This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2008-194986, filed on Jul. 29, 2008, the entire contents of which are incorporated herein by reference.
The present invention relates to an IP network communication method and a communication system, having a security function.
In a mobile communication system, as channels for connecting each network device (radio base station, radio base station controller, switching apparatus, etc.), generally, ATM (Asynchronous Transfer Mode) channels and IP (Internet Protocol) channels are used in many cases.
In the next generation mobile communication systems (LTE: LongTermEvolution, SAE: SystemArchitecture Evolution, ECN: Evolved Core Network, WiMAX, 4G, etc.) which are being studied vigorously today, there are many communication systems in which to define IP networks as the connection channels of network devices is under study.
Accordingly, in the mobile communication systems also, realization as one service connected to a total IP network (Internet Protocol Network) is going to be made.
As such, including the IP communication such as the Internet today, all kinds of communication are moving toward services using a common base of IP.
As such the services communicated through IP, a variety of types exist, including, for example, a type that requires communication with a small delay, such as voice and moving images, and a type that requires to transmit a large amount of data at high speed.
In case of communicating a large amount of data, a better transmission efficiency is obtainable if large packets in length (long packet length) on an IP channel are used. However, to transmit large packets, the IP channel must be occupied for a long time. The above occupation time may possibly impede a service in which communication with a small delay is required.
For the above reason, to secure communication quality with a small delay, generally, a large packet is transmitted after being fragmented.
Meanwhile, greater interest is being taken also in communication safety. Service providers desirably take measures on security issues using encrypted communication, considering communication safety in their own services.
Additionally, various studies are being carried out to the direction of adopting IPsec (IP security Protocol) to network channels, regardless of applications on the channels, as a technology that enables automatic encryption throughout communication.
In the following, using an example of an LTE system,
Further,
Further, in order to transmit the encrypted packet through a tunnel for encrypted communication, a new header E and a trailer F are added.
Here, to apply the IPsec technology, it is desirable to periodically exchange a variety of kinds of keys between network apparatuses, and it is preferable to arrange a protocol termination section dedicated for IPsec.
In the above case, there is a risk of largely damaging the processing capacity of a transmission apparatus itself, which may though be caused by a data layer, to which the technology related to the dedicated IPsec protocol termination is applied, and a target data transmission amount also.
In general, it is said that, depending on whether or not IPsec is applied (IPsec on/off), the performance of the protocol termination section differs on the order of 30 to 40 percent.
Also, as described in
As depicted in
Now, when there is a service on the network that a data delay is desired to be limited not to exceed a certain time, such as voice data, it is desired to limit the packet length to a certain extent. Because a long time is occupied in the network to transmit a long packet, which undesirably makes voice data etc. (having a limited delay) keep waiting, the packet is divided (fragmented) in advance into short packets.
As the prior art, there is a technique of adding, to a packet on which encryption processing is to be made, an identifier that is different from each hash value obtained by using a specific field of a packet header as a hash key, thereby enabling guarantee of sequence and parallel processing (Japanese Laid-Open Patent Publication No. 2000-315997).
However, fragmenting signifies shortening the packet length, which becomes a factor of decreasing the transmission efficiency, as described in regard to
On the other hand, with the widespread use of high speed Ethernet (registered trademark), there is an increased opportunity of transmitting a large amount of data and a private data through the Ethernet (registered trademark), and an efficient data security measure is required.
Accordingly, one objective of the present invention is to provide an IP network communication system applying encryption with a reduced processing delay caused by a CPU load which is increased by the application of IPsec etc., and with reduced degradation of data transmission efficiency in a network.
Large capacity communication data in these days include a lot of binary compressed data, such as ZIP, compressed video image data, such as MPEG, and compressed voice data. In most cases, such the compressed data include, in each top part, information for data restoration. In a state that decryption cannot be performed on the above part after being encrypted, there are many cases that accurate restoration of the above compressed data cannot be performed.
Therefore, instead of applying to an overall packet a security technology such as IPsec required for the network, the security technology is applied only to a portion of the packet in which security is required.
As one exemplary configuration, an IP network communication system having a security function includes a fragmentation section to fragment a transmission data into a plurality of packets, an encryption processing section to encrypt only a portion of packets among the plurality of fragmented packets and not to encrypt the residual packets, and a transmission means for transmitting the encrypted packets and the non-encrypted packets.
By this, a processing delay caused by an increased CPU load by the application of IPsec etc. is reduced, and the degradation of the data transmission efficiency in the network is reduced.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
Embodiments will now be described with reference to the accompanying drawings.
In the IP network communication system, a data transmission apparatus 20 on the transmission side and a data reception apparatus 40 on the reception side are connected through a network 30. On the input side of the data transmission apparatus 20 on the transmission side, an input interface 10 is provided.
Network 30 includes a path 31 for packets (ordinary packets) for non-encrypted session. Also, at a communication session time of the encrypted data, there are formed a tunnel 32 for encrypted communication and a tunnel 33 for encryption control, as will be described later.
In
A transmission packet generator 12 fragments the packet data read out from buffer 11 into a predetermined data length.
In regard to the packet data input to buffer 11, a session controller 13 decides a session and QoS (Quality of Service) for each fragmented packet, based on fragment information fragmented in transmission packet generator 12. On the basis of each session, in case of not being encrypted communication, session controller 13 instructs transmission packet generator 12 and a first IPsec on/off section 24 to perform non-encrypted communication.
By this, transmission packet generator 12 outputs packet data from buffer 11, which are kept intact in the state of being fragmented, so as to input to a selector 25 of data transmission apparatus 20.
Because of receiving the instruction of non-encryption from session controller 13, first IPsec on/off section 24 sets selector 25 in a manner to enable passing through an ordinary packet path 31 in network 30.
Now,
Namely, in
In the phase 1, in order to form tunnel 33 for encryption control between a transmission apparatus A on the transmission side and a transmission apparatus B on the reception side, an algorithm (such as encryption algorithm and verification algorithm) for use by tunnel 33 for encryption control is determined through path 31 for ordinary packets (processing procedure P11).
Next, in a similar way, through path 31 for ordinary packets, an encryption key of tunnel 33 for encryption control is determined (processing procedure P12), using the algorithm determined in the processing procedure P11. By this, tunnel 33 for encryption control is formed.
Further, in the phase 1, using tunnel 33 for encryption control determined by the processing procedures P11 and P12, verification of the opposite communication party is performed mutually between the transmission apparatus A and the transmission apparatus B (processing procedure P13).
In the phase 2, using tunnel 33 for encryption control generated in the phase 1, an encryption key and algorithm for use by tunnel 32 for encrypted communication between the transmission apparatus A and the transmission apparatus B are determined (processing procedure P21). Further, to the transmission apparatus B, the transmission apparatus A confirms the determined encryption key and the algorithm for use by tunnel 32 for encrypted communication (processing procedure P22).
Thereafter, encrypted communication (IPsec) is performed using the generated tunnel 32 for encrypted communication (processing procedure P3).
First, based on packet data in buffer 11, session controller 13 decides whether or not to be encrypted transmission on a session-by-session basis (step S1). In case of not being encrypted transmission (N in step S1), a packet being output from buffer 11 and fragmented is forwarded to data reception apparatus 40 through ordinary packet transmission path 31. Transmission is continued until the continuation of packet data in buffer 11 is interrupted (steps S8, S9 in
In step S1, based on the packet data, session controller 13 decides whether or not to be encrypted communication on a session-by-session basis, and in the case of being encrypted communication (Y in step S1), as described in
In
For example, in case of encrypting only the top packet, when the object for transmission processing is the top packet (Y in step S3), first IPsec on/off section 24 in an IPsec controller 21 is made to control selector 25 to switch so as to output only the top packet to an IP encryption section 26.
At the same time, an instruction is given to a second IPsec on/off section 23, so that IP encryption section 26 encrypts only the top packet, using the encryption key generated in encryption key generator 22. As such, encryption is performed only for a portion of the fragmented packets (step S5).
As depicted in
Here, in order to increase encryption accuracy, an effective time is set in the encryption key. When the effective time in the encryption key is timed out (Y in step S5), the procedure retains to step S2, and the encryption preparation processing is performed again, so that the subsequent processing is continued.
Data reception apparatus 40 receives packets in regard to path 31 for ordinary packets, tunnel 32 for encrypted communication, and tunnel 33 for encryption control, respectively.
In IPsec decryption section 42, in regard to each packet received from tunnel 32 for encrypted communication, it is decided, by the presence or absence of the encryption header, whether or not the received packet is an encrypted packet, (step S10).
Further, data reception apparatus 40 retains the encryption key, which has been determined between with the apparatus on the transmission side prior to the encrypted communication, in an encryption key generator 41 for decryption.
In
As such, in IPsec decryption section 42, the encrypted packet is decrypted, while the non-encrypted packet remains intact, and then, the packets are input to an assembling circuit not depictn in
In the above first embodiment, among the plurality of packets of the fragmented data, IPsec is applied only to the top packet, while the residual packets are transmitted with non-application of IPsec, through the tunnel for encrypted communication. Thus, a data range to which encryption is applied can be reduced.
Accordingly, because the entire data are not exposed to the communication network, security is ensured, and further, because ESP header (IA) etc. can be omitted at the time of encryption off, it is possible to cut both the network load and the processing required for encryption.
As a consequence, the CPU load can be reduced, and communication with a small delay can be attained. Here, according to the present embodiment, application and non-application of encryption can be decided on a packet-by-packet basis on the reception apparatus side, using the ESP header (IA) of IPsec. Therefore, any special functional addition is not necessary.
In the present embodiment, similar to the foregoing first embodiment, only a portion of fragmented packets, for example the top packet, is encrypted. In order that the fragmented packets thereafter are passed through ordinary packet path 31 without being encrypted, session controller 13 instructs first IPsec on/off circuit 24 to control to switch selector 25.
Accordingly,
The packets thereafter are kept in a state of being fragmented, and transmitted through ordinary packet path 31.
Therefore, by the comparison with the processing flow depictn in
Namely, except for the top packet, in case of the decision of not being an encrypted transmission packet (N in step S3), the packet is transmitted through ordinary packet path 31 in a state of the fragmented packet (III in
According to the above second embodiment, as described above, in an identical session, a packet having IPsec ON is transmitted using tunnel 32 for encrypted communication, while a packet having IPsec OFF is transmitted through ordinary packet path 31 as an ordinary packet, without using the tunnel. In consequence, according to the present embodiment, in regard to the packets in case of IPsec OFF, the header etc. for the transmission by tunnel 32 for encrypted communication can be omitted from the packets in the first case of encryption OFF. As compared with the first embodiment, the network load and the CPU load can be reduced further.
In addition, to execute the present embodiment, no addition of a special function is necessary on the data reception apparatus side, similarly to the first embodiment.
According to the present embodiment, transmission packet generator 12 for fragmenting packets is not provided in input interface 10 of transmission apparatus 20.
In regard to transmission packets read out from the buffer, session controller 13 specifies a portion of the transmission packets as an application range of IPsec. The above IPsec application range is determined to correspond to preset conditions based on information such as session information and QoS.
Namely, in synchronization with packets being input from buffer 11 to data transmission apparatus 20, session controller 13 notifies an encryption key generator 22A in IPsec controller 21 of the encryption application range.
According to an encryption instruction at timing corresponding to the encryption application range from encryption key generator 22A, IPsec encryption section 26 performs encryption, so as to transmit the encrypted portion in one packet and the residual portion of the packet concerned to transmission apparatus 40 on the reception side, through tunnel 32 for encrypted communication.
Specifically, in the example depicted in
In comparison with the processing flow according to the first embodiment depictn in
In the processing flow of the transmission apparatus on the reception side depicted in
According to the present third embodiment, as having been explained in the above
Further, although there is no change in the basis of the processing phases 1, 2 for encryption preparation described in
Further, as the present embodiment, it has been described that, in interface 10 of the transmission apparatus on the transmission side depictn in
Here, as having been described in the above, in the first and second embodiments, it is possible to switch the embodiment methods in the middle of the session because of the control on a packet-by-packet basis. Accordingly, as a still further embodiment, in consideration of the respective characteristics in the aforementioned embodiments, it is possible to optimize a network state by switching each embodiment method according to network congestion condition, CPU use rate, session QoS, etc.
In
In the processing flow depicted in
In
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a depicting of the superiority and inferiority of the invention. Although the embodiment(s) of the present inventions have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2008-194986 | Jul 2008 | JP | national |