Ultra dense network security architecture method
A method for establishing a trust relationship in an ultra dense network is provided. The method comprises receiving, by a user equipment (UE), a reconfiguration request from a macrocell; deriving, by the UE, a user plane encryption key according to information in the reconfiguration request; transmitting, by the UE, a first user plane signaling message to a first microcell in a group of microcells when the UE is attached to the first microcell; and transmitting, by the UE, a second user plane signaling message to a second microcell in the group of microcells when the UE is attached to the second microcell, wherein the first user plane signaling message and the second user plane signaling message are both encrypted according to the user plane encryption key.
Latest Futurewei Technologies, Inc. Patents:
This patent application claims priority to U.S. Provisional Application No. 62/196,667, filed on Jul. 24, 2015 and entitled “Ultra Dense Network Security Architecture and Method,” which is hereby incorporated by reference herein as if reproduced in its entirety.
TECHNICAL FIELDThe present invention relates to a network security architecture and method, and, in particular embodiments, to an ultra dense network security architecture and method.
BACKGROUNDThe use of Ultra Dense Networks (UDNs) is anticipated to be one of the 5G architectural solutions for providing high speed services with high quality of service (QoS) and quality of experience (QoE) in highly populated areas. In a UDN, a plurality of small cells or microcells may be deployed within the coverage area of a large cell or macrocell. Because the coverage of a microcell is limited compared with that of a macrocell, it is possible for a user equipment (UE) to move from one microcell to another very frequently, which may increase the number of microcells with which the UE needs to have a security trust relationship.
SUMMARYAn embodiment method for establishing a trust relationship in an ultra dense network includes receiving, by a user equipment (UE), a reconfiguration request from a macrocell; deriving, by the UE, a user plane encryption key according to information in the reconfiguration request; transmitting, by the UE, a first user plane signaling message to a first microcell in a group of microcells when the UE is attached to the first microcell; and transmitting, by the UE, a second user plane signaling message to a second microcell in the group of microcells when the UE is attached to the second microcell, wherein the first user plane signaling message and the second user plane signaling message are both encrypted according to the user plane encryption key.
An embodiment UE includes a processor and a non-transitory computer readable storage medium storing programming for execution by the processor. The programming includes instructions for receiving, by the UE, a reconfiguration request from a macrocell; deriving, by the UE, a user plane encryption key according to information in the reconfiguration request; transmitting, by the UE, a first user plane signaling message to a first microcell in a group of microcells when the UE is attached to the first microcell; and transmitting, by the UE, a second user plane signaling message to a second microcell in the group of microcells when the UE is attached to the second microcell, wherein the first user plane signaling message and the second user plane signaling message are both encrypted according to the user plane encryption key.
An embodiment computer program product includes a non-transitory computer readable storage medium storing programming. The programming includes instructions to receive a reconfiguration request from a macrocell; derive a user plane encryption key according to information in the reconfiguration request; transmit a first user plane signaling message to a first microcell in a group of microcells when a UE is attached to the first microcell; and transmit a second user plane signaling message to a second microcell in the group of microcells when the UE is attached to the second microcell, wherein the first user plane signaling message and the second user plane signaling message are both encrypted according to the user plane encryption key.
An embodiment secure macrocell group includes a first microcell and a second microcell. The first microcell is configured to receive a secure microcells group key and further configured to transmit user plane signaling to a UE when the UE is attached to the first microcell, wherein the signaling is encrypted according to a user plane encryption key derived by the first microcell according to the secure microcells group key. The second microcell is configured to receive the secure microcells group key and further configured to transmit user plane signaling to the UE when the UE is attached to the second microcell, wherein the signaling is encrypted according to the user plane encryption key derived by the second microcell according to the secure microcells group key.
For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which:
The structure, manufacture and use of the presently preferred embodiments are discussed in detail below. It should be appreciated, however, that the present invention provides many applicable inventive concepts that can be embodied in a wide variety of specific contexts. The specific embodiments discussed are merely illustrative of specific ways to make and use the invention, and do not limit the scope of the invention.
In the current 4G Long Term Evolution (LTE) architecture, both the control plane (CP) signaling and the user plane (UP) signaling are anchored at a macrocell, e.g., an enhanced node B (eNB). Thus, any UE attached to an Evolved Packet System (EPS) is usually anchored at a single eNB with both CP and UP associated with the same eNB. When a UE is anchored over a microcell and both the control plane and the user plane are anchored at that microcell, the procedures for the UE to attach to the microcell are similar to those where the UE attaches to a macrocell.
The vast majority of the eNB activities while serving a specific UE involve handling the UE user plane traffic. In densely populated areas, e.g., shopping malls, stadiums, etc., the user plane traffic may be offloaded to multiple small microcells through the use of a 5G Ultra Dense Network (UDN) architecture. UDNs generally anchor the control plane air interface signaling at a macrocell, e.g., an eNB in 4G, and anchor user plane traffic on a microcell or small cell. The same UE/user may have multiple user plane flows that are anchored at different microcells while the control plane is anchored at the macrocell. It is also possible that a small amount of control signaling may be needed between the UE and the microcell for maintaining the user plane session that is being anchored.
While specific embodiments described herein primarily utilize the terms “macrocell” and “microcell” for the communications controllers, embodiments are generally applicable to access points (APs) as communications controllers. Thus, the term “access point” may be used for the macrocells and microcells described herein. Furthermore, in some embodiments, the control plane may be anchored by a microcell or an access point in general, and the user plane may be anchored by a macrocell or an access point in general.
In such an architecture, a UE may have a single trust relationship with the eNB, which may cover both the control plane and the user plane at the same time. That is, all user plane traffic may be protected by a single security trust relationship between the UE and the eNB. Thus, if that trust relationship is compromised, then all the UE user plane traffic and flows may be compromised at once.
In 5G, the control plane continues to be protected with the security trust relationship between the UE and the eNB. For user plane traffic, a different trust relationship may be established between the UE and each of a plurality of microcells associated with the eNB. Maintaining multiple simultaneous user plane trust relationships in such a manner may not be efficient. A 5G architecture that handles densely populated areas with a UDN may call for the use of an optimized security architecture that reduces the burden on the UE in order to avoid maintaining a large number of security trust relationships when the UE user plane traffic is anchored at different microcells.
An embodiment provides a security architecture that maintains the same security trust relationship for all microcells within a group of microcells. That is, a new trust model is provided, wherein the trust relationship between a UE and a microcell within a specific group of microcells is the same as the trust relationship between the UE and any other microcell within that specific group of microcells. When the UE has multiple user plane flows, each anchored at a different microcell, the UE may have a single security trust relationship, i.e., security association, for all of the user plane flows. Thus, when a UE attaches to a 5G architecture where the UDN architecture is present, the UE maintains a single security trust relationship with each microcell in a group of microcells, instead of a different security trust relationship with each microcell in the group. When a user plane flow moves from a source microcell to a target microcell in the same group as the source microcell, the UE continues to have the same security trust relationship with the target microcell as the UE had with the source microcell. Also, if the UE maintains a user plane flow with a first microcell in a group and then attaches an additional user plane flow to a second microcell in the same group, the UE has the same security trust relationship with the second microcell as with the first. In general, once a UE has derived a key for secure communication with a microcell in a group of microcells, the UE may use the same key for secure communication with any other microcell in the group of microcells.
As used herein, terms such as “group” and “group of microcells” may refer to a set of microcells that have been defined as a group for reasons other than security considerations or may refer to a set of microcells that have been defined as a group specifically due to security considerations. A microcell may belong to a single group of microcells or to multiple groups of microcells. When multiple microcell groups are associated with a macrocell, the macrocell may be aware of which microcells belong to which groups. A UE may determine the group to which a microcell belongs based on information transmitted by that microcell or by the macrocell associated with that microcell or based on information the UE receives in some other manner.
In an embodiment, all microcells in a group of microcells may have the same security capabilities and criteria at all times. A group of microcells may be located within the same geographical area. The number of microcells within a given microcell group may be less than a defined maximum. In addition, all microcells in a microcell group may belong to the same operator.
In an embodiment, a group of microcells may be assigned a globally unique identifier (ID). A group of microcells that share a globally unique ID and the same security criteria and characteristics may be referred to as a secure microcells group (SMG). When a UE has a trust relationship or security association with a specific SMG, then the same trust relationship and security association may be valid with all microcells that are part of the SMG. In an embodiment, a UE may have a single security relationship with an SMG. In another embodiment, the UE may have more than one security association with the same SMG. Each SMG may have a single trust relationship with any visiting UE without introducing any security weaknesses or vulnerabilities relative to 4G architecture.
In an embodiment, the procedures for deriving a key for the microcells in an SMG may be an enhancement of the 4G key derivation procedure. In the 4G key derivation procedure, a mobility management entity (MME) receives a key known as Kasme from a home subscriber server (HSS) for a specific UE. Kasme is the master key for a specific pair of a UE and an MME that is acting as an Access Security Management Entity (ASME). The MME typically derives a key known as KeNB based on Kasme. KeNB is the master key for the communication between an eNB and a specific UE.
In an embodiment, the MME derives an additional key for all microcells in an SMG. This key, which may be referred to as Ksmg or the key for an SMG, is a master key between a UE and a group of microcells or secondary eNBs in an SMG. In some cases, Ksmg may reflect the identity of an SMG.
The techniques the MME uses to generate Ksmg and cause Ksmg to be transmitted to the microcells in an SMG may depend on the 5G architecture for handling the UDN architecture and approach. The techniques may not change the current security architecture when the UE control plane and user plane are anchored at the same macrocell.
In some circumstances, the MME may be aware of all SMGs that belong to a specific eNB, the members of each SMG, and the ID of each SMG. In such circumstances, the MME may be capable of communicating directly with each of the microcells in each SMG associated with the eNB. In an embodiment, when such circumstances exist, the MME may generate a different Ksmg key for each SMG based on Kasme. The MME may then communicate the respective Ksmg keys directly to every microcell in the corresponding SMG. Alternatively, Ksmg may be communicated to a leader microcell in an SMG and/or to the leader's backup, and one or both of those microcells may communicate Ksmg to the rest of the microcells in the SMG. After receiving Ksmg in either of the above manners, each microcell in an SMG may use Ksmg to protect user plane traffic for a specific UE, e.g., for purposes of encryption/decryption, authentication, verification, and/or other security procedures between the UE and each microcell in the SMG.
In some circumstances, the MME communicates directly only with the macrocell. That is, the MME communicates with an eNB but does not communicate directly with the microcells in each SMG associated with the eNB. In an embodiment, when such circumstances exist, the MME may generate a general SMG key for all the SMGs that belong to the eNB. The general SMG key may be similar to KeNB and may be based on Kasme and on a common identifier for all the SMGs. The MME may then transmit the general SMG key to the eNB. The eNB may then generate an individualized Ksmg for each SMG based on the general SMG key and on the ID for each SMG. Each individualized Ksmg may be associated with a specific group of microcells. The eNB may then communicate each individualized Ksmg to its respective SMG. The eNB may send an individualized Ksmg to each microcell in an SMG or to a leader and/or backup microcell in the SMG, and either or both of those microcells may then send the individualized Ksmg to the other microcells in the SMG. Each microcell may then use Ksmg to protect user plane traffic for a specific UE, e.g., for purposes of encryption/decryption, authentication, verification, and/or other security procedures between the UE and each microcell in the SMG.
The procedures depicted in
The method may be considered to begin when a UE establishes a connection, such as an RRC connection, with an MeNB. A master key, K, for the UE is then generated and stored in the UE and an HSS. The UE and the HSS each separately generate a ciphering key, CK, and an integrity protection key, IK, based on K. Based on CK and IK, the UE and the HSS each separately generate a master key, Kasme, for the pair of the UE and an MME associated with the UE and the HSS. The HSS then sends Kasme to the MME. Based on Kasme, the MME generates KeNB, which is a key for communication between the UE and the MeNB. In an embodiment, the MME also generates, also based on Kasme, a key for communication between the UE and the SeNBs in an SMG, and this key may be referred to as Ksmg. In some cases, Ksmg may reflect the identity of an SMG.
The MME causes Ksmg to be transmitted to the SeNBs in one of several ways. If the MME is capable of communicating directly with the SeNBs, the MME may send Ksmg to all of the SeNBs in the SMG. Alternatively, the MME may send Ksmg to only one of the SeNBs, which then sends Ksmg to the other SeNBs in the SMG. If the MME is capable of communicating with the MeNB but is not capable of communicating directly with the SeNBs, the MME generates a generic version of Ksmg and sends the generic version of Ksmg to the MeNB. The MeNB then generates an individualized version of Ksmg for the SMG based on the generic version of Ksmg and on the ID of the SMG. The MeNB then sends the individualized version to the SeNBs. If other SMGs were present, the MeNB would generate a different individualized version of Ksmg for each of the SMGs.
The MeNB also informs the SeNBs of the UE's security capabilities. In the case where the MeNB sends Ksmg to the SeNBs, the MeNB may send the security capabilities information to the SeNBs in the same message in which the MeNB sends Ksmg to the SeNBs. In the case where the MME sends Ksmg to the SeNBs, the MeNB may send the security capabilities information to the SeNBs in some other manner.
Based on Ksmg and the UE's security capabilities, the SeNBs select an algorithm to be used to derive a key for secure communication between the SeNBs and the UE. The algorithm may be a Key Derivation Function (KDF) or a similar algorithm. The SeNBs also select a unique counter to be used as input into the algorithm. Alternatively, a group ID for the SMG could be used instead of a counter. At this point, all SeNBs in the SMG have the same Ksmg, counter, and ID for the algorithm.
The SeNBs then send the algorithm ID and the counter to the MeNB, and the MeNB sends the algorithm ID and the counter to the UE. The MeNB may transmit that information in a Reconfiguration Request message in RRC signaling.
At some point, the UE generates Ksmg based on Kasme, which the UE had previously generated as described above. Since the UE uses the same inputs and same procedures used by the HSS in generating Kasme, the version of Kasme generated by the UE is the same as the version of Kasme that the HSS sent to the MME. Thus, the version of Ksmg that the UE generates based on Kasme is the same as the version of Ksmg that the MME generates and causes to be transmitted to the SeNBs. Therefore, at this point, the UE has same Ksmg, counter, and algorithm ID as the SeNBs.
The UE and each of the SeNBs separately provide the same Ksmg and the same counter as input into the same algorithm, such as a KDF, and thus generate the same user plane encryption key (KUPenc) as output. The same KUPenc may then be used for secure communication of user plane signaling between the UE and each of the SeNBs.
In some cases, the UE and the MME may generate other keys based on KUPenc, Kasme, and/or other parameters. For example, the key for NAS signaling encryption, KNASenc, and the key for NAS signaling integrity protection, KNASint, may be generated for the UE and the MME based on Kasme. In addition, a key for RRC encryption (KRRCenc) and a key for RRC integrity protection (KRRCint) may be generated. KRRCenc and KRRCint may be derived from information provided to the UE that reflects the identity and protocol of RRC communication. A new counter that is dedicated for RRC communication may be used to guarantee the freshness of these keys and to ensure that the keys are different from KUPenc, for example.
If needed for integrity protection, a user plane integrity protection key (KUPint) may also be generated using the counter used for KUPenc plus an identifier to indicate that KUPint is for integrity protection.
In general, an identifier for an RRC protocol specific for encryption and a separate identifier specific for integrity protection may be added as input to the key derivation function. The use of an identifier that reflects the nature of the generated key may differentiate between an encryption key and an integrity protection key that are derived from the same master key.
Under the above procedures, the MeNB may still communicate the S-KeNB over the X2-C plane to all members of the small cell group. The SeNBs may then derive the user plane encryption key for the UE. The MeNB may then communicate an S-eNB group special counter to the UE once, and the UE may then derive the S-KeNB and user plane encryption keys to share with all members of the group. That is, under existing procedures, each time the UE moves from one microcell in an SMG to another or adds a microcell in the SMG for user plane traffic, the MeNB sends the UE information from which the UE may derive a new user plane encryption key for use with the new microcell. Under the embodiments disclosed herein, on the other hand, the MeNB sends such information to the UE only once as long as the UE remains in the same SMG. The UE then uses the information to derive a single user plane encryption key that may be used with all the microcells in the SMG. Thus, under the procedures disclosed herein, the amount of signaling from the MeNB to the UE may be reduced compared to the amount of signaling previously used. In particular, the RRC Connection Reconfigure Request message shown at event 550 in the prior art
In 5G, it is expected that the MeNB may have more than one group of SeNBs. In such a case, the small cell group ID may be used in addition to a special counter to derive the S-KeNB. This assumes that the small cell group ID can be communicated to the UE in a timely enough manner for the UE to make use of the small cell group ID. If communicating the small cell group ID to UE is not possible, the MeNB may ensure that the special counter is unique for a group of small cells that are associated with the MeNB. When the MeNB communicates K-SeNB to a group of small cells, the MeNB may inform some members of the group to keep K-SeNB until the UE starts the random access procedure, which may not occur immediately.
When the UE hands over from a first microcell that belongs to a first SMG to a second microcell that belongs to a second SMG, the UE automatically uses the key that belongs to the second SMG for securing user plane communication with the second microcell.
As part of the UDN architecture, it is possible for a UE to have some limited control signaling with a microcell. In this case, it is possible to use a different key to protect the control plane signaling between the UE and the microcells within each SMG. For example, there may be one control plane key per SMG, or the same user plane key may be reused.
The concept of security keys has been used herein as an example for the purposes of illustration and explanation. Other similar concepts, such as certificates, can be used and can follow the same general approach, such that each microcell in a microcell group uses the same certificate or other security component.
Various embodiments provide a security architecture solution that is based on the existing 4G LTE security architecture, but is optimized to handle UDN security architecture. Embodiments may be used for the 5G UDN security architecture. 3GPP TS 33.401 V12.5.1 (October 2012) provides further details regarding message flows/sequences utilized by the various procedures described herein.
In some embodiments, the processing system 800 is included in a network device that is accessing, or part otherwise of, a telecommunications network. In one example, the processing system 800 is in a network-side device in a wireless or wireline telecommunications network, such as a base station, a relay station, a scheduler, a controller, a gateway, a router, an applications server, or any other device in the telecommunications network. In other embodiments, the processing system 800 is in a user-side device accessing a wireless or wireline telecommunications network, such as a mobile station, a user equipment (UE), a personal computer (PC), a tablet, a wearable communications device (e.g., a smartwatch, etc.), or any other device adapted to access a telecommunications network.
In some embodiments, one or more of the interfaces 810, 812, 814 connects the processing system 800 to a transceiver adapted to transmit and receive signaling over the telecommunications network.
The transceiver 900 may transmit and receive signaling over any type of communications medium. In some embodiments, the transceiver 900 transmits and receives signaling over a wireless medium. For example, the transceiver 900 may be a wireless transceiver adapted to communicate in accordance with a wireless telecommunications protocol, such as a cellular protocol (e.g., long-term evolution (LTE), etc.), a wireless local area network (WLAN) protocol (e.g., Wi-Fi, etc.), or any other type of wireless protocol (e.g., Bluetooth, near field communication (NFC), etc.). In such embodiments, the network-side interface 902 comprises one or more antenna/radiating elements. For example, the network-side interface 902 may include a single antenna, multiple separate antennas, or a multi-antenna array configured for multi-layer communication, e.g., single input multiple output (SIMO), multiple input single output (MISO), multiple input multiple output (MIMO), etc. In other embodiments, the transceiver 900 transmits and receives signaling over a wireline medium, e.g., twisted-pair cable, coaxial cable, optical fiber, etc. Specific processing systems and/or transceivers may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device.
It should be appreciated that one or more steps of the embodiment methods provided herein may be performed by corresponding units or modules. For example, a signal may be transmitted by a transmitting unit or a transmitting module. A signal may be received by a receiving unit or a receiving module. A signal may be processed by a processing unit or a processing module. Other steps may be performed by a deriving unit/module and/or a verifying unit/module. The respective units/modules may be hardware, software, or a combination thereof. For instance, one or more of the units/modules may be an integrated circuit, such as field programmable gate arrays (FPGAs) or application-specific integrated circuits (ASICs).
The following references are related to subject matter of the present application. Each of these references is incorporated herein by reference in its entirety:
-
- 3GPP TS 33.401 V12.5.1, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security architecture (Release 12) (October 2012).
While this invention has been described with reference to illustrative embodiments, this description is not intended to be construed in a limiting sense. Various modifications and combinations of the illustrative embodiments, as well as other embodiments of the invention, will be apparent to persons skilled in the art upon reference to the description. It is therefore intended that the appended claims encompass any such modifications or embodiments.
Claims
1. A method for establishing a trust relationship in an ultra dense network, the method comprising:
- receiving, by a user equipment (UE), a reconfiguration request from a macrocell that includes a unique counter that is assigned to a group of microcells;
- encrypting, by the UE, a first user plane signaling message and a second user plane signaling message using the same user plane encryption key, wherein the user plane encryption key is derived in accordance with the unique counter;
- transmitting, by the UE, the first user plane signaling message to a first microcell in the group of microcells during a first period in which the UE is communicatively coupled to the first microcell; and
- transmitting, by the UE, the second user plane signaling message to a second microcell in the group of microcells during a second period in which the UE is communicatively coupled to the second microcell.
2. The method of claim 1, wherein the reconfiguration request includes an algorithm to be used by the UE for deriving the user plane encryption key, and wherein the unique counter is used as an input to the algorithm.
3. The method of claim 1, further comprising:
- deriving a radio resource control (RRC) encryption key (KRRCenc) according to the user plane encryption key; and
- transmitting an RRC message to the first microcell, wherein signaling in the RRC message is encrypted according to KRRCenc.
4. The method of claim 1, further comprising:
- deriving a radio resource control (RRC) integrity key (KRRCint) according to the user plane encryption key;
- receiving an RRC message from the first microcell; and
- verifying the integrity of the RRC message according to KRRCint.
5. The method of claim 1, wherein the UE receives an identity of the group of microcells from at least one of:
- the first microcell;
- the second microcell; and
- a macrocell associated with the first microcell and the second microcell.
6. A user equipment (UE) comprising:
- a processor; and
- a non-transitory computer readable storage medium storing programming for execution by the processor, the programming including instructions that when executed by the processor cause the UE to: receive a reconfiguration request from a macrocell that includes a unique counter that is assigned to a group of microcells; encrypt a first user plane signaling message and a second user plane signaling message using the same user plane encryption key, wherein the user plane encryption key is derived in accordance with the unique counter; transmit the first user plane signaling message to a first microcell in the group of microcells during a first period in which the UE is communicatively coupled to the first microcell; and transmit the second user plane signaling message to a second microcell in the group of microcells during a first period in which the UE is communicatively coupled to the second microcell.
7. The UE of claim 6, wherein the reconfiguration request includes an algorithm to be used by the UE for deriving the user plane encryption key, and wherein the unique counter is used as an input to the algorithm.
8. The UE of claim 6, wherein the programming further includes instructions to:
- derive a radio resource control (RRC) encryption key (KRRCenc) according to the user plane encryption key; and
- transmit an RRC message to the first microcell, wherein signaling in the RRC message is encrypted according to KRRCenc.
9. The UE of claim 6, wherein the programming further includes instructions to:
- derive a radio resource control (RRC) integrity key (KRRCint) according to the user plane encryption key;
- receive an RRC message from the first microcell; and
- verify the integrity of the RRC message according to KRRCint.
10. The UE of claim 6, wherein the UE receives an identity of the group of microcells from at least one of:
- the first microcell;
- the second microcell; and
- a macrocell associated with the first microcell and the second microcell.
11. A computer program product comprising a non-transitory computer readable storage medium storing programming, the programming when executed includes instructions to:
- receive a reconfiguration request from a macrocell that includes a unique counter that is assigned to a group of microcells;
- encrypt a first user plane signaling message and a second user plane signaling message using the same a user plane encryption key, wherein the user plane encryption key is derived in accordance with the unique counter;
- transmit the first user plane signaling message to a first microcell in the group of microcells during a first period in which a user equipment (UE) is communicatively coupled to the first microcell; and
- transmit the second user plane signaling message to a second microcell in the group of microcells during a first period in which the UE is communicatively coupled to the second microcell.
12. The computer program product of claim 11, wherein the reconfiguration request includes an algorithm to be used by the UE for deriving the user plane encryption key, and wherein the unique counter is used as an input to the algorithm.
13. The computer program product of claim 11, wherein the programming further includes instructions to:
- derive a radio resource control (RRC) encryption key (KRRCenc) according to the user plane encryption key; and
- transmit an RRC message to the first microcell, wherein signaling in the RRC message is encrypted according to KRRCenc.
14. The computer program product of claim 11, wherein the programming further includes instructions to:
- derive a radio resource control (RRC) integrity key (KRRCint) according to the user plane encryption key;
- receive an RRC message from the first microcell; and
- verify the integrity of the RRC message according to KRRCint.
15. The computer program product of claim 11, wherein the UE receives an identity of the group of microcells from at least one of:
- the first microcell;
- the second microcell; and
- a macrocell associated with the first microcell and the second microcell.
16. A user equipment (UE) comprising:
- a receiver configured to receive a reconfiguration request from a macrocell that includes a unique counter that is assigned to a group of microcells;
- one or more processors configured to encrypt a first user plane signaling message and a second user plane signaling message using the same user plane encryption key, wherein the user plane encryption key is derived in accordance with the unique counter; and
- a transmitter configured to transmit the first user plane signaling message to a first microcell in the group of microcells during a first period in which the UE is communicatively coupled to the first microcell, and to transmit the second user plane signaling message to a second microcell in the group of microcells during a first period in which the UE is communicatively coupled to the second microcell.
17. The UE of claim 16, wherein the information in the reconfiguration request identifies an algorithm to be used by the UE for deriving the user plane encryption key and includes the unique counter to be used as an input into the algorithm.
20150126154 | May 7, 2015 | Yang |
20160127897 | May 5, 2016 | Lee |
20160249210 | August 25, 2016 | Chang |
102740289 | October 2012 | CN |
103959829 | July 2014 | CN |
104349312 | February 2015 | CN |
2014113686 | July 2014 | WO |
2014120077 | August 2014 | WO |
2015015300 | February 2015 | WO |
2015066406 | May 2015 | WO |
WO-2015062097 | May 2015 | WO |
- “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security architecture (Release 12),” 3GPP TS 33.401, V12.5.1, Oct. 2012, 121 pages.
- 3GPP TSG-RAN2 Meeting #81, “Discussion on minimizing UE context transfer and signalling to CN,” R2-130572, Intel Corporation, Jan. 28-Feb. 1, 2013, 6 pages, St. Julian's, Malta.
Type: Grant
Filed: Jul 18, 2016
Date of Patent: Aug 6, 2019
Patent Publication Number: 20170026347
Assignee: Futurewei Technologies, Inc. (Plano, TX)
Inventors: Ahmad Shawky Muhanna (Richardson, TX), Zhibi Wang (Woodridge, IL), Jiangsheng Wang (Shanghai)
Primary Examiner: Kendall Dolly
Application Number: 15/213,266
International Classification: G06F 21/00 (20130101); H04L 29/06 (20060101); H04W 12/06 (20090101); H04W 12/04 (20090101);