This disclosure is related to the field of communication systems and, in particular, to next generation networks.
Next generation networks, such as Fifth Generation (5G), denote the next major phase of mobile telecommunications standards beyond Fourth Generation (4G) standards. In comparison to 4G networks, next generation networks may be enhanced in terms of radio access and network architecture. Next generation networks intend to utilize new regions of the radio spectrum for Radio Access Networks (RANs), such as millimeter wave bands.
With mobile networks widely used across the country and the world, communications may be intercepted or suffer from other kinds of attacks. To ensure security and privacy, the 3rd Generation Partnership Project (3GPP) has set forth security mechanisms for 5G mobile networks, and the security procedures performed within the 5G mobile networks. One of the security procedures between User Equipment (UE) and a 5G mobile network is primary authentication and key agreement. Primary authentication and key agreement procedures enable mutual authentication between the UE and the network, and provide keying material that can be used between the UE and the serving network in subsequent security procedures.
Some of the present authentication procedures may be inefficient or not fully defined, and it may be desirable to identify improvements to the authentication procedures.
Described herein is a primary re-authentication procedure for a UE that is triggered by the home network. More particularly, a Unified Data Management (UDM) of the home network triggers primary re-authentication of a UE in response to a trigger condition. One technical benefit is the home network has control over when re-authentication is performed, and mechanisms are defined to allow for re-authentication.
In one embodiment, a UDM element comprises at least one processor, and at least one memory including computer program code. The memory and the computer program code are configured to, with the processor, cause the UDM element at least to trigger primary re-authentication of a UE in response to a trigger condition, and send a re-authentication notification message toward an Access and Mobility Management Function (AMF) to perform primary re-authentication of the UE.
In one embodiment, the processor further causes the UDM element at least to send the re-authentication notification message directly to the AMF requesting that the AMF initiate primary re-authentication with an Authentication Server Function (AUSF).
In one embodiment, the processor further causes the UDM element at least to generate a home environment re-authentication vector for the primary re-authentication, and send the re-authentication notification message to an AUSF with the home environment re-authentication vector.
In one embodiment, the trigger condition comprises wrap-around of a UE Parameters Update (UPU) counter.
In one embodiment, the processor further causes the UDM element at least to decide to perform a UPU procedure, send a UPU protection request message to an AUSF, receive a UPU protection response message from the AUSF with a counter wrap error for the UPU counter, suspend the UPU procedure, and trigger the primary re-authentication of the UE based on the counter wrap error for the UPU counter.
In one embodiment, the processor further causes the UDM element at least to decide to perform a UPU procedure, send a UPU protection request message to an AUSF, receive a UPU protection response message from the AUSF with a maximum counter value indicator for the UPU counter, continue with a present iteration of the UPU procedure, and trigger the primary re-authentication of the UE after the present iteration of the UPU procedure based on the maximum counter value indicator.
In one embodiment, the trigger condition comprises wrap-around of a Steering of Roaming (SoR) counter.
In one embodiment, the processor further causes the UDM element at least to decide to perform a SoR procedure, send a SoR protection request message to an AUSF, receive a SoR protection response message from the AUSF with a counter wrap error for the SoR counter, suspend the SoR procedure, and trigger the primary re-authentication of the UE based on the counter wrap error for the SoR counter.
In one embodiment, the processor further causes the UDM element at least to decide to perform a SoR procedure, send a SoR protection request message to an AUSF, receive a SoR protection response message from the AUSF with a maximum counter value indicator for the SoR counter, continue with a present iteration of the SoR procedure, and trigger the primary re-authentication of the UE after the present iteration of the SoR procedure based on the maximum counter value indicator.
In one embodiment, the trigger condition comprises a re-authentication request from another network function.
In one embodiment, a method of performing primary re-authentication in a UDM is described. The method comprises triggering, at the UDM, primary re-authentication of a UE in response to a trigger condition, and sending, at the UDM, a re-authentication notification message toward an AMF to perform primary re-authentication of the UE.
In one embodiment, sending the re-authentication notification message toward the AMF comprises sending the re-authentication notification message from the UDM directly to the AMF requesting that the AMF initiate primary re-authentication with an AUSF.
In one embodiment, the method further comprises receiving the re-authentication notification message at the AMF from the UDM, and initiating, at the AMF, re-authentication towards the AUSF by sending an authentication request message to the AUSF.
In one embodiment, the method further comprises generating, at the UDM, a home environment re-authentication vector for the primary re-authentication. Sending the re-authentication notification message toward the AMF comprises sending the re-authentication notification message from the UDM to the AUSF with the home environment re-authentication vector.
In one embodiment, the method further comprises receiving the re-authentication notification message from the UDM at the AUSF, generating, at the AUSF, a serving environment re-authentication vector from the home environment re-authentication vector received from the UDM, and sending a re-authentication notification message from the AUSF to the AMF with the serving environment re-authentication vector.
In one embodiment, the method further comprises receiving the re-authentication notification message from the AUSF at the AMF, and sending a re-authentication request message from the AMF to the UE.
In one embodiment, the method further comprises receiving another re-authentication notification message at the AMF from another network function, and sending a re-authentication request message from the AMF to the UE.
In one embodiment, the trigger condition comprises wrap-around of a UE Parameters Update (UPU) counter.
In one embodiment, the trigger condition comprises wrap-around of a Steering of Roaming (SoR) counter.
In one embodiment, the trigger condition comprises a re-authentication request from another network function.
Other embodiments may include computer readable media, other systems, or other methods as described below. The various features of the different embodiments may be variously combined with some features included and others excluded to suit a variety of different applications.
The above summary provides a basic understanding of some aspects of the specification. This summary is not an extensive overview of the specification. It is intended to neither identify key or critical elements of the specification nor delineate any scope of the particular embodiments of the specification, or any scope of the claims. Its sole purpose is to present some concepts of the specification in a simplified form as a prelude to the more detailed description that is presented later.
Some embodiments of the invention are now described, by way of example only, and with reference to the accompanying drawings. The same reference number represents the same element or the same type of element on all drawings.
The figures and the following description illustrate specific exemplary embodiments. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the embodiments and are included within the scope of the embodiments. Furthermore, any examples described herein are intended to aid in understanding the principles of the embodiments, and are to be construed as being without limitation to such specifically recited examples and conditions. As a result, the inventive concept(s) is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.
There are a large number of subscribers that are able to access services from a carrier that implements a mobile network comprising a 5G system 100, such as in
The purpose of the primary authentication and key agreement procedures is to enable mutual authentication between UE 106 and the network, and provide keying material that can be used between the UE 106 and the serving network in subsequent security procedures. The keying material generated by the primary authentication and key agreement procedure results in an anchor key called the KSEAF key provided by the AUSF 210 of the home network to the Security Anchor Function (SEAF) of the serving network. The SEAF provides authentication functionality via the AMF 212 in the serving network, and supports primary authentication using a Subscription Concealed Identifier (SUCI) that contains the concealed Subscription Permanent Identifier (SUPI). The SUPI is a globally unique 5G identifier allocated to each subscriber in the 5G system 100. The SUCI is composed a SUPI type, a Home Network Identifier (HN-ID) identifying the home network of the subscriber, a Routing Indicator (RID) that is assigned to the subscriber by the home network operator and provisioned in the Universal Subscriber Identity Module (USIM) of the UE, a Protection Scheme Identifier, a Home Network Public Key Identifier, and a Scheme Output. The anchor key KSEAF is derived from an intermediate key called the KAUSF key. The KAUSF key is established between the UE 106 and the home network resulting from the primary authentication procedure.
In response to the Nudm_UEAuthentication_Get Response message, AUSF 210 stores the expected response (XRES*) temporarily with the received SUCI or SUPI. AUSF 210 then generates a 5G Authentication Vector (5G AV) from the 5G HE AV received from UDM 218, by computing the hash expected response (HXRES*) from the expected response (XRES*) and the KSEAF key from the KAUSF key, and replacing the XRES* with the HXRES* and the KAUSF key with the KSEAF key in the 5G HE AV. AUSF 210 removes the KSEAF key to generate a 5G Serving Environment Authentication Vector (5G SE AV) that includes the authentication token (AUTN), hash expected response (HXRES*), and the random challenge (RAND). AUSF 210 sends a Nausf_UEAuthentication_Authenticate Response message to SEAF 302 that includes the 5G SE AV. In response, SEAF 302 sends the authentication token (AUTN) and the random challenge (RAND) to UE 106 in a NAS message Authentication Request message.
Although not shown in
UE 106 sends a NAS message Authentication Response message to SEAF 302 that includes RES*. In response, SEAF 302 computes HRES* from RES*, and compares HRES* and HXRES*. If they coincide, SEAF 302 considers the authentication successful from the serving network point of view. SEAF 302 sends RES*, as received from UE 106, in a Nausf_UEAuthentication_Authenticate Request message to AUSF 210. When AUSF 210 receives the Nausf_UEAuthentication_Authenticate Request message including a RES* as authentication confirmation, AUSF 210 stores the KAUSF key based on the home network operator’s policy, and compares the received RES* with the stored XRES*. If the RES* and XRES* are equal, then AUSF 210 considers the authentication successful from the home network point of view. AUSF 210 informs UDM 218 about the authentication result (not shown). AUSF 210 also sends a Nausf_UEAuthentication_Authenticate Response message to SEAF 302 indicating whether or not the authentication was successful from the home network point of view. If the authentication was successful, the KSEAF key is sent to SEAF 302 in the Nausf_UEAuthentication_Authenticate Response message. In case AUSF 210 received the SUCI from SEAF 302 in the authentication request, AUSF 210 includes the SUPI in the Nausf_UEAuthentication_Authenticate Response message if the authentication was successful.
One or more of the subsystems of UDM 218 may be implemented on a hardware platform comprised of analog and/or digital circuitry. For example, data management controller 504 may be implemented on one or more processors 530 that execute instructions 534 (i.e., computer readable code) for software that are loaded into memory 532. A processor 530 comprises an integrated hardware circuit configured to execute instructions 534 to provide the functions of UDM 218. Processor 530 may comprise a set of one or more processors or may comprise a multi-processor core, depending on the particular implementation. Memory 532 is a non-transitory computer readable storage medium for data, instructions, applications, etc., and is accessible by processor 530. Memory 532 is a hardware storage device capable of storing information on a temporary basis and/or a permanent basis. Memory 532 may comprise a random-access memory, or any other volatile or non-volatile storage device. One or more of the subsystems of UDM 218 may be implemented on a cloud-computing platform or another type of processing platform. UDM 218 may include various other components not specifically illustrated in
One or more of the subsystems of AUSF 210 may be implemented on a hardware platform comprised of analog and/or digital circuitry. One or more of the subsystems of AUSF 210 may be implemented on one or more processors 630 that execute instructions 634 (i.e., computer readable code) for software that are loaded into memory 632. One or more of the subsystems of AUSF 210 may be implemented on a cloud-computing platform or another type of processing platform.
AUSF 210 may include various other components not specifically illustrated in
One or more of the subsystems of AMF 212 may be implemented on a hardware platform comprised of analog and/or digital circuitry. One or more of the subsystems of AMF 212 may be implemented on one or more processors 730 that execute instructions 734 (i.e., computer readable code) for software that are loaded into memory 732. One or more of the subsystems of AMF 212 may be implemented on a cloud-computing platform or another type of processing platform.
AMF 212 may include various other components not specifically illustrated in
In the following embodiments, the home network is able to initiate primary re-authentication of a UE 106 through UDM 218.
Data management controller 504 of UDM 218 triggers primary re-authentication of a UE 106 in response to a trigger condition (step 802). The trigger condition may vary depending on policies of the operator network. In one embodiment, the trigger condition may be wrap-around of a counter (optional step 810), such as a counter for a UE Parameters Update (UPU), a counter for Steering of Roaming (SoR), and/or another type of counter. In one embodiment, the trigger condition may be a request from another network element or network function (optional step 812), such as a Network Function (NF) consumer or Application Function (AF) 222. The Network Function (NF) consumer or AF 222 may have an internal trigger condition, for example, keys expiry to trigger re-authentication. Other types of trigger conditions are considered herein.
In response to the trigger condition, data management controller 504 of UDM 218 sends a re-authentication notification message toward the AMF 212 to perform primary re-authentication of UE 106 (step 804), such as through network interface component 502. For example, data management controller 504 may send a re-authentication notification message (e.g., Nudm_SDM_Notification message) directly to AMF 212 requesting that AMF 212 initiate primary re-authentication with AUSF 210, such as by invoking the Nausf_UEAuthentication service (see
One technical benefit of method 800 is the home network is able to trigger primary re-authentication of a UE 106 through UDM 218. UDM 218 holds the subscription information of any SUPI and the network operator could configure that re-authentication is, for example, allowed or not allowed for certain trigger conditions. Moreover, in current primary authentication procedures, even though a UE requests registration, UDM 218 is the entity which has the information of which type of authentication method (5G-AKA or EAP-AKA′ or EAP-TLS) should be triggered for a particular UE/SUPI. Thus, it is beneficial for UDM 218 to decide based on internal configuration if re-authentication is allowed or not.
In one embodiment, UDM 218 may send a re-authentication notification message directly to AMF 212 requesting that AMF 212 initiate primary re-authentication to AUSF 210.
In Variant 1, data management controller 504 of UDM 218 triggers primary re-authentication of UE 106 in response to a trigger condition (step 802). In response to triggering primary re-authentication, data management controller 504 sends a re-authentication notification message directly to AMF 212 requesting that AMF 212 initiate primary re-authentication with AUSF 210 (step 902), such as by invoking the Nausf_UEAuthentication service. For example, data management controller 504 may invoke the Nudm_SDM_Notification service operation by sending an Nudm_SDM_Notification message to the AMF 212. In one embodiment, the Nudm_SDM_Notification message includes a primary re-authentication indicator that indicates primary re-authentication of UE 106 is requested or required. For example, the primary re-authentication indicator may comprise a primary re-authentication required flag that is set to “true”.
In
In one embodiment, UDM 218 may send a re-authentication notification message to AUSF 210 with a re-authentication vector for primary re-authentication, and AUSF 210 in turn sends a re-authentication notification message to AMF 212 with a re-authentication vector.
In Variant 2, data management controller 504 of UDM 218 triggers primary re-authentication of UE 106 in response to a trigger condition (step 802). In response to triggering primary re-authentication, data management controller 504 selects or chooses the re-authentication method for primary re-authentication of UE 106 (based on the SUPI of UE 106), and creates or generates a home environment re-authentication vector (5G HE AV) for primary re-authentication (step 1102). For example, UDM 218 derives the KAUSF key and calculates an expected response (XRES*) to a challenge. UDM 218 creates the home environment re-authentication vector comprising an authentication token (AUTN), the expected response (XRES*), the KAUSF key, and a random challenge (RAND) as discussed in
Data management controller 504 sends a re-authentication notification message to AUSF 210 with the home environment re-authentication vector (step 1104). For example, a new Nudm_UEreauthentication notification service operation may be defined. For the Nudm_UEreauthentication notification service operation, data management controller 504 may send a Nudm_UEreauthentication notification message to AUSF 210 that includes the home environment re-authentication vector, the SUPI, and/or other desired information.
In
In
As discussed above, there may be a variety of trigger conditions that trigger primary re-authentication of UE 106 at UDM 218. In one embodiment, a trigger condition for primary re-authentication may be wrap-around of a counter for UE Parameters Update (UPU). UDM 218 may decide to perform a UE parameters update anytime after UE 106 has been successfully authenticated and registered to the 5G system 100, as described in section 6.15.2 of 3GPP TS 33.501. For the UPU operation, AUSF 210 and UE 106 associate a 16-bit counter, CounterUPU, with the KAUSF key, and maintain the CounterUPU for the lifetime of the KAUSF key. UE 106 initializes the CounterUPU to 0x00 0x00 when the newly derived KAUSF key is stored, and stores the CounterUPU. To generate the UPU-MAC-IAUSF, AUSF 210 uses the CounterUPU. The CounterUPU is incremented by AUSF 210 for every new computation of the UPU-MAC-IAUSF. The CounterUPU is used as freshness input into UPU-MAC-IAUSF and UPU-MAC-IUE derivations to mitigate a replay attack. AUSF 210 sends the value of the CounterUPU along with the UPU-MAC-IAUSF to UE 106. UE 106 only accepts the CounterUPU value that is greater than the stored CounterUPU value. UE 106 updates the stored CounterUPU with the received CounterUPU, if the verification of the received UPU-MAC-IAUSF is successful. UE 106 uses the CounterUPU received from UDM 218 when deriving the UPU-MAC-IUE for the UPU acknowledgement.
One present issue is that AUSF 210 suspends the UPU protection service for UE 106 if the CounterUPU associated with the KAUSF key of UE 106 is about to wrap around. To resolve this issue, UDM 218 may trigger primary re-authentication of UE 106 in response to a wrap-around indication, such as for the CounterUPU.
At some point, data management controller 504 decides to perform a UE Parameters Update (UPU) procedure (step 1504), such as for a RID or Network Slice Selection Assistance Information (S-NSSAI) update. For the UPU procedure, UDM 218 sends a UPU protection request message (e.g., Nausf_UPUProtection Request message 1402) to AUSF 210 (step 1506) with the SUPI, UPU data, and optional ACK indication. In response to the UPU protection request message, AUSF 210 tries to increment the CounterUPU1430 and determines that the CounterUPU1430 associated with the KAUSF key of UE 106 is about to wrap around. Thus, AUSF 210 sends a UPU protection response message to UDM 218 (e.g., Nausf_UPUProtection Response message 1403) with a counter wrap error 1432 for CounterUPU1430. Data management controller 504 of UDM 218 receives the UPU protection response message from AUSF 210 with the counter wrap error 1432 (step 1508). In response to the counter wrap error 1432, data management controller 504 suspends the UPU procedure (step 1510), and triggers primary re-authentication (step 802).
For primary re-authentication, data management controller 504 sends a re-authentication notification message directly to AMF 212 (step 902) requesting that AMF 212 initiate primary re-authentication with AUSF 210, such as by invoking the Nausf_UEAuthentication service. In this example, data management controller 504 sends the re-authentication notification message directly to AMF 212 using the AMF re-authentication callback URI 1428. For example, data management controller 504 may invoke the Nudm_SDM_Notification service operation by sending an Nudm_SDM_Notification message 1404 to the AMF 212 using the AMF re-authentication callback URI 1428. In one embodiment, the Nudm_SDM_Notification message 1404 includes a primary re-authentication indicator 1434 that indicates primary re-authentication of UE 106 is requested or required. For example, the primary re-authentication indicator 1434 may comprise a primary re-authentication required flag that is set to “true”.
In response to the re-authentication notification message from UDM 218, AMF 212 initiates re-authentication towards AUSF 210 by sending an authentication request message to AUSF 210 (e.g., Nausf_UEAuthetication_Authenticate Request message 1405) with the SUPI and SN-Name. AUSF 210 in turn sends an authentication request message (e.g., Nudm_UEAuthentication_Get Request message 1406) with the SUPI and SN-Name towards UDM 218. Data management controller 504 of UDM 218 receives the authentication request message from AUSF 210 (step 1512). In response to the authentication request message from AUSF 210, data management controller 504 chooses or selects the authentication method for primary re-authentication based on the SUPI, and continues with successful primary re-authentication (step 1514), such as shown in
One technical benefit is UDM 218 is able to trigger primary re-authentication of UE 106 when the CounterUPU1430 is about to wrap-around so that AUSF 210 will reset the CounterUPU1430. Thus, the UPU procedure may resume without having to de-register the UE 106.
At some point, UDM 218 decides to perform a UE Parameters Update (UPU) procedure (step 1606). For the UPU procedure, UDM 218 sends a UPU protection request message (e.g., Nausf_UPUProtection request message 1413) to AUSF 210 (step 1608) with the SUPI, UPU data, and optional ACK indication. In response to the UPU protection request message, AUSF 210 tries to increment the CounterUPU1430 and determines that the CounterUPU1430 associated with the KAUSF key of UE 106 is about to wrap around. Thus, AUSF 210 sends a UPU protection response message to UDM 218 (e.g., Nausf_UPUProtection Response message 1414) with a counter wrap error 1432 for CounterUPU1430. Data management controller 504 of UDM 218 receives the UPU protection response message from AUSF 210 with the counter wrap error 1432 (step 1610). In response to the counter wrap error 1432, data management controller 504 suspends the UPU procedure (step 1612), and triggers primary re-authentication (step 802).
For primary re-authentication, data management controller 504 selects or chooses the re-authentication method for primary re-authentication of UE 106 (based on the SUPI for UE 106), and creates or generates a home environment re-authentication vector 1436 (5G HE AV) for primary re-authentication with the previously-registered AMF provided in the SN-Name (step 1102). Data management controller 504 sends a re-authentication notification message to AUSF 210 with the home environment re-authentication vector 1436 (step 1104). For example, data management controller 504 uses the AUSF re-authentication callback URI 1429 previously provided by AUSF 210, and sends a Nudm_UEreauthentication_Notification message 1415 to AUSF 210 that includes the home environment re-authentication vector 1436, the AMF re-authentication callback URI 1428, the SUPI, and/or other desired information.
In response to the Nudm_UEreauthentication_Notification message 1415 from UDM 218, AUSF 210 generates a serving environment re-authentication vector 1438 from the home environment re-authentication vector 1436 received from UDM 218. AUSF 210 sends a Re-authentication notification 1416 to AMF 212 using the AMF re-authentication callback URI 1428 provided by UDM 218. AUSF 210 includes the SUPI and serving environment re-authentication vector 1438 for re-authentication in the Re-authentication notification 1416. In response to the Re-authentication notification 1416, AMF 212 sends an authentication request 1417 towards UE 106 with the authentication token (AUTN) and the random challenge (RAND).
Data management controller 504 continues with successful primary re-authentication (step 1614), such as shown in
One technical benefit is UDM 218 is able to trigger primary re-authentication of UE 106 when the CounterUPU1430 is about to wrap-around so that AUSF 210 will reset the CounterUPU1430. Thus, the UPU procedure may resume without having to de-register the UE 106.
In the embodiments in
Data management controller 504 then continues with the present iteration of the UPU procedure (step 1708). For example, data management controller 504 invokes the Nudm_SDM_Notification service operation by sending a Nudm_SDM_Notification message 1423, which includes the UPU Data, UPU-MAC-IAUSF, and CounterUPU1430. Upon receiving the Nudm_SDM_Notification message 1423, AMF 212 sends a DL NAS Transport message 1424 to UE 106 with the UPU Data, UPU-MAC-IAUSF, and CounterUPU 1430. On receiving the DL NAS Transport message 1424, UE 106 calculates the UPU-MAC-IAUSF in the same way as AUSF 210 on the received UPU Data and the CounterUPU 1430, and verifies whether it matches the UPU-MAC-IAUSF value received in the DL NAS Transport message 1424. If UDM 218 has requested an acknowledgement from UE 106 and UE 106 has successfully verified and updated the UPU Data provided by UDM 218, then UE 106 sends an UL NAS Transport message 1425 to the serving AMF 212. UE 106 generates the UPU-MAC-IUE, and includes the generated UPU-MAC-IUE in the UL NAS Transport message 1425. AMF 212 sends a Nudm_SDM_Info message 1426 with the UPU-MAC-IUE to UDM 218. If UDM 218 indicated that UE 106 is to acknowledge the successful security check of the received UPU Data, then data management controller 504 compares the received UPU-MAC-IUE with the expected UPU-XMAC-IUE that UDM 218 stored temporarily.
After the present iteration of the UPU procedure is successful, data management controller 504 triggers primary re-authentication of UE 106 (step 802), such as according to Variant 1 or Variant 2. For example, after the UPU procedure, data management controller 504 checks whether a maximum counter value indicator 1440 is stored for UE 106. If the maximum counter value indicator 1440 is stored, UDM 218 initiates primary re-authentication of UE 106 after the present iteration of the UPU procedure. Thus, data management controller 504 triggers primary re-authentication (step 802) based on the maximum counter value indicator 1440 previously received from AUSF 210. After the re-authentication is successful, data management controller 504 resets the maximum counter value indicator 1440 stored in UDM 218 (step 1710).
One technical benefit is UDM 218 is able to initiate primary re-authentication of UE 106 before the CounterUPU1430 wraps-around. AUSF 210 alerts UDM 218 that the CounterUPU1430 will reach a maximum value in the next (or a future) iteration. Thus, the present iteration of the UPU procedure is okay to continue, but UDM 218 knows that the next (or a future) UPU procedure will result in a wrap-around error. UDM 218 therefore initiates primary re-authentication of UE 106 after the present UPU procedure.
In one embodiment, a trigger condition for primary re-authentication may be wrap-around of a counter for Steering of Roaming (SoR). UDM 218 may notify UE 106 of the changes to the SoR Information, as described in section 6.14.2 of 3GPP TS 33.501. For an SoR operation, AUSF 210 and UE 106 associate a 16-bit counter, CounterSoR, with the KAUSF key, and maintain the CounterSoR for the lifetime of the KAUSF key. UE 106 initializes the CounterSoR to 0x00 0x00 when the newly derived KAUSF key is stored, and stores the CounterSoR. To generate the SoR-MAC-IAUSF, AUSF 210 uses the CounterSoR. The CounterSoR is incremented by AUSF 210 for every new computation of the SoR-MAC-IAUSF. The CounterSoR is used as freshness input into SoR-MAC-IAUSF and SoR-MAC-IUE derivations to mitigate a replay attack. AUSF 210 sends the value of the CounterSoR along with the SoR-MAC-IAUSF to UE 106. UE 106 only accepts a CounterSoR value that is greater than the stored CounterSoR value. UE 106 updates the stored CounterSoR with the received CounterSoR, if the verification of the received SoR-MAC-IAUSF is successful. UE 106 uses the stored CounterSoR received from the HPLMN when deriving the SoR-MAC-IUE for the SoR acknowledgement.
One present issue is AUSF 210 suspends the SoR protection service for UE 106 if the CounterSoR associated with the KAUSF key of UE 106 is about to wrap around. To resolve this issue, UDM 218 may trigger primary re-authentication of UE 106 in response to a wrap-around indication, such as for the CounterSoR.
At some point, data management controller 504 decides to perform a SoR procedure (step 1904). For the SoR procedure, UDM 218 sends a SoR protection request message (e.g., Nausf_SoRProtection Request message 1802) to AUSF 210 (step 1906) with the SUPI, SoR data, and optional ACK indication. In response to the SoR protection request message, AUSF 210 tries to increment the CounterSoR1830 and determines that the CounterSoR1830 associated with the KAUSF key of UE 106 is about to wrap around. Thus, AUSF 210 sends a SoR protection response message to UDM 218 (e.g., Nausf_SoRProtection Response message 1803) with a counter wrap error 1832 for CounterSoR1830. Data management controller 504 of UDM 218 receives the SoR protection response message from AUSF 210 with the counter wrap error 1832 (step 1908). In response to the counter wrap error 1832, data management controller 504 suspends the SoR procedure (step 1910), and triggers primary re-authentication (step 802).
For primary re-authentication, data management controller 504 sends a re-authentication notification message directly to AMF 212 requesting that AMF 212 initiate primary re-authentication with AUSF 210 (step 902), such as by invoking the Nausf_UEAuthentication service. In this example, data management controller 504 sends the re-authentication notification message directly to AMF 212 using the AMF re-authentication callback URI 1428. For example, data management controller 504 may invoke the Nudm_SDM_Notification service operation by sending an Nudm_SDM_Notification message 1804 to the AMF 212 using the AMF re-authentication callback URI 1428. In one embodiment, the Nudm_SDM_Notification message 1804 includes a primary re-authentication indicator 1434 that indicates primary re-authentication of UE 106 is requested or required. For example, the primary re-authentication indicator 1434 may comprise a primary re-authentication required flag that is set to “true”.
In response to the re-authentication notification message from UDM 218, AMF 212 triggers re-authentication towards AUSF 210 by sending an authentication request message to AUSF 210 (e.g., Nausf_UEAuthetication_Authenticate Request message 1805) with the SUPI and SN-Name. AUSF 210 in turn sends an authentication request message (e.g., Nudm_UEAuthentication_Get Request message 1806) with the SUPI and SN-Name towards UDM 218. Data management controller 504 of UDM 218 receives the authentication request message from AUSF 210 (step 1912). In response to the authentication request message from AUSF 210, data management controller 504 chooses or selects the authentication method for primary re-authentication based on the SUPI, and continues with successful primary re-authentication (step 1914), such as shown in
One technical benefit is UDM 218 is able to trigger primary re-authentication of UE 106 when the CounterSoR1830 is about to wrap-around so that AUSF 210 will reset the CounterSoR1830. Thus, the SoR procedure may resume without having to de-register the UE 106.
At some point, UDM 218 decides to perform a SoR procedure (step 2006). For the SoR procedure, UDM 218 sends a SoR protection request message (e.g., Nausf_ SoRProtection Request message 1813) to AUSF 210 (step 2008) with the SUPI, SoR data, and optional ACK indication. In response to the SoR protection request message, AUSF 210 tries to increment the CounterSoR1830 and determines that the CounterSoR1830 associated with the KAUSF key of UE 106 is about to wrap around. Thus, AUSF 210 sends a SoR protection response message to UDM 218 (e.g., Nausf_SoRProtection Response message 1814) with a counter wrap error 1832 for CounterSoR1830. Data management controller 504 of UDM 218 receives the SoR protection response message from AUSF 210 with the counter wrap error 1832 (step 2010). In response to the counter wrap error 1832, data management controller 504 suspends the SoR procedure (step 2012), and triggers primary re-authentication (step 802).
For primary re-authentication, data management controller 504 selects or chooses the re-authentication method for primary re-authentication of UE 106 (based on the SUPI for UE 106), and creates or generates a home environment re-authentication vector 1436 (5G HE AV) for primary re-authentication with the previously-registered AMF provided in the SN-Name (step 1102). Data management controller 504 sends a re-authentication notification message to AUSF 210 with the home environment re-authentication vector 1436 (step 1104). For example, data management controller 504 uses the AUSF re-authentication callback URI 1429 previously provided by AUSF 210, and sends a Nudm_UEreauthentication_Notification message 1815 to AUSF 210 that includes the home environment re-authentication vector 1436, the AMF re-authentication callback URI 1428, the SUPI, and/or other desired information.
In response to the Nudm_UEreauthentication_Notification message 1815 from UDM 218, AUSF 210 generates a serving environment re-authentication vector 1438 from the home environment re-authentication vector 1436 received from UDM 218. AUSF 210 sends a Re-authentication notification 1816 to AMF 212 using the AMF re-authentication callback URI 1428 provided by UDM 218. AUSF 210 includes the SUPI and serving environment re-authentication vector 1438 for re-authentication in the Re-authentication notification 1816. In response to the Re-authentication notification 1816, AMF 212 sends an authentication request 1817 towards UE 106 with the authentication token (AUTN) and the random challenge (RAND).
Data management controller 504 continues with successful primary re-authentication (step 2014), such as shown in
One technical benefit is UDM 218 is able to trigger primary re-authentication of UE 106 when the CounterSoR1830 is about to wrap-around so that AUSF 210 will reset the CounterSoR1830. Thus, the SoR procedure may resume without having to de-register the UE 106.
In the embodiments in
Data management controller 504 then continues with the present iteration of the SoR procedure (step 2108). For example, data management controller 504 invokes the Nudm_SDM_Notification service operation by sending a Nudm_SDM_Notification message 1823, which includes the SoR Data, SoR-MAC-IAUSF, and CounterSoR1830. Upon receiving the Nudm_SDM_Notification message 1823, AMF 212 sends a DL NAS Transport message 1824 to UE 106 with the SoR Data, SoR-MAC-IAUSF, and CounterSoR 1830. On receiving the DL NAS Transport message 1824, UE 106 calculates the SoR-MAC-IAUSF in the same way as AUSF 210 on the received SoR Data and the CounterSoR 1830, and verifies whether it matches the SoR-MAC-IAUSF value received in the DL NAS Transport message 1824. If UDM 218 has requested an acknowledgement from UE 106 and UE 106 has successfully verified and updated the SoR Data provided by UDM 218, then UE 106 sends an UL NAS Transport message 1825 to the serving AMF 212. UE 106 generates the SoR-MAC-IUE, and includes the generated SoR-MAC-IUE in the UL NAS Transport message 1825. AMF 212 sends a Nudm_SDM_Info message 1826 with the SoR-MAC-IUE to UDM 218. If UDM 218 indicated that UE 106 is to acknowledge the successful security check of the received SoR Data, then data management controller 504 compares the received SoR-MAC-IUE with the expected SoR-XMAC-IUE that UDM 218 stored temporarily.
After the present iteration of the SoR procedure is successful, data management controller 504 triggers primary re-authentication of UE 106 (step 802), such as according to Variant 1 or Variant 2. For example, after the SoR procedure, data management controller 504 checks whether a maximum counter value indicator 1840 is stored for UE 106. If the maximum counter value indicator 1840 is stored, UDM 218 initiates primary re-authentication of UE 106 after the present iteration of the SoR procedure. Thus, data management controller 504 triggers primary re-authentication (step 802) based on the maximum counter value indicator 1840 previously received from AUSF 210. After the re-authentication is successful, data management controller 504 resets the maximum counter value indicator 1840 stored in UDM 218 (step 2110).
One technical benefit is UDM 218 is able to initiate primary re-authentication of UE 106 before the CounterSoR1830 wraps-around. AUSF 210 alerts UDM 218 that the CounterSoR1830 will reach a maximum value in the next (or a future) iteration. Thus, the present iteration of the SoR procedure is okay to continue, but UDM 218 knows that the next (or a future) SoR procedure will result in a wrap-around error. UDM 218 therefore initiates primary re-authentication of UE 106 after the present SoR procedure.
In one embodiment, a trigger condition for primary re-authentication may be a request from another network element/function.
One technical benefit is UDM 218 is able to initiate primary re-authentication of UE 106 when requested by another NF. An NF may request re-authentication of a UE 106 to UDM 218, such as in an error case. UDM 218 may decide based on error reasoning and whether its configuration supports such a re-authentication for those kinds of errors.
A network element/function may invoke re-authentication at UDM 218 as described above, or directly at AMF 212.
Any of the various elements or modules shown in the figures or described herein may be implemented as hardware, software, firmware, or some combination of these. For example, an element may be implemented as dedicated hardware. Dedicated hardware elements may be referred to as “processors”, “controllers”, or some similar terminology. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term “processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, a network processor, application specific integrated circuit (ASIC) or other circuitry, field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), non-volatile storage, logic, or some other physical hardware component or module.
Also, an element may be implemented as instructions executable by a processor or a computer to perform the functions of the element. Some examples of instructions are software, program code, and firmware. The instructions are operational when executed by the processor to direct the processor to perform the functions of the element. The instructions may be stored on storage devices that are readable by the processor. Some examples of the storage devices are digital or solid-state memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
As used in this application, the term “circuitry” may refer to one or more or all of the following:
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
Although specific embodiments were described herein, the scope of the disclosure is not limited to those specific embodiments. The scope of the disclosure is defined by the following claims and any equivalents thereof.
Number | Date | Country | Kind |
---|---|---|---|
202241026481 | May 2022 | IN | national |