The disclosure relates to the field of communications, and in particular to a connection processing method and system.
A Home NodeB (HNB) is used for providing 3rd Generation (3G) wireless coverage for 3G mobile phones in the home. The HNB is connected to existing residential broadband services, and includes the function of a standard Node B (one element of a 3G macro radio access network) and a radio resource management function of a standard Radio Network Controller (RNC).
The H(e)NB includes the HNB and the H(e)NB, and is a common name of the HNB and the H(e)NB.
Aiming at the security of the H(e)NB, the 3GPP TR 33.820 defines 27 threats. The 27 threats are grouped into 7 categories, which respectively are: hazards on the qualification certificate of the H(e)NB, physical attack on the H(e)NB, attack on the construction of the H(e)NB, attack on the protocol of the H(e)NB, attack on the core network (including the attack based on the location of the H(e)NB), attack on the data and identity privacy of users, and attack on radio resource and management.
In
The disclosure provides a connection processing method and system, which solve the problem that the S1 interface between the H(e)NB and the MME and/or S-GW is not protected in the related technology.
The disclosure provides a connection processing method according to one aspect.
The connection processing method according to the disclosure includes: establishing a secure connection between an MME and/or S-GW and an H(e)NB; protecting a connection between the MME and/or S-GW and the H(e)NB via the secure connection.
Establishing the secure connection between the MME and/or S-GW and the H(e)NB includes: establishing the secure connection between the MME and/or S-GW and a Security Gateway (SeGW); establishing the secure connection between the SeGW and the H(e)NB.
Establishing the secure connection between the MME and/or S-GW and the SeGW includes: establishing the secure connection between the MME and/or S-GW and an H(e)NB Gateway (H(e)NB GW); establishing the secure connection between the H(e)NB GW and the SeGW.
The secure connection established between the MME and/or S-GW and the H(e)NB GW includes at least one of the following: an Internet Protocol Security (IPsec) tunnel, a Transport Layer Security (TLS) tunnel, a Network Domain Security/Internet Protocol (NDS/IP).
The secure connection established between the H(e)NB GW and the SeGW includes one of the following: an NDS/IP, combination of the H(e)NB GW and the SeGW.
When the secure connection established between the MME and/or S-GW and the SeGW does not pass through the H(e)NB GW, the method further includes: establishing the secure connection between the MME and/or S-GW and the H(e)NB GW; establishing the secure connection between the H(e)NB GW and the SeGW.
The secure connection which is established between the MME and/or S-GW and the SeGW, and does not pass through the H(e)NB GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, an NDS/IP.
After establishing the secure connection between the SeGW and the H(e)NB, the method further includes: the SeGW and the H(e)NB performing authentication.
The secure connection includes at least one of the following: data source authentication, confidentiality protection, integrity protection, anti-replay protection.
The disclosure provides a connection processing system according to another aspect.
The connection processing system according to the disclosure includes an MME and/or S-GW and an H(e)NB, wherein the MME and/or S-GW includes: a first establishment module, configured to establish a secure connection with the H(e)NB; a first connection processing module, configured to protect a connection between the MME and/or S-GW and the H(e)NB via the secure connection; the H(e)NB includes: a second establishment module, configured to establish the secure connection with the MME and/or S-GW; a second connection processing module, configured to protect the connection between the MME and/or S-GW and the H(e)NB via the secure connection.
By establishing a secure connection between the MME and/or S-GW and the H(e)NB, and using the secure connection to implement data transmission, the disclosure solves the problem that the S1 interface between the H(e)NB and the MME and/or S-GW is not protected in the related technology, thus increasing the reliability and security of the data transmission mechanism of the H(e)NB system, solving the security defects of the H(e)NB system, and improving the security performance of the H(e)NB system.
Drawings, provided for further understanding of the disclosure and forming a part of the specification, are used to explain the disclosure together with embodiments of the disclosure rather than to limit the disclosure, wherein:
It should note that, the embodiments in the application and the characteristics of the embodiments can be mutually combined without conflict. The disclosure is described below in details with reference to the drawings and embodiments.
An embodiment of the disclosure provides a connection processing method.
Step S402, a secure connection is established between an MME and/or S-GW and an H(e)NB.
Step S404, a connection between the MME and/or S-GW and the H(e)NB is protected via the secure connection.
The S1 interface between the H(e)NB and the MME and/or S-GW is not protected in the related technology, such that the reliability and security of the data transmission mechanism of the H(e)NB cannot be guaranteed. In the embodiment of the disclosure, by establishing a secure connection between the H(e)NB and the MME and/or S-GW, and using the secure connection to implement connection processing, the reliability and security of the data transmission mechanism of the H(e)NB can be increased, the security defects of the H(e)NB system can be solved, and the security performance of the H(e)NB system can be improved.
Preferably, establishing the secure connection between the MME and/or S-GW and the H(e)NB includes that: a secure connection is established between the MME and/or S-GW and an SeGW; and a secure connection is established between the SeGW and the H(e)NB.
Preferably, establishing the secure connection between the MME and/or S-GW and the SeGW includes: a secure connection is established between the MME and/or S-GW and an H(e)NB GW; and a secure connection is established between the H(e)NB GW and the SeGW.
Preferably, the secure connection established between the MME and/or S-GW and the H(e)NB GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, an NDS/IP.
Preferably, the secure connection established between the H(e)NB GW and the SeGW includes one of the following: an NDS/IP, combination of the H(e)NB GW and the SeGW.
Preferably, when the secure connection established between the MME and/or S-GW and the SeGW does not pass through the H(e)NB GW, the method further includes that: a secure connection is established between the MME and/or S-GW and the H(e)NB GW; and a secure connection is established between the H(e)NB GW and the SeGW.
Preferably, the secure connection which is established between the MME and/or S-GW and the SeGW, and does not pass through the H(e)NB GW includes at least one of the following: an IPsec tunnel, a TLS tunnel, an NDS/IP.
Preferably, after the secure connection is established between the SeGW and the H(e)NB, the method further includes: the SeGW and the H(e)NB performs authentication.
Preferably, the secure connection includes at least one of the following: data source authentication, confidentiality protection, integrity protection, anti-replay protection.
Preferably, security protection is provided, via two and/or one secure connection(s), for the connection processing between the MME and/or S-GW and the H(e)NB.
The implementation process of the embodiment of the disclosure is described below in details with reference to the examples.
Step S502, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an HeNB GW.
Step S504, a secure connection is established between the HeNB GW and an SeGW, wherein this secure connection may be the NDS/IP, or the combination of the H(e)NB GW and the SeGW.
Step S506, a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection may be formed by the secure connection between the MME and/or S-GW and the H(e)NB GW and the secure connection between the H(e)NB GW and the SeGW, or may be another IPsec tunnel and/or TLS tunnel.
Step S508, mutual authentication is implemented between the HeNB and the SeGW, and a secure connection is established between the HeNB and the SeGW.
Step S510, it is judged whether the data transmission between the MME and/or S-GW and the HeNB is implemented with security protection via two secure connections, if yes, Step S512 is implemented, otherwise, Step S514 is implemented.
Step S512, the data transmission between the MME and/or S-GW and the HeNB is separately protected, namely, is implemented with security protection via two security connections.
Step S514, the data transmission between the MME and/or S-GW and the HeNB is protected via the same secure connection, namely, is implemented with security protection via one secure connection.
It should be noted that, the security protection in Steps S512-S514 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The secure connection(s) used for protecting the data transmission between the H(e)NB and the MME and/or S-GW can be IPsec tunnel(s) and/or TLS tunnel(s).
Step S602, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an H(e)NB GW.
Step S604, a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP, or the combination of the H(e)NB GW and the SeGW.
Step S606, a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection is another IPsec tunnel and/or TLS tunnel, and does not pass through the H(e)NB GW.
Step S608, mutual authentication is implemented between the H(e)NB and the SeGW, and a secure connection is established between the H(e)NB and the SeGW.
Step S610, control plane data transmission between the H(e)NB and the MME and/or S-GW is protected by the secure connection which passes through the H(e)NB GW.
Step S612, user plane data transmission between the H(e)NB and the MME and/or S-GW is protected by the secure connection which does not pass through the H(e)NB GW.
It should be noted that, the security protection in the Steps S610-S612 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The security connection for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be the IPsec tunnel and/or the TLS tunnel.
Step S702, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an H(e)NB GW.
Step S704, a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP or the combination of the H(e)NB GW and the SeGW.
Step S706, a secure connection is established between the MME and/or S-GW and the
SeGW, wherein this secure connection is another IPsec tunnel and/or TLS tunnel, and does not pass through the H(e)NB GW.
Step S708, mutual authentication is implemented between the H(e)NB and the SeGW, and a secure connection is established between the H(e)NB and the SeGW.
Step S710, control plane data transmission between the H(e)NB and the MME and/or S-GW is protected by the secure connection which passes through the H(e)NB GW.
Step S712, control plane data transmission and user plane data transmission between the H(e)NB and the MME and/or S-GW is protected by the secure connection which does not pass through the H(e)NB GW.
It should be noted that, the security protection in the Steps S710-S712 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The security connection for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be an IPsec tunnel and/or an TLS tunnel.
Step S802, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an HeNB GW.
Step S804: a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP or the combination of the H(e)NB GW and the SeGW.
Step S806: a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection is another IPsec tunnel and/or TLS tunnel, and does not pass through the H(e)NB GW.
Step S808: mutual authentication is implemented between the H(e)NB and the SeGW, and the secure connection is established between the H(e)NB and the SeGW.
Step S810: control plane data transmission and user plane data transmission between the H(e)NB and the MME and/or S-GW is protected via the secure connection which passes through the H(e)NB GW.
Step S812: user plane data transmission between the H(e)NB and the MME and/or S-GW is protected via the secure connection which does not pass through the H(e)NB GW.
It should be noted that, the security protection in the Steps S810-S812 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The security connection for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
Step S902, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an H(e)NB GW.
Step S904: a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP or the combination of the H(e)NB GW and the SeGW.
Step S906: a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection is another IPsec tunnel and/or TLS tunnel, and does not pass through the H(e)NB GW.
Step S908: mutual authentication is implemented between the H(e)NB and the SeGW, and the secure connection is established between the H(e)NB and the SeGW.
Step S910: control plane and user plane data transmission between the H(e)NB and the MME and/or S-GW is protected via the secure connection which passes through the H(e)NB GW.
Step S912: control plane and user plane data transmission between the H(e)NB and the MME and/or S-GW is protected via the secure connection which does not pass through the H(e)NB GW.
It should be noted that, the security protection in the Steps S910-S912 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The security connection for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be an IPsec tunnel and/or a TLS tunnel.
Step S1002, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an H(e)NB GW.
Step S1004: a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP or the combination of the H(e)NB GW and the SeGW.
Step S1006: a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection can be formed by the secure connection between the MME and/or S-GW and the H(e)NB GW and the secure connection between the H(e)NB GW and the SeGW.
Step S1008: mutual authentication is implemented between the H(e)NB and the SeGW, and the secure connection is established between the H(e)NB and the SeGW.
Step S1010: user plane and/or control plane data transmission between the H(e)NB and the MME and/or S-GW is implemented with security protection via a hop-by-hop secure connection.
It should be noted that, the security protection in the Step S1010 may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection. The security connections for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be the IPsec tunnels and/or the TLS tunnels.
Step S1102, an IPsec tunnel and/or TLS tunnel is established between an MME and/or S-GW and an H(e)NB GW.
Step S1104: a secure connection is established between the H(e)NB GW and an SeGW, wherein this secure connection may be an NDS/IP or the combination of the H(e)NB GW and the SeGW.
Step S1106: a secure connection is established between the MME and/or S-GW and the SeGW, wherein this secure connection can be formed by the secure connection between the MME and/or S-GW and the H(e)NB GW and the secure connection between the H(e)NB GW and the SeGW.
Step S1108: mutual authentication is implemented between the H(e)NB and the SeGW, and the secure connection is established between the H(e)NB and the SeGW.
Step S1110: control plane data transmission between the H(e)NB and the MME and/or S-GW is implemented with security protection via the hop-by-hop secure connection.
Step S1112, this security protection may be data source authentication and/or confidentiality protection and/or integrity protection and/or anti-replay protection.
The user plane data transmission between the H(e)NB and the MME and/or S-GW is implemented with security protection via a hop-by-hop secure connection. This secure protection may be data source authentication and/or confidentiality protection and/or anti-replay protection. The secure connections for protecting the data transmission between the H(e)NB and the MME and/or S-GW may be the IPsec tunnels and/or the TLS tunnels.
It should be noted that, the steps shown in the flowcharts of the drawings can be executed by a computer system, such as a group of computers which can execute the instructions, in addition, although the logic sequences are shown in the flowchart, the shown or described steps can be executed according to different sequences in some cases.
An embodiment of the disclosure provides a connection processing system, which can be used for realizing the above connection processing method.
The first establishment module 1222 is configured to establish a secure connection with the H(e)NB 124; the first connection processing module 1224 is coupled with the first establishment module 1222, and is configured to protect a connection between the MME and/or S-GW 122 and the H(e)NB 124 via the secure connection established by the first establishment module 1222.
The second establishment module 1242 is configured to establish a secure connection with the MME and/or S-GW 122; the second connection processing module 1244 is coupled with the second establishment module 1242, and is configured to protect the connection between the MME and/or S-GW 122 and the H(e)NB 124 via the secure connection established by the second establishment module 1242.
Specifically, the second establishment module 1242 is configured to establish the secure connection with the first establishment module 1222 in the MME and/or S-GW 122; the second connection processing module 1244 is connected to the second establishment module 1242, and is configured to protect the connection between the first connection processing module 1224 and the second connection processing module 1244 in the MME and/or S-GW 122 via the secure connection established by the second establishment module 1242.
It should be noted that, the connection processing system described in the device embodiment is corresponding to the above method embodiment, the specific implementation process has been described in details in the above method embodiment, and thus is not repeated.
In conclusion, a connection processing method and system is provided according to the above embodiments of the disclosure. By establishing the secure connection between the H(e)NB and the MME and/or S-GW, and using this secure connection to implement connection processing, the problem that the S1 interface between the H(e)NB and the MME and/or S-GW is not protected is solved, such that the reliability and security of the data transmission mechanism of the H(e)NB system can be increased, the security defects of the H(e)NB system can be solved, and the security performance of the H(e)NB system can be improved.
Obviously, those skilled in the art shall understand that the above-mentioned modules and steps of the disclosure can be realized by using general purpose calculating device, can be integrated in one calculating device or distributed on a network which consists of a plurality of calculating devices. Alternatively, the modules and the steps of the disclosure can be realized by using the executable program code of the calculating device. Consequently, they can be stored in the storing device and executed by the calculating device, or they are made into integrated circuit module respectively, or a plurality of modules or steps thereof are made into one integrated circuit module. In this way, the disclosure is not restricted to any particular hardware and software combination.
The technical solution of the disclosure has industrial applicability. By establishing the secure connection between the H(e)NB and the MME and/or S-GW, and using this secure connection to implement connection processing, the problem that the S1 interface between the H(e)NB and the MME and/or S-GW is not protected is solved, such that the reliability and security of the data transmission mechanism of the H(e)NB system can be increased, the security defects of the H(e)NB system can be solved, and the security performance of the H(e)NB system can be improved.
The descriptions above are only the preferable embodiment of the disclosure, which are not used to restrict the disclosure. For those skilled in the art, the disclosure may have various changes and variations. Any amendments, equivalent substitutions, improvements, etc. within the principle of the disclosure are all included in the scope of the protection of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
201010611930.2 | Dec 2010 | CN | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CN11/79113 | 8/30/2011 | WO | 00 | 8/18/2013 |