This disclosure relates to securely pushing messages from an Application Function entity to a User Equipment (UE) in communication networks.
In a communication network, the mutual authentication of a User Equipment (UE) and the communication network may be performed to allow only authenticated UE and the authenticated communication network to communicate with each other. Application Function entities may provide various application services to the UE once authenticated. Efficient and robust authentication mechanism involving various network elements is critical to provide secure communication between Application Function entity and the UE, and to protect the credentials of the UE and the Application Function entity.
This disclosure relates to securely pushing messages from an Application Function entity to a User Equipment (UE) in communication networks, and in particular, to establishing a security mechanism between the UE and the Application Function entity for perform such message push securely.
In one embodiment, the present disclosure describes a method for wireless communication. Performed by a wireless device in a wireless network, the method includes receiving, from a first network element hosting an Application Function (AF), a message comprising one of: an AKMA (Authentication and Key Management for Applications) key identifier (ID) identifying an AKMA anchor key of the wireless device; or a set of parameters indicative of the AKMA key ID; and storing the AKMA key ID and an AF key associated with the first network element in a security context, wherein the first network element outside of a core network of the wireless network.
In another embodiment, the present disclosure describes a method for wireless communication. Performed by a first network element in a wireless network in a wireless network, the first network element hosting an application function, the method includes receiving a first message from a second network element in the wireless network, the first message comprising configuration information for securely pushing a message from the first network element to a wireless device under an AKMA framework, and the second network element hosting an AKMA Anchor Function (AAnF); and generating a security context for pushing the message from the first network element to the wireless device based on the first message, wherein the first network element is outside a core network of the wireless network.
In another embodiment, the present disclosure describes a method for wireless communication. Performed by a first network element in a wireless network, the first network element hosting an AKMA anchor function, the method includes determining configuration information for securely pushing a message from a second network element hosting an application function to a wireless device under an AKMA framework, wherein the second network element is outside of a core network of the wireless network.
In another embodiment, the present disclosure describes a method for wireless communication. Performed by a first network element in a wireless network, the first network element hosting an authentication function, the method includes receiving, from a second network element hosting an AKMA anchor function, a first message requesting an AKMA context for a wireless device in the wireless network, the first message comprising a SUPI of the wireless device; transmitting, to a third network element, a second message comprising the SUPI of the wireless device to request the AKMA context; and receiving, from the third network element, a third message comprising: an Authentication Vector (AV) corresponding to an authentication method; and an authentication method indicator indicting the authentication method, wherein the authentication method comprises one of a 5G-AKA method or an EAP-AKA′ method.
In another embodiment, a network element or wireless device comprising a processor and a memory is disclosed. The processor may be configured to read computer code from the memory to implement any of the methods above.
In yet another embodiment, a computer program product comprising a non-transitory computer-readable program medium with computer code stored thereupon is disclosed. The computer code, when executed by a processor, may cause the processor to implement any one of the methods above.
The above embodiments and other aspects and alternatives of their implementations are explained in greater detail in the drawings, the descriptions, and the claims below.
An exemplary communication network, shown as 100 in
The core network 130 of
The implementations described above in
In
Continuing with
The AMF/SEAF 330 may communicate with the RAN 320, the SMF 340, the AUSF 360, the UDM/ARPF 370, and the PCF 322 via communication interfaces indicated by the various solid lines connecting these network nodes or functions. The AMF/SEAF 330 may be responsible for UE to non-access stratum (NAS) signaling management, and for provisioning registration and access of the UE 310 to the core network 130 as well as allocation of SMF 340 to support communication need of a particular UE. The AMF/SEAF 330 may be further responsible for UE mobility management. The AMF may also include a security anchor function (SEAF, as indicated in 330 of
The SMF 340 may be allocated by the AMF/SEAF 330 for a particular communication session instantiated in the wireless communication network 300. The SMF 340 may be responsible for allocating UPF 350 to support the communication session and data flows therein in a user data plane and for provisioning/regulating the allocated UPF 350 (e.g., for formulating packet detection and forwarding rules for the allocated UPF 350). Alternative to being allocated by the SMF 340, the UPF 350 may be allocated by the AMF/SEAF 330 for the particular communication session and data flows. The UPF 350 allocated and provisioned by the SMF 340 and AMF/SEAF 330 may be responsible for data routing and forwarding and for reporting network usage by the particular communication session. For example, the UPF 350 may be responsible for routing end-end data flows between UE 310 and the DN 150, between UE 310 and the service applications 140. The DN 150 and the service applications 140 may include but are not limited to data network and services provided by the operator of the wireless communication network 300 or by third-party data network and service providers.
The PCF 322 may be responsible for managing and providing various levels of policies and rules applicable to a communication session associated with the UE 310 to the AMF/SEAF 330 and SMF 340. As such, the AMF/SEAF 330, for example, may assign SMF 340 for the communication session according to policies and rules associated with the UE 310 and obtained from the PCF 322. Likewise, the SMF 340 may allocate UPF 350 to handle data routing and forwarding of the communication session according to policies and rules obtained from the PCF 322.
While
Network identity and data security in the wireless communication network 300 of
In the wireless communication network, the Application Function (AF) may provide application service to a UE. AF may or may not resides in of the core network. In certain scenarios, the AF may need to push a message on its own initiative to the UE (e.g., the AF may push various notification to the UE according to the service subscribed to the AF by the UE). In further disclosure below, various embodiments are disclosed to facilitate the AF to securely push the message to the UE under an Authentication and Key Management for Applications (AKMA) framework. The AKMA framework may be based on various authentication procedures such as the 5G Authentication and Key Agreement (5G-AKA) method, the Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′) method, the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) method, or the like.
The AKMA Anchor Function (AAnF) 412 provides a security anchor function in the Home Public Land Mobile Network (HPLMN). The AAnF stores the AKMA Anchor Key (KAKMA) for AKMA service, which is received from the Authentication Server Function (AUSF) 416 after the UE 424 completes a successful primary authentication. The AAnF may also generate the key material to be used between the UE and the Application Function (AF) 420 and maintains UE AKMA contexts.
The AF 420 may provide application service to the UE. Under the AKMA framework, the AF may request for its AKMA Application Key, denoted as KAF, from the AAnF using an identifier for the KAKMA. The identifier may include an AKMA Key Identifier (A-KID). The AAnF may only provide the KAF to the AF after the AF is authenticated and authorized by the operator network. The AF may be located inside or outside the operator's network. In this disclosure, for simplicity, the AKMA Application Key (KAF) may also be referred to as the AF key.
The Network Exposure Function (NEF) 410 may be configured to enable and authorize external AFs to access the AKMA service and forward the AKMA service request towards the AAnF. The NEF may also perform the AAnF selection in case there are multiple AAnFs.
The AUSF 416 may provide the Subscription Permanent Identifier (SUPI) and AKMA key material (e.g., A-KID, KAKMA) of the UE to the AAnF. The AUSF may also perform the AAnF selection.
The UDM may store AKMA subscription data of the subscriber (or the UE subscribed to the wireless communication network).
Referring to
Under the AKMA framework, there may be various keys involved, and these keys may be organized in a hierarchical structure as shown in
After a successful primary authentication between the UE and the wireless communication network (e.g., UE authenticated by the operator), the AUSF and/or the UE may derive the KAUSF based on an Integrity Key (IK) of the UE, and a Cipher Key (CK) of the UE. AUSF may alternatively derive the KAUSF based on a transformation of the Integrity Key (denoted as IK′) of the UE, and a transformation of the Cipher Key (denoted as CK′) of the UE.
Based on the KAUSF, the ME and the AUSF may each derive the KAKMA based on the KAUSF, and the SUPI of the UE, by using a Key Derivation Function (KDF).
Then based on the KAKMA, the ME and the AAnF may each derive the KAF based on the KAKMA, and an identifier of the AF, also similarly by using a KDF. It is to be noted that a UE may store multiple KAF, each corresponding to an AF.
The various keys described herein may each have a lifetime. For example, the KAKMA may be refreshed until the next successful primary authentication. For another example, the KAF may be provisioned with a lifetime, for example, by the AAnF.
In this disclosure, various embodiments are disclosed aiming to establish secure communication between the AF and the UE utilizing security context based on the AKMA framework. The security context may be stored in the AF and the UE, therefore secure communication may be achieved based on the security context. Details including interactions between various network elements are described below.
With reference to
In order to push messages securely to the UE, a security context (may also be referred to as a security configuration, an AKMA security context) may be set up on both the Application Function (AF) side and the UE side. For example, the security context may be based on the AKMA framework and may include an AKMA anchor key (or an ID of the AKMA anchor key (A-KID)) of the UE, and an AF key of the UE. Alternatively, the security context may include a binding of the AKMA anchor key (or A-KID) of the UE and the AF key of the UE. This binding may be referred to as a Security Association (SA). As described earlier, in this disclosure, the AKMA anchor key of the UE and the AF key of the UE may be denoted as KAKMA and KAF, respectively.
To obtain the security context, the AF may send a request to the AAnF, to request security context related configuration information. The request may include the AF ID (i.e., the identifier of the AF), and/or identity of the UE, e.g., Generic Public Subscription Identifier (GPSI), 5G-GUTI, or SUPI of the UE. In one implementation, the GPSI may be used when the AF is located outside the operator's network. Otherwise the SUPI may be used.
In one implementation, the AF may be allocated outside of the core network.
In one implementation, the AF may not have a direct access to the core network. For example, the AF may not have a direct access to the AAnF. In this case, the AF may send the request message to the core network via a relay network element such as an NEF.
In one implementation, the AF may already have an A-KID of the UE and a valid AF key (KAF) of the UE available. In this case, the AF may directly jump to step 12 below, and send the A-KID directly to the UE, so the UE may establish the security association (SA) and/or store the security context.
Upon receiving the request message from the AF in step 1, if the identity of the UE in the request message is in the form of GPSI or another format other than SUPI, the AAnF may retrieve the SUPI of the UE from the UDM. In particular, the AAnF may send to the UDM in step 2a a UE ID request which may include the GPSI and an ID type indicator. The ID type indicator may indicate the ID type for the ID requested. For example, the ID type indicator may indicate the ID in the form of SUPI is requested. The UDM may reply with the SUPI of the UE in a UE ID response message in step 2b.
If the identity of the UE in the request message is already in the form of SUPI, then steps 2a & 2b may be skipped.
Based on the SUPI of the UE, the AAnF may check if a corresponding AKMA security context of the UE (SUPI, KAKMA and/or A-KID) exists locally in the AAnF. In case that the AAnF already has the AKMA context, steps 4-8 below may be skipped.
In step 3 above, the AAnF may determine that the AKMA security context for the UE is not available. The AAnF may then select an AUSF based on its local policy and forward an AKMA Security Context Request to the selected AUSF. The AKMA Security Context Request may include the SUPI of the UE.
In one implementation, the AAnF may be provisioned with AUSF function, or the AAnF and the AUSF may be co-located. In this case, the AAnF may directly interact with the UDM to request the AKMA Security Context Request from the UDM and jump to step 9 below.
Upon receiving the AKMA Security Context Request from the AAnF, the AUSF may send an Authentication Request to the UDM. The Authentication Request may be used to request the AKMA security context and may include the SUPI of the UE.
The UDM may determine the authentication method according to the UE subscription data of the UE. In one implementation, the UDM may retrieve the UE subscription data based on the SUPI of the UE.
If the authentication method is EAP-AKA′, the UDM may reply to the AUSF with an EAP-AKA′ Authentication Vector (AV). The EAP-AKA′ AV may include at least one of:
The transformation of the cipher key and the integrity key may be based on a predetermined algorithm, such as a KDF.
If the authentication method is 5G AKA, the UDM may reply to the AUSF with a 5G Home Environment Authentication Vector (5G HE AV). The 5G HE AV may include at least one of:
The reply message to the AUSF may further include an authentication method indicator, which indicates what authentication method is chosen (e.g., 5G AKA, EAP-AKA′, or EAP-TLS).
In one implementation, the reply message to the AUSF may further include a Routing Indicator (RID) of the UE.
Upon receiving the response from the UDM, depending on the authentication method, the AUSF may retrieve the AUSF key (KAUSF) from the response message directly, or may need to derive or generate KAUSF.
If the authentication method indicator indicates that EAP-AKA′ is used as the authentication method, the AUSF may derive KAUSF based on CK′ and IK′.
If the authentication method indicator indicates that 5G AKA is used as the authentication method, the AUSF may retrieve KAUSF from the response message directly.
Next, the AUSF may generate the AKMA Anchor Key (KAKMA) and the A-KID based on KAUSF.
In one implementation, KAKMA may be derived by: KAKMA=KDF (SUPI, KAUSF). KDF refers to Key Derivation Function. For example, the KDF may include HMAC-SHA-256 (256-bit Hash-based Message Authentication Code for Secure Hash Algorithm). When using HMAC-SHA-256, the output of the KDF may be a 256-bits key. In one implementation, the output key may further be truncated, for example, to 128 bits. When deriving KAKMA using KDF as described above, SUPI of the UE may be used as a key, and KAUSF may be used as an input.
As described above, A-KID may be used to identify KAKMA of the UE. In one implementation, A-KID may be represented in a Network Access Identifier (NAI) format, i.e. username@realm. The username part may include the RID of the UE and an AKMA Temporary UE Identifier (A-TID) of the UE, and the realm part may include Home Network Identifier of the UE. In one implementation, A-TID may be derived based on KAUSF using a KDF. For example, A-TID=KDF (KAUSF, “AKMA”), i.e., the KDF uses string “AKMA” as the input, and KAUSF as the key. The RID may be received from the UDM as part of the response message in step 6.
In one implementation, KAKMA or A-KID derived in this step may be served as part of the AKMA context of the UE, which is describe in detail in steps below.
As a response to the AKMA Security Context Request received from the AAnF in step 4, the AUSF may send a reply message to the AAnF. The reply message may include at least one of:
The AKMA context of the UE may include KAKMA of the UE and A-KID identifying KAKMA.
In one implementation, the reply message may further include the SUPI of the UE.
Upon receiving the AKMA context response message from the AUSF, the AAnF may derive the Application Key (KAF) of the UE from KAKMA of the UE. For example, the application key may be determined by KAF=KDF (AF-ID, KAKMA), where AF-ID is the identifier of the AF.
Based on the response from the AUSF, the AAnF may be able to derive the AKMA security context related configuration information for the UE and the AF.
In one implementation, the AAnF may not have the AKMA context of the UE in step 3. In this case, the AAnF may generate or derive the AKMA security context related configuration information which may include:
In one implementation, in step 3, the AAnF may already have the AKMA context of the UE. In this case, step 4 to step 8 may be skipped. The AAnF may generate the AKMA security context related configuration information which may include:
Once the AKMA security context related configuration information is generated or derived, the AAnF may send the AKMA security context related configuration information to the AF.
Based on the response message received in step 10, the AF may store A-KID and KAF of the UE in an AKMA security context (or AKMA security association, i.e., the association of the A-KID and the KAF).
The AF may forward the AKMA security context related configuration information to the UE.
In one implementation, the AAnF does not have the AKMA context of the UE in step 3. In this case, the AKMA security context related configuration information may include at least one of:
In one implementation, in step 3, the AAnF may already have the AKMA context of the UE. In this case, the AKMA security context related configuration information may include A-KID identifying the KAKMA of the UE.
Once receives the AKMA security context related configuration information from the AF, the UE may store A-KID and KAF in an AKMA security context (or AKMA security association, i.e., the association of the A-KID and the KAF).
In one implementation, the AAnF does not have the AKMA context of the UE in step 3 (this condition may be implied by the received AKMA security context related configuration information, e.g., by determining that A-KID does not present). In this case, the UE may first verify the freshness and integrity of the received AKMA security context related configuration information, for example, by checking the received AUTN. If the verification passes, the UE may derive KAUSF based on the authentication method indicated by the authentication method indicator. Specifically, in a case that 5G AKA authentication method is used, the UE may calculate KAUSF based on CK and IK of the UE (with CK and IK retrieved from USIM of the UE). In a case that EAP-AKA′ authentication method is used, the UE may derive CK′ and IK′ from CK and IK, respectively, and then calculate KAUSF based on CK′ and IK′. The UE may then derive KAKMA, and A-KID in a similar way as in step 7. The UE may further derive KAF in a similar way as in step 9. The UE may store A-KID and KAF of the UE in an AKMA security context (or AKMA security association, i.e., the association of the A-KID and the KAF).
In one implementation, in step 3, the AAnF may already have the AKMA context of the UE (this condition may similarly be implied by the received AKMA security context related configuration information, e.g., by determining that A-KID does present). In this case, the UE may compare the received A-KID with an A-KID locally stored by the UE. If there is a match, the UE may look up the KAF corresponding to the AF which may be stored locally in the UE, and proceed to storing A-KID and KAF of the UE in an AKMA security context (or AKMA security association, i.e., the association of the A-KID and the KAF).
Once the UE stores the AKMA security context or establishes the AKMA security association, the UE may acknowledge to the AF.
Till this step, the UE and the AF may have each established the AKMA security association or have stored the AKMA security context. The AF may push message securely to the UE based on the AKMA security context.
In the embodiments above, to establish a secure link between the AF and the UE such that the AF may push messages to the UE securely, the AF may request for AKMA related configuration from the core network. In one implementation, the core network may send AKMA context (e.g., A-KID and KAF) of the UE to the AF and the AF may forward the AKMA context to the UE. The AF and the UE may each be provisioned with the AKMA security context, which associates the A-KID and KAF. The AF may then proceed to pushing messages to the UE securely.
The accompanying drawings and description above provide specific example embodiments and implementations. The described subject matter may, however, be embodied in a variety of different forms and, therefore, covered or claimed subject matter is intended to be construed as not being limited to any example embodiments set forth herein. A reasonably broad scope for claimed or covered subject matter is intended. Among other things, for example, subject matter may be embodied as methods, devices, components, systems, or non-transitory computer-readable media for storing computer codes. Accordingly, embodiments may, for example, take the form of hardware, software, firmware, storage media or any combination thereof. For example, the method embodiments described above may be implemented by components, devices, or systems including memory and processors by executing computer codes stored in the memory.
Throughout the specification and claims, terms may have nuanced meanings suggested or implied in context beyond an explicitly stated meaning. Likewise, the phrase “in one embodiment/implementation” as used herein does not necessarily refer to the same embodiment and the phrase “in another embodiment/implementation” as used herein does not necessarily refer to a different embodiment. It is intended, for example, that claimed subject matter includes combinations of example embodiments in whole or in part.
In general, terminology may be understood at least in part from usage in context. For example, terms, such as “and”, “or”, or “and/or,” as used herein may include a variety of meanings that may depend at least in part on the context in which such terms are used. Typically, “or” if used to associate a list, such as A, B or C, is intended to mean A, B, and C, here used in the inclusive sense, as well as A, B or C, here used in the exclusive sense. In addition, the term “one or more” as used herein, depending at least in part upon context, may be used to describe any feature, structure, or characteristic in a singular sense or may be used to describe combinations of features, structures or characteristics in a plural sense. Similarly, terms, such as “a,” “an,” or “the,” may be understood to convey a singular usage or to convey a plural usage, depending at least in part upon context. In addition, the term “based on” may be understood as not necessarily intended to convey an exclusive set of factors and may, instead, allow for existence of additional factors not necessarily expressly described, again, depending at least in part on context.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present solution should be or are included in any single implementation thereof. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present solution. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the present solution may be combined in any suitable manner in one or more embodiments. One of ordinary skill in the relevant art will recognize, in light of the description herein, that the present solution can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present solution.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2021/130191 | Nov 2021 | WO |
Child | 18599982 | US |