The present invention relates to communication networks capable of ciphering and deciphering and especially to a method for managing keys in such communication networks.
Radio transmission is by nature more prone to eavesdropping and fraud than fixed wire transmission. Listening to communications is easy and does not require access to special locations. The GSM cellular system has alleviated this problem by introducing authentication and encryption or ciphering. Next the GSM authentication and ciphering procedures are explained shortly in reference with
When a User Equipment UE (or Mobile Station MS) 10 accesses the first core network it registers itself in the MSC/VLR 40. After receiving a registration request or a service request from the mobile, MSC/VLR 40 transmits to HLR/AuC a request including IMSI to acquire authentication triplets consisting of RAND, SRES and Kc1. In GSM the MM or the mobility management protocol implements the functionality for the authentication. The triplets are of a predetermined length and calculated by using a secret key Ki, known only to the authentication center and the SIM card in the mobile. After receiving the triplets from HLR/AuC, the MSC/VLR sends the challenge, RAND, to the MS in an authentication request to authenticate that particular MS. As part of the successful registration, the MSC/VLR updates the location of the MS to HLR and downloads the subscriber data from HLR.
The mobile 10 has the secret key Ki in its SIM card. The secret key Ki is stored on subscription by the operator and is not visible for the users of the mobile or for any other party for that matter. It is identical to the secret key Ki stored in the Authentication Center. The secret key Ki is applied together with the random number RAND into a predetermined algorithm called A3 to produce a signed response SIZES. The mobile 10 then transmits a message containing SIZES to the MSC/VLR 40, which compares it with the SIZES received from the AuC. If the comparison is successful, the mobile 10 is authenticated and allowed to access the network. At the same time with calculating the SIZES, the mobile applies RAND and Ki to another predetermined algorithm called A8 to produce the ciphering key Kc1. If the authentication was successful and the network should so decide, all subsequent transmissions with the mobile 10 over the air interface are ciphered.
For this the MSC/VLR transmits the ciphering key Kc1 to the BSC which is in communication with the mobile 10, and the BSC subsequently delivers the Kc1 further to the BTS communicating with the MS and the ciphering or encryption takes place in the base station and the mobile according to yet another predetermined algorithm, for example A5. Once MSC/VLR has decided that ciphering will be used, the BSC makes a decision up on the actual algorithm. In GSM there are currently two ciphering algorithms to select from.
If the mobile wants to access the second core network it registers itself in the SGSN 60. The procedure for authentication is similar to the procedure with the first core network, with the exception that the ciphering key Kc2 is not transmitted to the base station (BSS part of the system) currently in communication with the mobile 10. In other words, the ciphering takes place in SGSN and in MS. The SGSN 60 retains the ciphering key Kc2 within itself and performs the ciphering.
Thus, the prior art system uses different ciphering keys for ciphering the communications with two different core networks and the ciphering is applied to two different radio connections as the radio channels used for communicating with MSC and SGSN are distinct. As a result, a GSM MS having simultaneous communications with both MSC and SGSN utilizes two ciphering keys on two different radio channels or connections having both their own independent control in the network.
The fact that the ciphering and the control of the ciphering takes place at different locations, may cause consistency problems. The fact that radio access network is not able to access the signalling messages of the second core network at all, may turn out to be problematic in future networks, when all radio recourses used by a specific user should be managed in conjunction in a system having two CN nodes controlling the ciphering. In this case, the radio resources reserved for simultanous connections to MSC and SGSN should be managed by a single entity in the radio access network part of the system, but still there would be two entities controlling the ciphering.
It is proposed that in UMTS there will be only one RRC or radio resource control protocol, controlling both the connection to the MSC and to the SGSN. If only one key is used at a time for both connections, the problem is, how to communicate to the other CN node that its key is not going to be used. Yet another problem, relates to handovers controlled by a CN entity.
It is therefore an object of the present invention to efficiently manage the ciphering keys and algorithms for ciphering and deciphering user data communicated between different core networks and a mobile station.
It is another object of the present invention to efficiently manage the ciphering keys and algorithms for ciphering and deciphering signalling data communicated between different core networks and a mobile station.
It is still another object of the present invention to efficiently transfer the ciphering parameters when the serving radio network controller is handed over to another radio network controller, which then becomes a new serving radio network controller.
The present invention is a novel and improved method for managing in a single location the ciphering keys and algorithms used for encrypting or ciphering the communications of a specific mobile station with multiple core networks or core network entities. Further another aspect of the invention is that the management location is movable as the mobile station moves within the radio access network.
The preferred embodiment of the present invention relates to a 3rd generation mobile network, for which abbreviations UMTS or WCDMA are used. The network is shown in
Since the air interface access method is CDMA, the mobile 110 is capable of communicating with multiple base stations at the same time (called soft or diversity handover). When that occurs, all transmissions from the mobile 110 are directed to one RNC, called serving RNC or SRNC, in which the transmissions are combined into one transmission for further sending towards the intended core network. Also, the SRNC has the control over the radio connections.
In the preferred embodiment a mobile station establishes communication with one core network or core network entity or vice versa. In the establishment the network requests mobile to authenticate itself as explained above. At the same time with the authentication the mobile and the network (or CN node) calculate identical ciphering keys Kc1. In the preferred embodiment of the invention the core network or core network entity, which calculated the ciphering key does not start ciphering user data or signalling messages but generates and transmits a message comprising the key and data indicative of the algorithm to be used to a ciphering controller 180, which is preferably located in the serving radio network controller. The ciphering controller receives said message and starts ciphering the data and signalling messages flowing from the core network towards to mobile station and to decipher the data and signalling messages flowing from the mobile to the core network.
In the preferred embodiment of the invention another core network or network entity may establish communication with the mobile station or vice versa while the communication with the first core network is still active. The second core network or network entity authenticates the mobile and second ciphering keys Kc2 are calculated. Then, as described above, the second core network generates and transmits a second message comprising the second key and data indicative of the algorithm to be used with the second key to the ciphering controller. The ciphering controller receives said second message and compares the first and second ciphering keys and the related algorithms. If the first and second ciphering keys and the related algorithms are equally reliable, the ciphering controller ciphers and deciphers data and signalling messages to and from the first and second core networks with the key and algorithm it was using already. This is illustrated in
In another embodiment of the present invention the respective different keys are used for ciphering user data in different communications but the key and it's related algorithm with higher ciphering capabilities are used for ciphering the signalling messages to and from both core networks.
In yet another embodiment, after receiving the message containing the second ciphering key Kc2, the ciphering control acknowledges said message with another message containing information indicative of the selected ciphering key and algorithm. The communication of the key in use into the second CN node (possessing Kc2) may also take place in the reception of initial message as part of the COMPLETE LAYER 3 INFO message. By doing so, the second CN will become aware immediately that the radio connection for signalling is already ciphered and as a result there would be no need to commend ciphering on.
In another embodiment, there is only one entity controlling the ciphering in CN. This approach is illustrated in
In another embodiment the is an interface between the two ciphering control entites in CN providing the required coordination. In practice, there could be an interface called Gs between the MSC and SGSN. The Gs as such is present in the prior art GSM system, but it does not contain functionality to coordinate the ciphering keys.
In the preferred embodiment of the present invention it is possible that the communications to the mobile station are rerouted via another serving radio network controller. Should this occur, the parameters used for ciphering and deciphering (along with other parameters required to establish the communication via the target controller) need to be transferred to the new location of the ciphering controller via CN. This is done by signalling the parameters or info on them transparently through the corresponding core networks. Alternatively this may be done by signalling the parameters over Iu interfaced between radio network controllers.
The invention is described in more detail in the following with reference to the accompanying drawings, of which
Same reference numerals are used for similar entities in the figures.
The ciphering is likely to be done within UTRAN in UMTS. In the two MM option there are two entities, i.e., MSC and SGSN, which may request ciphering in the radio interface.
It is assumed that in UMTS the ciphering key and the allowed ciphering algorithms are supplied by CN domains to the UTRAN usually in the beginning of the connection. Receipt of the ciphering command message at the UTRAN will cause the generation of a radio interface ciphering command message and, if applicable, invoke the encryption device and start data stream ciphering. The CN domain is noted if the ciphering is executed successfully in the radio interface and the selected ciphering algorithm.
When new connection is established from other CN domain, which is not having any connection to the UE, the new CN domain also supplies the ciphering key and the ciphering algorithms allowed to use to UTRAN in the beginning of the connection. This is due to the fact CN domains are independent from each other, in the sense of ciphering.
If it is assumed that only one ciphering key and one ciphering algorithm are used for all connections, this leads to a situation, in which there are (two) more than one ciphering keys supplied from CN domains and only one of them is used.
To handle this situation, UTRAN must select either one of the ciphering keys. If there are no differences between the ciphering requirements requested by two CN domains or there is no desire to change the key then, e.g., the first ciphering key and the algorithm is maintained as shown in
As a result of the selection of the ciphering key between two different CN domains (if both CN domains have active connection(s) to the UE) either one of the CN domains does not know the correct ciphering key used for the connection(s). Only UTRAN and UE know the correct ciphering key used.
It may be required to use one ciphering key for, e.g., one radio access bearer. Different user plane bearers are ciphered by different ciphering keys supplied by the single CN domain respectly. This means that, e.g., for two calls via MSC, two keys would be used for the data streams. However, in the control plane only one ciphering key is used and therefore in the control plane there must be coordinated between ciphering keys supplied by CN domains or domain.
The coordination in the control plane is similar to what is presented for one ciphering key used in UTRAN. In the control plane, UTRAN must select either one of the ciphering keys supplied from CN domains if both CN domains are active or from a CN domain in case more than one bearers were in use.
In GSM, when inter-BSC handover is performed, MSC sends the ciphering key and allowed algorithms to the target BSC in the BSSMAP HANDOVER REQUEST message. In GPRS, because the SGSN performs the ciphering, the inter-BSC handover does not cause any need for the ciphering key management.
For UMTS, the GSM approach is not applicable on the serving RNC (SRNC) relocation, because CN domains do not necessary know the correct ciphering key used as it is described above. The solution is to relay info on ciphering transparently via the CN in SRNC relocation.
In the handover from UMTS to GSM, the ciphering key cannot be transferred transparently like it is proposed for UMTS. The CN (or IWU) has to build the BSSMAP HO REQUEST message, having the ciphering key from the MSC. 2G-SGSN receives its ciphering key from the old 3G-SGSN via Gn-interface as it is done in GPRS.
If the ciphering keys used in UMTS are different compared to GSM, e.g., the ciphering key length is different, both MSC and SGSN ciphering keys must be changed in UMTS-GSM handover.
In GSM, the A-interface BSSMAP supports a transparent field in the BSSMAP HO REQUIRED and HO REQUEST messages, which allows to utilize the proposed solution also GSM CN-connected to the UTRAN.
An alternative signalling is presented in
In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention. While a preferred embodiment of the invention has been described in detail, it should be apparent that many modifications and variations thereto are possible, all of which fall within the true spirit and scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
982727 | Dec 1998 | FI | national |
990757 | Apr 1999 | FI | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FI99/01010 | 12/7/1999 | WO | 00 | 10/12/2001 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO00/36860 | 6/22/2000 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5199069 | Barrett et al. | Mar 1993 | A |
5237612 | Raith | Aug 1993 | A |
5325419 | Connolly et al. | Jun 1994 | A |
5537474 | Brown et al. | Jul 1996 | A |
5555553 | Jonsson | Sep 1996 | A |
5729537 | Billström | Mar 1998 | A |
5878036 | Spartz et al. | Mar 1999 | A |
6112088 | Haartsen | Aug 2000 | A |
6125122 | Favichia et al. | Sep 2000 | A |
6167513 | Inoue et al. | Dec 2000 | A |
6363151 | Linder | Mar 2002 | B1 |
6434382 | Liu et al. | Aug 2002 | B2 |
6584310 | Berenzweig | Jun 2003 | B1 |
6876747 | Faccin et al. | Apr 2005 | B1 |
7002992 | Shaffer et al. | Feb 2006 | B1 |
7079656 | Menzel et al. | Jul 2006 | B1 |
20020052206 | Longoni | May 2002 | A1 |
Number | Date | Country |
---|---|---|
0779760 | Jun 1997 | EP |
779760 | Jun 1997 | EP |
0869692 | Oct 1998 | EP |
0957651 | Nov 1999 | EP |
10-135945 | May 1998 | JP |
WO9715161 | Apr 1997 | WO |
WO-9809461 | Mar 1998 | WO |
WO 9809468 | Mar 1998 | WO |
WO9930524 | Jun 1999 | WO |
WO9933299 | Jul 1999 | WO |