN服务;结果,去往AAA服务器的认证消息必须首先被路由到VPLMN,然后被路由到归属PLMN(HPLMN)。修饰NAI可以具有如下形式:homerealm!username@otherrealm。A modified NAI is used if authentication messages (e.g., EAP messages) must be routed via another AAA server (in "otherrealm") than the AAA server of the user's home subscription provider. For example, a UE may be roaming in a visited PLMN (VPLMN) and want to use WLAN services provided by the VPLMN; as a result, authentication messages to the AAA server must first be routed to the VPLMN and then to the home PLMN (HPLMN). The modified NAI may have the following form: homerealm!username@otherrealm.
下面列出了修改后的NAI的各种选项。Listed below are the various options for the modified NAI.
选项1(根NAI域(realm)包括小区ID)Option 1 (Root NAI realm includes cell ID)
根据选项1,包含在根NAI中的eNB的标识符(带下划线的文本)是小区ID。下面提出这样的根NAI的示例:According to option 1, the identifier of the eNB contained in the root NAI (underlined text) is the cell ID. An example of such a root NAI is presented below:
Auth_type<Identity_desc>@wlan.cellid523768193.mnc015.mcc234.3gppnetwork.orgAuth_type<Identity_desc>@wlan. cellid523768193 .mnc015.mcc234.3gppnetwork.org
在该根NAI中,带下划线的文本是UE连接到的MeNB的小区的小区ID。小区ID(示例中的cellid523768193)被添加到根NAI的NAI域,其中在这个示例中的NAI域是@符号后面的字符串的部分。当相对于特定的PLMN码引用时,小区ID是全球唯一的。WLAN节点例如可以在该域上执行查找以获取MeNB的IP地址。例如,查找可以是DNS服务器上的域名系统(DNS)查找。备选地,查找可以是在WLAN节点处静态配置的表。如果eNB提供多个小区,请注意,这些多个小区的所有小区ID可能预期会导致解析为相同(eNB)IP地址的域。In this root NAI, the underlined text is the cell ID of the cell of the MeNB to which the UE is connected. The cell ID (cellid523768193 in the example) is added to the NAI domain of the root NAI, where the NAI domain in this example is the portion of the string following the @ symbol. The cell ID is globally unique when referenced relative to a specific PLMN code. A WLAN node can, for example, perform a lookup on this domain to obtain the IP address of the MeNB. For example, the lookup can be a Domain Name System (DNS) lookup on a DNS server. Alternatively, the lookup can be a table statically configured at the WLAN node. If the eNB provides multiple cells, note that all cell IDs of these multiple cells can be expected to result in a domain that resolves to the same (eNB) IP address.
在只有仅与一个PLMN相关联的eNB附着到WLAN的情况下,MNC/MCC可能不必包括在NAI中。但是,为了覆盖WLAN网络共享场景的可能性,建议在一些实施方式中将MNC/MCC保留在NAI中。In the case where only eNBs associated with only one PLMN are attached to the WLAN, the MNC/MCC may not need to be included in the NAI. However, to cover the possibility of WLAN network sharing scenarios, it is recommended to retain the MNC/MCC in the NAI in some embodiments.
选项2(根NAI域包括eNB标识符)Option 2 (Root NAI field includes eNB identifier)
根据选项2,包含在根NAI中的eNB的标识符(带下划线的文本)是eNB ID。下面提出这样的根NAI的示例:According to option 2, the identifier of the eNB contained in the root NAI (underlined text) is the eNB ID. An example of such a root NAI is presented below:
Auth_type<Identity_desc>@wlan.enbid83456789.mnc015.mcc234.3gppnetwork.orgAuth_type<Identity_desc>@wlan. enbid83456789 .mnc015.mcc234.3gppnetwork.org
在该根NAI中,带下划线的文本是唯一标识eNB的eNB ID(在该示例中为enbid83456789),并被包括在根NAI的域中。在一些示例中,eNB ID可以由eNB使用RRC消息(或其它消息)提供给UE。eNB ID可以由eNB导出;例如eNB标识符可以被设置为eNB中任意选择的扇区的小区ID。eNB ID可以包括能够唯一地标识eNB的任何ID,用于将AAA消息从WLAN节点向eNB进行IP路由的目的。可能的是,可以从将eNB连接到WLAN的IP网络上的eNB的IP地址导出eNB ID。注意,这样的eNB ID当前不在常规E-UTRAN通信中使用,因此可以在RRC消息或其他消息中被指定为附加信息单元(IE)。In this root NAI, the underlined text is the eNB ID (enbid83456789 in this example) that uniquely identifies the eNB and is included in the domain of the root NAI. In some examples, the eNB ID may be provided by the eNB to the UE using an RRC message (or other message). The eNB ID may be derived by the eNB; for example, the eNB identifier may be set to the cell ID of an arbitrarily selected sector within the eNB. The eNB ID may include any ID that can uniquely identify the eNB for the purpose of IP routing of AAA messages from WLAN nodes to the eNB. It is possible that the eNB ID may be derived from the IP address of the eNB on the IP network that connects the eNB to the WLAN. Note that such an eNB ID is not currently used in conventional E-UTRAN communications and may therefore be specified as an additional information element (IE) in an RRC message or other message.
选项3(修饰NAI域包括小区ID)Option 3 (Modify the NAI field to include the cell ID)
如果UE正在VPLMN上进行蜂窝漫游,则可以使用修饰NAI(例如,对于VPLMN中的MeNB必须将该EAP消息转发到HPLMN上的AAA服务器的情况,例如在下文“作为验证代理的MeNB”一节中进一步讨论的,MeNB充当认证代理的解决方案中)。修饰NAI包括2个域,出现在字符串中的第一域是归属网络订阅提供商的域,出现在字符串中的第二域是AAA消息将通过其路由的运营商的域。If the UE is cellular roaming on a VPLMN, a modified NAI may be used (e.g., for situations where the MeNB in the VPLMN must forward the EAP message to the AAA server on the HPLMN, such as in the solution where the MeNB acts as an authentication proxy, discussed further below in the "MeNB as an Authentication Proxy" section). The modified NAI includes two fields, the first field appearing in the string is the domain of the home network subscription provider, and the second field appearing in the string is the domain of the operator through which the AAA message will be routed.
下面提供了包括小区ID(带下划线的文本)的根据选项3的修饰NAI的示例。An example of a modified NAI according to option 3 including the cell ID (underlined text) is provided below.
wlan.mnc015.mcc234.3gppnetwork.org!Auth_type<Identity_desc>@wlan.cel lid523768193.mnc071.mcc610.3gppnetwork.org。wlan.mnc015.mcc234.3gppnetwork.org! Auth_type<Identity_desc>@ wlan.cel lid523768193.mnc071.mcc610.3gppnetwork.org .
选项4(修饰NAI域包括eNBOption 4 (modify the NAI field to include eNB ID)ID)
下面提供了包含eNB ID(带下划线的文本)的根据选项4的修饰NAI的示例:An example of a decorated NAI according to Option 4 containing the eNB ID (underlined text) is provided below:
wlan.mnc015.mcc234.3gppnetwork.org!Auth_type<Identity_desc>@wlan.enb id83456789.mnc071.mcc610.3gppnetwork.orgwlan.mnc015.mcc234.3gppnetwork.org! Auth_type<Identity_desc>@wlan. enb id83456789 .mnc071.mcc610.3gppnetwork.org
用于发信号通知UE标识的选项Options for signaling UE identity
在根据选项1-4的上述示例NAI中的每一个NAI中,“Identity_desc”字符串表示对应于UE的标识符。标识符的示例可以包括以下内容:In each of the above example NAIs according to options 1-4, the "Identity_desc" string represents an identifier corresponding to the UE. Examples of identifiers may include the following:
·LTE核心网络已知的标识,如:Identifiers known to the LTE core network, such as:
ο国际移动订户标识(IMSI),其是与UE相关联的用户或订户的标识符,或者o International Mobile Subscriber Identity (IMSI), which is an identifier of a user or subscriber associated with the UE, or
ο全球唯一临时标识符(GUTI),其是为了标识UE而生成的临时标识符。o Globally Unique Temporary Identifier (GUTI), which is a temporary identifier generated to identify the UE.
·LTE eNB已知的标识(称为“无线电接入网络标识”),诸如:An identity known to the LTE eNB (called the "Radio Access Network Identity"), such as:
ο无线电网络临时标识(RNTI),其是由无线电接入网络在RRC消息中分配给UE的UE的临时标识符,或者o Radio Network Temporary Identity (RNTI), which is a temporary identifier of the UE assigned to the UE by the radio access network in an RRC message, or
ο WLAN MAC地址,其标识UE的WLAN接口,并且可以在蜂窝附着期间在UE和eNB之间交换。o WLAN MAC address, which identifies the UE's WLAN interface and may be exchanged between the UE and the eNB during cellular attach.
在其他示例中,可以采用对应于UE的其他标识符。In other examples, other identifiers corresponding to the UE may be used.
由于在此描述的一些解决方案中,eNB能够自主地(不接入HSS/AAA服务器或核心网络)处理认证过程,因此使用无线电接入网络标识(例如,RNTI或MAC地址)是可能的。另外,eNB可能能够将RNTI或MAC地址映射到核心网络标识。由于隐私原因,可以使用临时标识。Since in some of the solutions described herein, the eNB can handle the authentication process autonomously (without access to the HSS/AAA server or core network), it is possible to use a radio access network identity (e.g., RNTI or MAC address). In addition, the eNB may be able to map the RNTI or MAC address to a core network identity. For privacy reasons, a temporary identity may be used.
在针对LTE-WLAN聚合配置UE的过程期间,可以由MeNB使用RRC消息(例如RRC连接重配置“RRCConnectionReconfiguration”命令)向UE提供“Identity_desc”字符串(表示对应于UE的标识符)以及可选的新的eNB_Identifier(eNB的标识符),如图3所示。During the process of configuring the UE for LTE-WLAN aggregation, the MeNB may provide the UE with an "Identity_desc" string (representing the identifier corresponding to the UE) and an optional new eNB_Identifier (identifier of the eNB) using an RRC message (e.g., an RRC connection reconfiguration "RRCConnectionReconfiguration" command), as shown in FIG3 .
在图3中,UE 106发送(在302)测量结果,测量结果包括由各种无线接入节点(诸如MeNB 108和WLAN AP 110)发送的信号的测量。所述测量结果被发送到MeNB 108,并且可以指示可以执行LTE-WLAN聚合(例如,由UE测量的来自WLAN AP 110的信号的强度或功率高于指定的阈值)。3 , UE 106 transmits (at 302) measurement results that include measurements of signals transmitted by various wireless access nodes, such as MeNB 108 and WLAN AP 110. The measurement results are transmitted to MeNB 108 and may indicate that LTE-WLAN aggregation may be performed (e.g., the strength or power of the signal from WLAN AP 110 measured by the UE is above a specified threshold).
响应于确定可以执行LTE-WLAN聚合,MeNB 108向UE 106发送(在304)控制消息,其中控制消息包括要包含在用于EAP认证的标识字符串中的eNB_Identifier,如上面结合图2所讨论的。在一些示例中,控制消息(在304处发送的)可以包括RRC连接重配置“RRCConnectionReconfiguration”命令。In response to determining that LTE-WLAN aggregation can be performed, MeNB 108 sends (at 304) a control message to UE 106, where the control message includes the eNB_Identifier to be included in the identification string for EAP authentication, as discussed above in conjunction with FIG2. In some examples, the control message (sent at 304) can include an RRC connection reconfiguration "RRCConnectionReconfiguration" command.
图3中所示的另外的消息306、308和310分别对应于图2中的消息204、206和208。在310处发送的EAP-响应/标识消息中,标识字符串包括由MeNB 108在304发送的RRC连接重配置“RRCConnectionReconfiguration”命令中发送的eNB_Identifier。3 corresponds to messages 204, 206, and 208, respectively, in FIG2. In the EAP-Response/Identity message sent at 310, the identification string includes the eNB_Identifier sent by MeNB 108 in the RRCConnectionReconfiguration command sent at 304.
在一些示例中,可以对3GPP TS 36.331做出以下改变(改变带有下划线)。In some examples, the following changes may be made to 3GPP TS 36.331 (changes are underlined).
RRC连接重配置“RRCConnectionReconfiguration”RRC connection reconfiguration "RRCConnectionReconfiguration"
RRC连接重配置消息是修改RRC连接的命令。它可以传送以下信息:测量配置、移动性控制、无线电资源配置(包括资源块(RB)、MAC主配置和物理信道配置)以及任何相关联的专用非接入层(NAS)信息和安全配置。The RRC Connection Reconfiguration message is a command to modify the RRC connection. It can convey the following information: measurement configuration, mobility control, radio resource configuration (including resource blocks (RBs), MAC primary configuration and physical channel configuration), as well as any associated dedicated non-access stratum (NAS) information and security configuration.
信令无线电承载:SRB1Signaling Radio Bearer: SRB1
RLC-SAP:AMRLC-SAP:AM
逻辑信道DCCHLogical Channel DCCH
方向:E-UTRAN到UEDirection: E-UTRAN to UE
RRC连接配置消息RRC Connection Configuration message
网络提供的使用WLAN-LTE聚合类型认证的指示Indication provided by the network to use WLAN-LTE aggregation type authentication
在一些实施方式中,为了解决以上进一步讨论的问题2,网络(诸如MeNB108)可以向UE提供关于如下的指示:当UE在LTE-WLAN聚合模式中工作时,UE应使用多个认证过程中的哪个过程来获得对WLAN资源的接入。In some embodiments, to address issue 2 discussed further above, the network (such as MeNB 108) may provide an indication to the UE as to which of multiple authentication procedures the UE should use to gain access to WLAN resources when the UE operates in LTE-WLAN aggregation mode.
UE可以在使用第一类型认证过程和第二类型认证过程之间进行选择,第一类型认证过程中,认证消息在WLAN节点和蜂窝接入网络节点(例如MeNB 108)之间进行路由,在第二类型认证过程中,认证消息在WLAN节点和AAA服务器(例如,图1A中的120)之间进行路由。The UE may select between using a first type of authentication procedure, in which authentication messages are routed between the WLAN node and the cellular access network node (e.g., MeNB 108), and a second type of authentication procedure, in which authentication messages are routed between the WLAN node and the AAA server (e.g., 120 in FIG. 1A ).
第一类型认证过程可以包括这里讨论的各种技术中的任何一种,包括使用如上所述的修改的NAI(其包括eNB的标识符),和/或生成和使用密钥,如下面进一步讨论的。The first type authentication procedure may include any of the various techniques discussed herein, including using a modified NAI (which includes an identifier of the eNB) as described above, and/or generating and using keys, as discussed further below.
第二类型认证过程是在WLAN节点和AAA服务器之间的传统认证程序(例如来自Wi-Fi联盟的Wi-Fi保护接入(WPA2))以获得对WLAN资源的接入。The second type of authentication process is a traditional authentication procedure (such as Wi-Fi Protected Access (WPA2) from the Wi-Fi Alliance) between a WLAN node and an AAA server to gain access to WLAN resources.
在一些示例实施方式中,可以由网络使用RRC消息来通知UE该UE应当应用的认证过程的类型。In some example embodiments, an RRC message may be used by the network to inform the UE of the type of authentication procedure that the UE should apply.
要使用的认证过程的类型的指示可以是显式的。这种显式的指示可以包括在RRCConnectionReconfiguration命令中,该命令可以用于配置对基于WLAN的小型小区的使用。The indication of the type of authentication procedure to be used may be explicit.Such an explicit indication may be included in an RRCConnectionReconfiguration command that may be used to configure the use of a WLAN-based small cell.
例如,可以将以下信息单元(IE)添加到RRCConnectionReconfiguration命令中:For example, the following information element (IE) may be added to the RRCConnectionReconfiguration command:
WLANAuthenticationType IE(枚举值:AAA路由,eNB路由,...)WLANAuthenticationType IE (enumeration value: AAA routing, eNB routing, ...)
如果WLANAuthenticationType IE被设置为值“eNB路由”,则采用第一类型认证过程。另一方面,如果WLANAuthenticationType IE被设置为值“AAA路由”,则使用第二类型认证过程。If the WLANAuthenticationType IE is set to the value "eNB-routed", the first type authentication procedure is adopted. On the other hand, if the WLANAuthenticationType IE is set to the value "AAA-routed", the second type authentication procedure is used.
在备选实施方式中,使用第一类型认证过程的指示可以是隐式指示,其可以使用在针对WLAN配置使用的RRCConnectionReconfiguration消息中的eNB ID(例如,上面讨论的eNB_Identifier)的信令(或者隐式地通过eNB ID的存在)来提供。由于这样的eNB ID只是为了构建包括eNB ID的NAI而被提供给UE,所以eNB ID的存在隐式地指示了第一类型认证过程的使用。In an alternative embodiment, the indication to use the first type of authentication procedure may be an implicit indication, which may be provided using the signaling of the eNB ID (e.g., the eNB_Identifier discussed above) in the RRCConnectionReconfiguration message used for WLAN configuration (or implicitly through the presence of the eNB ID). Since such an eNB ID is provided to the UE only for the purpose of constructing the NAI including the eNB ID, the presence of the eNB ID implicitly indicates the use of the first type of authentication procedure.
上述指示要使用的认证过程类型的信令是使得:UE知道哪种类型的认证过程与哪个WLAN一起使用,其中WLAN类型可以例如使用服务集标识(SSID)或基础SSID(BSSID)来表示。The signaling indicating the type of authentication procedure to be used enables the UE to know which type of authentication procedure is used with which WLAN, wherein the WLAN type may be represented by, for example, a service set identifier (SSID) or a basic SSID (BSSID).
在MeNB处处理认证消息Processing authentication messages at the MeNB
以下描述用于在MeNB 108处理来自UE的认证消息(诸如EAP消息)的示例技术或机制。The following describes example techniques or mechanisms for processing authentication messages (such as EAP messages) from a UE at the MeNB 108 .
在第一类型的解决方案中,MeNB 108充当认证代理。In a first type of solution, the MeNB 108 acts as an authentication proxy.
在第二类型的解决方案中,MeNB 108充当自主认证服务器。In a second type of solution, the MeNB 108 acts as an autonomous authentication server.
MeNB充当认证代理MeNB acts as an authentication agent
此解决方案解决问题1,但不解决问题3。This solution solves problem 1, but not problem 3.
如以上结合图2所讨论的,响应于来自UE的EAP消息,WLAN节点(例如,图2中的WLAN节点202)向MeNB 108发送认证消息。响应于从WLAN节点202接收到认证消息,充当认证代理的MeNB在执行UE的认证中涉及核心网络(以及最终在图1中的HSS 118),并且任何认证信令(例如,AAA信令)将在UE和HSS 118之间延伸。As discussed above in conjunction with FIG2 , in response to the EAP message from the UE, the WLAN node (e.g., WLAN node 202 in FIG2 ) sends an authentication message to the MeNB 108. In response to receiving the authentication message from the WLAN node 202, the MeNB, acting as an authentication agent, involves the core network (and ultimately the HSS 118 in FIG1 ) in performing authentication of the UE, and any authentication signaling (e.g., AAA signaling) will extend between the UE and the HSS 118.
传统上,AAA信令在WLAN节点和AAA服务器之间传送。在本公开的一些实施方式中,经由MeNB 108对AAA信令进行路由。Traditionally, AAA signaling is transmitted between WLAN nodes and AAA servers. In some embodiments of the present disclosure, AAA signaling is routed via MeNB 108.
在图4A和图4B中分别示出了用于在UE 106和HSS 118之间经由MeNB 108对认证消息进行路由的不同选项。Different options for routing authentication messages between the UE 106 and the HSS 118 via the MeNB 108 are shown in FIGURES 4A and 4B, respectively.
在图4A中,通过WLAN 104、充当AAA代理的MeNB 108和3GPP AAA服务器402在UE106和HSS 118之间对认证消息进行路由。在图4A的选项中,提供了核心网络中MeNB 108与3GPP AAA服务器402之间的连接。4A, authentication messages are routed between UE 106 and HSS 118 through WLAN 104, MeNB 108 acting as AAA proxy, and 3GPP AAA server 402. In the option of FIG4A, a connection between MeNB 108 and 3GPP AAA server 402 in the core network is provided.
在图4B中,通过WLAN 104、MeNB 108、MME 116和3GPP AAA服务器402在UE 106和HSS 118之间对认证消息进行路由。In FIG. 4B , authentication messages are routed between the UE 106 and the HSS 118 through the WLAN 104 , the MeNB 108 , the MME 116 , and the 3GPP AAA server 402 .
一旦从UE 106接收到包含标识字符串的EAP-请求,MeNB 108就向3GPP AAA服务器402(图4A)或向MME 116(图4B)发送认证消息。为了认证UE 106,HSS 118使用对应于UE 106的标识符。如上所述,与UE对应的该标识符可以是在NAI的“Identity_desc”字符串中提供的IMSI,或者备选地,如果在NAI中使用无线电接入网络标识(例如上面讨论的RNTI或MAC地址),则MeNB 108用诸如IMSI的核心网络标识替换该无线电接入网络标识。MeNB 108可以确定图4A的系统架构中的正确的3GPP AAA服务器的IP地址的一种方式是通过使用NAI域中标识蜂窝网络运营商的一部分来执行DNS查找。Upon receiving the EAP-Request containing the identification string from the UE 106, the MeNB 108 sends an authentication message to the 3GPP AAA server 402 ( FIG. 4A ) or to the MME 116 ( FIG. 4B ). To authenticate the UE 106, the HSS 118 uses an identifier corresponding to the UE 106. As described above, this identifier corresponding to the UE can be the IMSI provided in the “Identity_desc” string of the NAI, or alternatively, if a radio access network identifier (e.g., the RNTI or MAC address discussed above) is used in the NAI, the MeNB 108 replaces the radio access network identifier with a core network identifier such as the IMSI. One way that the MeNB 108 can determine the IP address of the correct 3GPP AAA server in the system architecture of FIG. 4A is by performing a DNS lookup using a portion of the NAI field that identifies the cellular network operator.
如上所述,取决于UE 106是否在蜂窝漫游,可以使用根NAI或修饰NAI。如果UE 106不在蜂窝漫游,则使用根NAI;当UE 106在蜂窝漫游时使用修饰NAI。如果消息必须首先通过VPLMN中的AAA服务器,然后到达HPLMN中的AAA服务器(在图4A或图4B中没有示出两个AAA服务器的情况),则修饰NAI可能是合适的。NAI中包括eNB的标识符(例如,小区ID或eNB ID)的部分可以由MeNB 108去除。As described above, depending on whether UE 106 is roaming in cellular mode, either the root NAI or the modified NAI can be used. If UE 106 is not roaming in cellular mode, the root NAI is used; when UE 106 is roaming in cellular mode, the modified NAI is used. If the message must first pass through an AAA server in the VPLMN and then reach an AAA server in the HPLMN (the case where two AAA servers are not shown in Figures 4A or 4B), the modified NAI may be appropriate. The portion of the NAI that includes the eNB's identifier (e.g., cell ID or eNB ID) may be removed by MeNB 108.
如果使用图4B的选项,则EAP消息可潜在地在消息所包括的透明容器中被转发到MME 116,该消息例如是从MeNB 108向MME 116发送(在502)的UE-WLAN聚合ID消息,如图5所示。UE-WLAN聚合ID可以是UE的用户的IMSI或者与UE 106对应的任何其他标识符。If the option of FIG4B is used, the EAP message may be forwarded to the MME 116, potentially in a transparent container included in a message, such as a UE-WLAN Aggregation ID message sent (at 502) from the MeNB 108 to the MME 116, as shown in FIG5. The UE-WLAN Aggregation ID may be the IMSI of the user of the UE or any other identifier corresponding to the UE 106.
然后,MME 116可以将EAP消息解包并且将解包的EAP消息转发给适当的AAA服务器(例如,图4B中的402)。EAP消息内的NAI可以具有足够的信息以便MME 116确定应该将解包的EAP消息(例如,如上所述的没有eNB的标识符的传统形式的NAI)转发给哪个AAA服务器。The MME 116 may then unpack the EAP message and forward the unpacked EAP message to the appropriate AAA server (e.g., 402 in FIG. 4B ). The NAI within the EAP message may contain sufficient information for the MME 116 to determine to which AAA server the unpacked EAP message (e.g., the traditional form of the NAI without the eNB's identifier as described above) should be forwarded.
响应于UE-WLAN聚合ID消息,MME 116向MeNB 108发送(在504)UE-WLAN聚合质询,其中UE-WLAN聚合质询可能已经由HSS 118或AAA服务器402发出。UE-WLAN聚合质询消息包含质询向量。In response to the UE-WLAN Aggregation ID message, the MME 116 sends (at 504) a UE-WLAN Aggregation Challenge to the MeNB 108, where the UE-WLAN Aggregation Challenge may have been issued by the HSS 118 or the AAA server 402. The UE-WLAN Aggregation Challenge message contains a challenge vector.
在无线电接入网络(RAN)共享场景中,可能存在连接到MeNB 108的多个MME(在不同的PLMN中)。为了支持这种场景,MeNB 108可能必须读取NAI以确定哪个MME要转发EAP消息(假定IMSI被用作Identity_desc)。另一方面,如果无线电接入网络标识被用作NAI中的Identity_desc(上面讨论的示例),或者如果EAP消息到达与特定用户相关联的X2-AP消息,则MeNB 108可以进行表查找以确定哪个特定的MME(即哪个S1-C链路)应该用于转发透明容器。In a radio access network (RAN) sharing scenario, there may be multiple MMEs (in different PLMNs) connected to the MeNB 108. To support this scenario, the MeNB 108 may have to read the NAI to determine which MME to forward the EAP message (assuming that the IMSI is used as the Identity_desc). On the other hand, if the radio access network identity is used as the Identity_desc in the NAI (the example discussed above), or if the EAP message arrives in an X2-AP message associated with a specific user, the MeNB 108 may perform a table lookup to determine which specific MME (i.e., which S1-C link) should be used to forward the transparent container.
下面描述如图5所示的对于3GPP TS 36.413的示例性改变,以启用MeNB108与MME116之间的信令。The following describes exemplary changes to 3GPP TS 36.413, as shown in FIG. 5 , to enable signaling between the MeNB 108 and the MME 116 .
UEUE WLAN-聚合认证消息WLAN-aggregation authentication message
UE-WLAN聚合IDUE-WLAN aggregation ID
UE-WLAN聚合ID消息(如下表所示)由MeNB发送,用于请求MME发送要发送给UE的EAP质询响应的对应质询向量。方向是eNB→MME。The UE-WLAN Aggregation ID message (as shown in the table below) is sent by the MeNB to request the MME to send the corresponding challenge vector of the EAP challenge response to be sent to the UE. The direction is eNB → MME.
UE-WLAN聚合质询UE-WLAN aggregation query
UE-WLAN聚合质询消息(如下表所示)由MME发送,用于在EAP交换期间发送用于质询UE的IE以进行WLAN认证。所述方向是MME→eNB。The UE-WLAN Aggregation Challenge message (as shown in the table below) is sent by the MME to send IEs for challenging the UE for WLAN authentication during the EAP exchange. The direction is MME→eNB.
MeNB自主处理EAP消息MeNB autonomously processes EAP messages
以上讨论了MeNB 108用作认证代理的第一类型的解决方案。以下讨论MeNB 108用作自主认证服务器的第二类型的解决方案。The first type of solution in which the MeNB 108 functions as an authentication proxy is discussed above. The second type of solution in which the MeNB 108 functions as an autonomous authentication server is discussed below.
第二类型的解决方案解决了问题1和问题2。The second type of solution addresses both problems 1 and 2.
对于第二类型的解决方案,假设MeNB 108获得密钥Kwlan(下面讨论)。在分级上,该密钥可以处于与在MME 116处生成的KeNB相同的安全级别。MME116使用作为NAS消息的计数器的NAS上行链路计数来生成KeNB。For the second type of solution, it is assumed that the MeNB 108 obtains the key Kwlan (discussed below). Hierarchically, this key can be at the same security level as the KeNB generated at the MME 116. The MME 116 generates KeNB using the NAS uplink count as a counter of the NAS message.
可以使MeNB 108知道密钥Kwlan。密钥Kwlan可以由MeNB 108和UE 106两者用于执行WLAN EAP认证/授权质询以及计算用于加密和完整性保护的WLAN专用密钥。The key Kwlan may be made known to the MeNB 108. The key Kwlan may be used by both the MeNB 108 and the UE 106 to perform WLAN EAP authentication/authorization challenges and to calculate WLAN-specific keys for encryption and integrity protection.
MeNB 108生成Kwlan或者从MME 116向其提供Kwlan。UE 106能够从存储在UE 106的通用订户标识模块(USIM)上的主密钥K生成Kwlan。The MeNB 108 generates Kwlan or is provided with Kwlan from the MME 116. The UE 106 can generate Kwlan from a master key K stored on the UE's 106 Universal Subscriber Identity Module (USIM).
如图6所示,可以通过使用密钥导出函数(KDF)602,以与KeNB的生成类似的方式来生成密钥Kwlan。KDF 602接收两个输入:(1)输入密钥(图6中的Kasme),通常是秘密值,该秘密值不离开已知或者导出密钥的安全域;(2)输入字符串(图6中的INPUT_STRING1),它可能是也可能不是秘密的,并且可以使用预定的一组参数或值来构建。As shown in Figure 6, the key Kwlan can be generated in a similar manner to the generation of KeNB by using a key derivation function (KDF) 602. KDF 602 receives two inputs: (1) an input key (Kasme in Figure 6), which is typically a secret value that does not leave the security domain from which the key is known or derived; and (2) an input string (INPUT_STRING1 in Figure 6), which may or may not be secret and can be constructed using a predetermined set of parameters or values.
在生成Kwlan中使用的INPUT_STRING1可以被存储并被转发到UE 106,以使得UE106也能够生成Kwlan(注意,另一输入Kasme可以由UE 106生成)。INPUT_STRING1 used in generating Kwlan may be stored and forwarded to UE 106 to enable UE 106 to also generate Kwlan (note that another input Kasme may be generated by UE 106).
在一些实施方式中,可以使用服务网络标识(SN ID)来确定Kasme(Kasme是EPS会话主密钥)。In some implementations, the serving network identity (SN ID) may be used to determine Kasme (Kasme is the EPS session master key).
作为示例,INPUT_STRING1可以是由MME 116生成的随机数,并且随后在UE 106的附着过程期间(例如,通过将该随机数包括在从MME 116向UE 106发送的认证请求消息中)将该随机数发送给UE 106。认证请求消息在3GPP TS24.301中描述。备选地,INPUT_STRING1可以是UE 106和MeNB 116都知道的并且可以改变的值。这样的值将不必发信号通知给UE。这样的值的示例是RRC消息计数器。As an example, INPUT_STRING1 can be a random number generated by MME 116 and subsequently sent to UE 106 during its attach procedure (e.g., by including the random number in an authentication request message sent from MME 116 to UE 106). The authentication request message is described in 3GPP TS 24.301. Alternatively, INPUT_STRING1 can be a value that is known to both UE 106 and MeNB 116 and can change. Such a value does not need to be signaled to the UE. An example of such a value is an RRC message counter.
下面带下划线的文本可以被添加到3GPP TS 33.401以支持以上内容,其中FC是密钥导出函数的特定变体的标识符。The underlined text below may be added to 3GPP TS 33.401 to support the above, where FC is an identifier of a specific variant of the key derivation function.
附件A(规范):Annex A (Specifications):
密钥导出函数Key derivation function
A.1KDF接口和输入参数构建A.1 KDF interface and input parameter construction
……
A.16在MME处导出KwlanA.16 Exporting Kwlan at the MME
该输入字符串在MME和UE从Kasme导出Kwlan以用于WLAN聚合时使用。应使用以下This input string is used by the MME and UE when deriving Kwlan from Kasme for WLAN aggregation. The following should be used 输入参数来形成密钥导出函数的输入字符串:Enter the parameters to form the input string to the key derivation function:
-FC=0x1D-FC=0x1D
-P0=在MME生成的随机非负整数的值- P0 = random non-negative integer value generated at the MME
-L0=在上述步骤中生成的非负整数的长度(即0x00 0x02)输入密钥是Kasme。- L0 = the length of the non-negative integer generated in the above step (ie 0x00 0x02) The input key is Kasme.
图7A-7B示出了根据3GPP TS 23.401的修改的LTE附着和安全建立过程。下面讨论根据图7A-7B所示的3GPP TS 23.401的对LTE附着和安全建立过程的修改。没有进一步讨论根据3GPP TS 23.401的其余消息。7A-7B illustrate a modified LTE attach and security setup procedure according to 3GPP TS 23.401. The modifications to the LTE attach and security setup procedure according to 3GPP TS 23.401 shown in FIG7A-7B are discussed below. The remaining messages according to 3GPP TS 23.401 are not discussed further.
如图7A-7B中所示,消息11是由MME 116向MeNB 108发送的初始上下文建立请求消息。在一些实施方式中,可以修改所述初始上下文建立请求消息以包括如上所述的密钥Kwlan。在其他实施方式中,密钥Kwlan不包括在初始上下文建立请求消息中。As shown in Figures 7A-7B, message 11 is an initial context setup request message sent by MME 116 to MeNB 108. In some embodiments, the initial context setup request message can be modified to include the key Kwlan as described above. In other embodiments, the key Kwlan is not included in the initial context setup request message.
图7A-7B中的消息14是从MeNB 108向UE 106发送的RRCConnectionReconfiguration消息。如上所述,RRCConnectionReconfiguration消息可以包括要使用不同类型认证过程(诸如上面讨论的第一类型认证过程和第二类型认证过程)中的哪种类型的指示。RRCConnectionReconfiguration消息还可以包括特定认证类型所适用的WLAN的标识符(WLAN ID)。Message 14 in Figures 7A-7B is an RRCConnectionReconfiguration message sent from MeNB 108 to UE 106. As described above, the RRCConnectionReconfiguration message may include an indication of which of the different types of authentication procedures (such as the first type authentication procedure and the second type authentication procedure discussed above) to use. The RRCConnectionReconfiguration message may also include an identifier (WLAN ID) of the WLAN to which the particular authentication type applies.
图7A-7B还示出了任务702,该任务对应于以响应于图7A-7B中未示出的RRC重新配置过程在UE 106处触发的WLAN的添加(用于LTE-WLAN聚合模式)。7A-7B also illustrate task 702 , which corresponds to adding a WLAN (for LTE-WLAN aggregation mode) triggered at UE 106 in response to an RRC reconfiguration procedure not shown in FIGs. 7A-7B .
图7A-7B中的消息和/或任务18,19,20,20a,21,22,23,24,25,26,26a,27和27a分别对应于图2中的消息和/或任务204,206,208,210,212,214,216,218,220,222,224,226和228。Messages and/or tasks 18, 19, 20, 20a, 21, 22, 23, 24, 25, 26, 26a, 27 and 27a in Figures 7A-7B correspond to messages and/or tasks 204, 206, 208, 210, 212, 214, 216, 218, 220, 222, 224, 226 and 228 in Figure 2, respectively.
图7A-7B还示出了在MeNB108处的任务704,该任务包括使用Kwlan作为输入并且输出AK,RAND,AUTN,XRES,MSK(主会话密钥)和EMSK(扩展主会话密钥)来执行EAP认证和密钥协商(AKA)(EAP-AKA或EAP-AKA')算法,如图8所示。7A-7B also illustrate task 704 at MeNB 108, which includes performing an EAP Authentication and Key Agreement (AKA) (EAP-AKA or EAP-AKA′) algorithm using Kwlan as input and outputting AK, RAND, AUTN, XRES, MSK (Master Session Key), and EMSK (Extended Master Session Key), as shown in FIG8 .
EAP是一种认证框架,支持称为EAP方法的多种认证方法。AKA和AKA'是根据3GPP使用存储在USIM和HSS上的证书的过程。EAP-AKA和EAP-AKA’是可应用的认证过程。EAP-AKA'类似于EAP-AKA,只是EAP-AKA'提供了导出密钥与接入网络标识的绑定。在2009年5月发布的标题为“Improved Extensible Authentication Protocol Method for 3rdGeneration Authentication and Key Agreement(EAP-AKA’)”的RFC 5448中对EAP-AKA’进行了描述。EAP is an authentication framework that supports multiple authentication methods, referred to as EAP methods. AKA and AKA' are procedures based on 3GPP that use certificates stored on the USIM and HSS. EAP-AKA and EAP-AKA' are applicable authentication procedures. EAP-AKA' is similar to EAP-AKA, except that it provides for binding derived keys to access network identifiers. EAP-AKA' is described in RFC 5448, "Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')," published in May 2009.
在任务704中执行EAP-AKA或EAP-AKA'过程可以包括请求AKA向量,并且返回包含各种内容的AKA向量,诸如图8中所示的密钥导出函数的输出(下面进一步讨论)。在一些实施方式中,可以经由MME 116和/或3GPP AAA服务器402将AKA向量的请求从MeNB 108发送到HSS 118,之后HSS 118用AKA向量进行响应。在MeNB 108自主执行认证任务的其它实施方式中,MeNB 108可以产生AKA向量。关于EPA-AKA’的更多细节由3GPP TS 33.402和RFC 5448提供。Performing the EAP-AKA or EAP-AKA' process in task 704 may include requesting an AKA vector and returning an AKA vector containing various contents, such as the output of the key derivation function shown in FIG8 (discussed further below). In some embodiments, the request for the AKA vector may be sent from the MeNB 108 to the HSS 118 via the MME 116 and/or the 3GPP AAA server 402, after which the HSS 118 responds with the AKA vector. In other embodiments where the MeNB 108 performs authentication tasks autonomously, the MeNB 108 may generate the AKA vector. Further details regarding EAP-AKA' are provided in 3GPP TS 33.402 and RFC 5448.
图7A-7B还示出了在UE 106处的任务706,该任务包括使用Kwlan运行AKA,验证AUTN并生成RES和MSK。7A-7B also illustrate task 706 at UE 106, which includes running AKA using Kwlan, verifying AUTN, and generating RES and MSK.
在图7A-7B中,在以LTE-WLAN聚合模式配置UE之前,MeNB 108生成RADIUS接入-质询消息(消息22)。为了实现这一点,在MeNB 108处生成RADIUS接入-质询消息的所有内容。如图8所示,由MeNB 108使用Kwlan作为秘密密钥来生成RADIUS接入-质询消息的内容。In Figures 7A-7B , before configuring the UE in LTE-WLAN aggregated mode, MeNB 108 generates a RADIUS Access-Challenge message (Message 22). To achieve this, all contents of the RADIUS Access-Challenge message are generated at MeNB 108. As shown in Figure 8 , the contents of the RADIUS Access-Challenge message are generated by MeNB 108 using Kwlan as a secret key.
图8描述了MeNB可以如何导出该组参数以使得UE和网络能够相互认证的示例。KDF(密钥导出函数)802,804,806用于响应于各种输入而产生密钥。KDF802的输出被提供作为KDF 804的输入,KDF 804的输出被提供作为KDF 806的输入。KDF 806的输出包括MSK和EMSK,它们是例如可用于WLAN业务的加密的密钥。还提供了多个其他函数来导出用作UE和网络相互认证过程的一部分的其他参数。函数F1 810提供消息认证码,该消息认证码由UE检查以确定来自网络的认证消息的真实性。函数F3用于产生认证令牌,UE也可以在比较检查中导出和使用该认证令牌以认证网络。函数F2 812用于产生XRES(预期结果),该XRES也作为UE预期导出并且然后在RES参数中提供给网络的值,使得网络可以认证UE。网络向UE提供包括字符串1、字符串2、字符串3的参数(所谓的KDF-INPUT参数)和KDF(密钥导出函数)的标识,除非UE能够可靠地自主确定它们。Figure 8 illustrates an example of how the MeNB can derive this set of parameters to enable mutual authentication between the UE and the network. Key Derivation Functions (KDFs) 802, 804, and 806 are used to generate keys in response to various inputs. The output of KDF 802 is provided as input to KDF 804, which in turn provides input to KDF 806. The output of KDF 806 includes the MSK and EMSK, which are keys that can be used, for example, to encrypt WLAN traffic. Several other functions are also provided to derive other parameters used as part of the mutual authentication process between the UE and the network. Function F1 810 provides a message authentication code, which the UE checks to verify the authenticity of authentication messages from the network. Function F3 generates an authentication token, which the UE can also derive and use in comparison checks to authenticate the network. Function F2 812 generates an XRES (Expected Result), which the UE also expects to derive and then provide to the network in the RES parameter, enabling the network to authenticate the UE. The network provides the UE with parameters including string 1, string 2, string 3 (so-called KDF-INPUT parameters) and the identity of the KDF (Key Derivation Function), unless the UE can reliably determine them autonomously.
下表比较了图8所示密钥生成算法中使用的参数与传统EAP-AKA’算法中使用的密钥生成中使用的参数。The following table compares the parameters used in the key generation algorithm shown in Figure 8 with the parameters used in key generation used in the legacy EAP-AKA’ algorithm.
参考图6,可以注意到,密钥Kasme被用作用于导出Kwlan的算法的秘密密钥输入。备选地,也可以使用诸如KeNB等任何其他密钥作为输入。换句话说,上述算法可以通过在图6中用KeNB代替Kasme来运行。Referring to Figure 6, it can be noted that the key Kasme is used as the secret key input for the algorithm used to derive Kwlan. Alternatively, any other key such as KeNB can be used as input. In other words, the above algorithm can be run by replacing Kasme with KeNB in Figure 6.
如果使用KeNB,则由于在MeNB发生变化时产生新的KeNB,因此可以在切换后使用新的KeNB(即切换后的KeNB)重新执行该算法。该算法的其余部分保持不变。这里的假设是,在切换(即,MeNB改变)时,WLAN被去除并再次被添加(由新的MeNB)。If KeNB is used, since a new KeNB is generated when the MeNB changes, the algorithm can be re-executed using the new KeNB (i.e., the KeNB after the handover) after the handover. The rest of the algorithm remains unchanged. The assumption here is that during the handover (i.e., MeNB change), the WLAN is removed and added again (by the new MeNB).
另一种备选技术是通过使用与导出Kasme中所使用的相同的密钥导出函数和输入、但是使用不同的服务网络标识(SN ID字符串)来在HSS 116和USIM处(即,在与导出Kasme相同的安全级别处)导出Kwlan。SN ID字符串可以是固定的字符串,在蜂窝附着到给定的PLMN时,只要设备在LTE-WLAN聚合模式下使用WLAN,就要使用该字符串。Another alternative technique is to derive Kwlan at the HSS 116 and USIM (i.e., at the same security level as deriving Kwlan) by using the same key derivation function and input as used in deriving Kwlan, but using a different serving network identifier (SN ID string). The SN ID string can be a fixed string that is used whenever the device uses WLAN in LTE-WLAN aggregation mode when the cell is attached to a given PLMN.
在WLAN和MeNB之间传送认证消息的选项Options for transmitting authentication messages between WLAN and MeNB
此解决方案可用于解决问题1。This solution can be used to solve problem 1.
在WLAN和MeNB 108之间传送用于完成WLAN上的认证的信息的方式有许多种。以下是传送认证消息的方式的示例:There are many ways to transmit information for completing authentication on the WLAN between the WLAN and the MeNB 108. The following are examples of ways to transmit authentication messages:
·在WLAN和MeNB之间使用流控制传输协议/互联网协议(SCTP/IP)在DIAMETER或RADIUS消息中传送EAP消息。DIAMETER消息是根据Diameter基础协议,而RADIUS消息是根据RADIUS协议。EAP messages are transmitted between the WLAN and the MeNB using Stream Control Transmission Protocol/Internet Protocol (SCTP/IP) in DIAMETER or RADIUS messages. DIAMETER messages are based on the Diameter protocol, while RADIUS messages are based on the RADIUS protocol.
·使用X2-AP透明容器在WLAN和MeNB之间传送DIAMETER或RADIUS消息。Use X2-AP transparent containers to transmit DIAMETER or RADIUS messages between the WLAN and the MeNB.
·使用X2-AP透明容器在WLAN和MeNB之间直接传送EAP消息。Use X2-AP transparent container to directly transmit EAP messages between WLAN and MeNB.
·提取EAP消息的内容,并将提取的内容放置在WLAN和MeNB之间的X2-AP消息中。Extract the content of the EAP message and place the extracted content in the X2-AP message between the WLAN and the MeNB.
以下提供关于传送认证消息的上述方式的进一步细节。Further details regarding the above-described manner of transmitting authentication messages are provided below.
在SCTP/IP上使用Diameter或Radius传送EAP消息Using Diameter or Radius to transmit EAP messages over SCTP/IP
DIAMETER和RADIUS是支持传送EAP消息的协议。RADIUS协议在WLAN中更普遍,而DIAMETER则被3GPP使用。DIAMETER and RADIUS are protocols that support the transmission of EAP messages. RADIUS is more common in WLAN, while DIAMETER is used by 3GPP.
图9是MeNB 108和WLAN 104(WLAN AP或WLAN AP和WLAN网关的组合)中的协议层的框图。MeNB 108和WLAN 104中的每个中的协议层包括层1(物理层)、层2(数据链路层)、层1之上的IP层以及IP层之上的SCTP层。另外,在MeNB 108和WLAN 104的每个中都包括DIAMETER层和可选的X2-AP层。使用图9的配置,在MeNB 108和WLAN 104的DIAMETER层之间传送的DIAMETER消息可以封装EAP消息。FIG9 is a block diagram of the protocol layers in MeNB 108 and WLAN 104 (a WLAN AP or a combination of a WLAN AP and a WLAN gateway). The protocol layers in each of MeNB 108 and WLAN 104 include Layer 1 (physical layer), Layer 2 (data link layer), the IP layer above Layer 1, and the SCTP layer above the IP layer. Furthermore, each of MeNB 108 and WLAN 104 includes a DIAMETER layer and an optional X2-AP layer. Using the configuration of FIG9 , DIAMETER messages transmitted between the DIAMETER layers of MeNB 108 and WLAN 104 can encapsulate EAP messages.
在本公开的其他实施方式中,可以在MeNB 108和WLAN 104中提供RADIUS层来携带可以封装EAP消息的RADIUS消息。In other embodiments of the present disclosure, a RADIUS layer may be provided in the MeNB 108 and the WLAN 104 to carry RADIUS messages that may encapsulate EAP messages.
在X2-AP透明容器中使用Diameter或Radius传送EAPUsing Diameter or Radius to Transmit EAP in an X2-AP Transparent Container
在备选实施方式中,如图10所示,EAP消息首先被封装到DIAMETER或RADIUS消息中,并且DIAMETER或RADIUS消息继而在WLAN节点202和MeNB 108之间的X2-AP消息中携带。In an alternative embodiment, as shown in FIG. 10 , the EAP message is first encapsulated into a DIAMETER or RADIUS message, and the DIAMETER or RADIUS message is then carried in an X2-AP message between the WLAN node 202 and the MeNB 108 .
MeNB 108和WLAN 104中的每一个的协议层都包括层1、层2、IP层、SCTP层和SCTP层之上的X2-AP层。携带DIAMETER或RADIUS消息的X2-AP消息支持在3GPP中所称的透明容器,这意味着X2-AP层本身不解释透明容器的内容,而是该内容(在这种情况下的DIAMETER或RADIUS消息)可用于MeNB 108以供进一步处理。The protocol layers of each of MeNB 108 and WLAN 104 include Layer 1, Layer 2, IP layer, SCTP layer, and an X2-AP layer above the SCTP layer. X2-AP messages carrying DIAMETER or RADIUS messages support what is known in 3GPP as transparent containers, meaning that the X2-AP layer itself does not interpret the contents of the transparent container, but rather the contents (in this case, the DIAMETER or RADIUS message) are made available to MeNB 108 for further processing.
尽管图10示出了DIAMETER消息由X2-AP透明容器携带的示例,但是在其他示例中,替代地,可以由X2-AP透明容器来携带RADIUS消息。Although FIG10 shows an example in which a DIAMETER message is carried by an X2-AP transparent container, in other examples, a RADIUS message may be carried by an X2-AP transparent container instead.
直接在X2-AP透明容器中传送EAP消息Transmit EAP messages directly in the X2-AP transparent container
在这种解决方案中,EAP消息直接在X2-AP透明容器内携带,而不是首先封装在DIAMETER或RADIUS消息中然后进而由X2-AP透明容器携带。In this solution, EAP messages are directly carried in an X2-AP transparent container, rather than being first encapsulated in a DIAMETER or RADIUS message and then carried by the X2-AP transparent container.
在X2-AP消息中传送EAP消息的内容The content of the EAP message is transmitted in the X2-AP message
在这个解决方案中,EAP-AKA’消息的内容直接作为新的X2-AP消息中的新的信息单元被携带。EAP消息中支持的EAP-AKA’消息的内容包括诸如NAI、RAND、AUTN、MAC等的信息单元。In this solution, the content of the EAP-AKA' message is directly carried as a new information element in the new X2-AP message. The content of the EAP-AKA' message supported in the EAP message includes information elements such as NAI, RAND, AUTN, and MAC.
系统架构System Architecture
图11是可以表示以下任何一个的示例系统(或网络节点)1100的框图:UE、蜂窝接入网络节点或WLAN节点。系统1100可以被实现为计算设备或多个计算设备的配置。11 is a block diagram of an example system (or network node) 1100 that may represent any of the following: a UE, a cellular access network node, or a WLAN node. System 1100 may be implemented as a computing device or a configuration of multiple computing devices.
系统1100包括可以被耦合到网络接口(或多个网络接口)1104的处理器(或多个处理器)1102,以无线地或通过有线链路与另一个实体进行通信。处理器可以包括微处理器、微控制器、物理处理器模块或子系统、可编程集成电路、可编程门阵列或另一物理控制或计算电路。System 1100 includes a processor (or multiple processors) 1102 that can be coupled to a network interface (or multiple network interfaces) 1104 to communicate with another entity wirelessly or through a wired link. The processor may include a microprocessor, a microcontroller, a physical processor module or subsystem, a programmable integrated circuit, a programmable gate array, or another physical control or computing circuit.
处理器1102还可以耦合到一种非瞬时机器可读或机器可读存储介质(或多种存储介质)1106,所述存储介质可存储可在处理器1102上执行的机器可读指令1108以执行上述的各种任务。The processor 1102 may also be coupled to a non-transitory machine-readable or machine-readable storage medium (or storage media) 1106 that may store machine-readable instructions 1108 executable on the processor 1102 to perform the various tasks described above.
一种存储介质(或多种存储介质)1106可以包括一个或多个计算机可读或计算机可读存储介质。所述一种或多种存储介质可以包括一种或多种不同形式的存储器,包括半导体存储器件,例如动态或静态随机存取存储器(DRAM或SRAM)、可擦除和可编程只读存储器(EPROM)、电可擦除和可编程只读存储器(EEPROM)和闪存;磁盘,诸如固定的、软的和可拆卸的盘;其它磁介质(包括磁带);诸如光盘(CD)或数字视频光盘(DVD)的光学介质;或其他类型的存储设备。注意,上述指令可提供在计算机可读或机器可读存储介质上或备选地可提供在具有可能多个节点的大型系统中分布的多个计算机可读或机器可读存储介质上。这样的一种或多种计算机可读或机器可读存储介质被认为是物品(或制品)的一部分。物品或制品可以指任何制造的单个组件或多个组件。一种或多种存储介质可以位于运行机器可读指令的机器中,或者位于远程位置处,可以通过网络从该远程位置下载机器可读指令以便执行。A storage medium (or multiple storage media) 1106 may include one or more computer-readable or machine-readable storage media. The one or more storage media may include one or more different forms of memory, including semiconductor memory devices such as dynamic or static random access memory (DRAM or SRAM), erasable and programmable read-only memory (EPROM), electrically erasable and programmable read-only memory (EEPROM), and flash memory; magnetic disks such as fixed, flexible, and removable disks; other magnetic media (including magnetic tape); optical media such as compact disks (CDs) or digital video disks (DVDs); or other types of storage devices. Note that the instructions described above may be provided on a computer-readable or machine-readable storage medium or, alternatively, on multiple computer-readable or machine-readable storage media distributed across a large system, potentially with multiple nodes. Such one or more computer-readable or machine-readable storage media are considered part of an article (or article of manufacture). An article or article of manufacture may refer to any manufactured single component or multiple components. The one or more storage media may be located in the machine that runs the machine-readable instructions, or at a remote location from which the machine-readable instructions may be downloaded over a network for execution.
在前面的描述中,阐述了大量细节,以提供对本文公开的主题的理解。然而,在没有这些细节中的一部分的情况下,也可以实施这些实现方式。其它实现可包括对以上细节的修改和变形。旨在使所附权利要求覆盖这些修改和改变。In the foregoing description, numerous details have been set forth to provide an understanding of the subject matter disclosed herein. However, these implementations may be practiced without some of these details. Other implementations may include modifications and variations of the above details. It is intended that the appended claims cover such modifications and variations.
Claims (20)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/824,898 | 2015-08-12 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1254125A1 HK1254125A1 (en) | 2019-07-12 |
| HK1254125B true HK1254125B (en) | 2022-07-08 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10939294B2 (en) | Network access identifier including an identifier for a cellular access network node | |
| US11212676B2 (en) | User identity privacy protection in public wireless local access network, WLAN, access | |
| US10299120B2 (en) | Methods and arrangements for identification of user equipments for authentication purposes | |
| EP3158827B1 (en) | Method for generating a common identifier for a wireless device in at least two different types of networks | |
| US9693332B2 (en) | Identification of a wireless device in a wireless communication environment | |
| US11490252B2 (en) | Protecting WLCP message exchange between TWAG and UE | |
| US20170223531A1 (en) | Authentication in a wireless communications network | |
| JP2018537927A (en) | Emergency service support via WLAN access to 3GPP evolved packet core for unauthenticated users | |
| JP2020505845A (en) | Method and device for parameter exchange during emergency access | |
| HK1254125B (en) | A network access identifier of cellular access network node based authentication method | |
| WO2016015750A1 (en) | Authentication in a communications network | |
| HK1254125A1 (en) | Network access identifier including an identifier for a cellular access network node | |
| CN120584502A (en) | Generate security context for user equipment (UE) trusted non-3GPP access point (TNAP) mobility |