This disclosure is related to the security procedures for UE's in 5GLAN Group Communication.
5G expands the scope and reach of 3GPP-defined technologies. There are multiple market segments in the realm of residential, office, enterprise and factory, where 5G will need to provide services with similar functionalities to Local Area Networks (LANs) and VPN's but improved with 5G capabilities (e.g., high performance, long distance access, mobility and security). The 5G system shall support 5G LAN-type services in a shared RAN configuration over a wide area mobile network.
The 5G System shall support on-demand establishment of a point to point UE to UE private communication connections between UEs using the same 5G LAN-VN with multiple types of data communication. At least IP and Ethernet should be supported. The 5G network shall support service continuity for 5G LAN-type service, i.e., the private communication between UEs shall not be interrupted when one or more UEs of the private communication move within the same network that provides the 5G LAN-type service.
The 5G network shall enable the UEs using a 5G LAN-VN to use the multicast/broadcast addresses to communicate with required latency (e.g. 180 ms). The 5G system shall support use of unlicensed as well as licensed spectrum for 5G LAN-type services. The 5G system shall enable the network operator to provide the same 5G LAN-type service to any 5G UE, regardless of whether it is connected via public base stations, indoor small base stations connected via fixed access, or via relay UEs connected to either of these two types of base stations.
A Private DNN uniquely identifies a 5GLAN group and all the member UEs of the same group need to establish a PDU Session towards the same Private DNN for 5GLAN group communication. TR 23.734 (NPL 3) defines how UE's are added to the 5GLAN group or deleted from the group, but the security procedure necessary for authenticating/authorizing UE's to the 5GLAN Group, handling of 5GLAN UE security context and 5GLAN UE access restrictions has not been addressed based on the new network function, GMF introduced in the 5G system architecture for 5GLAN Group Communication.
UE's message transmission and accessing of 5GLAN type services are prone to attacks due to the nature of 5GLAN Group communication in 5G system. Attacks like impersonate attack, unauthorized access by the attackers, DDoS attacks, eavesdropping, etc. may considered as major threat to 5GLAN group. The 5GLAN group communication requires high levels of security mechanism in order to secure the message transmission and access permission in vertical domains. And also, the security procedures of UE's in 5GLAN group were not addressed in 5GLAN Group Communication. We have proposed the security procedures for GMF that involves problem related to authentication/authorization of 5GLAN UE's in 5GLAN Group. The following are the sub problems related to security procedure for UE's in 5GLAN Group communication:
Sub-Problem Statement 1: Authentication/authorization of UE's by GMF in a 5GLAN Group
Sub-Problem Statement 2: Handling of 5GLAN UE Related Security Context During State Transitions
Sub-Problem Statement 3: Handling of Access Restrictions by GMF for Provisioning 5GLAN Service to the UEs Based on its Transition States (Such as Idle/Inactive) is Missing
1. Mitigation of eavesdropping attacks by adversary's in the 5GLAN group communication.
2. Restriction of 5GLAN UEs from unauthorized access in 5GLAN Group Communication.
1. Mitigation of DDoS attacks and impersonate attacks in the 5GLAN group communication.
1. Mitigation of data theft, impersonation attacks and privacy of other 5GLAN UE's who were provisioned in 5GLAN Group.
We have proposed a new security context in GMF of 5GLAN group communication i.e. KGMF. The main objective of introducing KGMF is to secure (authenticity/integrity/confidentiality) the message transmission among the 5GLAN type services and UE's. By using KGMF, we shall introduce the anonymity for 5GLAN UE's and privacy for 5GLAN services that are provisioned in 5GLAN Group communication.
In view of the problems described above, the present disclosure aims to provide a solution to solve at least one of the various problems.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), a Registration Request along with a 5GLAN member id and a MAC address to an Access and Mobility Management Function (AMF), sending, by the AMF, a Nausf_Authentication request to an Authentication Server Function (AUSF), sending, by the AUSF, a Nudm_Authentication request to a Unified Data Management (UDM) after receiving the Nausf_Authentication request, sending, by the UDM, a Nudm_Authentication response to the AUSF, sending, by the AUSF, a Nausf_Authentication response to the AMF on receiving the Nudm_Authentication response from the UDM, and an authentication procedure takes place between the UE and the 5G Core Network (5GC), sending, by the AMF, a Get UE subscription data request to the UDM, sending, by the UDM, a UE related subscription data to the AMF as a response to the Get UE subscription data request, checking, by the AMF, the UE related subscription data and determining an allowed 5GLAN-type services to the particular UE, sending, by the AMF, a UE Group Authentication request to a Group Management Function (GMF) after determining the allowed 5GLAN services, deriving, by the GMF, a Key for Group Management Function (KGMF) used to derive a KGMFint and a KGMFenc, these keys are used for integrity and confidentiality protection of the sensitive information sent by the UE to the GMF via the AMF, sending, by the GMF, a UE Group Authentication response including the 5GLAN member id, the MAC address and a UE Group Configuration to the AMF, sending, by the AMF, a Registration Accept with the 5GLAN member id, the MAC address and the UE Group Configuration on receiving the UE Group Authentication response and the UE Group Configuration, and deriving, by the UE, the KGMF used for deriving the KGMFint and the KGMFenc, and a connection is established between the UE and a 5GLAN group after successful key derivation.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an Authorization Permission Request along with a 5GLAN member id and a MAC address to an Access and Mobility Management Function (AMF), sending, by the AMF, a Nausf_Authentication request to an Authentication Server Function (AUSF), sending, by the AUSF, a Nudm_Authentication request to a Unified Data Management (UDM) after receiving the Nausf_Authentication request, sending, by the UDM, a Nudm_Authentication response to the AUSF, sending, by the AUSF, a Nausf_Authentication response to the AMF on receiving the Nudm_Authentication response from the UDM, and an authentication procedure takes place between the UE and the 5G Core Network (5GC), sending, by the AMF, a Get UE subscription data request to the UDM, sending, by the UDM, a UE related subscription data to the AMF as a response to the Get UE subscription data request, checking, by the AMF, the UE related subscription data and determining an allowed 5GLAN-type services to the particular UE, sending, by the AMF, a UE Group Authorization request to a Group Management Function (GMF) after determining the allowed 5GLAN services, verifying, by the GMF, a Key for Group Management Function (KGMF) and provisioning the access permissions for the UE in a 5GLAN group for the 5GLAN-type services, sending, by the GMF, a UE Group Authorization Response along with a UE Group Configuration to the AMF, sending, by the AMF, an Authorization Permission Response with the list of allowed 5GLAN-type services to the UE, and updating, by the UE, the authorization permission with the allowed 5GLAN-type services.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC connection re-establishment request to a gNB on state transition from Idle state to connected state after the 5GLAN Group is created and members are added to the 5GLAN group, responding, by the gNB, with an RRC setup to the UE on receiving the RRC connection re-establishment request, sending, by the UE, an RRC setup complete to the gNB on reception of the RRC setup from the gNB, sending, by the UE, a PDU session re-establishment request to an Access and Mobility Management Function (AMF), forwarding, by the AMF, the PDU session re-establishment request to a Unified Data Management (UDM), sending, by the UDM, a PDU session re-establishment response to the AMF on receiving the PDU session re-establishment request, sending, by the gNB, a UE state notification to the AMF in order to notify the state of the UE, requesting, by the AMF, to retrieve a UE security context based on the UE's state to a Group Management Function (GMF) on reception of the UE state notification, and sending, by the GMF, the UE security context in a response to the AMF and a connection is established.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC connection re-establishment request to a gNB, on state transition from Inactive state to connected state after the 5GLAN Group is created and members are added to the 5GLAN group, responding, by the gNB, with an RRC setup to the UE on receiving the RRC connection re-establishment request, sending, by the UE, an RRC setup complete to the gNB on reception of the RRC setup from the gNB, sending, by the UE, a PDU session re-establishment request to an Access and Mobility Management Function (AMF), forwarding, by the AMF, the PDU session re-establishment request to a Unified Data Management (UDM), sending, by the UDM, a PDU session re-establishment response to the AMF on receiving the PDU session re-establishment request, sending, by the gNB, a UE state notification to the AMF in order to notify the state of the UE, requesting, by the AMF, to retrieve a UE security context based on the UE's state to a Group Management Function (GMF) on reception of the UE state notification, and sending, by the GMF, the UE security context in a response to the AMF and a connection is established.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), a Registration Request to an Access and Mobility Management Function (AMF) after the 5GLAN Group is created and members are added to the 5GLAN group, authenticating, by the AMF, the UE to the network, getting, by the AMF, UE a UE subscription data from a Unified Data Management (UDM) after a UE Authentication takes place between the UE and the 5G Core Network (5GC), determining, by the AMF, the 5GLAN-type services which are allowed for the authenticated UE, sending, by the AMF, a UE Group Authentication request for authenticating the UE for group communication to a Group Management Function (GMF), taking place, between the UE and the GMF in the 5GLAN Group, a UE group authentication procedure, sending, by the GM, a UE Group Authentication Failure response with a cause value to the AMF during Group authentication failure, and sending, by the AMF, a Registration denied to the UE via the gNB as a response for the UE Group Authentication failure.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC release request to a gNB on state transition from connected state to idle state after the 5GLAN Group is created and members are added to the 5GLAN group, sending, by the gNB, an RRC release as a response to the RRC release request sent by the UE, sending, by the UE, a PDU session release request to an Access and Mobility Management Function (AMF) on reception of the RRC release response, forwarding, by the AMF, the PDU session release request to a Unified Data Management (UDM) via a Session Management Function (SMF), sending, by the UDM, a PDU session release response to the AMF as response to the PDU session release request, requesting, by the AMF, to remove a UE related security context to a Group Management Function (GMF) on reception of the PDU session release response, sending, by the GMF, a response to a request for removing the UE related security context to the AMF on receiving the request for removing the UE related security context, and sending, by the AMF, an acknowledgement to removal of the UE security context to the UE via the gNB.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC release request to a gNB on state transition from connected state to inactive state after the 5GLAN Group is created and members are added to the 5GLAN group, sending, by the gNB, an RRC release as a response to the RRC release request sent by the UE, sending, by the UE, a PDU session release request to an Access and Mobility Management Function (AMF) on reception of the RRC release response, forwarding, by the AMF, the PDU session release request to a Unified Data Management (UDM) via a Session Management Function (SMF), sending, by the UDM, a PDU session release response to the AMF as response to the PDU session release request, requesting, by the AMF, to remove a UE related security context to a Group Management Function (GMF) on reception of the PDU session release response, sending, by the GMF, a response to a request for removing the UE related security context to the AMF on receiving the request for removing the UE related security context, and sending, by the AMF, an acknowledgement to removal of the UE security context to the UE via the gNB.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC release request to a gNB on state transition after the 5GLAN Group is created and members are added to the 5GLAN group, sending, by the gNB, an RRC release as a response to the RRC release request sent by the UE, sending, by the UE, a PDU session release request to an Access and Mobility Management Function (AMF) on reception of the RRC release response, forwarding, by the AMF, the PDU session release request to a Unified Data Management (UDM) via a Session Management Function (SMF), sending, by the UDM, a PDU session release response to the AMF as response to the PDU session release request, requesting, by the AMF, to remove a UE related security context to a Group Management Function (GMF) on reception of the PDU session release response, waiting, by the AMF, for a response of the GMF for a particular instance of time, and sending, by the AMF, a Request failure response with the cause value to the UE when the AMF does not receives any response.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a User Equipment (UE), an RRC release request to a gNB on subscription expiry after the 5GLAN Group is created and members are added to the 5GLAN group, sending, by the gNB, an RRC release as a response to the RRC release request sent by the UE, sending, by the UE, a PDU session release request to an Access and Mobility Management Function (AMF) on reception of the RRC release response, forwarding, by the AMF, the PDU session release request to a Unified Data Management (UDM) via a Session Management Function (SMF), sending, by the UDM, a PDU session release response to the AMF as response to the PDU session release request, requesting, by the AMF, to remove a stored UE subscription profile to a Group Management Function (GMF) on reception of the PDU session release response, removing, by the GMF, the UE from a 5GLAN group member list on reception of the request for removing the UE subscription profile, sending, by the GMF, a UE subscription removal profile response to the AMF, and sending, by the AMF, an acknowledgement to removal of the UE subscription profile as well as the UE from the 5GLAN group member list to the UE via the gNB.
A method for a 5GLAN Group Communication according to the present disclosure includes sending, by a gNB, a UE state notification to an Access and Mobility Management Function (AMF) to report a current RRC state for a User Equipment (UE) when the UE is not in connected state after the 5GLAN Group is created and members are added to the 5GLAN group, forwarding, by the AMF, the UE state notification to a Group Management Function (GMF), checking, by the GMF, a local policy based on the UE state notification according to a pre-provisioned access restrictions, restricting, by the GMF, an access to 5GLAN-type services to the UE based on the UE's state, sending, by the GMF, an acknowledgement of the forwarded UE state notification in order to notify the AMF about the restricted 5GLAN-type services for the particular UE, and forwarding, by the AMF, the acknowledgement to the gNB to notify the UE about the restricted 5GLAN-type services.
1. Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 (NPL 1) and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 (NPL 1).
5GC 5G Core Network
5GS 5G System
5G-AN 5G Access Network
5G-GUTI 5G Globally Unique Temporary Identifier
5G S-TMSI 5G S-Temporary Mobile Subscription Identifier
AMF Access and Mobility Management Function
AN Access Node
AS Access Stratum
AUSF Authentication Server Function
CP Control Plane
CM Connection Management
DL Downlink
DN Data Network
DNAI DN Access Identifier
DNN Data Network Name
ECIES Elliptic Curve Integrated Encryption Scheme (ECIES)
EPC Evolved Packet Core
FQDN Fully Qualified Domain Name
GMF Group Management Function
GPSI Generic Public Subscription Identifier
GUAMI Globally Unique AMF Identifier
HR Home Routed (roaming)
KDF Key Derivation Function
KGMF Key for Group Management Function
MAC Medium Access Control
MME Mobility Management Entity
N3IWF Non-3GPP Inter Working Function
NAI Network Access Identifier
NAS Non-Access Stratum
NEF Network Exposure Function
NF Network Function
NG-RAN Next Generation Radio Access Network
NR New Radio
NRF Network Repository Function
PLMN Public land mobile network
PPD Paging Policy Differentiation
PMF Path Management Function
(R)AN (Radio) Access Network
RLC Radio Link Control
RRC Radio Resource Control
SBA Service Based Architecture
SEAF Security Anchor Functionality
SMF Session Management Function
S-NSSAI Single Network Slice Selection Assistance Information
SUCI Subscription Concealed Identifier
SUPI Subscription Permanent Identifier
UPF User Plane Function
UDR Unified Data Repository
2. Definitions
For the purposes of the present document, the terms and definitions given in TR 21.905 (NPL 1) and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 (NPL 1).
3. Information on the Related Art
3.1 5G LAN-Type Service and 5GLAN Communications
1. The UE initiates Registration and include its 5GLAN capability in the Registration Request message. The UE may indicate its 5GLAN capability and optionally include a list of its pre-configured P-DNNs if available.
2. The UE is authenticated.
3. The serving AMF retrieves the UE subscription/context data from the UDM.
4. The AMF recognizes that the UE belongs to one or more 5GLAN groups based on subscription data or pre-configured P-DNNs. It further determines which 5GLAN service/groups are allowed based on local configurations.
5. The AMF may initiate the group authentication/authorization towards the 5GLAN-GMF. It is also possible that group authentication/authorization may be conducted at a later time after Registration completes.
6-7. The 5GLAN-GMF authenticates/authorizes the UE for the group communication.
8. The AMF also receives the corresponding group configuration parameters.
9. The AMF returns the list of allowed 5GLAN service/groups (e.g. P-DNNs) and corresponding configurations to the UE. The UE stores the information for future 5GLAN group communication.
3.2 Basic Architecture for Supporting Dynamic 5G LAN-Type Service and 5GLAN Communication
To enable 5G LAN-type service, the 5GC is enhanced with the following functions/functionalities in the control plane:
3.3 System Architecture for Supporting Service Exposure for Creation and Management of a 5GLAN Group
3.4 Creation/Deletion of a Group by Admin User
1. The AF (i.e. the admin subscriber) requests the NEF to add (or delete) a group. It includes the Group External Identity, list of the GPSI(s), Requestor Identity, and Authorization Information.
2. The NEF may record its request so that the operator allow or authorize the request.
3. When the operator authorize the request, the NEF proceeds to use the UDM's service operations to request the UDM to create (or delete) a group with list of UE identities.
4. UDM uses the UDR service operations to create (or delete) a group from the Group Records
5. For each UEs in the group, UDM uses the UDR service operations to add (or delete) a Group identified by Internal/External Identifier.
4. Proposed Aspects
4.1 First Aspect (Solution 1 Solves Problem Statement 1):
The proposed solution discussed in 4.1 aspect shall ensure authenticity and access permissions for 5GLAN services for the genuine UE's provisioned in 5GLAN Group Communication.
The solution also addresses the gaps of security procedures for GMF, which was not discussed in TR 23.734 (NPL 3).
The proposed solution derives the KGMF for GMF in 5GLAN group communication, the keys which shall provide confidentiality, authenticity and integrity protection for 5GLAN UE's message transmission.
The proposed KGMF shall be used to introduce anonymity and privacy for 5GLAN UE's and 5GLAN services respectively.
The derivation of KGMF in GMF and UE's for 5GLAN communication shall be considered as novelty.
The security procedure which uses KGMF for protecting the message communication and access permission for UE's in 5GLAN group shall also be considered as novelty of the first aspect.
The KGMF shall be used for integrity and confidentiality protection of the sensitive information sent by the 5GLAN UE to the 5GLAN GMF via AMF. This solution shall be considered as one of the novelty point.
This section provides solutions for security gaps addressed and discussed in sub problem statement 1.
A. Security Procedures
A.1 Authentication Procedure of UE's in 5GLAN
0. The 5GLAN UE sends a registration request along with the 5GLAN member id(s), the MAC address.
1. The AMF sends a Nausf_Authentication request to the AUSF.
2. After receiving the Nausf_Authentication request the AUSF sends the Nudm_Authentication request to the UDM (Unified Data Management).
3. The UDM sends a Nudm_Authentication response to the AUSF.
4. On receiving the Nudm_Authentication response to authentication the AUSF sends the Nausf_authentication response to the AMF, and the authentication procedure takes place between UE and 5GC based on the procedure given in TS 33.501 (NPL 2) clause 6.1.2 and clause 6.1.3.
5. The AMF will then send a Get subscription data request to the UDM.
6. The UDM responds to the Get subscription data request and sends the 5GLAN UE related subscription data to the AMF in a Get subscription data response.
7. The AMF then checks the 5GLAN UE related subscription data and determines the allowed 5GLAN-type services to that particular 5GLAN UE.
8. After determining the allowed 5GLAN services AMF sends the UE group authentication request to the GMF.
9. At the GMF a key for Group Management Function KGMF is derived which shall be used to derive the KGMFint and KGMFenc. These keys shall be used for integrity and confidentiality protection of the sensitive information sent by the 5GLAN UE to the 5GLAN GMF via the AMF.
10. The GMF sends a UE group authentication response to AMF.
11. In this response the GMF includes the 5GLAN member id(s), the MAC address and the UE group configuration. In example of
12. On receiving the UE group authentication response and UE group configuration the AMF sends a registration accept with the 5GLAN member id(s), the MAC address and the UE group configuration.
13. At the UE side the KGMF is derived which shall be used for deriving the KGMFint and the KGMFenc.
14. After successful key derivation a connection is established between the UE and the 5GLAN group.
A.2 Authorization Procedure of UE's in 5GLAN
0. The 5GLAN UE sends an authorization permission request along with the 5GLAN member id(s), the MAC address.
1. The AMF sends a Nausf_Authentication request to the AUSF.
2. After receiving the Nausf_Authentication request the AUSF sends the Nudm_Authentication request to the UDM.
3. The UDM sends a Nudm_Authentication response to the AUSF.
4. On receiving the Nudm_Authentication response to authentication the AUSF sends the Nausf_authentication response to the AMF, and the authentication procedure takes place between UE and 5GC based on the procedure given in TS 33.501 (NPL 2) clause 6.1.2 and clause 6.1.3.
5. The AMF will then send a Get subscription data request to the UDM.
6. The UDM responds to the Get subscription data request and sends the 5GLAN UE related subscription data to the AMF in a Get subscription data response.
7. The AMF then checks the 5GLAN UE related subscription data and determines the allowed 5GLAN-type services to that particular 5GLAN UE.
8. After determining the allowed 5GLAN services AMF sends a UE group authorization request to the GMF.
9. The GMF verifies the KGMF.
10. The GMF provisions the access permissions for the UE in 5GLAN group for 5GLAN-type services.
11-12. The GMF sends a UE group authorization response to the AMF along with a UE group configuration.
13. The AMF sends an authorization permission response to the UE with the list of allowed 5GLAN-type services.
14. The UE then gets updated the authorization permission with the allowed 5GLAN-type services.
A.2.1 Proposed Key Derivation:
4.2 Second Aspect (Solution 2 Solves Problem Statement 2):
The proposed solution discussed in 4.2 aspect may mitigate the impersonation attacks/DDoS attacks in 5GLAN Group by 5GLAN UE's due to the handling of 5GLAN UE's related security context by GMF during Idle/Inactive/Failure/Subscription expiry.
The proposed solution discuss about the security procedures by GMF for 5GLAN UE's during different transition states in 5GLAN group communication which was not discussed in TR 23.734 (NPL 3).
The proposed solution discuss the security procedure of detachment of UE's state in 5GLAN group communication by GMF was also not discussed in TR 23.734 (NPL 3).
The proposed solution provides the status of 5GLAN UE's during different transition state to GMF, based on the transition state of 5GLAN UE's GMF shall protect the security context of each 5GLAN UE in 5GLAN group.
The proposed solution shall notify the transition state of 5GLAN UE's to GMF and notification shall be authenticity/integrity protected.
The proposed solution shall provide status of UE's Subscription expiry to GMF, and that shall protect the 5GLAN services from unauthorised access of expired UE's in 5GLAN group network. This was discussed in TR 23.734 (NPL 3).
The above solution description that discuss about status of transition state of each UE's in 5GLAN group to GMF, based on status GMF provide access permission and protecting the security context of 5GLAN UE's shall be considered to be novelty of the second aspect.
Handling of 5GLAN UE security context during state transition
A. Attachment Scenario
A.1. Transition from Idle to Connected State
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. The AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On state transition from RRC Idle to RRC connected state the UE sends an RRC connection re-establishment request to the gNB (NR NodeB, NR base station).
2. The gNB responds to the UE with an RRC setup on receiving the RRC connection re-establishment request.
3. The 5GLAN UE sends an RRC setup complete to the gNB on reception of the RRC setup from the gNB.
4-5. The 5GLAN UE sends a PDU session re-establishment request to the AMF. The AMF then forwards the PDU session re-establishment request to the UDM.
6. On receiving the PDU session re-establishment request, the UDM sends a PDU session re-establishment response to the AMF.
7. The gNB sends a UE state notification (Idle) to the AMF in order to notify the state of the 5GLAN UE.
8. On reception of UE state notification the AMF requests the GMF to retrieve the 5GLAN UE security context based on UE's state.
9-10. The GMF sends the 5GLAN UE security context to the AMF in the response and connection is established.
A.2. Transition from Inactive to Connected State
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. The AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On state transition from RRC inactive to RRC connected state UE sends an RRC connection re-establishment request to the gNB.
2. The gNB responds to the UE with an RRC setup on receiving the RRC connection re-establishment request.
3. The 5GLAN UE sends an RRC setup complete to the gNB on reception of the RRC setup from the gNB.
4-5. The 5GLAN UE sends a PDU session re-establishment request to the AMF. The AMF then forwards the PDU session re-establishment request to the UDM.
6. On receiving the PDU session re-establishment request, UDM sends a PDU session re-establishment response to the AMF.
7. The gNB sends a UE state notification (Inactive) to the AMF in order to notify the state of the 5GLAN UE.
8. On reception of UE state notification the AMF requests the GMF to retrieve the 5GLAN UE security context based on UE's state.
9-10. The GMF sends the 5GLAN UE security context to the AMF in the response and the connection is established.
A.3. Authentication Failure Scenario
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
1. The 5GLAN UE initiates a registration request to the AMF and then the AMF authenticates the 5GLAN UE to the network.
2-3. The UE Authentication takes place between the UE and the 5GC. The AMF gets the UE subscription data from the UDM.
4. The AMF determines the 5GLAN-type services which are allowed for the authenticated 5GLAN UE.
5. The AMF then sends a UE group authentication request to the GMF for authenticating the 5GLAN UE for group communication.
6-7. The UE group authentication procedure takes place between the 5GLAN UE and the GMF in the 5GLAN Group. On Group authentication failure a UE group authentication failure response is sent by the GMF to the AMF with the cause value.
8. The AMF sends a registration denied to the UE via gNB as a response for the group authentication failure.
B. Detachment Scenario:
B.1 Transition from Connected to Idle State
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. The AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On state transition from connected to idle state an RRC release request is initiated by the 5GLAN UE and the UE sends the request to the gNB.
2. The gNB sends an RRC release as a response to the RRC release request sent by the 5GLAN UE.
3. On reception of the RRC release response the UE initiates a PDU session release request and sends the request to the AMF.
4. The AMF then forwards the PDU session release request to the UDM via the SMF.
5. The UDM sends a PDU session release response as response to the PDU session release request to the AMF.
6. On reception of the PDU session release response the AMF requests the GMF to remove the 5GLAN UE related security context (the 5GLAN UE related credentials).
7-8. On receiving the request for removing the 5GLAN UE related security context, the GMF removes the 5GLAN UE related security context and sends a response to the request for removing the 5GLAN UE related security context to the AMF.
9-10. The AMF sends the acknowledgement to removal of the 5GLAN UE security context to the UE via the gNB.
B.2. Transition from Connected to Inactive State
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. the AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On state transition from connected to inactive state an RRC release request is initiated by the 5GLAN UE and the UE sends the request to the gNB.
2. The gNB sends an RRC release as a response to the RRC release request sent by the 5GLAN UE.
3. On reception of the RRC release response the UE initiates a PDU session release request and sends the request to the AMF.
4. The AMF then forwards the PDU session release request to the UDM via the SMF.
5. The UDM sends a PDU session release response as response to the PDU session release request to the AMF.
6. On reception of the PDU session release response the AMF requests the GMF to remove the 5GLAN UE related security context (the 5GLAN UE related credentials).
7-8. On receiving the request for removing the 5GLAN UE related security context, the GMF removes the 5GLAN UE related security context and sends a response to the request for removing the 5GLAN UE related security context to the AMF.
9-10. The AMF sends the acknowledgement to removal of the 5GLAN UE security context to the UE via the gNB.
B.3. Failure Scenario
0. The 5GLAN Group was created and members were added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. The AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On state transition an RRC release request is initiated by the 5GLAN UE and the UE sends the request to the gNB.
2. The gNB sends an RRC release as a response to the RRC release request sent by the 5GLAN UE.
3. On reception of the RRC release response the UE initiates a PDU session release request and sends the request to the AMF.
4. The AMF then forwards the PDU session release request to the UDM via the SMF.
5. The UDM sends a PDU session release response as response to the PDU session release request to the AMF.
6. On reception of the PDU session release response the AMF requests the GMF to remove the 5GLAN UE related security context.
7. The AMF waits for a response of the GMF for a particular instance of time.
8-9. When the AMF does not receives any response it sends back a request failure response to the UE with the cause value.
B.4. Subscription Expiry (Only During Detachment Scenario)
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
0 a. The AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. On subscription expiry an RRC release request is initiated by the 5GLAN UE and the UE sends the request to the gNB.
2. The gNB sends an RRC release as a response to the RRC release request sent by the 5GLAN UE.
3. On reception of the RRC release response the UE initiates a PDU session release request and sends the request to the AMF.
4. The AMF then forwards the PDU session release request to the UDM via the SMF.
5. The UDM sends a PDU session release response as response to the PDU session release request to the AMF.
6. On reception of the PDU session release response the AMF requests the GMF to remove the stored UE subscription profile.
7. On reception of the request for removing the UE subscription profile, the GMF removes the UE from the 5GLAN group member list.
8. The GMF then sends the UE subscription profile removal response to the AMF.
9. Acknowledgement to removal of the UE subscription profile as well as the UE from the 5GLAN group member list is sent back to the UE by the AMF via the gNB.
4.3 Third Aspect (Solution 3 Solves Problem Statement 3):
The proposed solution discussed in 4.3 aspect may mitigate the data theft attacks/privacy attacks in 5GLAN Group by 5GLAN UE's due to the handling of access permission by GMF, since GMF provision's 5GLAN service to the UE based on its transition states (such as Idle/Inactive).
The proposed solution discuss about the access restrictions by GMF for 5GLAN UE's during different transition states in 5GLAN group communication which was not discussed in TR 23.734 (NPL 3).
The proposed solution shall restricts the 5GLAN UE's to access different 5GLAN services in 5GLAN group communication based on their different transition states which was not discussed in TR 23.734 (NPL 3).
The above solution description in context of 5GLAN UE's and 5GLAN service type in 5GLAN group communication shall be considered to be novelty of the third aspect.
Handling of Access Restrictions by GMF
Considering the scenario when 5GLAN UE is not in connected state (i.e., Idle/Inactive state), steps are as follows:
0. The 5GLAN Group is created and members are added to the 5GLAN group according to the procedure defined in TR 23.734 (NPL 3), clause 6.14.2.1.
The 5GLAN UE initiates the registration request to the AMF and then the AMF authenticates the 5GLAN UE to the network.
0 a. the AMF sends the group authentication request to the GMF.
0 b. After successful Group Authentication the 5GLAN UE registers itself to the 5GLAN group.
1. The gNB sends a UE state Notification message to the AMF to report the current RRC state for the UE (i.e. RRC Inactive state or RRC Idle state, RRC Connected state).
2. The AMF forwards this UE state notification to the GMF.
3. According to the pre-provisioned access restrictions, the GMF checks the local policy (and configurations regarding UE) based on the UE state notification.
4. Based on the UE's state, the GMF restricts the access to 5GLAN-type services to the 5GLAN UE.
5. The GMF sends the acknowledgement of the forwarded UE state notification in order to notify the AMF about the restricted 5GLAN-type services for that particular UE.
6. The AMF then forwards this acknowledgement to the gNB to notify the 5GLAN UE about the restricted 5GLAN-type services.
4.4 Another Aspect:
User Equipment (UE)
A controller 301 controls the operation of the UE 300 in accordance with software stored in a memory 302. For example, the controller 301 may be realized by Central Processing Unit (CPU). The software includes, among other things, an operating system 308 and a communications control module 306 having at least a transceiver control module 307. The communications control module 306 (using its transceiver control sub-module) is responsible for handling (generating/sending/receiving) signalling and uplink/downlink data packets between the UE 300 and other nodes, such as the base station/(R)AN node, a MME, the AMF (and other core network nodes). Such signalling may include, for example, appropriately formatted signalling messages relating to connection establishment and maintenance (e.g. RRC messages), NAS messages such as periodic location update related messages (e.g. tracking area update, paging area updates, location area update) etc.
(R)AN Node
The communications control module 406 (using its transceiver control sub-module) is responsible for handling (generating/sending/receiving) signalling between the (R)AN node 400 and other nodes, such as the UE, the MME, the AMF (e.g. directly or indirectly). The signalling may include, for example, appropriately formatted signalling messages relating to a radio connection and location procedures (for a particular UE), and in particular, relating to connection establishment and maintenance (e.g. RRC connection establishment and other RRC messages), periodic location update related messages (e.g. tracking area update, paging area updates, location area update), S1 AP messages and NG AP messages (i.e. messages by N2 reference point), etc. Such signalling may also include, for example, broadcast information (e.g. Master Information and System information) in a sending case.
The controller 401 is also configured (by software or hardware) to handle related tasks such as, when implemented, UE mobility estimate and/or moving trajectory estimation.
Core Network Node
The communications control module 505 (using its transceiver control sub-module) is responsible for handling (generating/sending/receiving) signalling between the core network node 500 and other nodes, such as the UE, base station/(R)AN node (e.g. “gNB” or “eNB”) (directly or indirectly). Such signalling may include, for example, appropriately formatted signalling messages relating to the procedures described herein, for example, NG AP message (i.e. a message by N2 reference point) to convey an NAS message from and to the UE, etc.
The User Equipment (or “UE”, “mobile station”, “mobile device” or “wireless device”) in the present disclosure is an entity connected to a network via a wireless interface.
It should be noted that the UE in this specification is not limited to a dedicated communication device, and can be applied to any device, having a communication function as a UE described in this specification, as explained in the following paragraphs.
The terms “User Equipment” or “UE” (as the term is used by 3GPP), “mobile station”, “mobile device”, and “wireless device” are generally intended to be synonymous with one another, and include standalone mobile stations, such as terminals, cell phones, smart phones, tablets, cellular IoT devices, IoT devices, and machinery.
It will be appreciated that the terms “UE” and “wireless device” also encompass devices that remain stationary for a long period of time.
A UE may, for example, be an item of equipment for production or manufacture and/or an item of energy related machinery (for example equipment or machinery such as: boilers; engines; turbines; solar panels; wind turbines; hydroelectric generators; thermal power generators; nuclear electricity generators; batteries; nuclear systems and/or associated equipment; heavy electrical machinery; pumps including vacuum pumps; compressors; fans; blowers; oil hydraulic equipment; pneumatic equipment; metal working machinery; manipulators; robots and/or their application systems; tools; molds or dies; rolls; conveying equipment; elevating equipment; materials handling equipment; textile machinery; sewing machines; printing and/or related machinery; paper converting machinery; chemical machinery; mining and/or construction machinery and/or related equipment; machinery and/or implements for agriculture, forestry and/or fisheries; safety and/or environment preservation equipment; tractors; precision bearings; chains; gears; power transmission equipment; lubricating equipment; valves; pipe fittings; and/or application systems for any of the previously mentioned equipment or machinery etc.).
A UE may, for example, be an item of transport equipment (for example transport equipment such as: rolling stocks; motor vehicles; motor cycles; bicycles; trains; buses; carts; rickshaws; ships and other watercraft; aircraft; rockets; satellites; drones; balloons etc.).
A UE may, for example, be an item of information and communication equipment (for example information and communication equipment such as: electronic computer and related equipment; communication and related equipment; electronic components etc.).
A UE may, for example, be a refrigerating machine, a refrigerating machine applied product, an item of trade and/or service industry equipment, a vending machine, an automatic service machine, an office machine or equipment, a consumer electronic and electronic appliance (for example a consumer electronic appliance such as: audio equipment; video equipment; a loud speaker; a radio; a television; a microwave oven; a rice cooker; a coffee machine; a dishwasher; a washing machine; a dryer; an electronic fan or related appliance; a cleaner etc.).
A UE may, for example, be an electrical application system or equipment (for example an electrical application system or equipment such as: an x-ray system; a particle accelerator; radio isotope equipment; sonic equipment; electromagnetic application equipment; electronic power application equipment etc.).
A UE may, for example, be an electronic lamp, a luminaire, a measuring instrument, an analyzer, a tester, or a surveying or sensing instrument (for example a surveying or sensing instrument such as: a smoke alarm; a human alarm sensor; a motion sensor; a wireless tag etc.), a watch or clock, a laboratory instrument, optical apparatus, medical equipment and/or system, a weapon, an item of cutlery, a hand tool, or the like.
A UE may, for example, be a wireless-equipped personal digital assistant or related equipment (such as a wireless card or module designed for attachment to or for insertion into another electronic device (for example a personal computer, electrical measuring machine)).
A UE may be a device or a part of a system that provides applications, services, and solutions described below, as to “internet of things (IoT)”, using a variety of wired and/or wireless communication technologies.
Internet of Things devices (or “things”) may be equipped with appropriate electronics, software, sensors, network connectivity, and/or the like, which enable these devices to collect and exchange data with each other and with other communication devices. IoT devices may comprise automated equipment that follow software instructions stored in an internal memory. IoT devices may operate without requiring human supervision or interaction. IoT devices might also remain stationary and/or inactive for a long period of time. IoT devices may be implemented as a part of a (generally) stationary apparatus. IoT devices may also be embedded in non-stationary apparatus (e.g. vehicles) or attached to animals or persons to be monitored/tracked.
It will be appreciated that IoT technology can be implemented on any communication devices that can connect to a communications network for sending/receiving data, regardless of whether such communication devices are controlled by human input or software instructions stored in memory.
It will be appreciated that IoT devices are sometimes also referred to as Machine-Type Communication (MTC) devices or Machine-to-Machine (M2M) communication devices or Narrow Band-IoT UE (NB-IoT UE). It will be appreciated that a UE may support one or more IoT or MTC applications. Some examples of MTC applications are listed in the following table (source: 3GPP TS 22.368 V13.1.0 (2016-03), Annex B, the contents of which are incorporated herein by reference). This list is not exhaustive and is intended to be indicative of some examples of machine type communication applications.
Applications, services, and solutions may be an MVNO (Mobile Virtual Network Operator) service, an emergency radio communication system, a PBX (Private Branch eXchange) system, a PHS/Digital Cordless Telecommunications system, a POS (Point of sale) system, an advertise calling system, an MBMS (Multimedia Broadcast and Multicast Service), a V2X (Vehicle to Everything) system, a train radio system, a location related service, a Disaster/Emergency Wireless Communication Service, a community service, a video streaming service, a femto cell application service, a VoLTE (Voice over LTE) service, a charging service, a radio on demand service, a roaming service, an activity monitoring service, a telecom carrier/communication NW selection service, a functional restriction service, a PoC (Proof of Concept) service, a personal information management service, an ad-hoc network/DTN (Delay Tolerant Networking) service, etc.
Further, the above-described UE categories are merely examples of applications of the technical ideas and exemplary aspects described in the present document. Needless to say, these technical ideas and aspects are not limited to the above-described UE and various modifications can be made thereto.
As will be appreciated by one of skill in the art, the present disclosure may be embodied as a method, and system. Accordingly, the present disclosure may take the form of an entirely hardware aspect, a software aspect or an aspect combining software and hardware aspects.
It will be understood that each block of the block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a plurality of microprocessors, one or more microprocessors, or any other such configuration.
The methods or algorithms described in connection with the examples disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. A storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC.
The previous description of the disclosed examples is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these examples will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other examples without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the examples shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
This application is based upon and claims the benefit of priority from Indian patent applications No. 201841041573, filed on Nov. 2, 2018, the disclosure of which is incorporated herein in its entirety by reference.
Number | Date | Country | Kind |
---|---|---|---|
201841041573 | Nov 2018 | IN | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2019/042241 | 10/29/2019 | WO | 00 |