[go: up one dir, main page]

WO2013064089A1 - 生成组密钥的方法和相关设备 - Google Patents

生成组密钥的方法和相关设备 Download PDF

Info

Publication number
WO2013064089A1
WO2013064089A1 PCT/CN2012/083930 CN2012083930W WO2013064089A1 WO 2013064089 A1 WO2013064089 A1 WO 2013064089A1 CN 2012083930 W CN2012083930 W CN 2012083930W WO 2013064089 A1 WO2013064089 A1 WO 2013064089A1
Authority
WO
WIPO (PCT)
Prior art keywords
group
key
mtc device
base station
mtc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2012/083930
Other languages
English (en)
French (fr)
Inventor
张丽佳
陈璟
许怡娴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to EP18202007.3A priority Critical patent/EP3515036A1/en
Priority to EP12846508.5A priority patent/EP2765793B1/en
Publication of WO2013064089A1 publication Critical patent/WO2013064089A1/zh
Priority to US14/264,587 priority patent/US9775028B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present invention relates to the field of communications, and more particularly to a method and related apparatus for generating a group key in the field of communications.
  • M2M Machine to Machine
  • M2M There are three ways of M2M, including machine-to-machine, machine-to-mobile and mobile-to-machine.
  • M2M devices can access the network through long-distance connection technology and close-range connection technology.
  • the long-distance connection technologies involved include Global System for Mobile communications (GSM) and General Packet Radio (General Packet Radio). Service, GPRS), Universal Mobile Telecommunications System (UMTS) and other wireless access type technologies.
  • the short-range connection technologies include 802.11b/g, Bluetooth (Blue Tooth), Zigbee, Radio Frequency Identification (RFID), and Ultra Wideband (UWB) technologies.
  • M2M communication can also be called Machine Type Communication (MTC), and M2M equipment can also be called MTC equipment.
  • MTC Machine Type Communication
  • M2M equipment can also be called MTC equipment.
  • the base station constructs a common physical layer, a Radio Link Control (RLC) layer, a Packet Data Convergence Protocol (PDCP) layer, and a medium access control for the same group of MTC devices.
  • RLC Radio Link Control
  • PDCP Packet Data Convergence Protocol
  • MAC Media Access Control
  • each MTC device in the same group needs to maintain their respective keys, which increases the complexity of the operation of the base station, and causes too many keys to be maintained and managed by the base station, which affects the performance of the base station.
  • SUMMARY OF THE INVENTION The present invention provides a method and related apparatus for generating a group key to improve base station performance.
  • the present invention provides a method for generating a group key, including: acquiring a group ID of a group in which a machine type communication MTC device is located; acquiring a group communication root key corresponding to the group ID; Generating a group key corresponding to the group ID; transmitting, to the MTC device, the group key encrypted with an access layer key of the MTC device, so that the MTC device is configured according to the MTC device
  • the access layer key is decrypted to obtain the group key.
  • the present invention provides a method for generating a group key, including: acquiring a group ID of a group in which a machine type communication MTC device is located; acquiring a group communication root key corresponding to the group ID; and transmitting the group to a base station ID and the group communication root key, so that the base station generates a group key corresponding to the group ID according to the group communication root key and sends an access layer with the MTC device to the MTC device The group key of the key encryption.
  • the present invention provides a method for generating a group key, comprising: receiving, from a base station, a group key encrypted by an access layer key of a machine type communication MTC device of the base station, wherein the group key is The base station generates, according to the group communication root key acquired by the base station, and corresponds to the group ID of the group in which the MTC device is acquired by the base station, or the group key is obtained by the base station according to the mobility management entity MME. And generating, by the access layer key of the MTC device, the group key.
  • the present invention provides a base station, including: a first acquiring module, configured to acquire a group ID of a group in which the machine type communication MTC device is located; and a second acquiring module, configured to acquire a group communication root corresponding to the group ID And a generating module, configured to generate, according to the group communication root key, a group key corresponding to the group ID, where the first sending module is configured to send an access layer with the MTC device to the MTC device The group key encrypted by the key, so that the MTC device decrypts the group key according to the access layer key of the MTC device.
  • the present invention provides a mobility management entity, including: a first obtaining module, configured to acquire a group ID of a group in which the machine type communication MTC device is located; and a second obtaining module, configured to acquire the group ID corresponding to the a group communication root key; a sending module, configured to send the group ID and the group communication root key to a base station, so that the base station generates a group key corresponding to the group ID according to the group communication root key And transmitting, to the MTC device, the group key encrypted with an access layer key of the MTC device.
  • the present invention provides a machine type communication device, including: a first receiving module, configured to receive, from a base station, a group key encrypted by an access layer key of a machine type communication MTC device of the base station, where The group key is generated by the base station according to the group communication root key acquired by the base station, and corresponds to the group ID of the group in which the MTC device is acquired by the base station, or the group key is moved by the base station according to the The group communication root key generated by the MME is corresponding to the group ID of the group in which the MTC device is acquired by the MME; the first decryption module is configured to decrypt the access layer key according to the MTC device. Group key.
  • the network side determines the group key corresponding to the group ID by determining the group ID of the group in which the MTC device is located, and can secure the group key used by the MTC device by means of the access layer key of the MTC device.
  • the location is assigned to the MTC device, and the MTC devices within the same group ID share the same group key.
  • the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station, only the same group key needs to be kept for the same group, thereby reducing the complexity of the base station operation and reducing the base station. Maintain and manage the number of keys to improve base station performance.
  • FIG. 1 is a flow chart of a method of generating a group key in accordance with an embodiment of the present invention.
  • FIG. 2 is a flow diagram of a first example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • Fig. 3 is a schematic diagram showing an example of generating a group authentication parameter in the first example.
  • FIG. 4 is a flow chart showing the authentication performed by the MTC device and the MME (Mobility Management Entity) in the first example.
  • Figure 5 is a flow diagram of a second example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • Fig. 6 is a schematic diagram showing an example of generating a group authentication parameter in the second example.
  • Fig. 7 is a schematic diagram showing another example of generating a group authentication parameter in the second example.
  • Figure 8 is a flow chart showing the authentication performed by the MTC device and the MME in the second example.
  • FIG. 9 is a flow diagram of a third example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • Figure 10 is a flow diagram of a fourth example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • Figure 11 is a flow chart when the MTC device rejoins the group communication from the idle state or the detached state in the third and fourth examples.
  • Figure 12 is a flow diagram of a fifth example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • Figure 13 is a flow diagram of a sixth example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • FIG. 14 is a flow chart of another method of generating a group key in accordance with an embodiment of the present invention.
  • 15 is a flow chart of still another method of generating a group key in accordance with an embodiment of the present invention.
  • FIG. 16 is a structural block diagram of a base station according to an embodiment of the present invention.
  • Figure 17 is a block diagram showing the structure of another base station according to an embodiment of the present invention.
  • 19 is a structural block diagram of another mobility management entity in accordance with an embodiment of the present invention.
  • Figure 20 is a block diagram showing the structure of a machine type communication device in accordance with an embodiment of the present invention.
  • 21 is a block diagram showing the structure of another machine type communication device according to an embodiment of the present invention.
  • the method 100 includes:
  • a group key corresponding to the group ID is generated according to the group communication root key
  • the group key encrypted by the access layer key of the MTC device is sent to the MTC device, so that the MTC device decrypts the group key according to the access layer key of the MTC device.
  • method 100 can be performed by a base station.
  • the base station can determine the group key corresponding to the group ID of the group in which the MTC device is located by grouping the MTC devices, where the group key and the group ID are corresponding to each other, and the group keys corresponding to each group ID are different from each other.
  • the group key can be sent to the MTC device through the access layer key of the MTC device, so that the group key is allocated, so that the MTC devices in a group ID can be connected by themselves.
  • the group key is used to securely obtain the group key used by the group.
  • the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station only need to keep the same group key for the same group. Therefore, the complexity of the operation of the base station can be reduced, the number of keys maintained and managed by the base station can be reduced, and the performance of the base station can be improved.
  • the base station can obtain the group ID of the group in which the MTC device is located in multiple manners. For example, the base station can group the MTC devices to divide the MTC devices into groups corresponding to the group ID.
  • the base station may perform grouping according to the distance of the MTC device from the base station, may also be grouped according to the signal strength of the MTC device, may also be grouped according to the manufacturing of the MTC device, or may be randomly grouped, and how the packet is grouped by the present invention The specific method is not limited.
  • the base station may obtain the group ID of the group in which the MTC device is located from other network elements.
  • the other network element may be an MME, or may be an HSS (Home Subscriber System), or may be another device of the core network or a packet data network.
  • the other network element can be The MTC device performs grouping, so that the base station can obtain the group ID to which the MTC device belongs from the other network element.
  • the base station can receive the group ID from the MTC device to determine the group to which the MTC device belongs.
  • the base station may receive the service ID of the service to which the MTC device belongs from the MTC device, and group the MTC device according to the service ID, thereby determining the group ID of the group to which the MTC device belongs.
  • the method of grouping according to the service ID to determine the group ID may be the same as the prior art, for example, grouping according to the location of the MTC device supporting the same service, and the details are not described herein.
  • the base station may receive the group ID and the group communication root key from the MME, and the group communication root key is generated by the home subscriber system HSS to which the MTC device belongs according to the random number and the set key corresponding to the group ID.
  • the group communication root key is generated by the HSS according to the random number, the group ID, and the exclusive key of the one MTC device when receiving the group ID from an MTC device forwarded by the MME, and the group communication is rooted by the HSS.
  • the key is sent to the MME.
  • the base station may receive a service ID and a service root key corresponding to the service ID from the MME, where the service ID is a service ID of the service to which the MTC device belongs to the MME, and the service root key is The HSS to which the MTC device belongs is generated according to the random number and the set key corresponding to the service ID, or the service root key is received by the HSS when receiving the service ID from an MTC device forwarded by the MME, according to the random number, the service ID, and the one.
  • the unique key of the MTC device is generated, and the service root key is sent by the HSS to the MME, and the base station determines the group ID of the group in which the MTC device is located according to the service ID, and generates the group communication root density corresponding to the group ID according to the service root key. key.
  • the base station can flexibly obtain the group ID and the group communication root key in various ways in different embodiments. Due to the increase in the number of network elements involved in the process of generating the group key and the increase of security information such as the ensemble key, the security of the group key generation can be further improved, and the groups of different groups generated by the base station can be avoided.
  • the keys coincide. Corresponding examples can be referred to the description of the first to fourth examples below.
  • the base station can obtain the group communication root key corresponding to the group ID in multiple manners. For example, the base station may select an MTC device from the MTC devices in the group ID, and determine a group communication root key corresponding to the group ID according to the selected key of the MTC device. Since one group ID corresponds to at least one MTC device, the base station can select one MTC device from it, use its key as a group communication root key, or generate a group communication root key according to its key.
  • the key of the selected MTC device may be the KeNB corresponding to the MTC device.
  • the base station may receive the group communication root key corresponding to the group ID from the MME, where the MME divides the MTC device into a group corresponding to the group ID, and selects the MTC device from the MTC devices in the group ID, according to the selected MTC.
  • the key of the device determines the group communication root key corresponding to the group ID, or the MME determines the group communication root key corresponding to the group ID according to the random number generated by the MME.
  • the MME sends the generated group communication root key to the base station, so that the base station acquires the group communication root key corresponding to the group ID.
  • the base station may generate a random number, and determine a group communication root key corresponding to the group ID according to the random number.
  • the base station may directly use the generated random number as the group communication root key corresponding to the group ID, or may derive the group communication root key corresponding to the group ID according to the random number calculation.
  • the base station may generate a group communication root key corresponding to the group ID according to the first parameter.
  • the base station can bind and store the group communication root key, the group key, and the group ID.
  • the group key that is bound according to the group ID may be acquired; and the group key encrypted with the access layer key of the other MTC device is sent to other MTC devices, The other MTC device is decrypted according to its access layer key to obtain a group key.
  • the base station When the base station determines that it is necessary to generate a group key for another MTC device belonging to the group ID, it is not necessary to determine the group communication root key and determine the group key according to the group communication root key, and directly according to the group ID.
  • the group key the base station can allocate a group key for the MTC device, thereby reducing the processing complexity of the base station, improving the group key generation efficiency, and ensuring that the group keys used by the MTC devices in the same group ID are the same.
  • the parameter with the word "Group” indicates a parameter associated with a group
  • the parameter "XXX_Group” of a group may have a parameter with an MTC device.
  • XXX similar usage and function.
  • AV_Group can have a similar generation and representation as an Authentication Vector (AV), except that AV_Group is for a group, not for a specific MTC device.
  • the set ID is the group ID of the group in which the MTC device is located, which means that the MTC devices are grouped in advance, and the group in which the MTC device is located is determined.
  • the group ID can be preset in the MTC device. It can also be set in the USIM (Universal Subscriber Identity Module). When the USIM is inserted into the MTC device, the USIM becomes part of the MTC device to determine the group where the MTC device resides. .
  • the first parameter is the group communication root key, which is KeNB_Group in the following description, which is equal to the Kasme_Group generated by the HSS.
  • KeNB_Group has similar functions as KeNB, except that KeNB_Group is pin-group, and KeNB is derived from KeNB_Group for other MTC devices.
  • the USIM inserted into the MTC device stores the group information Group ID (group ID) of the group to which the MTC device belongs and the set key K_Group corresponding to the group ID.
  • the K_Group corresponding to the Group ID is also saved in the HSS to which the MTC device belongs.
  • the MTC device sends an attach request to the MME, where the request includes the IMSI of the MTC device and the Group ID of the group to which the MTC device belongs.
  • the MME determines whether the AV_Group bound to the Group ID is saved. Do one of the following before:
  • the MME sends an authentication data request to the HSS, and includes the authentication data request.
  • IMSI and Group ID are the authentication data request.
  • the HSS finds the corresponding K according to the IMSI, generates an AV according to the , and the HSS finds the corresponding K_Group according to the Group ID, and generates an AV_Group according to the K_Group; in S240, the HSS sends the AV and the AV_Group to the MME through the authentication data response; In S250, the MME binds and stores the Group ID and the AV_Group.
  • Figure 3 The way to generate AV_Group according to K_Group is shown in Figure 3.
  • Figure 3 is only an example and does not limit the way in which AV_Group is generated according to K_Group.
  • the HSS test generates AV for generating Group H ⁇ AV_Group.
  • the placeholders AMF and F1 to F5 involved have the same meaning as the prior art, except that the other input parameters and the generated parameters are for one group and not for one MTC device.
  • the HSS generates a sequence number SQN_Group for the Group ID and generates a random number RAND_Group for the Group ID. Enter K_Group, SQN_Group, RAND_Group, and AMF into each function as shown in the figure to generate MAC_Group, XRES_Group, CK_Group, IK_Group, and AK_Group. Next, you can generate AUTN_Group and Kasme_Group as follows:
  • AUTN_Group SQN ten AK_Group II AMF II MAC_Group
  • Kasme_Group KDF (SQN ten AK_Group, SN ID, IK_Group, CK_Group)
  • KDF is a key generation function and can have the same calculation method as the prior art.
  • KDF function its form is not limited; Represents XOR calculation; II represents the combination of two physical quantities before and after to form a continuous physical quantity.
  • AV_Group RAND_Group II XRES_Group II Kasme_Group II AUTN—Group
  • the MME sends an authentication data request to the HSS, and includes IMSI in the request; in S230, the HSS finds a corresponding K according to the IMSI, and generates an AV according to K;
  • the MME sends a user authentication request to the MTC device, in which the RAND, the RAND, the AUTH, and the KSIASME are carried in the request to authenticate the MTC device itself, and the RAND_Group is carried in the manner of the embodiment of the present invention.
  • AUTH_Group and KSIASME_Group perform group authentication on the MTC device belonging to the Group ID.
  • the meanings and usages of RAND_Group, AUTH_Group, and KSIASME_Group can be the same as RAND, AUTH, and KSIASME, except that AND_Group, AUTH_Group, and KSIASME_Group are parameters for one group, and RAND, AUTH, and KSIASME are for one MTC device.
  • the MTC device when the authentication succeeds, the MTC device returns a user authentication response, in which the RES_Group is carried in the manner of the embodiment of the present invention, in addition to the RES to respond to the device authentication. To respond to group authentication.
  • the MTC device needs to send a user authentication reject message to the MME as in the prior art, and the message carries a CAUSE parameter indicating the reason for the authentication failure.
  • the MME and the MTC device calculate the KeNB as in the prior art, and the MME can calculate the KeNB_Group according to the AV_Group, in this embodiment, the Kasme_Group as the KeNB_Group.
  • KeNB_Group is the group communication root key of the access layer, and other access layer group keys can be generated by KeNB_Group.
  • the MTC device occurs with the MME as KeNB at S270, the MTC device may also generate the KeNB at any time after S260 and before S292.
  • the MME transmits the Group ID, KeNB, and KeNB_Group to the eNB (evolved Node B, evolved base station).
  • eNB evolved Node B, evolved base station
  • the eNB selects an integrity algorithm and an encryption algorithm according to the security capabilities of the MTC device. If the binding associated with the Group ID is not established on the eNB, the eNB selects a group algorithm for generating a group key according to the group security capability of the MTC device, and may include a group integrity algorithm and a group encryption algorithm.
  • the method of selecting the group integrity algorithm and the group encryption algorithm may be similar to the selection algorithm of the MTC device selection integrity algorithm and the encryption algorithm in the prior art, and the group integrity algorithm and the group encryption algorithm may also be respectively associated with the integrity algorithm in the prior art.
  • the encryption algorithm is similar, except that the group integrity algorithm and the group encryption algorithm are algorithms for one group, and the integrity algorithm and encryption algorithm are algorithms for one MTC device.
  • the eNB When the eNB establishes a binding relationship of the group ID for the first time to generate a corresponding group key for a group ID, the eNB sets the key update number Key Count to 0, and the parameter may be used to perform a derivation update on the group key. .
  • the PDCP Counter value reaches the maximum value, the Key Count value can be incremented by one.
  • the PDCP Count value reaches the maximum value, which means that the Hyper Frame Number (HFN) part of the PDCP Count reaches the maximum value, that is, the Key Count is incremented by 1 each time the HFN reaches the threshold.
  • HFN Hyper Frame Number
  • the eNB can establish a binding relationship between the group ID and the group integrity algorithm, the group encryption algorithm, and the Key Count, and calculate the access layer key of the MTC device and the access layer group key of the group to which the MTC device belongs, and then connect The inbound group key and KeNB_Group are also bound to the Group ID.
  • the access layer key of the MTC device is calculated in the same manner as the current technology, and the calculation of the access layer group key can be performed as follows.
  • an access stratum group key may be referred to as a group key.
  • the access stratum group key may include a group strength p key Key_Groupenc and a group integrity key Key_Groupint.
  • Key_Groupenc KDF (KeNB_Group, Group-enc-alg, Alg-ID)
  • Key_Groupint KDF (KeNB_Group, Group-int-alg, Alg-ID).
  • KDF is the key generation function
  • Group-enc-alg represents the current calculation using the group encryption algorithm
  • Group-int-alg represents the current calculation using the group integrity algorithm.
  • the eNB does not need to perform the steps of selecting the group algorithm and calculating the group key.
  • the group integrity algorithm and the group encryption algorithm are selected by the eNB according to the group security capabilities of the MTC device in the first example, in other embodiments, the group integrity algorithm and the group encryption algorithm may also be pre-configured in the eNB. This does not require the eNB to select the corresponding algorithm.
  • the eNB shall utilize the access layer key encryption and integrity protection of the MTC device, a group algorithm including a group integrity algorithm and a group encryption algorithm, and a group key including a group encryption key and a group integrity key.
  • the MTC device is sent to the MTC device to perform group communication according to the group algorithm and the group key.
  • the MTC device uses its own access layer key to obtain a group algorithm and a group key. In this way, the MTC device can perform subsequent group communication normally using a group algorithm and a group key shared by one group.
  • the eNB may update the group key according to the Key Count.
  • the method of updating the group key may be to first derive a new KeNB_Group according to the Key Count, and then calculate a new group key by using the derived KeNB_Group.
  • KeNB_Group* is used to represent the derived KeNB_Group, and KeNB_Group* is replaced by the derived KeNB_Group* as the current KeNB-Group:
  • KeNB_Group* KDF ( KeNB_Group, Cell ID, Group ID )
  • the KDF is a key generation function
  • the Cell ID is a cell identifier.
  • the Key Count is a few, and it is deduced several times.
  • KeNB_Group* You can also use the following expression to directly derive KeNB_Group*, and KeNB_Group* as KeNB_Group:
  • KeNB_Group* KDF (KeNB_Group, Cell ID, Group ID, Key Count)
  • the eNB can recalculate Key_Groupenc and Key_Groupint by using the derived KeNB_Group.
  • the recalculated group key is encrypted by using the access layer key of the MTC device, and sent to the MTC device, so that the MTC device updates the group key and performs group communication by using the new group key.
  • a group of MTC devices use an AV_Group for a period of time, which can allow AV_Group to be reused.
  • the usage rule of the SQN_Group can be an MTC setting.
  • the SQN_Group in the AUTH_Group is received from the network side and is greater than or equal to the device side. SQN_Group. If the SQN_Group is out of sync, it can be resolved by the resynchronization process.
  • an MTC device in a group is originally in group communication, but exits the group communication after a period of time, then when the MTC device needs to transition from the idle (IDLE) state or the detached state to the active (active) state,
  • the eNB transmits a group key encrypted with the access layer key of the MTC device to the MTC device, so that the MTC device reacquires the group key to perform group communication.
  • the set ID is the group ID of the group in which the MTC device is located.
  • the first parameter is the group communication root key, which is KeNB_Group in the following description, which is equal to the Group Key generated by the HSS.
  • the group ID of the group to which the MTC device belongs and the key K_Group corresponding to the group ID are stored in the USIM of the MTC device.
  • the Group ID and the K_Group corresponding to the Group ID can also be directly saved in the MTC device.
  • the correspondence between the Group ID and the K_Group is also saved in the HSS to which the MTC device belongs.
  • the MTC device sends an attach request to the MME, where the request includes the IMSI and the Group ID of the MTC device.
  • the MME determines whether the Group Key bound to the Group ID is saved. Do one of the following before:
  • the MME sends an authentication data request message to the HSS, where the IMSI and the Group ID are included.
  • the indicator data should also be included in the authentication data request, which is used to indicate that the MME has not established the related binding information of the Group ID, and the HSS is required to generate the Group Key.
  • the Group Key Indicator may also be carried to indicate that the related binding information of the Group ID is not established;
  • the HSS finds the corresponding K according to IMSI, and generates AV according to K, so that the MTC device and the network side use the AV for authentication.
  • the K corresponding to IMSI can be called the exclusive key of the MTC device, and the value of any K is unique and is only held by one MTC device.
  • the MTC device is assigned a unique K because K is stored in the USIM.
  • the HSS can also find the corresponding K according to the IMSI, find the corresponding K_Group according to the Group ID, and generate the AV_Group with the K and K_Group so that the MTC device and the network side can use the AV_Group for authentication.
  • the HSS finds the corresponding K_Group according to the Group ID, and generates a Group Key according to the K_Group and the randomly generated random number Nonce;
  • the HSS when authenticating with the AV, transmits the AV and the Group Key to the MME through the authentication data response message.
  • the HSS sends the AV_Group and the Group Key to the MME through the authentication data response message;
  • the MME binds and stores the Group ID and the Group Key.
  • Figure 6 and Figure 7 The way to generate AV_Group based on K and K_Group can be as shown in Figure 6 and Figure 7.
  • Figure 6 and Figure 7 are just two examples and do not limit the way AV_Group is generated.
  • the HSS generates the SQN and generates RAND, and takes SQN and RAND as the sequence number and random number for one group.
  • the HSS inputs SQN, RAND, AMF, K into the same F1 to F5 functions as in the prior art as shown in the figure, and obtains MAC, XRES, CK, ⁇ , ⁇ .
  • HSS will K_Group and MAC, SRES, CK, IK, AK as shown in the figure
  • the other functions F are input in the manner shown. These functions F may be the same or different, and the specific form is not limited herein. Through these functions F, MAC_Group, XRES_Group, CK_Group, IK_Group, and AK_Group can be obtained respectively.
  • the HSS generates the SQN and generates RAND, and uses SQN and RAND as the sequence number and random number for a group.
  • the HSS inputs SQN, RAND, AMF, K, and K_Group into the same F1 to F5 functions as the prior art as shown in the figure, and obtains MAC_Group, XRES_Group, CK_Group, IK_Group, and AK_Group, respectively.
  • AUTN_Group SQN ten AK_Group II AMF II MAC_Group
  • Kasme_Group KDF (SQN ten AK_Group, SN ID, IK_Group, CK_Group)
  • AV_Group RAND II XRES_Group II Kasme_Group II AUTN_Group
  • KDF is a key generation function, which can have the same calculation method as the prior art
  • represents XOR calculation
  • II The representative combines the two physical quantities together to form a continuous physical quantity.
  • the MME sends an authentication data request message to the HSS, and when the authentication is only required to be performed by the AV, the IMSI is included in the authentication data request message, and is included in the authentication data request message when the AV_Group is subsequently used for authentication.
  • IMSI and Group ID In S530, when performing authentication using the AV, the HSS finds a corresponding K according to the IMSI, and generates an AV according to K. When using AV_Group for authentication, the HSS finds the corresponding K according to IMSI, finds the corresponding K_Group according to the Group ID, and generates AV_Group by combining K and K_Group;
  • the HSS sends the AV or AV_Group to the MME through the authentication data response. At this time, it is not necessary to execute S550.
  • the MME and MTC devices use AV or AV_Group for authentication.
  • AV authentication the same method as in the prior art is employed.
  • AV_Group authentication the authentication process is shown in Figure 8.
  • the MME sends a user authentication request to the MTC device, where the request carries the RAND_Group, the AUTN_Group in the AV_Group, and the KSIASME in the prior art.
  • the MTC device when the authentication is successful, the MTC device returns a user authentication response to the MME, and carries the RES_Group in the response. In addition, if the authentication fails, the MTC device sends a user authentication rejection to the MME, and carries the CAUSE parameter in the message.
  • the MME and the MTC device calculate the KeNB as in the prior art, and the MME uses the Group Key as the KeNB_Group. Although in the second example shown in FIG. 5, the MTC device and the MME occur as KeNB at S570, the MTC device can also generate the KeNB at any time after S560 and before S592.
  • the MME transmits the Group ID, KeNB, and KeNB_Group to the eNB.
  • the eNB selects an integrity algorithm and an encryption algorithm according to the security capabilities of the MTC device. If the binding associated with the group ID is not established on the eNB, the eNB selects a group algorithm for generating a group key according to the group security capability of the MTC device, and may include a group integrity algorithm and a group encryption algorithm, and calculate the access. Layer key and group keys Key_Groupenc and Key_Groupint. Further, the eNB also binds the group algorithm, Key Count, KeNB_Group, KeNB_Groupenc, and KeNB_Groupint to the Group ID.
  • the relevant content of S590 can be described in S290, in order to avoid repetition, ⁇ will not be described again.
  • the eNB will utilize the access layer key encryption and integrity protection of the MTC device, a group algorithm including a group integrity algorithm and a group encryption algorithm, and a group key including a group encryption key and a group integrity key.
  • the MTC device is sent to the MTC device to perform group communication according to the group algorithm and the group key.
  • the MTC device uses its own access layer key to obtain a group algorithm and a group key. In this way, the MTC device can perform subsequent group communication normally using a group algorithm and a group key shared by one group.
  • the eNB A group key encrypted with an access layer key of the MTC device is transmitted to the MTC device to cause the MTC device to reacquire the group key to perform group communication.
  • the set ID is the service ID of the MTC device support service.
  • the MTC device is divided into different service sets according to the function or the service of the MTC device in advance, and is distinguished by the service ID.
  • the service set is not equal to the group sharing the same group key, and the group sharing the same group key needs to be determined by the base station according to the service ID.
  • the service ID can be preset in the MTC device. It can also be set in the USIM. When the USIM is inserted into the MTC device, the USIM becomes part of the MTC device to determine the services supported by the MTC device.
  • the first parameter is the service root key corresponding to the service ID, that is, KeNB_Service in the following description, which is equal to the Service Key generated by the HSS.
  • the KeNB_Group can be determined by the base station through KeNB_Service.
  • the service ID of the service to which the MTC device belongs and the key K_Service corresponding to the service ID are stored in the USIM of the MTC device.
  • the Service ID and the key K_Service corresponding to the Service ID can also be saved in the MTC device.
  • the correspondence between Service ID and K_Service is also saved in the HSS to which the MTC device belongs.
  • the MTC device sends an attach request to the MME, where the IMSI and the Service ID are included in the request.
  • the MME determines whether the Service Key bound to the Service ID is saved. When the MME determines that the Service Key bound to the Service ID has not been saved, perform the following operations before S960:
  • the MME sends an authentication data request message to the HSS, where the IMSI and the Service ID are carried in the message;
  • the HSS finds the corresponding K according to IMSI, and generates AV according to K, so that the MME uses the AV and MTC devices for authentication.
  • the HSS finds the K_Service according to the Service ID, and randomly generates the random number Nonce, and then generates a Service Key according to the K_Service and the Nonce; in S940, the HSS sends the AV and the Service key to the MME through the authentication data response message;
  • the MME binds and stores the Service ID and the Service Key. Before, perform the following operations:
  • the MME sends an authentication data request message to the HSS, where the IMSI is carried in the message;
  • the HSS finds the corresponding K according to IMSI, and generates AV according to K;
  • the HSS sends the AV to the MME through the authentication data response message. At this point, you do not need to execute S950.
  • the MME and the MTC device calculate the KeNB, and the MME uses the Service Key as the KeNB_Service.
  • the MTC device generates a KeNB with the MME at S970, the MTC device can also generate the KeNB at any time after S960 and before S992.
  • the MME transmits the Service ID, KeNB, and KeNB_Service to the eNB.
  • the eNB selects an integrity algorithm and an encryption algorithm according to the security capabilities of the MTC device. If the binding relationship related to the Service ID is not established on the eNB, the eNB selects a group algorithm for generating a group key according to the group security capability of the MTC device, and may include a group integrity algorithm and a group encryption algorithm, and calculate the access. Layer key and access layer group key.
  • the method of selecting the group integrity algorithm and the group encryption algorithm may be similar to the selection algorithm of the MTC device selection integrity algorithm and the encryption algorithm in the prior art, and the group integrity algorithm and the group encryption algorithm may also be respectively associated with the integrity algorithm in the prior art.
  • the encryption algorithm is similar, except that the group integrity algorithm and the group encryption algorithm are algorithms for one group, and the integrity algorithm and encryption algorithm are algorithms for one MTC device.
  • the eNB In the process of calculating the access layer group key including Key_Groupenc and Key_Groupint, the eNB first needs to group the MTC devices belonging to the same service according to the Service ID, and then determine a group of KeNB_Group according to the group, and then generate a group according to the KeNB_Group and the group algorithm. Key.
  • KeNB_Group can be calculated as follows:
  • KeNB_Group KDF ( KeNB_Service, Cell ID, Group ID )
  • the KDF is a key generation function
  • the Cell ID is the number of the eNB serving cell
  • the Group ID is the group ID of the group to which the MTC device belongs.
  • the group encryption key Key_Groupenc and the group integrity key Key_Groupint can be calculated:
  • Key_Groupenc KDF ( KeNB_Group , Group-enc-alg, Alg-ID )
  • Key_Groupint KDF ( KeNB_Group, Group-int-alg, Alg-ID )
  • KDF is the key generation function
  • Group-enc-alg represents the current calculation using the group encryption algorithm
  • Alg-ID is the algorithm identification
  • Group-int-alg represents the current integrity calculation algorithm.
  • the eNB After calculating the group key, the eNB also binds the group algorithm, Key Count, KeNB_Group, KeNB_Groupenc, and KeNB_Groupint to the Group ID.
  • the eNB sets the Key Count to 0, when the PDCP counter value reaches the maximum.
  • the Key Count value is incremented by 1, and the group key is deduced and updated by the Key Count value.
  • the group integrity algorithm and the group encryption algorithm may also be pre-configured on the eNB and the MTC device, in which case there is no need to select a group algorithm in S990 or a negotiation group algorithm.
  • the eNB shall utilize the access layer key encryption and integrity protection of the MTC device, a group algorithm including a group integrity algorithm and a group encryption algorithm, and a group key including a group encryption key and a group integrity key.
  • the MTC device is sent to the MTC device to perform group communication according to the group algorithm and the group key.
  • the MTC device uses its own access layer key to obtain a group algorithm and a group key. In this way, the MTC device can perform subsequent group communication normally using a group algorithm and a group key shared by one group.
  • the eNB may update the group key according to the Key Count.
  • the manner of updating the group key may first derive a new KeNB_Group according to the Key Count, and then calculate a new group by using the derived KeNB_Group. Key.
  • the derivation method can be used to test the relevant content in S292.
  • the eNB transmits a group key encrypted with the access layer key of the MTC device to the MTC device, so that the MTC device reacquires the group key to perform group communication.
  • the set ID is the service ID of the MTC device support service.
  • the service ID can be preset in the MTC device. It can also be set in the USIM.
  • the USIM becomes part of the MTC device to determine the services supported by the MTC device.
  • the first parameter is a service root key corresponding to the service ID, that is, KeNB_Service in the following description, It is equal to the Service Key generated by the HSS.
  • KeNB_Group 0 can be determined by the base station through KeNB_Service
  • the service ID of the service to which the MTC device belongs and the key K_Service corresponding to the service ID are stored in the USIM of the MTC device.
  • the Service ID and the K_Service corresponding to the Service ID can also be directly saved in the MTC device.
  • the correspondence between the Service ID and the K_Service is also saved in the HSS to which the MTC device belongs.
  • the MTC device sends an attach request to the network, and includes IMSI and Service ID in the request.
  • the MME After the MME receives the attach request sent by the MTC device, the MME determines whether the Service Key bound to the Service ID is saved.
  • the MME sends an authentication data request message to the HSS, where the IMSI and the Service ID are carried in the message;
  • the HSS sends the calculated AV and Service Key to the MME;
  • the MME establishes a binding relationship between the Service ID and the Service Key and stores the binding relationship.
  • the MME determines that the Service Key is bound to the Service ID, perform the following operations before S1060:
  • the MME sends an authentication data request message to the HSS, where the IMSI is carried in the message;
  • the HSS finds the corresponding K according to IMSI, and generates AV according to K;
  • the HSS sends the AV to the MME through an authentication data response message. At this point, you do not need to perform S1050.
  • the MME and the MTC device calculate the KeNB, and the MME uses the Service Key as the KeNB_Service.
  • the MTC device may also generate the KeNB at any time after S1060 and before S1092.
  • the MME transmits the Service ID, KeNB, and KeNB_Service to the eNB.
  • the eNB selects an integrity algorithm and an encryption algorithm according to the security capabilities of the MTC device. If the binding relationship related to the Service ID is not established on the eNB, the eNB is configured according to The group security capability of the MTC device selects a group algorithm for generating a group key, may include a group integrity algorithm and a group encryption algorithm, and calculates an access layer key and an access layer group key. Including calculations
  • the eNB In the process of access layer group key of Key_Groupenc and Key_Groupint, the eNB first needs to group the MTC devices belonging to the same service according to the Service ID, then determine a group KeNB_Group according to the group, and then generate a group key according to the KeNB_Group and the group algorithm. After calculating the group key, the eNB also binds the group algorithm, Key Count, KeNB_Group, KeNB_Groupenc, and KeNB_Groupint to the Group ID. In other embodiments, the group integrity algorithm and the group encryption algorithm may also be pre-configured on the eNB and the MTC device. For related content of S1090, reference may be made to the description in S990 above.
  • the eNB and the MTC device perform an AS SMC (Access Stratum Security Mode Command), negotiate the selected integrity algorithm, the encryption algorithm, the group integrity algorithm, and the group encryption algorithm.
  • AS SMC Access Stratum Security Mode Command
  • the MTC device calculates an access stratum key according to the negotiated algorithm.
  • the eNB sends the calculated Key_Groupenc and Key_Groupint to the MTC device through the access layer security protection, and then the MTC device and the network side can perform group communication by using Key_Groupenc and Key_Groupint.
  • the MTC device may be grouped according to the Service ID in the MME, and then the MME sends the group ID obtained by the packet to the eNB; and may also be on a specific M2M-enabled entity.
  • the MTC device performs grouping, and the entity notifies the eNB of the Group ID obtained by the packet.
  • the eNB does not need to perform further grouping, and the KeNB_Group can be directly calculated according to the received Group ID.
  • the network side can obtain the service ID of the MTC device in multiple manners, for example: the MTC device sends the Service ID to the network side, as described above; the HSS saves the binding relationship between the IMSI and the Service ID.
  • the IMSI can find the corresponding Service ID; the entity of a specific M2M function saves the binding relationship between the IMSI and the Service ID, and the HSS can obtain the corresponding Service ID from the entity; the HSS learns the Service ID through the specific field of the IMSI.
  • the group key synchronization can be performed by the flowchart shown in FIG.
  • the MTC device sends a service request message to the network side, and the service ID is included in the message.
  • the MME checks whether there is a binding relationship corresponding to the Service ID. If not, performs S1020 to S1050 and subsequent S1060 to S1093 when the MEE has no binding relationship in FIG. 10; if yes, The Service ID is sent to the eNB.
  • the MME sends the Service ID to the eNB.
  • the eNB obtains a Group ID for the MTC device group according to the Service ID, and searches for the group algorithm and the group key to which the Group ID is bound.
  • the eNB sends an AS SMC to the MTC device, and negotiates an integrity algorithm, an encryption algorithm, a group integrity algorithm, and a group encryption algorithm.
  • the MTC device calculates the access stratum key and Key_Groupenc, Key_Groupint according to the negotiated algorithm.
  • Figure 12 is a flow diagram of a fifth example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • the eNB groups the MTC device, or obtains the grouping status of the MTC device from other network elements, to determine the group ID of the group in which the MTC device is located.
  • KDF KDF (KeNB/RAND, Group ID)
  • the present invention does not limit the specific form of KDF.
  • the eNB also selects a group algorithm including a group integrity algorithm and a group encryption algorithm for the group of MTC devices, and calculates a group key including a group encryption key Key_Groupenc and a group integrity key Key_Groupint according to the KeNB_Group and the group algorithm, and establishes Group ID and group communication root key, group algorithm, group key binding relationship.
  • Key_Groupenc KDF ( KeNB_Group , Group-enc-alg , Alg-ID )
  • Key_Groupint KDF ( KeNB_Group , Group-int-alg , Alg-ID )
  • Group-enc-alg represents the current calculation using a group encryption algorithm
  • Alg-ID is the algorithm identifier
  • Group-int-alg represents the group integrity algorithm for the current calculation.
  • the functions and usages of the group integrity algorithm and the group encryption algorithm are similar to the integrity algorithm and the encryption algorithm, respectively, except that the group integrity algorithm and the group encryption algorithm are for one group ID, and the integrity algorithm and the encryption algorithm are For an MTC device.
  • the eNB shall utilize the access layer key encryption and integrity protection of the MTC device, a group algorithm including a group integrity algorithm and a group encryption algorithm, and a group key including a group encryption key and a group integrity key.
  • the MTC device is sent to the MTC device to perform group communication according to the group algorithm and the group key.
  • the MTC device uses its own access layer key to obtain a group algorithm and a group key. In this way, the MTC device can perform subsequent group communication normally using a group algorithm and a group key shared by one group.
  • Figure 13 is a flow diagram of a sixth example of generating a group key using a method provided in accordance with an embodiment of the present invention.
  • the MME groups the MTC devices, or obtains the grouping status of the MTC device from other network elements, to determine the group ID of the group in which the MTC device is located.
  • the MME can also directly use the random number as the KeNB_Group and establish Binding relationship between Group ID and KeNB_Group.
  • the MME transmits the Group ID and the KeNB_Group to the eNB.
  • the eNB selects a group encryption algorithm and a group integrity algorithm for the group in which the MTC device is located, and calculates Key_Groupenc and Key_Groupint of the response.
  • Key_Groupenc KDF (KeNB_Group, Group-enc-alg, Alg-ID)
  • Key_Groupint KDF (KeNB_Group, Group-int-alg, Alg-ID)
  • Group ID and group integrity algorithm group encryption algorithm, Binding relationship of KeNB_Group, KeNB_Groupenc, KeNB_Groupint.
  • the eNB sends the group integrity algorithm, the group encryption algorithm, the Key_Groupenc and the Key_Groupint after the encryption and integrity protection to the MTC device.
  • the algorithms and keys used for encryption and integrity protection are access layer algorithms and keys that the MTC device shares with the network side.
  • the MTC device acquires the group algorithm and group key and uses them for subsequent communication.
  • the access layer key synchronization may be performed by the following process: the MTC device sends a service request message to the network side, After the network side, for example, the MME or the eNB, is grouped by the MTC device, when the group ID obtained by the packet has the bound group key, the group key bound to the group ID is sent to the MTC device through the access layer key of the MTC device. Then, when the group ID obtained by the packet does not have the group key bound, after the group key is generated for the group ID, the group key is sent to the MTC device through the access layer key of the MTC device.
  • the eNB may not need to maintain a PDCP Count value for each MTC device, but maintain a group PDCP Count value for a group of MTC devices. In this way, the PDCP Count value that the base station needs to maintain can be reduced, and the processing complexity of the base station is further reduced.
  • the PDCP Count value is composed of two parts: HFN and SN.
  • the eNB may not need to maintain an HFN value for each MTC device, but is one.
  • the group MTC device maintains a group HFN value, wherein the group HFN is shared by a group of MTC devices, and the SN is determined by the sequence number in the data packet transmitted by the MTC device.
  • a PDCP Count value is maintained, and the HFN in the PDCP Count value is synchronized with the HFN of the group HFN and other MTC devices maintained by the eNB, and the SN is separately maintained by the MTC device.
  • the serial number of the transmitted packet is related.
  • each MTC device For the uplink, each MTC device maintains a PDCP Count value, and the HFN maintained by each MTC device in the group is synchronized with the group HFN maintained by the eNB.
  • the intra-group MTC device encrypts the uplink data by using the uplink PDCP Count value, and carries the SN in the header of the uplink data packet data unit (PDU).
  • the eNB decrypts the data packet by using the HF value saved by the eNB and the Count value of the SN carried by the data packet.
  • the eNB When the SN in the data packet sent by any MTC device in the group reaches the threshold, after receiving the data packet, the eNB adds 1 to the group HFN, and notifies the value of the HFN or the information that the HFN needs to be added to the group.
  • Each MTC device. HFN can have multiple notification methods. For example, for an MTC device with a small traffic volume, the HFN can be set to a fixed value. For example, when the HFN is variable, the eNB may send the HFN to all the MTC devices in the group ID corresponding group by using the grouping ID corresponding to the signaling bearer of each MTC device in the group, the common signaling bearer of the group ID corresponding group, or the broadcast channel. The value.
  • the eNB may send the HFN value to all the MTC devices in the group ID corresponding group when the HFN reaches the threshold, or may send the HFN value to the MTC device when the MTC device joins the group ID corresponding group. For example, when the HFN is variable, if the HFN corresponding to the group ID reaches the threshold, the eNB may use the group ID to correspond to the signaling bearer of each MTC device in the group, the common signaling bearer of the group ID corresponding group, or the broadcast channel. All MTC devices in the group ID corresponding group send indication information indicating that the HFN is incremented by 1.
  • the initial value for the group HFN needs to be negotiated by the MTC device with the eNB or sent by the eNB to the MTC device.
  • the eNB may directly send the PDCP Count value to the MTC device in the PDU header, so that the MTC device may extract the value of the HFN from the header according to the received PDU.
  • the general intra-group MTC device receives the group information sent by the eNB through the common bearer, and the PDCP Count values of the MTC devices in the group change consistently. Therefore, there is no need to introduce a new PDCP Count value mechanism on the downlink.
  • the eNB When the group HFN held by the eNB reaches the threshold, the eNB updates the group key. When the HFN in the PDCP Count value in the MTC device reaches the threshold, the MTC device also updates the group key.
  • the MTC device can be determined in various ways to reach the HFN threshold. For example, the eNB may notify the MTC device of the HFN value or the indication of the HFN port 1, so that the MTC device determines that the HFN reaches the threshold after changing the HFN, thereby updating the group key. For another example, the eNB may directly notify the MTC device of the indication that the HFN reaches the threshold, so that the MTC device updates the group key.
  • the group key can be updated in two ways in the eNB.
  • Key_Groupenc* KDF (Key_Groupenc, Cell ID, Group ID)
  • Key_Groupint* KDF (Key_Groupint, Cell ID, Group ID).
  • the network side may update the group communication root key when certain conditions are met.
  • the network side updates the group root key KeNB_Group, and generates a new group key according to the updated group communication root key to perform group communication by using the new group key.
  • the certain condition may be when the timer maintained by the network side reaches the threshold; or when the Key Count value maintained by the eNB reaches the threshold; or when the counter value for a group or a service maintained by the MME reaches the threshold, The counter value is incremented by 1 each time the MME receives NAS signaling sent by an MTC device belonging to a group or a service.
  • the group ID and the group communication root key are sent to the base station, so that the base station generates the group key corresponding to the group ID according to the group communication root key and transmits the group encrypted with the access layer key of the MTC device to the MTC device. Key.
  • method 1400 can be performed by an MME.
  • the MME groups the MTC devices, and then determines the group communication root key corresponding to the group ID of the group in which the MTC device is located.
  • the MME sends the group ID and the group communication root key to the base station, so that the base station generates the group key, encrypts it, and sends it to the MTC device, thereby completing the group key allocation.
  • the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station. Only the same group key needs to be kept for the same group, thereby reducing the complexity of the operation of the base station, reducing the number of keys maintained and managed by the base station, and improving the performance of the base station.
  • the MME can obtain the group ID of the group in which the MTC is located in multiple manners.
  • the MME may group the MTC devices so that the MTC devices can be divided into groups corresponding to the group ID.
  • the MME may obtain the group ID of the group in which the MTC device is located from other network elements.
  • the MME can receive the group ID sent by the MTC device.
  • the MME when the MME obtains the group ID from the group ID sent by the MTC device in S1410, the MME may acquire the group communication root key corresponding to the group ID in the following manner:
  • the HSS sends the group ID, so that the HSS generates the first parameter according to the random number and the set key corresponding to the group ID; receives the first parameter from the HSS; and generates the group communication root key corresponding to the group ID according to the first parameter.
  • the MME when the group ID is not bound to the first parameter corresponding to the group ID, the MME sends the group ID to the HSS. After the MME receives the first parameter from the HSS, the MME may bind and store the first parameter with the group ID. In this way, when the MME receives the attach request carrying the group ID sent by the other MTC device, the MME may acquire the first parameter bound to the group ID according to the group ID; and generate the group communication root density corresponding to the group ID according to the first parameter. Key; sends the group ID and group communication to the base station.
  • the MME may receive the group authentication parameter from the HSS, where the group authentication parameter is generated by the HSS according to the set key corresponding to the group ID, or is determined by the HSS.
  • the set key corresponding to the group ID and the exclusive key of the MTC device are generated; and the MTC device is authenticated according to the group authentication parameter.
  • the MME after the MTC device and the network side authenticate successfully, the MME generates a group communication root key corresponding to the group ID according to the first parameter.
  • the exclusive key of the MTC device may be the MTC device, and K may be stored in the USIM. When the USIM is inserted into an MTC device, the USIM becomes part of the MTC device.
  • the MME may also obtain the group communication root key corresponding to the group ID by: selecting an MTC device from the MTC devices in the group ID, and determining the group communication corresponding to the group ID according to the selected key of the MTC device.
  • the root key ; or generate a random number, and determine a group communication root key corresponding to the group ID according to the random number.
  • the MME may derive the group communication root key corresponding to the group ID according to the KeNB of the selected MTC device, or directly use the KeNB of the selected MTC device as the group communication root key corresponding to the group ID.
  • the MME may derive the group communication root key corresponding to the group ID according to the random number, or directly use the random number as the group communication root key corresponding to the group ID.
  • the group ID and the group communication root key may be bound and stored.
  • the group communication root key is acquired according to the group ID; the group ID and the group communication root key are transmitted to the base station.
  • the MTC device when a predetermined timer maintained by the network side reaches a first predetermined threshold, or when the number of times the base station updates the group key reaches a second predetermined threshold, or when the number of non-access strata maintained is maintained When the value reaches the third predetermined threshold, the MTC device performs re-authentication or acquires a new group communication root key corresponding to the group ID. In this way, the group key can be updated after a certain period of time, and the insecure factor is introduced to avoid the use of the same group of keys for a long time, thereby further improving the security of the group communication.
  • method 1500 includes:
  • the base station receives, from the base station, a group key that is encrypted by the base station with the access layer key of the MTC device, where the group key is generated by the base station according to the group communication root key acquired by the base station, and the group of the MTC device acquired by the base station
  • the group ID is corresponding, or the group key is generated by the base station according to the group communication root key acquired by the MME, and corresponds to the group ID of the group in which the MTC device is acquired by the MME;
  • the group key is decrypted according to the access layer key of the MTC device.
  • method 1500 can be performed by an MTC device.
  • steps in the method 1500 reference may be made to the descriptions of the method 100 and the method 1400.
  • the HFN corresponding to the group ID may be preset to a fixed value, or the base station may notify the MTC device of information related to the HFN value.
  • the MTC device may receive the value of the HFN from the base station through the signaling 7 of the MTC device, the common signaling 7 of the group ID corresponding group, or the broadcast channel; or the MTC device may correspond to the group ID.
  • the indication information indicating the HFN plus 1 is received from the base station by using the signaling bearer of the MTC device, the common signaling bearer of the group ID corresponding group, or the broadcast channel.
  • the network side can update the group key, and the MTC device needs to perform group communication through the updated group key.
  • the MTC device may acquire, from the base station, an updated group key encrypted with an access layer key of the MTC device, wherein the updated group key is determined by the base station when the HFN corresponding to the group ID reaches a threshold Obtaining the update of the group key; decrypting the access group key according to the MTC device to obtain the updated group key.
  • the predetermined timer maintained by the network side reaches the first predetermined threshold, or when the number of times the base station updates the group key reaches the second predetermined threshold, or when the count value of the non-access stratum maintained by the MME reaches the third predetermined threshold, Re-authenticating with the MME or acquiring a new group key encrypted by the base station with the access layer key of the MTC device from the base station.
  • the group key can be updated after a certain period of time, and the use of the same group of keys is prevented from being too long to introduce an insecure factor, thereby further improving the security of the group communication.
  • the network side determines the group key corresponding to the group ID by determining the group ID of the group in which the MTC device is located, by using the access layer key of the MTC device.
  • the group key used by the MTC device is securely assigned to the MTC device, and the MTC devices within the same group ID share the same group key.
  • the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station, only the same group key needs to be kept for the same group, thereby reducing the complexity of the base station operation and reducing the base station. Maintain and manage the number of keys to improve base station performance.
  • the method of generating a group key is described above from the perspective of a base station, an MME, and an MTC device, and the related devices are described below with reference to Figs.
  • Figure 16 is a block diagram showing the structure of a base station 1600 according to an embodiment of the present invention.
  • the base station 1600 includes a first acquisition module 1610, a second acquisition module 1620, a generation module 1630, and a first transmission module 1640.
  • the first obtaining module 1640 can be implemented by an input interface and/or a processor
  • the second obtaining module 1620 can be implemented by an input interface and/or a processor
  • the generating module 1630 can be implemented by a processor
  • the first sending module 1640 can be configured by an output interface.
  • the first obtaining module 1610 is configured to obtain a group ID of a group in which the MTC device is located.
  • the second obtaining module 1620 is configured to obtain a group communication root key corresponding to the group ID.
  • the generating module 1630 is configured to generate a group key corresponding to the group ID according to the group communication root key.
  • the first sending module 1640 is configured to send, to the MTC device, a group key encrypted with an access layer key of the MTC device, so that the MTC device decrypts the group key according to the access layer key of the MTC device.
  • the foregoing and other operations and/or functions of the first obtaining module 1610, the second obtaining module 1620, the generating module 1630, and the first sending module 1640 may refer to the foregoing method 100 and the descriptions of the first to sixth examples, in order to avoid duplication, I will not repeat them here.
  • the base station determines the group key corresponding to the group ID by determining the group ID of the group in which the MTC device is located, and can use the group key used by the MTC device by means of the access layer key of the MTC device.
  • the key is securely assigned to the MTC device and is made within the same group ID MTC devices share the same group key. In this way, the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station, only the same group key needs to be kept for the same group, thereby reducing the complexity of the base station operation and reducing the base station. Maintain and manage the number of keys to improve base station performance.
  • FIG. 17 is a structural block diagram of a base station 1700 according to an embodiment of the present invention.
  • the first obtaining module 1710, the second obtaining module 1720, the generating module 1730, and the first sending module 1740 of the base station 1700 and the first obtaining module 1610, the second obtaining module 1620, the generating module 1630, and the first sending module 1640 of the base station 1600 are basically the same.
  • the first obtaining module 1710 is specifically configured to divide the MTC device into a group corresponding to the group ID; or obtain the group ID of the group in which the MTC device is located from other network elements.
  • the second obtaining module 1720 is specifically configured to select an MTC device from the MTC devices in the group ID, and determine a group communication root key corresponding to the group ID according to the selected key of the MTC device. .
  • the second obtaining module 1720 is specifically configured to receive, from the MME, a group communication root key corresponding to the group ID, where the MME divides the MTC device into a group corresponding to the group ID, and selects the MTC device from the MTC devices in the group ID.
  • the group communication root key corresponding to the group ID is determined according to the key of the selected MTC device, or the group communication root key corresponding to the group ID is determined by the MME according to the random number generated by the MME.
  • the second obtaining module 1720 is specifically configured to generate a random number, and determine, according to the random number, a group communication root key corresponding to the group ID.
  • the first obtaining module 1710 and the second obtaining module 1720 are specifically configured to receive a group ID and a group communication root key from the MME, where the group communication root key is randomly selected by the home subscriber system HSS to which the MTC device belongs.
  • the number and the set key corresponding to the group ID are generated, or the group communication root key is received by the HSS when receiving the group ID from an MTC device forwarded by the MME, according to the random number, the group ID, and the exclusive key of the one MTC device. Generated, and the group communication root key is sent to the MME by the HSS.
  • the first obtaining module 1710 may include a receiving unit 1712 and a determining unit 1714.
  • the receiving unit 1712 is configured to receive, by the MME, a service ID and a service root key corresponding to the service ID, where the service ID is a service ID of the service to which the MTC device belongs to the MME, and the service root key is determined by the HSS to which the MTC device belongs.
  • the random number is generated by the set key corresponding to the service ID, or the service root key is generated by the HSS when receiving the service ID from an MTC device forwarded by the MME, according to the random number, the service ID, and the exclusive key of an MTC device.
  • the HSS sends the service root key to the MME.
  • the determining unit 1714 is configured to determine a group ID of the group in which the MTC device is located according to the service ID.
  • the second obtaining module 1720 is configured to generate a group communication root key corresponding to the group ID according to the service root key.
  • the base station 1700 may further include a binding module 1750, a third obtaining module 1760, and a second sending module 1770.
  • the binding module 1750 can be used to bind and store the group communication root key, the group key, and the group ID.
  • the third obtaining module 1760 is configured to acquire the bound group key according to the group ID when determining that the other MTC devices belong to the group corresponding to the group ID.
  • the second sending module 1770 is configured to send, to other MTC devices, a group key encrypted with an access layer key of another MTC device, so that the other MTC device decrypts according to an access layer key of the other MTC device. Go to the group key.
  • base station 1700 can also include an update module 1780 and a third transmit module 1790.
  • the update module 1780 is configured to update the group key when the HFN corresponding to the group ID reaches the threshold.
  • the third sending module 1790 is configured to send, to the MTC device, the updated group key encrypted by the access layer key of the MTC device, so that the MTC device decrypts the updated group key according to the access layer key of the MTC device. . In this way, it is possible to prevent the same group of keys from being used for a long time and introduce an insecure factor, thereby further improving communication security.
  • Base station 1700 can also include a fourth transmitting module 1795, in accordance with an embodiment of the present invention.
  • the fourth sending module 1795 can be configured to send the value of the HFN to all the MTC devices in the group ID corresponding group by using the signaling bearer of each MTC device in the group ID group, the common signaling bearer of the group ID corresponding group, or the broadcast channel. .
  • the fourth sending module 1795 may be configured to: when the HFN corresponding to the group ID reaches the threshold, the grouping ID corresponding to the signaling bearer of each MTC device in the group, the common signaling bearer of the group ID corresponding group, or the broadcast channel, to the group All MTC devices in the ID corresponding group send indication information indicating that the HFN is incremented by one.
  • the first obtaining module 1710, the second obtaining module 1720, the receiving unit 1712, the determining unit 1714, the binding module 1750, the third obtaining module 1760, the second sending module 1770, the updating module 1780, the third sending module 1790, and the fourth sending The above and other operations and/or functions of the module 1795 can be referred to the above-described method 100 and the description of the first to sixth examples, and are not described again in order to avoid redundancy.
  • the binding module 1750, the third obtaining module 1760, and the updating module 1780 can be implemented by a processor, and the second sending module 1770, the third sending module 1790, and the fourth sending module 1795 can be implemented by using an output interface.
  • the base station may send the same group key to the MTC devices in the same group, so that the MTC devices in the same group can perform group communication normally by using the same group key, but in the base station. It is also only necessary to keep the same group key for the same group. This can reduce the complexity of base station operation, reduce the number of keys maintained and managed by the base station, and improve base station performance.
  • Figure 18 is a block diagram showing the structure of a mobility management entity 1800 in accordance with an embodiment of the present invention.
  • the mobility management entity 1800 includes a first acquisition module 1810, a second acquisition module 1820, and a transmission module 1830.
  • the first obtaining module 1810 and the second obtaining module 1820 can be implemented by an input interface and/or a processor, and the sending module 1830 can be implemented by an output interface.
  • the first obtaining module 1810 is configured to obtain a group ID of a group in which the MTC device is located.
  • the second obtaining module 1820 is configured to obtain a group communication root key corresponding to the group ID.
  • the sending module 1830 is configured to send the group ID and the group communication key to the base station, so that the base station generates the group key corresponding to the group ID and sends the MTC device to the MTC device.
  • first obtaining module 1810 the second obtaining module 1820, and the transmitting module 1830 may refer to the above method 1400 and the descriptions of the first to sixth examples, In order to avoid repetition, it will not be described here.
  • the base station by determining the group ID and the group communication key of the group in which the MTC device is located, the base station can determine the group key corresponding to the group ID, and use the group secret used by the MTC device.
  • the key is securely transmitted to the MTC device through encryption of the access layer key of the MTC device, so that the MTC devices in the same group ID can share the same group key.
  • the MTC devices in the same group can use the same group key to perform group communication normally, and in the base station, only the same group key needs to be kept for the same group, thereby reducing the complexity of the base station operation and reducing the base station. Maintain and manage the number of keys to improve base station performance.
  • Figure 19 is a block diagram showing the structure of a mobility management entity 1900 in accordance with an embodiment of the present invention.
  • the first obtaining module 1910, the second obtaining module 1920, and the sending module 1930 of the mobility management entity 1900 are substantially the same as the first obtaining module 1810, the second obtaining module 1820, and the transmitting module 1830 of the mobility management entity 1800.
  • the first obtaining module 1910 is specifically configured to divide the MTC device into a group corresponding to the group ID. Alternatively, the first obtaining module 1910 is specifically configured to obtain, from other network elements, a group ID of a group in which the MTC device is located. Alternatively, the first obtaining module 1910 is specifically configured to receive a group ID sent by the MTC device.
  • the first obtaining module 1910 is further specifically configured to receive the group ID sent by the MTC device.
  • the second acquisition module 1920 can include a transmitting unit 1922, a receiving unit 1924, and a generating unit 1926.
  • the sending unit 1922 is configured to send the group ID to the HSS to which the MTC device belongs, so that the HSS generates the first parameter according to the random number and the set key corresponding to the group ID.
  • the receiving unit 1924 is configured to receive the first parameter from the HSS.
  • the generating unit 1926 is configured to generate a group communication root key corresponding to the group ID according to the first parameter.
  • the sending unit 1922 is specifically configured to send the group ID to the HSS to which the MTC device belongs when the group ID is not bound to the first parameter corresponding to the group ID.
  • the mobility management entity 1900 may further include a first binding module 1940 and a third obtaining module 1950.
  • the first binding module 1940 can be configured to bind and store the first parameter with the group ID.
  • the third obtaining module 1950 is configured to: when receiving the attach request carrying the group ID sent by the other MTC device, acquire the first parameter bound to the group ID according to the group ID, so that the generating unit 1926 generates the group according to the first parameter.
  • the mobility management entity 1900 may also include a receiving module 1960 and an authentication module 1970, in accordance with an embodiment of the present invention.
  • the receiving module 1960 is configured to receive a group authentication parameter from the HSS, where the group authentication parameter is generated by the HSS according to the set key corresponding to the group ID, or generated by the HSS according to the set key corresponding to the group ID and the exclusive key of the MTC device.
  • the authentication module 1970 is used to authenticate with the MTC device based on the group authentication parameters.
  • the generating unit 1926 can be configured to generate a group communication root key corresponding to the group ID according to the first parameter after the MTC device and the network side are successfully authenticated.
  • the second obtaining module 1920 may be specifically configured to select one MTC device from the MTC devices in the group ID, and determine a group communication root key corresponding to the group ID according to the selected key of the MTC device.
  • the second obtaining module 1920 is further configured to generate a random number, and determine, according to the random number, a group communication root key corresponding to the group ID.
  • the mobility management entity 1900 can also include a second binding module 1980 and a fourth acquisition module 1990.
  • the second binding module 1980 can be configured to bind and store the group ID and the group communication root key.
  • the fourth obtaining module 1990 is configured to: when determining that the other MTC devices belong to the group corresponding to the group ID, acquire the bound group communication root key according to the group ID, so that the sending module 1930 sends the group ID and the group communication to the base station. Key.
  • the mobility management entity 1900 may also include a processing module 1992, in accordance with an embodiment of the present invention.
  • the processing module 1992 may be configured to: when the predetermined timer maintained by the network side reaches the first predetermined threshold, or when the number of times the base station updates the group key reaches a second predetermined threshold, or when the count value of the maintained non-access stratum reaches the third When the threshold is predetermined, the MTC device performs re-authentication or acquires a new group communication root key corresponding to the group ID.
  • the foregoing method and other operations and/or functions of the fourth obtaining module 1990 and the processing module 1992 may refer to the foregoing method 1400 and the descriptions of the first to sixth examples. To avoid repetition, details are not described herein again.
  • the first binding module 1940, the third obtaining module 1950, the authentication module 1970, the second binding module 1980, and the fourth obtaining module 1990 may be implemented by a processor, and the receiving module 1960 may be implemented by using an input interface, and the processing module 1992 may be implemented by Implemented by the processor and / or input interface.
  • the mobility management entity can send the same group key to the MTC device in the same group by sending the group ID and the group communication root key to the base station, so that the same group key can be made.
  • the MTC devices in the group use the same group key to perform group communication normally, and in the base station only need to keep the same group key for the same group. In this way, the complexity of the operation of the base station can be reduced, the number of keys maintained and managed by the base station can be reduced, and the performance of the base station can be improved.
  • Figure 20 is a block diagram showing the structure of a machine type communication device 2000 according to an embodiment of the present invention.
  • the machine type communication device 2000 includes a first receiving module 2010 and a first decrypting module 2020.
  • the first receiving module 2010 can be implemented through an input interface, and the first decrypting module 2020 can be implemented by a processor.
  • the first receiving module 2010 is configured to receive, from the base station, a group key that is encrypted by the base station by using an access layer key of the MTC device, where the group key is generated by the base station according to the group communication root key acquired by the base station, and the MTC device acquired by the base station.
  • the group ID of the group is corresponding, or the group key is generated by the base station according to the group communication root key acquired from the MME, and corresponds to the group ID of the group in which the MTC device is acquired by the MME.
  • the first decryption module 2020 is configured to decrypt the group key according to the access layer key of the MTC device.
  • first receiving module 2010 and the first decrypting module 2020 can be referred to the above method 1500 and the descriptions of the first to sixth examples. To avoid repetition, details are not described herein again.
  • the same group key can be shared with other MTC devices of the same group to perform group communication normally, and in the base station. It is also only necessary to maintain the same group key for the same group, thereby reducing the complexity of base station operation, reducing the number of keys maintained and managed by the base station, and improving base station performance.
  • 21 is a block diagram showing the structure of a machine type communication device 2100 according to an embodiment of the present invention.
  • the first receiving module 2110 and the first decrypting module 2120 of the machine type communication device 2100 are substantially the same as the first receiving module 2010 and the first decrypting module 2020 of the machine type communication device 2000.
  • all MTC devices of the same group ID can share the same HFN.
  • the base station can maintain a PDCP Count value for the same group ID, thereby further reducing the processing complexity of the base station.
  • the machine type communication device 2100 may further include a second receiving module 2130 and a second decryption module 2140.
  • the second receiving module 2130 is configured to receive, from the base station, an updated group key encrypted by using an access layer key of the MTC device, where the updated group key is performed by the base station when the HFN corresponding to the group ID reaches a threshold. The update is getting.
  • the second decryption module 2140 is configured to decrypt the updated group key according to the access layer key of the MTC device.
  • the HFN corresponding to the group ID may be preset to a fixed value, or the MTC device may receive information related to the HFN value from the base station.
  • the machine type communication device 2100 may include a third receiving module 2150.
  • the third receiving module 2150 is configured to receive the value of the HFN from the base station by using a signaling bearer of the MTC device, a common signaling bearer of the group ID corresponding group, or a broadcast channel.
  • the third receiving module 2150 is further configured to: when the HFN corresponding to the group ID reaches the threshold, receive an indication for indicating that the HFN is incremented by the base station by using a signaling bearer of the MTC device, a common signaling bearer of the group ID corresponding group, or a broadcast channel. information.
  • the machine type communication device 2100 may further include a processing module 2160, in accordance with an embodiment of the present invention.
  • the processing module 2160 is configured to: when the predetermined timer maintained by the network side reaches the first predetermined threshold, or when the number of times the base station updates the group key reaches a second predetermined threshold, or when the count value of the non-access stratum maintained by the MME reaches the first When the threshold is predetermined, the MME performs re-authentication or acquires a new group key encrypted by the base station using the access layer key of the MTC device from the base station.
  • the foregoing and other operations and/or functions of the second receiving module 2130, the second decrypting module 2140, the third receiving module 2150, and the processing module 2160 may refer to the foregoing method 1500 and the descriptions of the first to sixth examples, in order to avoid duplication, I will not repeat them here.
  • the second receiving module 2130 and the third receiving module 2150 can be implemented by using an input interface
  • the second decrypting module 2140 can be implemented by a processor
  • the processing module 2160 can be implemented by a processor and/or an input interface.
  • the MTC device in the same group can perform group communication normally by using the same group key by receiving the group key corresponding to the group in the base station, and also in the base station. You only need to keep the same group key for the same group. In this way, the complexity of the operation of the base station can be reduced, the number of keys maintained and managed by the base station can be reduced, and the performance of the base station can be improved.
  • RAM random access memory
  • ROM read only memory
  • electrically programmable ROM electrically erasable programmable ROM
  • registers hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. in.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供了生成组密钥的方法和相关设备。该方法包括:获取机器类通信MTC设备所在组的组ID;获取组 ID对应的组通信根密钥;根据组通信根密钥生成组ID对应的组密钥;向MTC设备发送用MTC设备的接入层密钥加密的组密钥,以使MTC设备根据MTC设备的接入层密钥解密得到组密钥。根据上述技术方案,基站可以向MTC设备分配与MTC设备所在的组对应的组密钥,从而可以使同一组内的MTC设备利用相同的组密钥来正常进行组通信,而在基站中也只需要为同一个组保持相同组密钥,这样,可以降低基站操作的复杂性,减少基站维护和管理的密钥数,提高基站性能。

Description

生成組密钥的方法和相关设备 本申请要求于 2011 年 11 月 1 日提交中国专利局、 申请号为 201110340029.0、发明名称为"生成组密钥的方法和相关设备"的中国专利申 请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 本发明涉及通信领域, 并且更具体地, 涉及通信领域中生成组密钥的 方法和相关设备。
背景技术 机器对机器( Machine to Machine, M2M )技术是无线通信和信息技术 的整合, 是指机器和机器之间可以直接进行通信而无需人工干预。 M2M应 用种类丰富, 包括自动仪表、 远程监控、 工业安全与舰艇自动化、 支付系 统以及车辆远程控制等。
M2M存在三种方式, 包括机器对机器、 机器对移动电话和移动电话对 机器。 在 M2M中, M2M设备可以通过远距离连接技术和近距离连接技术 接入网络,涉及的远距离连接技术包括全球移动通信系统( Global System for Mobile communications, GSM )、 通用分组无线业务( General Packet Radio Service, GPRS )、 通用移动通信系统 ( Universal Mobile Telecommunications System, UMTS )等无线接入类型技术。 近距离连接技术包括 802.11b/g、 蓝牙 (Blue Tooth )、 紫蜂(Zigbee )、 无线射频识别技术(Radio Frequency Identification, RFID )和超宽带 ( Ultra Wideband, UWB )技术等。 当然, 不排除还有其他技术可用于支撑 M2M通信。 M2M通信也可以被称为机器 类通信(Machine Type Communication, MTC ), M2M设备也可以被称为 MTC设备。
在现有技术中, 基站对同一组 MTC设备构建公共的物理层、 无线链路 控制 (Radio Link Control , RLC ) 层、 分组数据汇聚协议 (Packet Data Convergence Protocol, PDCP )层和媒体接入控制 ( Media Access Control, MAC )层。 当为同一组 MTC设备建立公共承载之后, 每个 MTC设备都有 各自单独的密钥, 各 MTC设备的密钥互不相同, 在基站和 MTC设备之间 交互的 PDU单元需要携带 MTC设备标识以根据该标识来寻找对应的密钥。 因此, 在基站处, 需要为同一组内的每个 MTC设备维护它们各自的密钥, 这增加了基站操作的复杂性, 使基站需要维护和管理的密钥过多, 影响基 站性能。 发明内容 本发明提供了生成组密钥的方法和相关设备, 以提高基站性能。
一方面, 本发明提供了一种生成组密钥的方法, 包括: 获取机器类通 信 MTC设备所在组的组 ID; 获取所述组 ID对应的组通信根密钥; 根据所 述组通信^ f艮密钥生成所述组 ID对应的组密钥; 向所述 MTC设备发送用所 述 MTC设备的接入层密钥加密的所述组密钥, 以使所述 MTC设备根据所 述 MTC设备的接入层密钥解密得到所述组密钥。
另一方面, 本发明提供了一种生成组密钥的方法, 包括: 获取机器类 通信 MTC设备所在组的组 ID; 获取所述组 ID对应的组通信根密钥; 向基 站发送所述组 ID和所述组通信根密钥, 以使所述基站根据所述组通信根密 钥生成所述组 ID对应的组密钥并向所述 MTC设备发送用所述 MTC设备的 接入层密钥加密的所述组密钥。
再一方面, 本发明提供了一种生成组密钥的方法, 包括: 从基站接收 所述基站用机器类通信 MTC设备的接入层密钥加密的组密钥,其中所述组 密钥由所述基站根据所述基站获取的组通信根密钥生成、 并与所述基站获 取的 MTC设备所在组的组 ID对应, 或者所述组密钥由所述基站根据从移 动性管理实体 MME获取的组通信根密钥生成、并与所述 MME获取的 MTC 设备所在组的组 ID对应; 根据所述 MTC设备的接入层密钥解密得到所述 组密钥。
又一方面, 本发明提供了一种基站, 包括: 第一获取模块, 用于获取 机器类通信 MTC设备所在组的组 ID; 第二获取模块, 用于获取所述组 ID 对应的组通信根密钥; 生成模块, 用于根据所述组通信根密钥生成所述组 ID对应的组密钥; 第一发送模块, 用于向所述 MTC设备发送用所述 MTC 设备的接入层密钥加密的所述组密钥, 以使所述 MTC设备根据所述 MTC 设备的接入层密钥解密得到所述组密钥。
又一方面, 本发明提供了一种移动性管理实体, 包括: 第一获取模块, 用于获取机器类通信 MTC设备所在组的组 ID; 第二获取模块, 用于获取 所述组 ID对应的组通信根密钥; 发送模块, 用于向基站发送所述组 ID和 所述组通信根密钥, 以使所述基站根据所述组通信根密钥生成所述组 ID对 应的组密钥并向所述 MTC设备发送用所述 MTC设备的接入层密钥加密的 所述组密钥。
又一方面, 本发明提供了一种机器类通信设备, 包括: 第一接收模块, 用于从基站接收所述基站用机器类通信 MTC设备的接入层密钥加密的组 密钥, 其中所述组密钥由所述基站根据所述基站获取的组通信根密钥生成、 并与所述基站获取的 MTC设备所在组的组 ID对应, 或者所述组密钥由所 述基站根据从移动性管理实体 MME获取的组通信根密钥生成、 并与所述 MME获取的 MTC设备所在组的组 ID对应; 第一解密模块,用于根据所述 MTC设备的接入层密钥解密得到所述组密钥。 根据上述技术方案, 网络侧通过确定 MTC设备所在组的组 ID, 从而 确定与该组 ID对应的组密钥, 通过借助于 MTC设备的接入层密钥可以将 MTC设备使用的组密钥安全地分配给 MTC设备, 并使得同一组 ID 内的 MTC设备共用相同的组密钥。 这样, 同一组内的 MTC设备可以利用相同 的组密钥来正常进行组通信, 而在基站中也只需要为同一个组保持相同组 密钥, 从而, 可以降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性能。 附图说明 为了更清楚地说明本发明实施例的技术方案, 下面将对实施例中所需 要使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅是本发 明的一些实施例, 对于本领域技术人员来讲, 在不付出创造性劳动的前提 下, 还可以根据这些附图获得其他的附图。
图 1是根据本发明实施例的生成组密钥的方法的流程图。
图 2是利用根据本发明实施例提供的方法来生成组密钥的第一例子的 流程图。
图 3是在第一例子中生成组认证参数的例子的示意图。
图 4是在第一例子中 MTC设备和 MME ( Mobility Management Entity, 移动性管理实体)进行认证的流程图。
图 5是利用根据本发明实施例提供的方法来生成组密钥的第二例子的 流程图。
图 6是在第二例子中生成组认证参数的例子的示意图。
图 7是在第二例子中生成组认证参数的另一例子的示意图。
图 8是在第二例子中 MTC设备和 MME进行认证的流程图。
图 9是利用根据本发明实施例提供的方法来生成组密钥的第三例子的 流程图。
图 10是利用根据本发明实施例提供的方法来生成组密钥的第四例子的 流程图。
图 11是在第三例子和第四例子中当 MTC设备从空闲状态或去附着状 态重新加入组通信时的流程图。
图 12是利用根据本发明实施例提供的方法来生成组密钥的第五例子的 流程图。
图 13是利用根据本发明实施例提供的方法来生成组密钥的第六例子的 流程图。
图 14是根据本发明实施例的生成组密钥的另一方法的流程图。
图 15是根据本发明实施例的生成组密钥的再一方法的流程图。
图 16是根据本发明实施例的基站的结构框图。
图 17是根据本发明实施例的另一基站的结构框图。 图 19是根据本发明实施例的另一移动性管理实体的结构框图。
图 20是根据本发明实施例的机器类通信设备的结构框图。
图 21是根据本发明实施例的另一机器类通信设备的结构框图。
具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例是本发明的一部分实施例, 而 不是全部实施例。 基于本发明中的所述实施例, 本领域技术人员在没有做 出创造性劳动的前提下所获得的所有其他实施例, 都应属于本发明保护的 范围。
首先, 结合图 1 , 描述根据本发明实施例的生成组密钥的方法 100。 如图 1所示, 方法 100包括:
在 S 110中, 获取 MTC设备所在组的组 ID;
在 S120中, 获取组 ID对应的组通信根密钥;
在 S130中, 根据组通信根密钥生成组 ID对应的组密钥;
在 S140中,向 MTC设备发送用 MTC设备的接入层密钥加密的组密钥, 以使 MTC设备根据 MTC设备的接入层密钥解密得到组密钥。
例如, 方法 100可以由基站执行。 基站通过对 MTC设备进行分组, 进 而可以确定 MTC设备所在组的组 ID对应的组密钥,其中组密钥与组 ID是 ——对应的, 每个组 ID对应的组密钥互不相同。 基站确定了组密钥之后, 通过 MTC设备的接入层密钥, 可以将组密钥发送给 MTC设备, 从而完成 组密钥的分配, 使得一个组 ID内的 MTC设备都可以通过自己的接入层密 钥而安全地得到所 ^组使用的组密钥。
因此, 借助于基站对同一组的组密钥的分配, 同一组内的 MTC设备可 以利用相同的组密钥来正常进行组通信, 而在基站中也只需要为同一个组 保持相同组密钥, 从而, 可以降低基站操作的复杂性, 减少基站维护和管 理的密钥数, 提高基站性能。
在 S110中, 基站可以通过多种方式获取 MTC设备所在组的组 ID。 例 如,基站可以对 MTC设备进行分组,从而将 MTC设备划分到组 ID对应的 组内。 在进行分组时, 基站可以根据 MTC设备距离基站的距离进行分组, 也可以根据 MTC设备的信号强度进行分组, 还可以根据 MTC设备的制造 上进行分组, 还可以随机分组, 本发明对如何分组的具体方式不做任何限 定。
再例如, 基站可以从其他网元获取 MTC设备所在组的组 ID。 其他网 元可以是 MME, 也可以是 HSS ( Home Subscriber System, 归属用户系统), 还可以是核心网的其他设备或者分组数据网的设 ^。 该其他网元可以对 MTC设备进行分组, 从而基站可以从该其他网元处得到 MTC设备所属的 组 ID。
又例如, 基站可以从 MTC设备接收组 ID, 从而确定 MTC设备所属分 组。 又例如, 基站可以从 MTC设备接收 MTC设备所属业务的业务 ID, 根 据业务 ID对 MTC设备进行分组, 从而确定 MTC设备所属组的组 ID。 根 据业务 ID进行分组从而确定组 ID的方式可以与现有技术相同, 例如根据 支持相同业务的 MTC设备所处的位置进行分组等, 在此不再赘述。
根据本发明的一个实施例, 基站可以从 MME接收组 ID和组通信根密 钥, 组通信根密钥由 MTC设备所属的归属用户系统 HSS根据随机数和与 组 ID对应的集合密钥生成,或者组通信根密钥由 HSS在收到 MME转发的 来自一个 MTC设备的所述组 ID时, 根据随机数、 组 ID和该一个 MTC设 备的专属密钥生成, 并由 HSS将组通信根密钥发送给 MME。 根据本发明 的另一实施例, 基站可以从 MME接收业务 ID和与业务 ID对应的业务根 密钥,业务 ID为 MTC设备发送给 MME的、 MTC设备所属业务的业务 ID, 业务根密钥由 MTC设备所属的 HSS根据随机数和与业务 ID对应的集合密 钥生成,或者业务根密钥由 HSS在收到 MME转发的来自一个 MTC设备的 业务 ID时, 根据随机数、 业务 ID和该一个 MTC设备的专属密钥生成, 并 由 HSS将业务根密钥发送给所述 MME, 并且基站根据业务 ID确定 MTC 设备所在组的组 ID, 根据业务根密钥生成组 ID对应的组通信根密钥。
这样,基站可以在不同的实施例中通过多种方式灵活获取组 ID和组通 信根密钥。 由于在生成组密钥的过程中涉及的网元个数的增加和诸如集合 密钥之类的安全信息的增加, 可以进一步提高组密钥生成的安全性, 并避 免基站生成的不同组的组密钥发生重合。 相应例子可以参考下文第一例子 至第四例子的描述。
在 S120中, 基站可以通过多种方式获取组 ID对应的组通信根密钥。 例如, 基站可以从组 ID内的 MTC设备中选择 MTC设备, 根据所选择的 MTC设备的密钥确定组 ID对应的组通信根密钥。 由于一个组 ID至少对应 一个 MTC设备, 所以基站可以从其中选择一个 MTC设备, 将其密钥作为 组通信根密钥, 或者根据其密钥生成组通信根密钥。 所选择的 MTC设备的 密钥可以是该 MTC设备对应的 KeNB。
再例如, 基站可以从 MME接收组 ID对应的组通信根密钥, 其中由 MME将 MTC设备划分到组 ID对应的组内, 从组 ID内的 MTC设备中选 择 MTC设备,根据所选择的 MTC设备的密钥确定组 ID对应的组通信根密 钥,或者由 MME根据 MME生成的随机数确定组 ID对应的组通信根密钥。 MME将生成的组通信根密钥发送给基站, 以使基站获取组 ID对应的组通 信根密钥。
又例如, 基站可以生成一个随机数, 根据该随机数确定组 ID对应的组 通信根密钥。基站可以直接将生成的随机数作为组 ID对应的组通信根密钥, 也可以根据随机数计算而推导出组 ID对应的组通信根密钥。 又例如, 当基站从 MME接收集合 ID和第一参数之后, 基站可以根据 第一参数来生成组 ID对应的组通信根密钥。
根据本发明的实施例, 在 S130生成组密钥之后, 基站可以将组通信根 密钥、 组密钥与组 ID相绑定并存储。 这样, 当确定其它 MTC设备属于组 ID对应的组时, 可以根据组 ID获取相绑定的组密钥; 向其它 MTC设备发 送用其他 MTC设备的接入层密钥加密的组密钥, 以使其他 MTC设备根据 其接入层密钥解密得到组密钥。
当基站确定需要为另一个属于该组 ID内的 MTC设备生成组密钥时, 无需再确定组通信根密钥并根据组通信根密钥确定组密钥, 而直接根据与 组 ID绑定的组密钥, 基站就可以为该 MTC设备分配组密钥, 从而可以减 小基站处理复杂度, 提高组密钥生成效率, 并保证同一组 ID内各 MTC设 备使用的组密钥相同。
接下来, 结合具体的例子来描述方法 100的操作。 在本发明的包括第 一例子至第六例子的如下实施例中, 带有 "Group" 字样的参数表示与一个 组相关的参数, 一个组的参数 "XXX_Group"可以具有与一个 MTC设备的 参数 "XXX" 类似的用法和作用。 例如, AV_Group 可以具有与认证向量 ( Authentication Vector, AV )相似的生成方式和表现形式, 不同之处在于 AV_Group是针对一个组的, 而不是针对一个特定 MTC设备的。
第一例子
在第一例子中, 集合 ID是 MTC设备所在组的组 ID, 这意味着提前将 MTC设备进行了分组, 而确定了 MTC设备所在的组。 组 ID可以预置在 MTC设备中; 也可以设置在 USIM ( Universal Subscriber Identity Module, 全球用户识别模块) 中, 当将 USIM插入 MTC设备时, USIM成为 MTC 设备的一部分, 从而确定 MTC设备所在的组。
第一参数是组通信根密钥,即如下描述中的 KeNB_Group,它等于 HSS 生成的 Kasme_Group。 KeNB_Group具有与 KeNB类似的功能, 区别在于 KeNB_Group 是针 —个组的, 而 KeNB 是针对一个 MTC 设备的通过 KeNB_Group可以衍生出其它的密钥。
^图 2所示的第一例子中, 插入 MTC设备的 USIM中保存有 MTC设 备所属组的组信息 Group ID (组 ID ) 以及与该 Group ID对应的集合密钥 K_Group。 在 MTC设备所属的 HSS 中同样保存有与 Group ID对应的 K_Group。
在 S210中, MTC设备向 MME发送附着请求, 请求中包括 MTC设备 的 IMSI和 MTC设备所属组的 Group ID。
当 MME收到 MTC设备发送的附着请求之后, MME确定是否保存有 与 Group ID绑定的、AV_Group。 一 之前执行如下操作:
在 S220中, MME向 HSS发送认证数据请求, 在认证数据请求中包括 IMSI和 Group ID;
在 S230中, HSS根据 IMSI找到对应的 K,根据 Κ生成 AV,并且 HSS 根据 Group ID找到对应的 K_Group, 并根据 K_Group生成 AV_Group; 在 S240中, HSS将 AV和 AV_Group通过认证数据响应发送给 MME; 在 S250中, MME将 Group ID和 AV_Group绑定并存储。
根据 K_Group生成 AV_Group的方式如图 3所示, 这里图 3只是一个 例子而并不对根据 K_Group生成 AV_Group的方式进行限制。
在图 3中, HSS ^考生成 AV的方式来生成针对 Group H^ AV_Group。 其中涉及的置位符 AMF、 函数 F1至 F5与现有技术的含义相同, 不同之处 在于其他输入参数以及产生的参数都是针对一个组的而不是针对一个 MTC 设备的。
HSS生成针对 Group ID的序列号 SQN_Group, 并生成针对 Group ID 的随机数 RAND_Group。 将 K_Group、 SQN_Group、 RAND_Group和 AMF 如图所示输入各函数+ , 生成 MAC_Group、 XRES_Group、 CK_Group、 IK_Group 和 AK_Group。 接着, 可以利用如下方式生成 AUTN_Group 和 Kasme_Group:
AUTN_Group = SQN㊉ AK_Group II AMF II MAC_Group
Kasme_Group =KDF( SQN㊉ AK_Group, SN ID, IK_Group, CK_Group) 其中, KDF是密钥生成函数, 可以具有与现有技 相同的计算方式, 与下文中的 KDF函数一样, 对其形式不做限定; ㊉代表异或计算; II代表将 前后两个物理量并在一起而形成连续的一个物理量。
生成 AUTN_Group和 Kasme_Group之后, 可以得到 AV_Group:
AV_Group = RAND_Group II XRES_Group II Kasme_Group II AUTN—Group
返回图 2, 当 MME确定保存有与 Group ID相绑定的 AV_Group时,在 S260之前执行如下操作:
在 S220中, MME向 HSS发送认证数据请求, 在该请求中包括 IMSI; 在 S230中, HSS根据 IMSI找到对应的 K, 根据 K生成 AV;
在 S240中, HSS将 AV发送给 MME。 此时, 不需要执行 S250。
继续图 2中的流程。在 S260中, MME和 MTC设备利用 AV和 AV_Group 进行认证。 认证过程如图 4所示。
在 S410中, MME向 MTC设备发送用户认证请求,在该请求中除了如 现有技术那样携带 RAND、 AUTH、 KSIASME来对 MTC设备本身进行认 证之外,还需要采用本发明实施例的方式携带 RAND_Group、 AUTH_Group、 KSIASME_Group来对 MTC设备属于 Group ID进行组认证。 RAND_Group、 AUTH_Group、 KSIASME_Group 的含义和用法可以与 RAND、 AUTH、 KSIASME相同, 除了 AND_Group、 AUTH_Group、 KSIASME_Group是针 对一个组而言的参数, 而 RAND、 AUTH、 KSIASME是针对一个 MTC设 备而言的。 在 S420中, 当认证成功时, MTC设备向 ΜΜΕ返回用户认证响应, 在 该响应中除了如现有技术那些携带 RES来对设备认证进行响应之外, 还需 要采用本发明实施例的方式携带 RES_Group来对组认证进行响应。 另外, 如果认证失败, 则 MTC设备需要如现有技术那样向 MME发送用户认证拒 绝消息, 在该消息中携带用于表示认证失败原因的 CAUSE参数。
返回图 2并继续图 2的流程。 在 S270中, 如果认证成功, 则 MME和 MTC设备如现有技术那样计算出 KeNB, 并且 MME可以根据 AV_Group 计算出 KeNB_Group, 在该实施例中将 Kasme_Group作为 KeNB_Group。 KeNB_Group是接入层的组通信根密钥, 通过 KeNB_Group可以生成其他 的接入层组密钥。 虽然在图 2所示的第一例子中, MTC设备在 S270处与 MME并发生成 KeNB, 但是 MTC设备也可以在 S260之后、 S292之前的 任意时刻生成 KeNB。
在 S280中, MME将 Group ID、 KeNB和 KeNB_Group发送给 eNB ( evolved Node B , 演进型基站)。
在 S290中, eNB根据 MTC设备的安全能力选择完整性算法和加密算 法。 如果 eNB上没有建立有与 Group ID相关的绑定, 则 eNB根据 MTC设 备的组安全能力选择用于生成组密钥的组算法, 可以包括组完整性算法和 组加密算法。 选择组完整性算法和组加密算法的方式可以与现有技术中针 对 MTC设备选择完整性算法和加密算法相似,组完整性算法和组加密算法 也可以分别与现有技术中的完整性算法和加密算法相似, 不同之处在于组 完整性算法和组加密算法是针对一个组的算法, 而完整性算法和加密算法 是针对一个 MTC设备的算法。
当 eNB第一次为一个组 ID生成对应的组密钥而建立组 ID的绑定关系 时, eNB将密钥更新次数 Key Count置为 0, 该参数可以用于对组密钥进行 推衍更新。当 PDCP计数器( PDCP Count )值达到最大值时,可以将 Key Count 值加 1。 PDCP Count值达到最大值,可以是指 PDCP Count中的超帧号( Hyper Frame Number, HFN )部分达到最大值,也就是每当 HFN达到阈值时, Key Count加 1。 每当 Key Count值加 1时, eNB都可以对组密钥进行更新, 从 而避免组密钥使用的时间过长而降低安全性。
之后, eNB可以建立 Group ID与组完整性算法、组加密算法、 Key Count 的绑定关系, 并计算 MTC设备的接入层密钥和 MTC设备所属组的接入层 组密钥, 再将接入层组密钥和KeNB_Group也与 Group ID绑定起来。 MTC 设备的接入层密钥的计算方式与现 技术相同, 而计算接入层组密钥可以 采用如下所述的方式。
在本文中, 接入层组密钥可以被筒称为组密钥。 接入层组密钥可以包 括组力 p密密钥 Key_Groupenc 和组完整性密钥 Key_Groupint 。 Key_Groupenc=KDF ( KeNB_Group , Group-enc-alg 、 Alg-ID ) , Key_Groupint=KDF ( KeNB_Group, Group-int-alg , Alg-ID )。 其中, KDF 是密钥生成函数, Group-enc-alg代表当前计算采用的是组加密算法、 Alg-ID 是算法标识, Group-int-alg代表当前计算采用的是组完整性算法。
如果 eNB上已经建立有 Group ID相关的绑定, 则 eNB不需要执行选 择组算法和计算组密钥的步骤。
这里, 虽然在第一例子中由 eNB根据 MTC设备的组安全能力选择组 完整性算法和组加密算法, 但是在其他实施例中, 组完整性算法和组加密 算法也可以被预先配置在 eNB中, 这样不需要 eNB选择相应算法。
在 S291中, eNB将利用 MTC设备的接入层密钥加密和完整性保护之 后的包括组完整性算法和组加密算法的组算法以及包括组加密密钥和组完 整性密钥的组密钥发送给 MTC设备, 以使 MTC设备根据组算法和组密钥 进行组通信。
在 S292中, MTC设备利用自己的接入层密钥, 获取组算法和组密钥。 这样, MTC设备可以利用一个组共用的组算法和组密钥正常进行后续的组 通信。
如果 Key Count不等于 0,则 eNB可以根据 Key Count来对组密钥进行 更新。更新组密钥的方式可以是首先根据 Key Count推衍新的 KeNB_Group, 然后利用推衍后的 KeNB_Group计算出新的组密钥。
例如,可以利用如下 达式来推衍新的 KeNB_Group。用 KeNB_Group* 表示推衍后的 KeNB_Group , 并用推衍出 的 KeNB_Group*取代 KeNB_Group , 作为当前的 KeNB—Group:
KeNB_Group*=KDF ( KeNB_Group, Cell ID, Group ID )
其中, KDF为密钥生成函数, Cell ID为小区标识。 Key Count为几, 就推衍几次。
还可以利用如下表达式来直接推衍 KeNB_Group*, 将 KeNB_Group* 作为 KeNB_Group:
KeNB_Group*=KDF ( KeNB—Group, Cell ID, Group ID, Key Count ) 当推衍出 KeNB_Group之后, eNB可以利用推衍后的 KeNB_Group重 新计算 Key_Groupenc和 Key_Groupint。 接着, 利用 MTC设备的接入层密 钥对重新计算出的组密钥进行加密, 并发送给 MTC设备, 以使 MTC设备 更新组密钥, 利用新的组密钥进行组通信。
在第一例子中, 一组 MTC设备在一段时间内都使用一个 AV_Group , 可以允许 AV_Group重用, SQN_Group的使用规则可以是 MTC设 ¾^从网络 侧收到 AUTH_Group 中的 SQN_Group 大于或等于设备侧保存的 SQN_Group。 如果 SQN_Group出现不同步的情况, 可以通过重同步过程来 进行解决。
此外, 一个组内的一个 MTC设备如果原本处于组通信中、 但经过一段 时间之后退出组通信, 那么当该 MTC设备需要从空闲 (IDLE )状态或者 去附着状态转换为活动( ACTIVE )状态而重新加入组通信时, eNB向 MTC 设备发送用该 MTC设备的接入层密钥加密的组密钥, 以使该 MTC设备重 新获取组密钥来进行组通信。 第二例子
在第二例子中, 集合 ID是 MTC设备所在组的组 ID。 第一参数是组通 信根密钥, 即如下描述中的 KeNB_Group, 它等于 HSS生成的 Group Key。
在图 5所示的第二例子中, 在 MTC设备的 USIM中保存有 MTC设备 所属组的 Group ID以及与该 Group ID对应的密钥 K_Group。 当然, 本领域 技术人员也可以想到, Group ID以及与 Group ID对应的 K_Group也可以直 接保存在 MTC设备中。另夕 在 MTC设备所属的 HSS中同样保存有 Group ID和 K_Group的对应关系。
在 S510 , MTC设备向 MME发送附着请求, 请求中包括 MTC设备 的 IMSI和 Group ID。
当 MME收到 MTC设备发送的附着请求之后, MME确定是否保存有 与 Group ID绑定的 Group Key。 一 之前执行如下操作:
在 S520中, MME向 HSS发送认证数据请求消息,在该消息中包含 IMSI 和 Group ID。 当在后续的认证中需要利用 S530中生成的 AV_Group时, 则 在认证数据请求中还需要包含指示符 Group Key Indicator, 用于表示 MME 还没有建立 Group ID的相关绑定信息, 需要 HSS生成 Group Key, 当然, 如果后续认证利用现有技术中的 AV, 也可以携带 Group Key Indicator来表 示没有建立有 Group ID的相关绑定信息;
在 S530中, HSS根据 IMSI找到对应的 K,根据 K生成 AV,以使 MTC 设备和网络侧利用 AV进行认证。其中,与 IMSI对应的 K可以被称为 MTC 设备的专属密钥, 任一 K的取值都是唯一的, 只由一个 MTC设备持有。 当 将 USIM插入 MTC设备时, 由于在 USIM中保存有 K, 故 MTC设备被分 配了唯一的 K。
HSS 也可以根据 IMSI 找到对应的 K, 根据 Group ID 找到对应的 K_Group , 结合 K和 K_Group生成 AV_Group , 以使 MTC设备和网络侧利 用 AV_Group进行认证。 此夕 HSS根据 Group ID找到对应的 K_Group, 根据 K_Group和随机产生的随机数 Nonce生成 Group Key;
在 S540中, 当利用 AV进行认证时, HSS将 AV和 Group Key通过认 证数据响应消息发送给 MME。 当利用 AV_Group 进行认证时, HSS 将 AV_Group和 Group Key通过认证数据响应消息发送给 MME;
在 S550中, MME将 Group ID与 Group Key进行绑定并存储。
根据 K和 K_Group生成 AV_Group的方式可以如图 6和图 7所示。 这 里图 6和图 7只是两个例子而并不对生成 AV_Group的方式进行限制。
在图 6中, HSS生成 SQN并生成 RAND, 并将 SQN和 RAND作为针 对一个组的序列号和随机数。 HSS将 SQN、 RAND, AMF、 K按照如图所 示的方式输入与现有技术相同的 F1至 F5函数, 得到 MAC、 XRES、 CK、 ΙΚ、 ΑΚ。 接着 HSS将 K_Group和 MAC、 SRES、 CK、 IK、 AK按照如图 所示的方式输入其它函数 F,这些函数 F可以相同也可以不同,具体形式在 此不作限制。 通过这些函数 F可以分别得到 MAC_Group、 XRES_Group、 CK_Group、 IK_Group和 AK_Group。
在图 7中, HSS生成 SQN并生成 RAND, 并将 SQN和 RAND作为针 对一个组的序列号和随机数。 HSS将 SQN、 RAND, AMF、 K和 K_Group 按照如图所示的方式输入与现有技术相同的 F1 至 F5 函数, 分别得到 MAC_Group、 XRES_Group, CK_Group, IK_Group, AK_Group。
^图 6和图 7中, 都可以采用如下方式得到 AV_Group:
AUTN_Group = SQN㊉ AK_Group II AMF II MAC_Group
Kasme_Group =KDF( SQN㊉ AK_Group, SN ID, IK_Group, CK_Group) AV_Group = RAND II XRES_Group II Kasme_Group II AUTN_Group 其 , KDF是密钥生成函数, 可以具有与现有技术相同的计算方式; Θ代表异或计算; II代表将前后两个物理量并在一起而形成连续的一个物理 量。
当 MME确定保存有与 Group ID相绑定的 Group Key时,在 S560之前 执行如下操作:
在 S520中, MME向 HSS发送认证数据请求消息, 当在后续只需要利 用 AV进行认证时, 在认证数据请求消息中包含 IMSI, 当在后续需要利用 AV_Group进行认证时, 在认证数据请求消息中包含 IMSI和 Group ID; 在 S530中, 当利用 AV进行认证时, HSS根据 IMSI找到对应的 K, 根据 K生成 AV。 当利用 AV_Group进行认证时, HSS根据 IMSI找到对应 的 K, 根据 Group ID 找到对应的 K_Group, 结合 K和 K_Group 生成 AV_Group;
在 S540中, HSS将 AV或 AV_Group通过认证数据响应发送给 MME。 此时, 不需要执行 S550。
继续图 5 中的流程。 在 S560 中, MME和 MTC设备利用 AV或者 AV_Group进行认证。 当利用 AV认证时, 采用与现有技术相同的方式。 当 利用 AV_Group认证时, 认证过程如图 8所示。
在 S810 + , MME向 MTC设备发送用户认证请求, 在该请求中携带 AV_Group中的 RAND_Group、AUTN_Group以及现有技术中的 KSIASME。
在 S820中, 当认证成功时, MTC设备向 MME返回用户认证响应, 在 该响应中携带 RES_Group。 另夕卜, 如果认证失败, 则 MTC设备向 MME发 送用户认证拒绝消 ¾, 并在该消息中携带 CAUSE参数。
返回图 5并继续图 5的流程。 在 S570中, 如果认证成功, 则 MME和 MTC 设备如现有技术那样计算出 KeNB , MME 将 Group Key 作为 KeNB_Group。虽然在图 5所示的第二例子中, MTC设备在 S570处与 MME 并发生成 KeNB, 但是 MTC设备也可以在 S560之后、 S592之前的任意时 刻生成 KeNB。
在 S580中, MME将 Group ID、 KeNB和 KeNB_Group发送给 eNB。 在 S590中, eNB根据 MTC设备的安全能力选择完整性算法和加密算 法。 如果 eNB上没有建立有与 Group ID相关的绑定, 则 eNB根据 MTC设 备的组安全能力选择用于生成组密钥的组算法, 可以包括组完整性算法和 组加密算法, 并计算出接入层密钥以及组密钥 Key_Groupenc 和 Key_Groupint。 此夕卜, eNB 还将组算法、 Key Count、 KeNB_Group、 KeNB_Groupenc和 KeNB_Groupint与 Group ID相绑定。 S590的相关内容 可以 ^考 S290中的描述, 为了避免重复, ^此不再赘述。
在 591中, eNB将利用 MTC设备的接入层密钥加密和完整性保护之后 的包括组完整性算法和组加密算法的组算法以及包括组加密密钥和组完整 性密钥的组密钥发送给 MTC设备, 以使 MTC设备根据组算法和组密钥进 行组通信。
在 S592中, MTC设备利用自己的接入层密钥, 获取组算法和组密钥。 这样, MTC设备可以利用一个组共用的组算法和组密钥正常进行后续的组 通信。
此外, 一个组内的一个 MTC设备如果原本处于组通信中、 但经过一段 时间之后退出组通信, 那么当该 MTC设备需要从 IDLE状态或去附着状态 转换为 ACTIVE状态而重新加入组通信时, eNB向 MTC设备发送用该 MTC 设备的接入层密钥加密的组密钥,以使该 MTC设备重新获取组密钥来进行 组通信。
第三例子
在第三例子中, 集合 ID是 MTC设备支持业务的业务 ID ( Service ID ), 这意味着提前根据 MTC设备的功能或者所属业务将 MTC设备分成了不同 的业务集合, 由业务 ID进行区分。 但是业务集合并不等于共用相同组密钥 的组, 共用相同组密钥的组还需要由基站根据业务 ID进行分组来确定。 业 务 ID可以预置在 MTC设备中; 也可以设置在 USIM中, 当将 USIM插入 MTC设备时, USIM成为 MTC设备的一部分, 从而确定 MTC设备所支持 的业务。
第一参数是与业务 ID 对应的业务根密钥, 即如下描述中的 KeNB_Service, 它等于 HSS生成的 Service Key。 通过 KeNB_Service, 可以 由基站确定 KeNB_Group。
在图 9所示的第三例子中, 在 MTC设备的 USIM中保存有 MTC设备 所属业务的 Service ID以及与该 Service ID对应的密钥 K_Service。 当然, Service ID和与该 Service ID对应的密钥 K_Service也可以保存在 MTC设备 中。 另外, 在 MTC设备所属的 HSS中同样保存有 Service ID和 K_Service 的对应关系。
在 S910中, MTC设备向 MME发送附着请求, 在该请求中包括 IMSI 和 Service ID。
当 MME收到 MTC设备发送的附着请求之后, MME确定是否保存有 与 Service ID绑定的 Service Key。 当 MME确定还没有保存有与 Service ID相绑定的 Service Key时, 在 S960之前执行如下操作:
在 S920中, MME向 HSS发送认证数据请求消息,在该消息中携带 IMSI 和 Service ID;
在 S930中, HSS根据 IMSI找到对应的 K, 并根据 K生成 AV, 以使 MME利用 AV与 MTC设备进行认证。 HSS根据 Service ID找到 K_Service, 并随机生成随机数 Nonce, 接着根据 K_Service和 Nonce生成 Service key; 在 S940中, HSS将 AV和 Service key通过认证数据响应消息发送给 MME;
^ S950中,、 MME将 Service ID与 Service Key进行绑定并存储。 、 前执行如下操作:
在 S920 中, MME向 HSS发送认证数据请求消息, 在该消息中携带 IMSI;
在 S930中, HSS根据 IMSI找到对应的 K, 并根据 K生成 AV;
在 S940中, HSS将 AV通过认证数据响应消息发送给 MME。 此时, 不需要执行 S950。
继续图 9中的流程。在 S960中, MME和 MTC设备利用 AV进行认证。 利用 AV的认证过程与现有技术相同, 在此不再赘述。
在 S970中, 如果认证成功, 则 MME和 MTC设备计算出 KeNB, 并 且 MME将 Service Key作为 KeNB_Service。虽然在图 9所示的第三例子中, MTC设备在 S970处与 MME并发生成 KeNB ,但是 MTC设备也可以在 S960 之后、 S992之前的任意时刻生成 KeNB。
在 S980中, MME将 Service ID、 KeNB和 KeNB_Service发送给 eNB。 在 S990中, eNB根据 MTC设备的安全能力选择完整性算法和加密算 法。 如果 eNB上没有建立有与 Service ID相关的绑定关系, 则 eNB根据 MTC设备的组安全能力选择用于生成组密钥的组算法, 可以包括组完整性 算法和组加密算法, 并计算接入层密钥以及接入层组密钥。 选择组完整性 算法和组加密算法的方式可以与现有技术中针对 MTC设备选择完整性算 法和加密算法相似, 组完整性算法和组加密算法也可以分别与现有技术中 的完整性算法和加密算法相似, 不同之处在于组完整性算法和组加密算法 是针对一个组的算法, 而完整性算法和加密算法是针对一个 MTC设备的算 法。
在计算包括 Key_Groupenc和 Key_Groupint的接入层组密钥的过程中, eNB首先需要根据 Service ID对属于同一业务的 MTC设备进行分组, 然后 根据分组确定一个组的 KeNB_Group, 再根据 KeNB_Group和组算法生成 组密钥。
对属于同一业务的 MTC设备进行分组的方式多种多样, 例如随机分 组、 根据 MTC设备的信号强度分组等。 可以采用如下方式计算 KeNB_Group:
KeNB_Group=KDF ( KeNB_Service, Cell ID, Group ID )
其中, KDF是密钥生成函数, Cell ID是 eNB服务小区的编号, Group ID 是经过分组得到的 MTC设备所属组的组 ID。
计算出 KeNB_Group之后,可以计算组加密密钥 Key_Groupenc和组完 整性密钥 Key_Groupint:
Key_Groupenc=KDF ( KeNB_Group , Group-enc-alg、 Alg-ID )
Key_Groupint=KDF ( KeNB_Group, Group-int-alg, Alg-ID )
其中, KDF是密钥生成函数, Group-enc-alg代表当前计算采用的是组 加密算法、 Alg-ID是算法标识, Group-int-alg代表当前计算采用的是组完整 性算法。
计算出组密钥之后, eNB 还将组算法、 Key Count、 KeNB_Group、 KeNB_Groupenc和KeNB_Groupint与 Group ID相绑定。 另夕卜, 如第一例子 所述, 当 eNB第一次为一个组 ID生成对应的组密钥而建立组 ID的绑定关 系时, eNB将 Key Count置为 0, 当 PDCP计数器值达到最大值时, 将 Key Count值加 1 , 通过 Key Count值对组密钥进行推衍更新。
在其它实施例中, 组完整性算法和组加密算法也可以被预先配置在 eNB和 MTC设备上, 此时无需在 S990中选择组算法,也无需协商组算法。
在 S991中, eNB将利用 MTC设备的接入层密钥加密和完整性保护之 后的包括组完整性算法和组加密算法的组算法以及包括组加密密钥和组完 整性密钥的组密钥发送给 MTC设备, 以使 MTC设备根据组算法和组密钥 进行组通信。
在 S992中, MTC设备利用自己的接入层密钥, 获取组算法和组密钥。 这样, MTC设备可以利用一个组共用的组算法和组密钥正常进行后续的组 通信。
如果 Key Count值不等于 0,则 eNB可以根据 Key Count对组密钥进行 更新, 更新组密钥的方式可以首先根据 Key Count推衍新的 KeNB_Group, 再利用推衍后的 KeNB_Group计算出新的组密钥。 推衍方式可以 ^考 S292 中的相关内容。
此外, 当一个组内的一个 MTC设备如果原本处于组通信中、但经过一 段时间之后退出组通信, 那么当该 MTC设备需要从 IDLE状态或去附着状 态转换为 ACTIVE状态而重新加入组通信时, eNB向 MTC设备发送用该 MTC设备的接入层密钥加密的组密钥, 以使该 MTC设备重新获取组密钥 来进行组通信。
第四例子
在第四例子中, 集合 ID是 MTC设备支持业务的业务 ID。 业务 ID可 以预置在 MTC设备中; 也可以设置在 USIM中, 当将 USIM插入 MTC设 备时, USIM成为 MTC设备的一部分, 从而确定 MTC设备所支持的业务。 第一参数是与业务 ID对应的业务根密钥, 即如下描述中的 KeNB_Service, 它等于 HSS 生成的 Service Key。 通过 KeNB_Service , 可以由基站确定 KeNB_Group0
^图 10所示的第四例子中,在 MTC设备的 USIM中保存有 MTC设备 所属业务的 Service ID以及与该 Service ID对应的密钥 K_Service。 当然, 本领域技术人员也可以想到, Service ID以及与 Service ID对应的 K_Service 也可以直接保存在 MTC设备中。 另夕卜, 在 MTC设备所属的 HSS中同样保 存有 Service ID和 K_Service的对应关系。
在 S1010中, MTC设备向网络发送附着请求, 在该请求中包括 IMSI 和 Service ID。
当 MME收到 MTC设备发送的附着请求之后, MME确定是否保存有 与 Service ID绑定的 Service Key。
当 MME确定还没有保存有与 Service ID相绑定的 Service Key时, 在 S1060之前执行如下操作:
在 S1020中, MME向 HSS发送认证数据请求消息, 在该消息中携带 IMSI和 Service ID;
在 S1030中, HSS根据 IMSI找到对应的 K, 并根据 K生成 AV, 以使 MME利用 AV与 MTC设备进行认证。并且, HSS根据 Service ID计算 Service Key, 其中 Service Key=f ( K, Service ID, Nonce ), Nonce是 HSS生成的 随机数, f是生成 Service Key所需的函数, 本发明对函数的具体形式不做 任何限定。 此外, 在其他实施例中, Service Key也可能由HSS或MME根 据 Kasme计算, 1"列 口, Service Key=f ( Kasme, Service ID , Nonce );
在 S1040中, HSS将计算的 AV和 Service Key发送给 MME;
在 S 1050中, MME建立 Service ID和 Service Key的绑定关系并存储。 当 MME确定保存有与 Service ID相绑定的 Service Key时, 在 S1060 之前执行如下操作:
在 S1020中, MME向 HSS发送认证数据请求消息, 在该消息中携带 IMSI;
在 S1030中, HSS根据 IMSI找到对应的 K, 并根据 K生成 AV;
在 S1040中, HSS将 AV通过认证数据响应消息发送给 MME。 此时, 不需要执行 S1050。
继续图 10中的流程。 在 S 1060中, MME和 MTC设备利用 AV进行认 证。 利用 AV的认证过程与现有技术相同, 在比不再赘述。
在 S1070中, 如果认证成功, 则 MME和 MTC设备计算出 KeNB, 并 且 MME将 Service Key作为 KeNB_Service。 虽然在图 10所示的第四例子 中, MTC设备在 S 1070处与 MME并发生成 KeNB,但是 MTC设备也可以 在 S1060之后、 S1092之前的任意时刻生成 KeNB。
在 S 1080中, MME将 Service ID、 KeNB和 KeNB_Service发送给 eNB。 在 S1090中, eNB根据 MTC设备的安全能力选择完整性算法和加密算 法。 如果 eNB上没有建立有与 Service ID相关的绑定关系, 则 eNB根据 MTC设备的组安全能力选择用于生成组密钥的组算法, 可以包括组完整性 算法和组加密算法, 并计算接入层密钥以及接入层组密钥。 在计算包括
Key_Groupenc和 Key_Groupint的接入层组密钥的过程中, eNB首先需要根 据 Service ID对属于同一业务的 MTC设备进行分组, 然后根据分组确定一 个组的 KeNB_Group, 再根据 KeNB_Group和组算法生成组密钥。 计算出 组密钥之后, eNB还将组算法、 Key Count, KeNB_Group、 KeNB_Groupenc 和KeNB_Groupint与 Group ID相绑定。 在其它实施例中, 组完整性算法和 组加密算法也可以被预先配置在 eNB和 MTC设备上。 S1090的相关内容可 以参考上述 S990中的描述。
^ S1091中, eNB和 MTC设备执行 AS SMC ( Access Stratum Security Mode Command, 接入层安全模式命令), 协商选择的完整性算法、 加密算 法、 组完整性算法、 组加密算法。
在 S1092中, MTC设备根据协商的算法计算接入层密钥。
在 S1093中, eNB将计算出的 Key_Groupenc和 Key_Groupint通过接 入层安全保护后发送给 MTC 设备, 此后 MTC 设备和网络侧可以利用 Key_Groupenc和 Key_Groupint进行组通信。
在第三例子和第四例子中, 也可以在 MME中根据 Service ID对 MTC 设备进行分组, 然后 MME将分组得到的 Group ID发送给 eNB; 还可以在 某个特定的具有 M2M功能的实体上对 MTC设备进行分组, 该实体将分组 得到的 Group ID通知给 eNB。 这样, 在 S990和 S1090中 eNB不需要再进 行分组, 直接根据收到的 Group ID计算 KeNB_Group即可。
在第三例子和第四例子中, 网络侧可以通过多种方式得到 MTC设备的 业务 ID, 例如: MTC设备向网络侧发送 Service ID, 如上所述; HSS保存 IMSI和 Service ID的绑定关系, 通过 IMSI可以查找到对应的 Service ID; 某个特定 M2M功能的实体保存 IMSI和 Service ID的绑定关系, HSS可以 从该实体处获取对应的 Service ID; HSS通过 IMSI的特定字段获知 Service ID。
此外, 在第三例子和第四例子中, 当 MTC 设备从 IDLE 态转换到 ACTIVE态时, 可以通过图 11所示的流程图来进行组密钥同步。
在 S1110 中, MTC设备向网络侧发送服务请求消息, 在消息中包含 Service ID。
在 S1120中, MME检查是否存在与该 Service ID对应的绑定关系, 如 果不存在, 则执行图 10中当 MEE没有绑定关系时执行的 S1020至 S1050 以及后续的 S1060至 S1093; 如果存在, 则将 Service ID发送给 eNB。
在 S 1130中, MME将 Service ID发送给 eNB。
在 SI 140中, eNB根据 Service ID为 MTC设备分组得到 Group ID, 并 查找该 Group ID绑定的组算法和组密钥。
S1150 f , eNB向 MTC设备发送 AS SMC, 协商完整性算法、 加密算 法、 组完整性算法和组加密算法。 在 S1160 中, MTC 设备根据协商的算法计算接入层密钥和 Key_Groupenc、 Key_Groupint。
第五例子
图 12是利用根据本发明实施例提供的方法来生成组密钥的第五例子的 流程图。
在 S1210中, eNB对 MTC设备进行分组, 或者从其他网元获取 MTC 设备的分组情况, 从而确定 MTC设备所在组的组 ID。
在 S1220中, eNB在 MTC设备所在的组内随机选择一个 MTC设备或 者生成一个随机数,根据所选择的 MTC设备的密钥或者随机数来推衍组通 信根密钥 KeNB_Group, 其中, KeNB_Group=KDF ( KeNB/RAND , Group ID ), KDF为密钥生成函数, 可以具有与现有技术相同的定义, 也可以根据 不同的算法灵活定义, 本发明不对 KDF的具体形式进行任何限定。
eNB还为该组的 MTC设备选择包含组完整性算法和组加密算法的组算 法, 根据 KeNB_Group和组算法, 计算出包括组加密密钥 Key_Groupenc和 组完整性密钥 Key_Groupint的组密钥, 并建立组 ID和组通信根密钥、组算 法、 组密钥的绑定关系。 其中, Key_Groupenc=KDF ( KeNB_Group , Group-enc-alg , Alg-ID ), Key_Groupint=KDF ( KeNB_Group , Group-int-alg , Alg-ID ) Group-enc-alg代表当前计算采用的是组加密算法、 Alg-ID是算法 标识, Group-int-alg代表当前计算采用的是组完整性算法。 组完整性算法和 组加密算法的功能和用法分别与完整性算法和加密算法相似, 不同之处在 于, 组完整性算法和组加密算法是针对一个组 ID的, 而完整性算法和加密 算法是针对一个 MTC设备的。
在 S1230中, eNB将利用 MTC设备的接入层密钥加密和完整性保护之 后的包括组完整性算法和组加密算法的组算法以及包括组加密密钥和组完 整性密钥的组密钥发送给 MTC设备, 以使 MTC设备根据组算法和组密钥 进行组通信。
在 S1240中, MTC设备利用自己的接入层密钥,获取组算法和组密钥。 这样, MTC设备可以利用一个组共用的组算法和组密钥正常进行后续的组 通信。
第六例子
图 13是利用根据本发明实施例提供的方法来生成组密钥的第六例子的 流程图。
在 S1310中, MME对 MTC设备进行分组, 或者从其他网元获取 MTC 设备的分组情况, 从而确定 MTC设备所在组的组 ID。
在 S1320中, MME在 MTC设备所在的组内随机选择一个 MTC设备 或者生成一个随机数, 根据所选择的 MTC设备的密钥 Kasme或者随机数 RAND 来 推 衍 组 通 信 根 密 钥 KeNB_Group , KeNB_Group=KDF(Kasme/RAND, NAS Count, Group ID), 其中 NAS Count 是非接入层计数值。 MME也可以直接将随机数作为 KeNB_Group, 并建立 Group ID和 KeNB_Group的绑定关系。
在 S1330中, MME将 Group ID和 KeNB_Group发送给 eNB。
在 S1340中, eNB为 MTC设备所在的组选择组加密算法和组完整性算 法 , 并计算响应 的 Key_Groupenc 和 Key_Groupint。 其 中 , Key_Groupenc=KDF ( KeNB_Group , Group-enc-alg , Alg-ID ) , Key_Groupint=KDF ( KeNB_Group, Group-int-alg, Alg-ID ), 并建立 Group ID 和组完整性算法、 组加密算法、 KeNB_Group、 KeNB_Groupenc、 KeNB_Groupint的绑定关系。
^ S1350中, eNB将加密和完整性保护之后的组完整性算法、 组加密 算法、 Key_Groupenc和 Key_Groupint发送给 MTC设备。 用来进行加密和 完整性保护的算法和密钥是 MTC设备与网络侧共享的接入层算法和密钥。
在 S1360中, MTC设备获取组算法和组密钥, 并利用它们进行后续通 信。
此外, 在第五例子和第六例子中, 当 MTC设备从 IDLE状态或去附着 状态转换为 ACTIVE状态时,可以通过如下过程进行接入层密钥同步: MTC 设备向网络侧发送服务请求消息,网络侧例如 MME或 eNB为 MTC设备分 组后, 当分组得到的组 ID具有绑定的组密钥时, 将与组 ID绑定的组密钥 通过 MTC设备的接入层密钥发送给 MTC设备即可, 当分组得到的组 ID 没有相绑定的组密钥时, 为该组 ID生成组密钥后, 将该组密钥通过 MTC 设备的接入层密钥发送给 MTC设备即可。
根据本发明的实施例, 在 MTC设备和 eNB之间进行组通信的过程中, eNB可以不需要为每个 MTC设备维护一个 PDCP Count值, 而是为一组 MTC设备维护一个组 PDCP Count值。这样,可以减少基站需要维护的 PDCP Count值, 进一步降低基站的处理复杂度。
根据本发明的实施例, PDCP Count值由 HFN和 SN两部分组成, 在 MTC设备和 eNB之间进行组通信的过程中, eNB可以不需要为每个 MTC 设备维护一个 HFN值, 而是为一组 MTC设备维护一个组 HFN值, 其中组 HFN由一组 MTC设备共用, SN由 MTC设备发送的数据包中的序列号决 定。 在一组 MTC设备的每个 MTC设备中, 都维护一个 PDCP Count值, 该 PDCP Count值中的 HFN与 eNB维护的组 HFN和其它 MTC设备的 HFN 保存同步, SN由 MTC设备单独维护, 与自己发送的数据包的序列号有关。
对于上行链路, 每个 MTC设备维护一个 PDCP Count值, 组内每个 MTC设备维护的 HFN与 eNB维护的组 HFN保持同步。 组内 MTC设备利 用上行 PDCP Count值对上行数据进行加密, 并在上行数据分组数据单元 ( Packet Data Unit, PDU )头部中携带 SN。 eNB收到公共承载上的数据包 时, 利用 eNB保存的 HFN和数据包携带的 SN组成的 Count值解密该数据 包。 当组内任一 MTC设备发送数据包中的 SN达到阈值时, eNB收到该数 据包之后, 将组 HFN加 1 , 并将该 HFN的取值或者 HFN需要加 1的信息 通知给组内的各 MTC设备。 HFN可以有多种通知方式。 例如, 对于业务量小的 MTC设备, 可以 将 HFN设置为固定值。 再例如, 当 HFN可变时, eNB可以通过组 ID对应 组内所有 MTC设备各自的信令承载、 组 ID对应组的公共信令承载或者广 播信道, 向组 ID对应组内所有 MTC设备发送 HFN的取值。 eNB可以在 HFN达到阈值时向组 ID对应组内的所有 MTC设备发送 HFN取值, 也可 以在有 MTC设备加入组 ID对应组时, 向该 MTC设备发送 HFN取值。 又 例如, 当 HFN可变时, 如果组 ID对应的 HFN达到阈值, 那么 eNB可以通 过组 ID对应组内所有 MTC设备各自的信令承载、组 ID对应组的公共信令 承载或者广播信道,向组 ID对应组内所有 MTC设备发送用于指示 HFN加 1的指示信息。如果广播 HFN需要增加的指示信息, 则对于组 HFN的初始 值需要 MTC设备与 eNB协商或由 eNB发送给 MTC设备。 另夕卜, eNB还 可以直接将 PDCP Count值放在 PDU头部中发送给 MTC设备, 这样 MTC 设备根据收到的 PDU, 可以从头部中提取中 HFN的取值。
对于下行链路, 如果组通信基于 eNB和一组 MTC设备之间的公共承 载, 则一般组内 MTC设备通过公共承载接收 eNB发送的组信息, 此时组 内 MTC设备的 PDCP Count值变化一致, 故不需要在下行链路引入新的 PDCP Count值机制。
当 eNB保存的组 HFN达到阈值时, eNB对组密钥进行更新。 当 MTC 设备内的 PDCP Count值中的 HFN达到阈值时, MTC设备也对组密钥进行 更新。 可以通过多种方式使 MTC设备确定 HFN达到阈值。 例如 eNB可以 向 MTC设备通知 HFN取值或 HFN力口 1的指示,以使 MTC设备在改变 HFN 之后确定 HFN达到阈值, 从而更新组密钥。 再例如 eNB可以直接向 MTC 设备通知 HFN达到阈值的指示, 以使 MTC设备更新组密钥。
在 eNB中可以有两种方式对组密钥进行更新。
一种是先更新 KeNB_Group, 然后利用更新后的 KeNB_Group 计算 Key_Groupenc和 Key_Groupint。 在该种更新方式中, KeNB_Group*=KDF ( KeNB_Group, Cell ID, Group ID )或者 KeNB_Group*=KDF( KeNB_Group, cell ID, Group ID, Key Count )。
另一种是直接对 Key_Groupenc和 Key_Groupint进行更新。在该更新方 式中 , Key_Groupenc*=KDF ( Key_Groupenc , Cell ID , Group ID ) , Key_Groupint*=KDF ( Key_Groupint, Cell ID, Group ID )。
在本发明的实施例中, 为了进一步保证通信的安全, 网络侧可以在满 足一定条件时对组通信根密钥进行更新。 当满足一定条件时, 网络侧更新 组根密钥 KeNB_Group, 并根据更新后的组通信根密钥来生成新的组密钥, 以通过新的组密钥进行组通信。 该一定条件可以是当网络侧维护的定时器 达到阈值时; 也可以是 eNB处维护的 Key Count值达到阈值时; 还可以是 MME处维护的针对一个组或一个业务的计数器值达到阈值时, 每当 MME 收到属于一个组或一个业务的 MTC设备发送的 NAS信令时, 该计数器值 加 1。 接下来, 结合图 14描述根据本发明实施例的生成组密钥的方法 1400。 如图 14所示, 方法 1400包括:
在 S1410中, 获取 MTC设备所在组的组 ID;
在 S1420中, 获取组 ID对应的组通信根密钥;
在 S1430中, 向基站发送组 ID和组通信根密钥, 以使基站根据组通信 根密钥生成组 ID对应的组密钥并向 MTC设备发送用 MTC设备的接入层密 钥加密的组密钥。
例如,方法 1400可以由 MME执行。 MME通过对 MTC设备进行分组, 进而可以确定 MTC设备所在组的组 ID对应的组通信根密钥。 MME将组 ID和组通信根密钥发送给基站,以使基站生成组密钥并加密后发送给 MTC 设备, 从而完成组密钥的分配。
由于同一组对应一个组通信根密钥, 再由组通信根密钥推衍出组密钥, 可以使同一组内的 MTC设备利用相同的组密钥来正常进行组通信,而在基 站中也只需要为同一个组保持相同组密钥, 从而, 可以降低基站操作的复 杂性, 减少基站维护和管理的密钥数, 提高基站性能。
在 S1410中, MME可以通过多种方式获取 MTC所在组的组 ID。例如, MME可以对 MTC设备进行分组, 从而可以将 MTC设备划分到组 ID对应 的组内。 再例如, MME可以从其它网元获取 MTC设备所在组的组 ID。 又 例如, MME可以接收 MTC设备发送的组 ID。
根据本发明的实施例, 当 MME在 S1410中从接收 MTC设备发送的组 ID从而获取到组 ID时, 在 S1420中 MME可以通过如下方式获取组 ID对 应的组通信根密钥: 向 MTC设备所属的 HSS发送组 ID, 以使 HSS根据随 机数和与组 ID对应的集合密钥生成第一参数;从 HSS接收第一参数;根据 第一参数生成组 ID对应的组通信根密钥。
其中, 根据本发明的实施例, 当组 ID没有绑定与组 ID对应的第一参 数时, MME向 HSS发送组 ID。当 MME从 HSS接收到第一参数之后, MME 可以将第一参数与组 ID相绑定并存储。 这样, 当 MME收到其它 MTC设 备发送的携带有组 ID的附着请求时, MME可以根据组 ID获取与组 ID相 绑定的第一参数; 根据第一参数生成组 ID对应的组通信根密钥; 向基站发 送组 ID和组通信^ f艮密钥。
根据本发明的一个实施例, MME向 MTC设备所属的 HSS发送组 ID 之后, MME可以从 HSS接收组认证参数, 其中组认证参数由 HSS根据与 组 ID对应的集合密钥生成, 或者由 HSS根据与组 ID对应的集合密钥和 MTC设备的专属密钥生成; 并根据组认证参数, 与 MTC设备进行认证。 在该情况下, 在 MTC设备与网络侧认证成功之后, MME根据第一参数生 成组 ID对应的组通信根密钥。 这里, MTC设备的专属密钥可以是 MTC设 备的 Κ, K可以存储在 USIM中, 当将 USIM插入一 MTC设备时, USIM 成为该 MTC设备的一部分。
相关实施例可以参考上述第一例子至第四例子的描述, 为了避免重复, 在此不再赘述。
在 S 1420中, MME还可以通过如下方式获取组 ID对应的组通信根密 钥: 从组 ID内的 MTC设备中选择 MTC设备, 根据所选择的 MTC设备的 密钥确定组 ID对应的组通信根密钥; 或者生成一个随机数, 根据随机数确 定组 ID对应的组通信根密钥。 MME可以根据选择的 MTC设备的 KeNB 推衍得到组 ID对应的组通信根密钥, 也可以将选择的 MTC设备的 KeNB 直接作为组 ID对应的组通信根密钥。 同样, MME可以根据随机数推衍得 到组 ID对应的组通信根密钥, 也可以将随机数直接作为组 ID对应的组通 信根密钥。
根据本发明的实施例, MME获取组 ID对应的组通信根密钥之后, 可 以将组 ID和组通信根密钥进行绑定并存储。 这样, 当确定其他 MTC设备 属于组 ID对应的组时, 根据组 ID获取相绑定的组通信根密钥; 向基站发 送组 ID和组通信根密钥。 通过直接获取相绑定的组通信根密钥, 可以降低 反复生成组通信根密钥的处理复杂度, 并可以保证同一组 ID对应的组通信 根密钥的一致性。
相关实施例可以参考上述第五例子和第六例子的描述, 为了避免重复, 在此不再赘述。
此外, 根据本发明的实施例, 当网络侧维护的预定定时器达到第一预 定阈值时, 或者当基站更新组密钥的次数达到第二预定阈值时, 或者当维 护的非接入层的计数值达到第三预定阈值时,与 MTC设备进行重认证或者 获取组 ID对应的新的组通信根密钥。 这样, 可以在一定时间之后更新组密 钥, 避免同一组密钥的使用时间过长而引入不安全因素, 从而可以进一步 提高组通信的安全性。
接下来, 参考图 15描述根据本发明实施例的生成组密钥的方法 1500。 如图 15所示, 方法 1500包括:
在 S1510中,从基站接收基站用 MTC设备的接入层密钥加密的组密钥, 其中组密钥由基站根据基站获取的组通信根密钥生成、 并与基站获取的 MTC设备所在组的组 ID对应,或者组密钥由基站根据 MME获取的组通信 根密钥生成、 并与 MME获取的 MTC设备所在组的组 ID对应;
在 S1520中, 根据 MTC设备的接入层密钥解密得到组密钥。
例如,方法 1500可以由 MTC设备执行。由于 MTC设备的操作与基站、 MME的操作相对应, 因此方法 1500中的各步骤的描述可以参考方法 100 和方法 1400的描述, 具体实施例可以参考上述第一例子至第六例子, 为了 避免重复, 在此不再赘述。
根据本发明的实施例, 同一组 ID的所有 MTC设备共用相同的 HFN。 为了保证同一组 ID对应的 HFN相同, 组 ID对应的 HFN可以被预先设置 为固定值, 也可以由基站向 MTC设备通知与 HFN取值相关的信息。 例如, MTC设备可以通过 MTC设备的信令 7 载、组 ID对应组的公共信令 7 载或 者广播信道, 从基站接收 HFN的取值; 或者 MTC设备可以在组 ID对应的 HFN达到阈值时, 通过 MTC设备的信令承载、 组 ID对应组的公共信令承 载或者广播信道, 从基站接收用于指示 HFN加 1的指示信息。
为了进一步提高组通信的安全性, 网络侧可以对组密钥进行更新, 而 MTC设备需要通过更新后的组密钥来进行组通信。 根据本发明的一个实施 例, MTC设备可以从基站获取用 MTC设备的接入层密钥加密的更新后的 组密钥, 其中更新后的组密钥由基站在组 ID对应的 HFN达到阈值时进行 组密钥的更新而得到;根据 MTC设备的接入层密钥解密得到更新后的组密 钥。
当网络侧维护的预定定时器达到第一预定阈值时, 或者当基站更新组 密钥的次数达到第二预定阈值时,或者当 MME维护的非接入层的计数值达 到第三预定阈值时, 与 MME进行重认证或者从基站获取基站用 MTC设备 的接入层密钥加密的新的组密钥。 这样, 可以在一定时间之后更新组密钥, 避免同一组密钥的使用时间过长而引入不安全因素, 从而也可以进一步提 高组通信的安全性。
根据本发明实施例提供的生成组密钥的方法, 网络侧通过确定 MTC设 备所在组的组 ID, 从而确定与该组 ID对应的组密钥, 通过借助于 MTC设 备的接入层密钥可以将 MTC设备使用的组密钥安全地分配给 MTC设备, 并使得同一组 ID内的 MTC设备共用相同的组密钥。这样,同一组内的 MTC 设备可以利用相同的组密钥来正常进行组通信, 而在基站中也只需要为同 一个组保持相同组密钥, 从而, 可以降低基站操作的复杂性, 减少基站维 护和管理的密钥数, 提高基站性能。
上面分别从基站、 MME和 MTC设备的角度描述了生成组密钥的方法, 下面结合图 16至 21描述相关设备。
图 16是根据本发明实施例的基站 1600的结构框图。
基站 1600包括第一获取模块 1610、第二获取模块 1620、生成模块 1630 和第一发送模块 1640。 第一获取模块 1610可以通过输入接口和 /或处理器 实现, 第二获取模块 1620可以通过输入接口和 /或处理器实现, 生成模块 1630可以通过处理器实现, 第一发送模块 1640可以通过输出接口实现。
第一获取模块 1610用于获取 MTC设备所在组的组 ID。 第二获取模块 1620用于获取组 ID对应的组通信根密钥。 生成模块 1630用于根据组通信 根密钥生成组 ID对应的组密钥。第一发送模块 1640用于向 MTC设备发送 用 MTC设备的接入层密钥加密的组密钥, 以使 MTC设备根据 MTC设备 的接入层密钥解密得到组密钥。
第一获取模块 1610、 第二获取模块 1620、 生成模块 1630和第一发送 模块 1640的上述和其他操作和 /或功能可以参考上述方法 100以及第一例子 至第六例子的描述, 为了避免重复, 在此不再赘述。
根据本发明实施例提供的基站, 通过确定 MTC设备所在组的组 ID, 从而确定与该组 ID对应的组密钥, 再借助于 MTC设备的接入层密钥可以 将 MTC设备使用的组密钥安全地分配给 MTC设备,并使得同一组 ID内的 MTC设备共用相同的组密钥。 这样, 同一组内的 MTC设备可以利用相同 的组密钥来正常进行组通信, 而在基站中也只需要为同一个组保持相同组 密钥, 从而, 可以降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性能。
图 17是根据本发明实施例的基站 1700的结构框图。
基站 1700的第一获取模块 1710、 第二获取模块 1720、 生成模块 1730 和第一发送模块 1740与基站 1600 的第一获取模块 1610、 第二获取模块 1620、 生成模块 1630和第一发送模块 1640基本相同。
根据本发明的实施例, 第一获取模块 1710具体可用于将 MTC设备划 分到组 ID对应的组内; 或者从其它网元获取 MTC设备所在组的组 ID。
根据本发明的实施例, 第二获取模块 1720具体可用于从所述组 ID内 的 MTC设备中选择 MTC设备, 根据所选择的 MTC设备的密钥确定所述 组 ID对应的组通信根密钥。 或者, 第二获取模块 1720具体可用于从 MME 接收组 ID对应的组通信根密钥,其中由 MME将 MTC设备划分到组 ID对 应的组内, 从组 ID内的 MTC设备中选择 MTC设备, 根据所选择的 MTC 设备的密钥确定组 ID对应的组通信根密钥, 或者由 MME根据 MME生成 的随机数确定组 ID对应的组通信根密钥。 或者, 第二获取模块 1720具体 可用于生成一个随机数, 根据该随机数确定组 ID对应的组通信根密钥。
根据本发明的一个实施例, 第一获取模块 1710和第二获取模块 1720 具体可用于从 MME接收组 ID和组通信根密钥, 组通信根密钥由 MTC设 备所属的归属用户系统 HSS根据随机数和与组 ID对应的集合密钥生成,或 者组通信根密钥由 HSS在收到 MME转发的来自一个 MTC设备的组 ID时, 根据随机数、 组 ID和该一个 MTC设备的专属密钥生成, 并由 HSS将组通 信根密钥发送给 MME。
根据本发明的一个实施例,第一获取模块 1710可以包括接收单元 1712 和确定单元 1714。 接收单元 1712可用于从 MME接收业务 ID和与业务 ID 对应的业务根密钥, 业务 ID为 MTC设备发送给 MME的、 MTC设备所属 业务的业务 ID, 业务根密钥由 MTC设备所属的 HSS根据随机数和与业务 ID对应的集合密钥生成, 或者业务根密钥由 HSS在收到 MME转发的来自 一个 MTC设备的业务 ID时, 根据随机数、 业务 ID和一个 MTC设备的专 属密钥生成, 并由 HSS将业务根密钥发送给 MME。 确定单元 1714可用于 根据业务 ID确定 MTC设备所在组的组 ID。在该情况下,第二获取模块 1720 可用于根据业务根密钥生成组 ID对应的组通信根密钥。
根据本发明的实施例,基站 1700还可以包括绑定模块 1750、 第三获取 模块 1760和第二发送模块 1770。 绑定模块 1750可用于将组通信根密钥、 组密钥与组 ID相绑定并存储。第三获取模块 1760用于当确定其它 MTC设 备属于组 ID对应的组时, 根据组 ID获取相绑定的组密钥。 第二发送模块 1770用于向其它 MTC设备发送用其他 MTC设备的接入层密钥加密的组密 钥, 以使所述其他 MTC设备根据所述其他 MTC设备的接入层密钥解密得 到组密钥。
根据本发明的实施例, 同一组 ID 的所有 MTC设备可以共用相同的 HFN。 这样, 可以减少基站需要维护的 PDCP Count值, 进一步降低基站的 处理复杂度。 在该情况下, 基站 1700还可以包括更新模块 1780和第三发 送模块 1790。 更新模块 1780用于当组 ID对应的 HFN达到阈值时, 更新组 密钥。第三发送模块 1790用于向 MTC设备发送用 MTC设备的接入层密钥 加密的更新后的组密钥, 以使 MTC设备根据 MTC设备的接入层密钥解密 得到更新后的组密钥。 这样, 可以避免同一组密钥使用时间过长而引入不 安全因素, 从而可以进一步提高通信安全性。
为了保证同一组 ID的所有 MTC设备共用相同的 HFN, 可以将组 ID 对应的 HFN预先设置为固定值, 也可以由基站来通知与 HFN相关的信息。 根据本发明的实施例,基站 1700还可以包括第四发送模块 1795。 第四发送 模块 1795可以用于通过组 ID对应组内所有 MTC设备各自的信令承载、组 ID对应组的公共信令承载或者广播信道, 向组 ID对应组内所有 MTC设备 发送 HFN的取值。或者, 第四发送模块 1795可以用于当组 ID对应的 HFN 达到阈值时,通过组 ID对应组内所有 MTC设备各自的信令承载、组 ID对 应组的公共信令承载或者广播信道, 向组 ID对应组内所有 MTC设备发送 用于指示 HFN加 1的指示信息。
第一获取模块 1710、 第二获取模块 1720、 接收单元 1712、 确定单元 1714、 绑定模块 1750、 第三获取模块 1760、 第二发送模块 1770、 更新模块 1780、 第三发送模块 1790和第四发送模块 1795的上述和其他操作和 /或功 能可以参考上述方法 100以及第一例子至第六例子的描述, 为了避免重复, 不再赘述。 其中, 绑定模块 1750、 第三获取模块 1760和更新模块 1780可 以通过处理器实现, 第二发送模块 1770、 第三发送模块 1790和第四发送模 块 1795可以通过输出接口实现。
根据本发明实施例提供的基站,基站可以向同一组内的 MTC设备发送 相同的组密钥,从而可以使同一组内的 MTC设备利用相同的组密钥来正常 进行组通信, 而在基站中也只需要为同一个组保持相同组密钥, 这样, 可 以降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性能。
图 18是根据本发明实施例的移动性管理实体 1800的结构框图。
移动性管理实体 1800包括第一获取模块 1810、 第二获取模块 1820和 发送模块 1830。 第一获取模块 1810和第二获取模块 1820可以通过输入接 口和 /或处理器实现, 发送模块 1830可以通过输出接口实现。
第一获取模块 1810用于获取 MTC设备所在组的组 ID。 第二获取模块 1820用于获取组 ID对应的组通信根密钥。 发送模块 1830用于向基站发送 组 ID和组通信^ f艮密钥, 以使基站才艮据组通信^ f艮密钥生成组 ID对应的组密 钥并向 MTC设备发送用 MTC设备的接入层密钥加密的组密钥。
第一获取模块 1810、 第二获取模块 1820和发送模块 1830的上述和其 他操作和 /或功能可以参考上述方法 1400以及第一例子至第六例子的描述, 为了避免重复, 在此不再赘述。
根据本发明实施例提供的移动性管理实体,通过确定 MTC设备所在组 的组 ID和组通信艮密钥, 可以使基站确定与该组 ID对应的组密钥, 并将 MTC设备使用的组密钥通过 MTC设备的接入层密钥的加密而安全发送给 MTC设备, 使得同一组 ID内的 MTC设备可以共用相同的组密钥。 这样, 同一组内的 MTC设备可以利用相同的组密钥来正常进行组通信, 而在基站 中也只需要为同一个组保持相同组密钥, 从而, 可以降低基站操作的复杂 性, 减少基站维护和管理的密钥数, 提高基站性能。
图 19是根据本发明实施例的移动性管理实体 1900的结构框图。
移动性管理实体 1900的第一获取模块 1910、 第二获取模块 1920和发 送模块 1930与移动性管理实体 1800的第一获取模块 1810、 第二获取模块 1820和发送模块 1830基本相同。
根据本发明的实施例, 第一获取模块 1910具体可用于将 MTC设备划 分到组 ID对应的组内。 或者, 第一获取模块 1910具体可用于从其它网元 获取 MTC设备所在组的组 ID。 或者, 第一获取模块 1910具体可用于接收 MTC设备发送的组 ID。
根据本发明的实施例, 第一获取模块 1910还可具体用于接收 MTC设 备发送的组 ID。 在该情况下, 第二获取模块 1920可以包括发送单元 1922、 接收单元 1924和生成单元 1926。 发送单元 1922用于向 MTC设备所属的 HSS发送组 ID, 以使 HSS根据随机数和与组 ID对应的集合密钥生成第一 参数。 接收单元 1924用于从 HSS接收第一参数。 生成单元 1926用于根据 第一参数生成组 ID对应的组通信根密钥。 其中, 发送单元 1922具体可用 于当组 ID没有绑定与组 ID对应的第一参数时, 向 MTC设备所属的 HSS 发送组 ID。
根据本发明的实施例, 移动性管理实体 1900还可以包括第一绑定模块 1940和第三获取模块 1950。 第一绑定模块 1940可用于将第一参数与组 ID 相绑定并存储。 第三获取模块 1950可用于当收到其它 MTC设备发送的携 带有组 ID的附着请求时, 根据组 ID获取与组 ID相绑定的第一参数, 以使 生成单元 1926根据第一参数生成组 ID对应的组通信根密钥。
根据本发明的实施例,移动性管理实体 1900还可以包括接收模块 1960 和认证模块 1970。 接收模块 1960用于从 HSS接收组认证参数, 其中组认 证参数由 HSS根据与组 ID对应的集合密钥生成, 或者由 HSS根据与组 ID 对应的集合密钥和 MTC设备的专属密钥生成。 认证模块 1970用于根据组 认证参数, 与 MTC设备进行认证。 此时, 生成单元 1926可以用于在 MTC 设备与网络侧认证成功之后,根据第一参数生成组 ID对应的组通信根密钥。
根据本发明的实施例, 第二获取模块 1920可以具体用于从组 ID内的 MTC设备中选择一个 MTC设备,并根据所选择的 MTC设备的密钥确定组 ID对应的组通信根密钥。第二获取模块 1920还可以具体用于生成一个随机 数, 根据该随机数确定组 ID对应的组通信根密钥。 移动性管理实体 1900还可以包括第二绑定模块 1980和第四获取模块 1990。 第二绑定模块 1980可用于将组 ID和组通信根密钥进行绑定并存储。 第四获取模块 1990可用于当确定其他 MTC设备属于组 ID对应的组时,根 据组 ID获取相绑定的组通信根密钥, 以使发送模块 1930向基站发送组 ID 和组通信^ f艮密钥。
根据本发明的实施例,移动性管理实体 1900还可以包括处理模块 1992。 处理模块 1992可用于当网络侧维护的预定定时器达到第一预定阈值时, 或 者当基站更新组密钥的次数达到第二预定阈值时, 或者当维护的非接入层 的计数值达到第三预定阈值时, 与 MTC设备进行重认证或者获取组 ID对 应的新的组通信根密钥。
第一获取模块 1910、 第二获取模块 1920、 发送单元 1922、 接收单元 1924、 生成单元 1926、 第一绑定模块 1940、 第三获取模块 1950、 接收模块 1960、 认证模块 1970、 第二绑定模块 1980、 第四获取模块 1990和处理模 块 1992的上述和其他操作和 /或功能, 可以参考上述方法 1400以及第一例 子至第六例子的描述, 为了避免重复, 在此不再赘述。 其中, 第一绑定模 块 1940、 第三获取模块 1950、 认证模块 1970、 第二绑定模块 1980和第四 获取模块 1990可以通过处理器实现, 接收模块 1960可以通过输入接口实 现, 处理模块 1992可以通过处理器和 /或输入接口实现。
根据本发明实施例提供的移动性管理实体, 移动性管理实体通过向基 站发送组 ID和组通信根密钥, 可以使基站向同一组内的 MTC设备发送相 同的组密钥,从而可以使同一组内的 MTC设备利用相同的组密钥来正常进 行组通信, 而在基站中也只需要为同一个组保持相同组密钥。 这样, 可以 降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性能。
图 20是根据本发明实施例的机器类通信设备 2000的结构框图。
机器类通信设备 2000包括第一接收模块 2010和第一解密模块 2020, 第一接收模块 2010可以通过输入接口实现, 第一解密模块 2020可以通过 处理器实现。
第一接收模块 2010用于从基站接收基站用 MTC设备的接入层密钥加 密的组密钥, 其中组密钥由基站根据基站获取的组通信根密钥生成、 并与 基站获取的 MTC设备所在组的组 ID对应,或者组密钥由基站根据从 MME 获取的组通信根密钥生成、 并与 MME获取的 MTC设备所在组的组 ID对 应。第一解密模块 2020用于根据 MTC设备的接入层密钥解密得到组密钥。
第一接收模块 2010和第一解密模块 2020的上述和其他操作和 /或功能 可以参考上述方法 1500以及第一例子至第六例子的描述, 为了避免重复, 在此不再赘述。
根据本发明实施例提供的机器类通信设备, 通过从基站接收和与所在 组对应的组密钥,可以与同一组的其他 MTC设备共用相同的组密钥来正常 进行组通信, 并且在基站中也只需要为同一个组保持相同组密钥, 从而, 可以降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性 图 21是根据本发明实施例的机器类通信设备 2100的结构框图。
机器类通信设备 2100的第一接收模块 2110和第一解密模块 2120与机 器类通信设备 2000的第一接收模块 2010和第一解密模块 2020基本相同。
根据本发明的实施例, 同一组 ID 的所有 MTC设备可以共用相同的 HFN。 这样, 可以使基站为同一组 ID维持一个 PDCP Count值, 从而可以 进一步降低基站的处理复杂度。
机器类通信设备 2100还可以包括第二接收模块 2130和第二解密模块 2140。 第二接收模块 2130用于从基站接收用 MTC设备的接入层密钥加密 的更新后的组密钥, 其中更新后的组密钥由基站在组 ID对应的 HFN达到 阈值时进行组密钥的更新而得到。 第二解密模块 2140用于根据 MTC设备 的接入层密钥解密得到更新后的组密钥。
为了使同一组的 MTC设备共用相同的 HFN,可以将组 ID对应的 HFN 预先设置为固定值, 也可以由 MTC设备从基站接收与 HFN取值相关的信 息。 根据本发明的实施例, 机器类通信设备 2100 可以包括第三接收模块 2150。 第三接收模块 2150可用于通过 MTC设备的信令承载、组 ID对应组 的公共信令承载或者广播信道,从基站接收 HFN的取值。第三接收模块 2150 也可用于当组 ID对应的 HFN达到阈值时, 通过 MTC设备的信令承载、组 ID对应组的公共信令承载或者广播信道, 从基站接收用于指示 HFN加 1 的指示信息。
此外, 为了避免同一组密钥使用时间过长而引入不安全因素, 可以在 达到一定条件时, 对组密钥进行更新, 以进一步提高组通信的安全性。 根 据本发明的实施例,机器类通信设备 2100还可以包括处理模块 2160。 处理 模块 2160可用于当网络侧维护的预定定时器达到第一预定阈值时, 或者当 基站更新组密钥的次数达到第二预定阈值时,或者当 MME维护的非接入层 的计数值达到第三预定阈值时,与 MME进行重认证或者从基站获取基站用 MTC设备的接入层密钥加密的新的组密钥。
第二接收模块 2130、 第二解密模块 2140、 第三接收模块 2150和处理 模块 2160的上述和其他操作和 /或功能可以参考上述方法 1500以及第一例 子至第六例子的描述, 为了避免重复, 在此不再赘述。 其中, 第二接收模 块 2130和第三接收模块 2150可以通过输入接口实现, 第二解密模块 2140 可以通过处理器实现, 处理模块 2160可以通过处理器和 /或输入接口实现。
根据本发明实施例提供的机器类通信设备, 通过从基站接收与所在组 对应的组密钥,可以使同一组内的 MTC设备利用相同的组密钥来正常进行 组通信, 并且在基站中也只需要为同一个组保持相同组密钥。 这样, 可以 降低基站操作的复杂性, 减少基站维护和管理的密钥数, 提高基站性能。
本领域技术人员可以意识到, 结合本文中所公开的实施例中描述的各 方法步骤和单元, 能够以电子硬件、 计算机软件或者二者的结合来实现, 为了清楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一般 性地描述了各实施例的步骤及组成。 这些功能究竟以硬件还是软件方式来 执行, 取决于技术方案的特定应用和设计约束条件。 本领域技术人员可以 对每个特定的应用使用不同方法来实现所描述的功能, 但是这种实现不应 认为超出本发明的范围。
结合本文中所公开的实施例描述的方法步骤可以用硬件、 处理器执行 的软件程序、 或者二者的结合来实施。 软件程序可以置于随机存取存储器
( RAM ), 内存、 只读存储器(ROM )、 电可编程 ROM、 电可擦除可编程 ROM, 寄存器、 硬盘、 可移动磁盘、 CD-ROM或技术领域内所公知的任意 其它形式的存储介质中。
尽管已示出和描述了本发明的一些实施例, 但本领域技术人员应该理 解, 在不脱离本发明的原理和精神的情况下, 可对这些实施例进行各种修 改, 这样的修改应落入本发明的范围内。

Claims

权利要求
1. 一种生成组密钥的方法, 其特征在于, 包括:
获取机器类通信 MTC设备所在组的组 ID;
获取所述组 ID对应的组通信根密钥;
艮据所述组通信^ f艮密钥生成所述组 ID对应的组密钥;
向所述 MTC设备发送用所述 MTC设备的接入层密钥加密的所述组密 钥, 以使所述 MTC设备根据所述 MTC设备的接入层密钥解密得到所述组 密钥。
2. 根据权利要求 1所述的方法, 其特征在于, 所述获取 MTC设备所 在组的组 ID包括:
将所述 MTC设备划分到所述组 ID对应的组内; 或者
从其它网元获取所述 MTC设备所在组的组 ID。
3. 根据权利要求 1或 2所述的方法, 其特征在于, 所述获取所述组 ID 对应的组通信根密钥包括:
从所述组 ID内的 MTC设备中选择 MTC设备,
根据所选择的 MTC设备的密钥确定所述组 ID对应的组通信根密钥; 或者
从移动性管理实体 MME接收所述组 ID对应的组通信根密钥, 其中由 所述 MME将所述 MTC设备划分到所述组 ID对应的组内,从所述组 ID内 的 MTC设备中选择 MTC设备, 根据所选择的 MTC设备的密钥确定所述 组 ID对应的组通信根密钥, 或者由所述 MME根据所述 MME生成的随机 数确定所述组 ID对应的组通信根密钥; 或者
生成一个随机数, 根据该随机数确定所述组 ID对应的组通信根密钥。
4. 根据权利要求 1所述的方法, 其特征在于, 所述获取 MTC设备所 在组的组 ID、 获取所述组 ID对应的组通信根密钥包括:
从 MME接收所述组 ID和所述组通信根密钥, 所述组通信根密钥由所 述 MTC设备所属的归属用户系统 HSS根据随机数和与所述组 ID对应的集 合密钥生成, 或者所述组通信根密钥由所述 HSS在收到所述 MME转发的 来自一个 MTC设备的所述组 ID时, 根据随机数、 所述组 ID和所述一个 MTC设备的专属密钥生成,并由所述 HSS将所述组通信根密钥发送给所述 MME。
5. 根据权利要求 1所述的方法, 其特征在于, 所述获取 MTC设备所 在组的组 ID包括:
从 MME接收业务 ID和与所述业务 ID对应的业务根密钥, 所述业务 ID为所述 MTC设备发送给 MME的、 所述 MTC设备所属业务的业务 ID, 所述业务根密钥由所述 MTC设备所属的 HSS根据随机数和与所述业务 ID 对应的集合密钥生成, 或者所述业务根密钥由所述 HSS在收到所述 MME 转发的来自一个 MTC设备的所述业务 ID时,根据随机数、所述业务 ID和 所述一个 MTC设备的专属密钥生成, 并由所述 HSS将所述业务根密钥发 送给所述 MME,
根据所述业务 ID确定所述 MTC设备所在组的组 ID;
所述获取所述组 ID对应的组通信根密钥包括:
根据所述业务根密钥生成所述组 ID对应的组通信根密钥。
6. 根据权利要求 1至 5中任一所述的方法, 其特征在于, 所述根据所 述组通信根密钥生成所述组 ID对应的组密钥之后, 还包括:
将所述组通信根密钥、 所述组密钥与所述组 ID相绑定并存储; 当确定其它 MTC设备属于所述组 ID对应的组时,根据所述组 ID获取 相绑定的所述组密钥;
向所述其它 MTC设备发送用所述其他 MTC设备的接入层密钥加密的 所述组密钥, 以使所述其他 MTC设备根据所述其他 MTC设备的接入层密 钥解密得到所述组密钥。
7. 根据权利要求 1所述的方法, 其特征在于, 同一组 ID的所有 MTC 设备共用相同的超帧号 HFN。
8. 根据权利要求 7所述的方法, 其特征在于, 还包括:
当所述组 ID对应的 HFN达到阈值时, 更新所述组密钥;
向所述 MTC设备发送用所述 MTC设备的接入层密钥加密的更新后的 组密钥, 以使所述 MTC设备根据所述 MTC设备的接入层密钥解密得到所 述更新后的组密钥。
9. 根据权利要求 7或 8所述的方法, 其特征在于,
所述组 ID对应的 HFN被预先设置为固定值; 或者
通过所述组 ID对应组内所有 MTC设备各自的信令承载、所述组 ID对 应组的公共信令承载或者广播信道, 向所述组 ID对应组内所有 MTC设备 发送所述 HFN的取值; 或者
当所述组 ID对应的 HFN达到阈值时, 通过所述组 ID对应组内所有 MTC设备各自的信令承载、 所述组 ID对应组的公共信令承载或者广播信 道,向所述组 ID对应组内所有 MTC设备发送用于指示所述 HFN加 1的指 示信息。
10. 一种生成组密钥的方法, 其特征在于, 包括:
获取机器类通信 MTC设备所在组的组 ID;
获取所述组 ID对应的组通信根密钥;
向基站发送所述组 ID和所述组通信根密钥, 以使所述基站根据所述组 通信^ f艮密钥生成所述组 ID对应的组密钥并向所述 MTC设备发送用所述 MTC设备的接入层密钥加密的所述组密钥。
11. 根据权利要求 10所述的方法, 其特征在于, 所述获取 MTC设备 所在组的组 ID包括:
将所述 MTC设备划分到所述组 ID对应的组内; 或者包括: 从其它网元获取所述 MTC设备所在组的组 ID;
或者包括: 接收所述 MTC设备发送的所述组 ID。
12. 根据权利要求 10或 11所述的方法, 其特征在于, 所述获取所述 组 ID对应的组通信根密钥包括:
向所述 MTC设备所属的归属用户系统 HSS发送所述组 ID , 以使所述 HSS根据随机数和与所述组 ID对应的集合密钥生成第一参数;
从所述 HSS接收所述第一参数;
根据所述第一参数生成所述组 ID对应的组通信根密钥。
13. 根据权利要求 12所述的方法, 其特征在于, 所述向所述 MTC设 备所属的 HSS发送所述组 ID包括:
当所述组 ID没有绑定与所述组 ID对应的第一参数时,向所述 MTC设 备所属的 HSS发送所述组 ID。
14. 根据权利要求 12或 13所述的方法,其特征在于,所述从所述 HSS 接收所述第一参数之后, 还包括:
将所述第一参数与所述组 ID相绑定并存储;
当收到其它 MTC设备发送的携带有所述组 ID的附着请求时, 根据所 述组 ID获取与所述组 ID相绑定的所述第一参数;
根据所述第一参数生成所述组 ID对应的组通信根密钥;
向基站发送所述组 ID和所述组通信根密钥。
15. 根据权利要求 12至 14中任一项所述的方法, 其特征在于, 所述 向所述 MTC设备所属的 HSS发送所述组 ID之后, 还包括:
从所述 HSS接收组认证参数,其中所述组认证参数由所述 HSS根据与 所述组 ID对应的集合密钥生成, 或者由所述 HSS才艮据与所述组 ID对应的 集合密钥和所述 MTC设备的专属密钥生成, 并根据所述组认证参数, 与所 述 MTC设备进行认证;
所述根据所述第一参数生成所述组 ID对应的组通信根密钥包括: 在所述 MTC设备与网络侧认证成功之后,根据所述第一参数生成所述 组 ID对应的组通信才艮密钥。
16. 根据权利要求 10所述的方法, 其特征在于, 所述获取所述组 ID 对应的组通信根密钥包括:
从所述组 ID内的 MTC设备中选择 MTC设备,
根据所选择的 MTC设备的密钥确定所述组 ID对应的组通信根密钥; 或者
生成一个随机数,
根据该随机数确定所述组 ID对应的组通信根密钥。
17. 根据权利要求 10至 16中任一项所述的方法, 其特征在于, 所述 获取所述组 ID对应的组通信根密钥之后, 还包括:
将所述组 ID和所述组通信根密钥进行绑定并存储;
当确定其他 MTC设备属于所述组 ID对应的组时,根据所述组 ID获取 相绑定的所述组通信根密钥;
向基站发送所述组 ID和所述组通信根密钥。
18. 根据权利要求 10至 17中任一项所述的方法, 其特征在于, 还包 括:
当网络侧维护的预定定时器达到第一预定阈值时, 或者当所述基站更 新组密钥的次数达到第二预定阈值时, 或者当维护的非接入层的计数值达 到第三预定阈值时, 与所述 MTC设备进行重认证或者获取所述组 ID对应 的新的组通信根密钥。
19. 一种生成组密钥的方法, 其特征在于, 包括:
从基站接收所述基站用机器类通信 MTC设备的接入层密钥加密的组 密钥, 其中所述组密钥由所述基站根据所述基站获取的组通信根密钥生成、 并与所述基站获取的 MTC设备所在组的组 ID对应, 或者所述组密钥由所 述基站根据从移动性管理实体 MME获取的组通信根密钥生成、 并与所述 MME获取的 MTC设备所在组的组 ID对应;
根据所述 MTC设备的接入层密钥解密得到所述组密钥。
20.根据权利要求 19所述的方法,其特征在于,同一组 ID的所有 MTC 设备共用相同的超帧号 HFN。
21. 根据权利要求 20所述的方法, 其特征在于, 还包括:
从所述基站接收用所述 MTC设备的接入层密钥加密的更新后的组密 钥, 其中所述更新后的组密钥由所述基站在所述组 ID对应的 HFN达到阈 值时进行组密钥的更新而得到;
根据所述 MTC设备的接入层密钥解密得到所述更新后的组密钥。
22. 根据权利要求 20或 21所述的方法, 其特征在于,
所述组 ID对应的 HFN被预先设置为固定值; 或者
通过所述 MTC设备的信令承载、 所述组 ID对应组的公共信令承载或 者广播信道, 从所述基站接收所述 HFN的取值; 或者
当所述组 ID对应的 HFN达到阈值时,通过所述 MTC设备的信令 7 载、 所述组 ID对应组的公共信令承载或者广播信道, 从所述基站接收用于指示 所述 HFN加 1的指示信息。
23. 根据权利要求 19至 22中任一项所述的方法, 其特征在于, 还包 括:
当网络侧维护的预定定时器达到第一预定阈值时, 或者当基站更新组 密钥的次数达到第二预定阈值时,或者当 MME维护的非接入层的计数值达 到第三预定阈值时, 与 MME进行重认证或者从所述基站获取所述基站用 MTC设备的接入层密钥加密的新的组密钥。
24. 一种基站, 其特征在于, 包括:
第一获取模块, 用于获取机器类通信 MTC设备所在组的组 ID;
第二获取模块, 用于获取所述组 ID对应的组通信根密钥;
生成模块, 用于根据所述组通信根密钥生成所述组 ID对应的组密钥; 第一发送模块, 用于向所述 MTC设备发送用所述 MTC设备的接入层 密钥加密的所述组密钥, 以使所述 MTC设备根据所述 MTC设备的接入层 密钥解密得到所述组密钥。
25. 根据权利要求 24所述的基站, 其特征在于, 所述第一获取模块用 于将所述 MTC设备划分到所述组 ID对应的组内; 或者从其它网元获取所 述 MTC设备所在组的组 ID。
26. 根据权利要求 24或 25所述的基站, 其特征在于, 所述第二获取 模块用于从所述组 ID内的 MTC设备中选择 MTC设备,根据所选择的 MTC 设备的密钥确定所述组 ID对应的组通信根密钥; 或者
所述第二获取模块用于从移动性管理实体 MME接收所述组 ID对应的 组通信艮密钥, 其中由所述 MME将所述 MTC设备划分到所述组 ID对应 的组内,从所述组 ID内的 MTC设备中选择 MTC设备,根据所选择的 MTC 设备的密钥确定所述组 ID对应的组通信根密钥, 或者由所述 MME根据所 述 MME生成的随机数确定所述组 ID对应的组通信^ f艮密钥; 或者
所述第二获取模块用于生成一个随机数, 根据该随机数确定所述组 ID 对应的组通信艮密钥。
27. 根据权利要求 24所述的基站, 其特征在于, 所述第一获取模块和 所述第二获取模块用于从 MME接收所述组 ID和所述组通信根密钥, 所述 组通信根密钥由所述 MTC设备所属的归属用户系统 HSS根据随机数和与 所述组 ID对应的集合密钥生成,或者所述组通信根密钥由所述 HSS在收到 所述 MME转发的来自一个 MTC设备的所述组 ID时, 根据随机数、 所述 组 ID和所述一个 MTC设备的专属密钥生成, 并由所述 HSS将所述组通信 根密钥发送给所述 MME。
28. 根据权利要求 24所述的基站, 其特征在于, 所述第一获取模块包 括:
接收单元, 用于从 MME接收业务 ID和与所述业务 ID对应的业务根 密钥, 所述业务 ID为所述 MTC设备发送给 MME的、所述 MTC设备所属 业务的业务 ID, 所述业务根密钥由所述 MTC设备所属的 HSS根据随机数 和与所述业务 ID对应的集合密钥生成, 或者所述业务根密钥由所述 HSS 在收到所述 MME转发的来自一个 MTC设备的所述业务 ID时, 根据随机 数、 所述业务 ID和所述一个 MTC设备的专属密钥生成, 并由所述 HSS将 所述业务根密钥发送给所述 MME,
确定单元, 用于根据所述业务 ID确定所述 MTC设备所在组的组 ID; 所述第二获取模块用于根据所述业务根密钥生成所述组 ID对应的组通 信根密钥。
29. 根据权利要求 24至 28中任一项所述的基站, 其特征在于, 还包 括:
绑定模块, 用于将所述组通信根密钥、 所述组密钥与所述组 ID相绑定 并存储; 第三获取模块,用于当确定其它 MTC设备属于所述组 ID对应的组时, 根据所述组 ID获取相绑定的所述组密钥;
第二发送模块, 用于向所述其它 MTC设备发送用所述其他 MTC设备 的接入层密钥加密的所述组密钥, 以使所述其他 MTC设备根据所述其他 MTC设备的接入层密钥解密得到所述组密钥。
30.根据权利要求 24所述的基站,其特征在于,同一组 ID的所有 MTC 设备共用相同的超帧号 HFN, 所述基站还包括:
更新模块, 用于当所述组 ID对应的 HFN达到阈值时, 更新所述组密 钥;
第三发送模块, 用于向所述 MTC设备发送用所述 MTC设备的接入层 密钥加密的更新后的组密钥, 以使所述 MTC设备根据所述 MTC设备的接 入层密钥解密得到所述更新后的组密钥。
31.根据权利要求 24所述的基站,其特征在于,同一组 ID的所有 MTC 设备共用相同的 HFN, 所述组 ID对应的 HFN被预先设置为固定值; 或者 所述基站还包括第四发送模块,用于通过所述组 ID对应组内所有 MTC 设备各自的信令承载、 所述组 ID对应组的公共信令承载或者广播信道, 向 所述组 ID对应组内所有 MTC设备发送所述 HFN的取值; 或者
所述第四发送模块用于当所述组 ID对应的 HFN达到阈值时, 通过所 述组 ID对应组内所有 MTC设备各自的信令承载、所述组 ID对应组的公共 信令承载或者广播信道, 向所述组 ID对应组内所有 MTC设备发送用于指 示所述 HFN加 1的指示信息。
32. 一种移动性管理实体, 其特征在于, 包括:
第一获取模块, 用于获取机器类通信 MTC设备所在组的组 ID;
第二获取模块, 用于获取所述组 ID对应的组通信根密钥;
发送模块, 用于向基站发送所述组 ID和所述组通信根密钥, 以使所述 基站根据所述组通信根密钥生成所述组 ID对应的组密钥并向所述 MTC设 备发送用所述 MTC设备的接入层密钥加密的所述组密钥。
33. 根据权利要求 32所述的移动性管理实体, 其特征在于, 所述第一 获取模块用于将所述 MTC设备划分到所述组 ID对应的组内; 或者
所述第一获取模块用于从其它网元获取所述 MTC设备所在组的组 ID; 或者
所述第一获取模块用于接收所述 MTC设备发送的所述组 ID。
34. 根据权利要求 32或 33所述的移动性管理实体, 其特征在于, 所 述第一获取模块用于接收所述 MTC设备发送的所述组 ID,
其中, 所述第二获取模块包括:
发送单元, 用于向所述 MTC设备所属的归属用户系统 HSS发送所述 组 ID, 以使所述 HSS根据随机数和与所述组 ID对应的集合密钥生成第一 参数;
接收单元, 用于从所述 HSS接收所述第一参数; 生成单元,用于根据所述第一参数生成所述组 ID对应的组通信根密钥。
35. 根据权利要求 34所述的移动性管理实体, 其特征在于, 所述发送 单元用于当所述组 ID 没有绑定与所述组 ID对应的第一参数时, 向所述 MTC设备所属的 HSS发送所述组 ID。
36. 根据权利要求 34或 35所述的移动性管理实体, 其特征在于, 还 包括:
第一绑定模块, 用于将所述第一参数与所述组 ID相绑定并存储; 第三获取模块, 用于当收到其它 MTC设备发送的携带有所述组 ID的 附着请求时, 根据所述组 ID获取与所述组 ID相绑定的所述第一参数, 以 使所述生成单元根据所述第一参数生成所述组 ID对应的组通信根密钥。
37. 根据权利要求 34至 36中任一项所述的移动性管理实体, 其特征 在于, 还包括:
接收模块, 用于从所述 HSS接收组认证参数, 其中所述组认证参数由 所述 HSS根据与所述组 ID对应的集合密钥生成, 或者由所述 HSS根据与 所述组 ID对应的集合密钥和所述 MTC设备的专属密钥生成,
认证模块, 用于根据所述组认证参数, 与所述 MTC设备进行认证; 所述生成单元用于在所述 MTC设备与网络侧认证成功之后,根据所述 第一参数生成所述组 ID对应的组通信根密钥。
38. 根据权利要求 32所述的移动性管理实体, 其特征在于, 所述第二 获取模块用于从所述组 ID内的 MTC设备中选择 MTC设备,并根据所选择 的 MTC设备的密钥确定所述组 ID对应的组通信根密钥; 或者
所述第二获取模块用于生成一个随机数, 根据该随机数确定所述组 ID 对应的组通信艮密钥。
39. 根据权利要求 32至 38中任一项所述的移动性管理实体, 其特征 在于, 还包括:
第二绑定模块,用于将所述组 ID和所述组通信根密钥进行绑定并存储; 第四获取模块,用于当确定其他 MTC设备属于所述组 ID对应的组时, 根据所述组 ID获取相绑定的所述组通信根密钥, 以使所述发送模块向基站 发送所述组 ID和所述组通信根密钥。
40. 根据权利要求 32至 39中任一项所述的移动性管理实体, 其特征 在于, 还包括:
处理模块, 用于当网络侧维护的预定定时器达到第一预定阈值时, 或 者当所述基站更新组密钥的次数达到第二预定阈值时, 或者当维护的非接 入层的计数值达到第三预定阈值时,与所述 MTC设备进行重认证或者获取 所述组 ID对应的新的组通信根密钥。
41. 一种机器类通信设备, 其特征在于, 包括:
第一接收模块,用于从基站接收所述基站用机器类通信 MTC设备的接 入层密钥加密的组密钥, 其中所述组密钥由所述基站根据所述基站获取的 组通信根密钥生成、 并与所述基站获取的 MTC设备所在组的组 ID对应, 或者所述组密钥由所述基站根据从移动性管理实体 MME获取的组通信根 密钥生成、 并与所述 MME获取的 MTC设备所在组的组 ID对应;
第一解密模块,用于根据所述 MTC设备的接入层密钥解密得到所述组 密钥。
42. 根据权利要求 41所述的机器类通信设备, 其特征在于, 同一组 ID 的所有 MTC设备共用相同的超帧号 HFN, 所述机器类通信设备还包括: 第二接收模块,用于从所述基站接收用所述 MTC设备的接入层密钥加 密的更新后的组密钥, 其中所述更新后的组密钥由所述基站在所述组 ID对 应的 HFN达到阈值时进行组密钥的更新而得到;
第二解密模块,用于根据所述 MTC设备的接入层密钥解密得到所述更 新后的组密钥。
43. 根据权利要求 41所述的机器类通信设备, 其特征在于, 同一组 ID 的所有 MTC设备共用相同的 HFN, 所述组 ID对应的 HFN被预先设置为 固定值; 或者
所述机器类通信设备包括第三接收模块,用于通过所述 MTC设备的信 令承载、 所述组 ID对应组的公共信令承载或者广播信道, 从所述基站接收 所述 HFN的取值; 或者
所述第三接收模块用于当所述组 ID对应的 HFN达到阈值时, 通过所 述 MTC设备的信令承载、所述组 ID对应组的公共信令承载或者广播信道, 从所述基站接收用于指示所述 HFN加 1的指示信息。
44. 根据权利要求 41至 43中任一项所述的机器类通信设备, 其特征 在于, 还包括:
处理模块, 用于当网络侧维护的预定定时器达到第一预定阈值时, 或 者当基站更新组密钥的次数达到第二预定阈值时,或者当 MME维护的非接 入层的计数值达到第三预定阈值时,与 MME进行重认证或者从所述基站获 取所述基站用 MTC设备的接入层密钥加密的新的组密钥。
PCT/CN2012/083930 2011-11-01 2012-11-01 生成组密钥的方法和相关设备 Ceased WO2013064089A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP18202007.3A EP3515036A1 (en) 2011-11-01 2012-11-01 Method and related device for generating group key
EP12846508.5A EP2765793B1 (en) 2011-11-01 2012-11-01 Method and related device for generating group key
US14/264,587 US9775028B2 (en) 2011-11-01 2014-04-29 Method and related device for generating group key

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110340029.0A CN103096309B (zh) 2011-11-01 2011-11-01 生成组密钥的方法和相关设备
CN201110340029.0 2011-11-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/264,587 Continuation US9775028B2 (en) 2011-11-01 2014-04-29 Method and related device for generating group key

Publications (1)

Publication Number Publication Date
WO2013064089A1 true WO2013064089A1 (zh) 2013-05-10

Family

ID=48191351

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/083930 Ceased WO2013064089A1 (zh) 2011-11-01 2012-11-01 生成组密钥的方法和相关设备

Country Status (4)

Country Link
US (1) US9775028B2 (zh)
EP (2) EP3515036A1 (zh)
CN (1) CN103096309B (zh)
WO (1) WO2013064089A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015015714A1 (en) * 2013-07-31 2015-02-05 Nec Corporation Devices and method for mtc group key management

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8625805B1 (en) 2012-07-16 2014-01-07 Wickr Inc. Digital security bubble
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
CN104581704B (zh) * 2013-10-25 2019-09-24 中兴通讯股份有限公司 一种实现机器类通信设备间安全通信的方法及网络实体
CN103731258B (zh) * 2013-12-20 2017-07-28 三星电子(中国)研发中心 生成密钥的方法及设备
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
CN104936306B (zh) * 2014-03-17 2020-01-14 中兴通讯股份有限公司 Mtc设备组小数据安全传输连接建立方法、hss与系统
WO2015170834A1 (en) * 2014-05-06 2015-11-12 Lg Electronics Inc. Method for processing received rlc pdus for d2d commucation system and device therefor
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
CN105592434A (zh) * 2014-10-23 2016-05-18 中兴通讯股份有限公司 一种管理设备间d2d通信分组的方法及设备
US9585013B2 (en) * 2014-10-29 2017-02-28 Alcatel Lucent Generation of multiple shared keys by user equipment and base station using key expansion multiplier
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
CN105792095A (zh) * 2014-12-23 2016-07-20 中兴通讯股份有限公司 用于mtc分组通信的密钥协商方法、系统及网络实体
US10735200B2 (en) 2015-03-27 2020-08-04 Comcast Cable Communications, Llc Methods and systems for key generation
CN106162515B (zh) * 2015-04-14 2020-07-07 中兴通讯股份有限公司 一种机器类通信安全通信的方法、装置和系统
US10129235B2 (en) * 2015-10-16 2018-11-13 Qualcomm Incorporated Key hierarchy for network slicing
CN106612205B (zh) * 2015-10-27 2019-12-06 中国移动通信集团公司 一种节点认证方法、系统及代理节点
CN106888083B (zh) * 2015-12-15 2020-04-21 中国移动通信集团公司 物联网下组密钥生成方法及通信节点
US9590956B1 (en) 2015-12-18 2017-03-07 Wickr Inc. Decentralized authoritative messaging
WO2017110003A1 (ja) * 2015-12-25 2017-06-29 株式会社アイ・エル・シー 機器間接続方法およびオブジェクト共有機器
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
US9602477B1 (en) 2016-04-14 2017-03-21 Wickr Inc. Secure file transfer
US9596079B1 (en) 2016-04-14 2017-03-14 Wickr Inc. Secure telecommunications
WO2018072150A1 (zh) * 2016-10-19 2018-04-26 中兴通讯股份有限公司 一种机器类通信安全通信的方法、装置和系统
US10887295B2 (en) * 2016-10-26 2021-01-05 Futurewei Technologies, Inc. System and method for massive IoT group authentication
CN106535178B (zh) * 2016-11-16 2019-07-12 中国人民解放军信息工程大学 接入层和非接入层密钥安全隔离装置及其方法
KR102549946B1 (ko) 2017-01-09 2023-06-30 삼성전자주식회사 이동통신 환경에서 단말의 초기 접속 요청 메시지를 라우팅하는 방법 및 관련 파라미터
CN106714151B (zh) * 2017-03-07 2020-04-28 北京邮电大学 信息传输方法
FR3071692A1 (fr) * 2017-09-28 2019-03-29 Orange Gestion de groupes d' objets connectes utilisant des protocoles de communication sans fil
US10541814B2 (en) 2017-11-08 2020-01-21 Wickr Inc. End-to-end encryption during a secure communication session
US10778432B2 (en) 2017-11-08 2020-09-15 Wickr Inc. End-to-end encryption during a secure communication session
US11101999B2 (en) 2017-11-08 2021-08-24 Amazon Technologies, Inc. Two-way handshake for key establishment for secure communications
US10855440B1 (en) 2017-11-08 2020-12-01 Wickr Inc. Generating new encryption keys during a secure communication session
WO2019138152A1 (en) * 2018-01-12 2019-07-18 Nokia Technologies Oy Apparatuses and methods for informing master node of impending wrap-around of packet counter value
EP3763143B1 (en) 2018-03-09 2025-08-13 Nokia Technologies Oy Methods, devices and computer readable medium for authentication in communication
CN108650233B (zh) * 2018-04-12 2020-11-03 江南大学 一种JavaScript数据传输加密方法
JP7443247B2 (ja) * 2018-12-17 2024-03-05 ソニーセミコンダクタソリューションズ株式会社 送信装置および送信方法、並びに受信装置および受信方法
LU101619B1 (en) * 2020-01-30 2021-07-30 Microsoft Technology Licensing Llc Associating decentralized identifiers with one or more devices
CN115885496B (zh) * 2020-08-28 2023-10-20 华为技术有限公司 一种通信方法及相关装置
CN112199697A (zh) * 2020-09-29 2021-01-08 深圳壹账通智能科技有限公司 基于共享根密钥的信息处理方法、装置、设备及介质
CN112511498B (zh) * 2020-11-10 2022-08-26 新华三技术有限公司 一种数据加密、解密方法、装置及设备
CN115250450B (zh) * 2021-04-28 2024-06-21 大唐移动通信设备有限公司 一种获取组通信密钥的方法及设备
CN116032519B (zh) * 2022-06-30 2024-04-05 荣耀终端有限公司 数据处理方法、设备及计算机可读存储介质
US12137159B2 (en) 2022-08-23 2024-11-05 Centro de Pesquisas Avancades Wernher von Braun Encryption key distribution via wireless mobile devices to internet of things (IoT) systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (zh) * 2008-02-15 2009-08-19 中国移动通信集团公司 组密钥的更新方法、设备及系统
CN102137397A (zh) * 2011-03-10 2011-07-27 西安电子科技大学 机器类型通信中基于共享群密钥的认证方法
WO2011131052A1 (zh) * 2010-04-22 2011-10-27 中兴通讯股份有限公司 机器对机器的通信系统中基于组的认证方法及系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002087146A1 (en) * 2001-04-18 2002-10-31 Pumpkin House Incorporated Encryption system and control method thereof
CN1758593A (zh) * 2004-10-10 2006-04-12 大唐移动通信设备有限公司 多媒体组播业务的业务密钥更新方法
CN100596063C (zh) * 2007-02-01 2010-03-24 华为技术有限公司 组密钥控制报文的分发系统、方法和装置
FR2923668B1 (fr) * 2007-11-13 2010-04-23 Eads Defence And Security Syst Procede et systeme de distribution de cles cryptographiques dans un reseau hierarchise.
EP2416541A1 (en) * 2008-02-22 2012-02-08 Security First Corporation Systems and methods for secure workgroup management and communication
US8605904B2 (en) * 2009-08-14 2013-12-10 Industrial Technology Research Institute Security method in wireless communication system having relay node
CN102215474B (zh) * 2010-04-12 2014-11-05 华为技术有限公司 对通信设备进行认证的方法和装置
EP2601772B1 (en) * 2010-08-05 2018-05-23 Nec Corporation Group security in machine-type communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511082A (zh) * 2008-02-15 2009-08-19 中国移动通信集团公司 组密钥的更新方法、设备及系统
WO2011131052A1 (zh) * 2010-04-22 2011-10-27 中兴通讯股份有限公司 机器对机器的通信系统中基于组的认证方法及系统
CN102137397A (zh) * 2011-03-10 2011-07-27 西安电子科技大学 机器类型通信中基于共享群密钥的认证方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2765793A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015015714A1 (en) * 2013-07-31 2015-02-05 Nec Corporation Devices and method for mtc group key management
EP3331216A1 (en) * 2013-07-31 2018-06-06 NEC Corporation Devices and method for mtc group key management
US11570161B2 (en) 2013-07-31 2023-01-31 Nec Corporation Devices and method for MTC group key management

Also Published As

Publication number Publication date
EP3515036A1 (en) 2019-07-24
EP2765793B1 (en) 2019-01-09
CN103096309A (zh) 2013-05-08
EP2765793A4 (en) 2014-10-08
US20140233736A1 (en) 2014-08-21
CN103096309B (zh) 2016-08-10
EP2765793A1 (en) 2014-08-13
US9775028B2 (en) 2017-09-26

Similar Documents

Publication Publication Date Title
CN103096309B (zh) 生成组密钥的方法和相关设备
CN103096308B (zh) 生成组密钥的方法和相关设备
US20200084631A1 (en) Key Configuration Method, Apparatus, and System
KR102245688B1 (ko) 키 생성 방법, 사용자 장비, 장치, 컴퓨터 판독가능 저장 매체, 및 통신 시스템
CN102625300B (zh) 密钥生成方法和设备
AU2021417645B2 (en) Secure communication method and device
WO2020029938A1 (zh) 安全会话方法和装置
CN106134231B (zh) 密钥生成方法、设备及系统
CN108781366A (zh) 用于5g技术的认证机制
CN103167492B (zh) 在通信系统中生成接入层密钥的方法及其设备
CN101500229A (zh) 建立安全关联的方法和通信网络系统
US12156028B2 (en) Wireless network switching method and device
CN104247328A (zh) 数据传输方法和装置
CN107205208B (zh) 鉴权的方法、终端和服务器
WO2014131356A1 (zh) 一种宽带集群系统的组密钥分层管理方法、系统和终端
WO2022198671A1 (zh) 一种通信方法及装置
EP2648437B1 (en) Method, apparatus and system for key generation
CN105191479A (zh) 一种信息保护方法、基站、用户设备和移动管理实体
CN116325840A (zh) 一种密钥推衍方法及其装置、系统
WO2024208178A1 (zh) 通信方法和通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12846508

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012846508

Country of ref document: EP