Cellular infrastructure is designed to support seamless multi-radio access terminal networks. Cellular user equipment (UE) can roam seamlessly between 5th generation (5G)/4th generation (4G)/3rd generation (3G)/2nd generation (2G) networks, and the user equipment can utilize different services provided by the network infrastructure.
5G interworking with non-5G devices is defined via Non 3GPP Interworking Function (N3IWF), Trusted Non-3GPP Gateway Function (TNGF), Trusted Wireless LAN Interworking Function (TWIF), and Wireline Access Gateway Function (W-AGF). The main interfaces from the interworking function to a 5G core network is via N2 and N3 interfaces; the N3IWF, TNGF, and TWIF interface to a 5G UE or “Non-5G Capable Over WLAN” (N5CW) UE is over Wi-Fi. The interfacing of tactical radios without Wi-Fi interfaces is possible with a Military Trusted Interworking Function (M-TIF) that maintains the required N2 and N3 interfaces with the core network but terminates all the Wi-Fi related interworking functions at a proxy within the M-TIF. This eliminates changes to the tactical waveforms and related cryptographic functions within the tactical radio. However, no methodology exists to integrate one or more tactical nodes in a 5G network.
In one aspect, embodiments of the inventive concepts disclosed herein are directed to a system and method for implementing M-TIF to integrate one or more tactical nodes as an integral part of a 5G network. The M-TIF implements a tactical proxy to interface with a TWIF. The tactical proxy terminates wireless local area network interactions, eliminating the need for changes to the tactical waveform. Application layer messages between the tactical network node and tactical proxy are introduced to initiate, manage, and terminate sessions with the 5G Core.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and should not restrict the scope of the claims. The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate exemplary embodiments of the inventive concepts disclosed herein and together with the general description, serve to explain the principles.
The numerous advantages of the embodiments of the inventive concepts disclosed herein may be better understood by those skilled in the art by reference to the accompanying figures in which:
Before explaining at least one embodiment of the inventive concepts disclosed herein in detail, it is to be understood that the inventive concepts are not limited in their application to the details of construction and the arrangement of the components or steps or methodologies set forth in the following description or illustrated in the drawings. In the following detailed description of embodiments of the instant inventive concepts, numerous specific details are set forth in order to provide a more thorough understanding of the inventive concepts. However, it will be apparent to one of ordinary skill in the art having the benefit of the instant disclosure that the inventive concepts disclosed herein may be practiced without these specific details. In other instances, well-known features may not be described in detail to avoid unnecessarily complicating the instant disclosure. The inventive concepts disclosed herein are capable of other embodiments or of being practiced or carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein is for the purpose of description and should not be regarded as limiting.
As used herein a letter following a reference numeral is intended to reference an embodiment of the feature or element that may be similar, but not necessarily identical, to a previously described element or feature bearing the same reference numeral (e.g., 1, 1a, 1b). Such shorthand notations are used for purposes of convenience only, and should not be construed to limit the inventive concepts disclosed herein in any way unless expressly stated to the contrary.
Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by anyone of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
In addition, use of the “a” or “an” are employed to describe elements and components of embodiments of the instant inventive concepts. This is done merely for convenience and to give a general sense of the inventive concepts, and “a” and “an” are intended to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
Finally, as used herein any reference to “one embodiment,” or “some embodiments” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the inventive concepts disclosed herein. The appearances of the phrase “in some embodiments” in various places in the specification are not necessarily all referring to the same embodiment, and embodiments of the inventive concepts disclosed may include one or more of the features expressly described or inherently present herein, or any combination of sub-combination of two or more such features, along with any other features which may not necessarily be expressly described or inherently present in the instant disclosure.
Broadly, embodiments of the inventive concepts disclosed herein are directed to a system and method for implementing M-TIF to integrate one or more tactical nodes as an integral part of a 5G network. The M-TIF implements a tactical proxy to interface with a TWIF. The tactical proxy terminates wireless local area network interactions, eliminating the need for changes to the tactical waveform. Application layer messages between the tactical network node and tactical proxy are introduced to initiate, manage, and terminate sessions with the 5G Core. The inventive concepts disclosed herein may be better understood with reference to U.S. patent application Ser. No. 17/443,518 (filed Jul. 27, 2021) which is incorporated by reference.
Referring to
In at least one embodiment, the system is configured as a N5CW device, and the M-TIF 100 uses the TWIF 122 to communicate with the core network; the core network may include one or more User Plane Function (UPF) devices 106, 112, 116, including one or more UPF devices 106, 112 corresponding to the number of networks being interfaced, and a UPF anchor (UPF-A) device 116. Furthermore, the core network may include at least one Access & Mobility Management Function (AMF) device 108, at least one cryptographic guard 114, and at least one 5G gNodeB (5G gNB) 110, some or all of which may be communicatively coupled at any given time via standard interfaces 118, 120 such as N2 and N3.
Referring to
The system may include any suitable number and/or type of tactical military networks 200, and each tactical military network 200 may be configured to communicate via any suitable waveform(s) (e.g., a tactical targeting network technology (TTNT) waveform and/or a TSM waveform). For example, one or more of the tactical military networks 200 may be mobile ad-hoc networks (MANETs).
In at least one embodiment, the tactical military network 200 is an ad-hoc IP mesh network. Traditionally, both 5G UEs 204 and N5CW TTNT UEs 202 would be expected to have a universal subscriber identity module (USIM). Incorporating the USIM functionality into the TTNT node 202 would require substantial changes to the waveform and cryptographic functions, leading to waveform re-certification and crypto re-certification and can result in interoperability issues with standard TTNT radios. To obviate the need for re-certification, the tactical node gateway 208, which may be co-located on the platform with the gNB and core network, interfaces with the tactical proxy 210 and acts as a gateway router for all TTNT nodes 202 in the network that have been configured to be part of the 5G core 216 network. The connectivity between a TTNT nodes 202 and the tactical node gateway 208 can be single-hop or multi-hop through the ad-hoc network. The tactical proxy 210 includes the relevant security features to access the 5G core network 216 as a native 5G device. The tactical proxy 210 may establish multiple 5G data connections for different TTNT nodes 202 and different applications requiring different authentication. The tactical node gateway 208 does not require any direct 5G compatibility and all 5G specific data interactions are maintained between the 5G core network 216 and the tactical proxy 210.
In at least one embodiment, the only changes to each TTNT node 202 are applied at the application layer, which precludes incorporation of USIM functionality on the TTNT radio. The required USIM functionality is instead hosted on the Tactical Proxy 210.
Each TTNT node 202 may be any suitable network node, such as a terminal (e.g., an aircraft, a watercraft, a submersible craft, an automobile, a spacecraft, a satellite, and/or a train, or a manpack). Each TTNT node 202 may include at least one radio (e.g., at least one software-defined radio (SDR)), at least one processor, and at least memory for embodying processor executable code, some or all of which may be communicatively coupled at any given time. One or more of the TTNT nodes 202 may be considered analogous or equivalent to a non-5G capable over WLAN (N5CW) nodes. Each TTNT node 202 may use generic routing encapsulation (GRE) for control traffic and user plane traffic to a military trusted interworking function (M-TIF) device 206.
Referring to
The TTNT node 300 may establish a communication session with the 5G Core network via the intermediary tactical node gateway 304 and tactical proxy 306 to handle authentication and security; in at least one embodiment, the tactical node gateway 304 and tactical proxy 306 may establish a plurality of data channels for multiple TTNT nodes 300, or applications, or both. In at least one exemplary embodiment, a UPF-3 device may handle TSM tactical military nodes, and traffic can be seamlessly routed between SIPRNET, NIPRNET, Military 5G, TTNT tactical military network, and TSM tactical military network.
In at least one embodiment, the M-TIF device 302 (including tactical node gateway 304, tactical proxy 306, and TWIF 308) may be collocated on a platform that hosts a 5G RAN and communicates with a collocated 5G Core network. Tactical node gateways 304, tactical proxies 306, and TWIFs 308 may be collocated or discrete and separate entities; the may optionally implement commercial domain security to secure the control plane and user plane traffic.
In at least one embodiment, appropriate cryptographic guards may be deployed between UPF-2 and UPF-A and between UPF-1 and UPF-A so that only authorized data can be exchanged between the 5G Core network 110 and the tactical proxy 306 for relay to the TTNT node 300 via the tactical node gateway 304. Additionally, interfaces may optionally be extended to incorporate Department of Defense (DoD) defined security and/or authentication mechanisms.
Some embodiments permit DoD to deploy a seamless heterogenous network of networks with inter-network routing. Entire tactical networks or selective users from tactical networks can be incorporated as analogous or equivalent to 5G N5CW devices that can register on demand with a tactical 5G Core network. Roaming across networks may be seamlessly supported.
The 5G Core network may further include the at least one AMF device 310, at least one SMF device, at least one UPF-1 device, at least one UPF-2 device, at least one UPF-Anchor (UPF-A) device, and/or the at least one cryptographic guard. The devices may be configured to perform any or all of the operations disclosed throughout via various software applications or computer code, and configured to execute various instructions or operations.
Referring to
Referring to
The system may include an M-TIF 500 encompassing multiple TTNT/TSM gateway radios 504, 524 and intermediary tactical proxies 506, 526 that include necessary features for performing appropriate authentication to access 5G features and maintain 5G connections for corresponding TTNT/TSM nodes via their respective TTNT/TSM gateway radios 504, 524. A crypto guard 510 between respective TWIFs 508, 528 and 5G gNB 512 ensures that only controlled control information can be exchanged with the 5G Core. Similarly, the Crypto Guards 510, 520 logically interposed between UPF devices 514, 516, 522, and a UPF-A device 518 ensures that only controlled user traffic can be routed between the TTNT/TSM nodes, 5G Core, and external networks (SIPRNET/NIPRNET).
Referring to
Networks may operate at any classification. The tactical proxy 606 and the TWIF 608 are configured to handle multiple levels of classification traffic; if the tactical network cannot handle multiple levels of classification internally, then multiple tactical gateway radios 604, 624 are employed so that the tactical proxy 606 may route appropriate data on the appropriate network.
Referring to
The TWIF 728 and UPF devices 714, 716, 722, 718 are MILS while only the Tactical proxy 706 is MLS. A crypto guard 710 is logically interposed between the TWIF 728 and the AMF 730. Furthermore, in at least one embodiment, a crypto guard is disposed between a UPF-A device and other UPF devices 714, 716, 722 so that traffic at different classification levels is kept separate and only appropriate traffic can be routed between them.
In at least one embodiment, the interfaces presented by the TNGF/N3IWF/TWIF towards the tactical proxy are slightly different, but the functions to be performed by the tactical proxy do not change. The tactical proxy originates and terminates all Wi-Fi related transactions expected by the Y2/Ta/Yw interfaces to spoof the interworking function into functioning as though there is real 5G+Wi-Fi or Wi-Fi device at the other end.
In at least one embodiment, the tactical proxy hosts a UICC/USIM functionality and performs identity and authentication management on behalf of all tactical devices in the 5G network. The tactical proxy takes on this functionality, thereby keeping the 5G specifics from the tactical node and minimizing changes to tactical nodes.
In at least one embodiment, where a typical deployment of N5CW Layer 2 transport would be by Wi-Fi orchestrated by a TWAP and TWIF, the TWAP is redundant, as the tactical node and tactical proxy communicate over ethernet transport.
In at least one embodiment, the WLAN UE uses EAP-5G, IKEv2, and IPSEC to secure the control plane between the UE and TWIF, and GRE/IPSEC and GRE/ESP to secure the user plane. For secure networks where the tactical node gateway, tactical proxy, and TWIF are co-located on a secure platform, a GRE encapsulation can be used for user plane traffic between the tactical node and M-TIF. The control plane is terminated on the tactical proxy which is already collocated with TWIF on a secure platform, thus avoiding any control plane security aspects.
Embodiments of the present disclosure provide a secure and transparent method for 5G Identification and authentication of tactical nodes and IP-based networks. This functionality permits the DoD to deploy a seamless heterogenous network of networks with inter-network routing ability. Entire tactical networks or selective users from tactical networks can be incorporated as 5G N5CW devices that can register on demand with the tactical 5G network. Roaming across networks is seamlessly supported. Military security is retained. No details regarding frequencies, TRANSEC, COMSEC, etc., of the tactical network are available to the 5G network or the M-TIF. Policies dictate labeling of traffic to and from the M-TIF so that the tactical networks can appropriately route the information adhering to tactical networking standards.
It is believed that the inventive concepts disclosed herein and many of their attendant advantages will be understood by the foregoing description of embodiments of the inventive concepts disclosed, and it will be apparent that various changes may be made in the form, construction, and arrangement of the components thereof without departing from the broad scope of the inventive concepts disclosed herein or without sacrificing all of their material advantages; and individual features from various embodiments may be combined to arrive at other embodiments. The form herein before described being merely an explanatory embodiment thereof, it is the intention of the following claims to encompass and include such changes. Furthermore, any of the features disclosed in relation to any of the individual embodiments may be incorporated into any other embodiment.