The present disclosure relates generally to wireless communications, and more particularly to service access authentication in wireless communications networks, for example, push-to-talk over cellular service request in cellular communications networks.
Press/Push-to-Talk over Cellular (PoC) communications networks Architectures are known generally. The “Push-to-Talk over Cellular (PoC) Architecture”, v1.1.0, Release 1.0. defined by Ericsson et al., for example, is based on an Internet Protocol Based Multimedia Subsystem (IMS) core specified in 3GPP TS23.228 “IP Based Multimedia Subsystem (IMS) Stage 2”, Release 6. Version 6.4.1, 2004-01 and in 3GPP TS 24.229 “IP Multimedia Call Control based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP) Stage 3” Release 6. Version 6.1.1. 2003-12. The IMS is an all-Internet Protocol (IP) wireless system where data, voice and signaling are all carried as IP packets. However, authentication and security protections in these and other Push-to-Talk architectures cannot depend on IMS security features where Authentication and Key Agreement (AKA) based IMS security protocols are not implemented. Authentication and Key Agreement (AKA) is a new generation security scheme being developed for 3GPP2 CDMA2000 systems and 3GPP UMTS systems.
Presently, in order to secure Press/Push-to-Talk over Cellular (PoC) service, access authentication must be conducted between the user equipment (UE) and Application Server (AS). Messages between the UE and IP Based Multimedia Subsystem (IMS) core, for example, from the UE to a Proxy Call Session Control Function (P-CSCF), which is a first contact point for a terminal within the IMS, must be protected for confidentiality and integrity. For call set up, PoC uses Session Initiation Protocol (SIP), which is an Internet Engineering Task Force (IETF) Standards setting body protocol for packetized voice (VoIP) call processing, to establish a session. According to one SIP authentication method, the UE and Application Server use a Hypertext Transfer Protocol (HTTP) digest. The HTTP digest is computed via a hash function, like MD5, with secret information called a key (or password), which has a relatively short lifespan.
Siemens has proposed Hypertext Transfer Protocol (HTTP) digest password distribution through the Internet Protocol Based Multimedia Subsystem (IMS) core wherein passwords are generated by the Home Subscriber Server (HSS) and distributed to the user equipment (UE) through the Serving Call Session Control Function (S-CSCF), which handles IMS session states, and to the Application Server (AS), which handles applications for a range of addresses. The Siemens solution requires distribution of the password or key over the air interface to the UE. Nokia has also proposed key or password distribution via an over-the-air protocol. In some PoC applications, over-the-air (OTA) key or password distribution is undesirable. Additionally, the relatively short duration of key and password validity requires frequent over-the-air key or password updates.
Ericsson has proposed service request via HTTP without cryptographic authentication except for the execution of Transport Layer Security (TLS) between User Equipment (UE) and Proxy Call Session Control Function (P-CSCF). With this method, upon execution of the TLS, a protected channel between the UE and P-CSCF is produced. TLS depends on Public Key Infrastructure (PKI) for authentication and public key operations for key agreement. Under the Ericsson proposal, however, application service request messages delivered by HTTP are susceptible to a man-in-the-middle attack.
The various aspects, features and advantages of the disclosure will become more fully apparent to those having ordinary skill in the art upon careful consideration of the following Detailed Description thereof with the accompanying drawings described below.
In
In other embodiments, the wireless communications network is a CDMA network and the entities are known by different names. In CDMA networks for example the entity 120 is known as a Packet Data Serving Node (PDSN). The alternative CDMA network also includes wireless infrastructure. In other embodiments, the communications network is a 3rd Generation (3G) Universal Mobile Telecommunications System (UMTS) W-CDMA wireless communications network or a future generation communications network.
In some embodiments, the wireless communications device includes a lower layer access key for accessing lower layer entities of the architecture, for example, the radio interface. The lower layer access key is a long-term key that changes relatively infrequently, if at all.
In
In some embodiments, the user equipment (UE) generates other lower layer keys, for example, cipher keys. In one embodiment, the cipher key is generated based on the lower layer access key. The cipher and other lower layer keys are relatively short-term keys (compared to the lower layer access keys) used for encryption, at the link layer of the architecture, etc. as is known generally by those having ordinary skill in the art. Exemplary
In some embodiments, the user equipment (UE) also generates a higher layer authentication key or password based on, or from, the cipher key. The higher layer authentication key is used for authentication at higher layers in the architecture, for example, for authenticating applications as discussed further below. In
In the exemplary push-to-talk authentication application, the higher layer authentication key, Kt, is independently generated at the UE and at the Serving GPRS support node (SGSN) or at the Packet Data Serving Node (PDSN) in CDMA networks or other entity with which the UE will communicate during the authentication process. Independent generation of the higher layer authentication key is possible where entities have the same information from which the higher layer authentication key is generated.
In the exemplary GSM architecture, the higher layer authentication key, Kt, is generated using RAND and RES as inputs since this information is known by both the UE and SGSN. RAND is a random number used for authentication purposes, and RES is an authentication response, or a value calculated from a secret key and a random number that can be used to infer that the respondent is in possession of the secret key without revealing it, as illustrated in
In the exemplary SIP based authentication of the push-to-talk (PoC) application, a Hypertext Transfer Protocol (HTTP) digest is computed based upon a higher layer authentication key. In applications where an HTTP digest is required, the higher layer authentication key is the HTTP digest key or password. In other applications, the higher layer authentication key may be used to generate some other password or key or token, depending on the requirements of the particular application and on the authentication mode. By generating the application authentication key using only information stored on the entity, the need to transmit the HTTP digest key or password is eliminated.
In
In the exemplary process of
In
In
In other alternative embodiments, the higher layer authentication key is sent directly to the authorization and authentication server by the entity that generated the key. The higher layer authentication key is also bundled with any other information at the generating entity.
In
The exemplary process provides information, in the exemplary form of higher layer authentication key or password, required to authenticate an application service request, without requiring over-the-air transmission of the information. In the exemplary application, the UE accesses a GPRS network using SIM based authentication. The proposed solution uses the cipher key established during GPRS authentication to derive a key or password at the UE and at the SGSN. The key is delivered to GGSN via PDP context request message, and the GGSN then sends the key together with other information of UE to a Radius server, which stored the key for later authenticating service requests by HTTP digest.
While the present disclosure and what are presently considered to be the best modes thereof have been described in a manner establishing possession by the inventors and enabling those of ordinary skill in the art to make and use the same, it will be understood and appreciated that there are many equivalents to the exemplary embodiments disclosed herein and that modifications and variations may be made thereto without departing from the scope and spirit of the inventions, which are to be limited not by the exemplary embodiments but by the appended claims.