The present invention relates to the authentication of mobile stations accessing a cellular communication system via an unlicensed radio access network.
In conventional cellular networks, such as GSM, for example, the identity of a mobile station is checked and its operation and right to access the network authenticated using various elements within the core network portion, such as the Home Location Register (HLR), the Equipment Identity Register (EIR) and the authentication centre (AUC).
Conventional cellular networks can be extended by the provision of unlicensed radio access networks, which include an access network controller for interfacing with the core network portion of a conventional cellular system and for controlling a plurality of access points adapted to communicate with mobile stations over an unlicensed radio interface. The unlicensed radio interface may use any radio technology that does not require an operating license from a licensing authority and in particular may use wireless LAN (WLAN), Bluetooth or DECT radio technologies. While a mobile station that uses an unlicensed radio access network to access a cellular system may be authenticated in the same way as for a conventional access network, however, defective mobile stations can put a heavy operational load on both the access network and the core network, for example when they generate Location Updates or other information in a loop. Also, since mobile stations capable of accessing an unlicensed radio access network will require some modification over conventional mobile stations, an additional level of validation becomes necessary, specifically as to whether a mobile station is authorised to use such an access network and whether this mobile station is authorised to access the core network portion via this unlicensed radio access network.
It is thus an object of the present invention to enable the authentication and validation of mobile stations using an unlicensed radio access network that minimizes the load on both the access network and the core network it connects to.
It is a further object of the present invention to enable the authentication and validation of mobile stations for use with an unlicensed access network.
These and further objects are achieved in an unlicensed radio access network and a method of validation of a mobile station in an unlicensed radio access network in accordance with the appended claims.
Specifically, the unlicensed radio access network according to the present invention includes an access controller that is adapted to communicate with the core network portion of a public mobile communication network and is connected to a broadband packet-switched network. The access controller is adapted to receive messages from mobile stations communicating via an unlicensed radio interface with access points connected to the broadband packet-switched network. The access controller comprises a screening module for monitoring information received from a mobile station and a connection controller coupled to the screening module for controlling the connection between the mobile station and the access controller. In particular, the screening module is adapted to determine whether a mobile station is permitted to connect to said access controller, and the connection controller is adapted to terminate a connection with the mobile station if the screening module determines that the mobile station is not permitted to connect to the access controller.
The provision of a screening function within the access network ensures that access to mobile core network resources is denied as soon as possible to unauthorised users and equipment.
Preferably, the screening module includes a module for extracting at least part of a subscriber identity from information received from said mobile station to obtain a network operator identity for said mobile station. A table containing permitted and/or barred network operator identities is coupled to the subscriber identity extractor module, and the subscriber identity extractor module is adapted to compare an extracted network operator identity with network operator identities stored in the table to determine whether the extracted network operator identity is valid and consequently whether the mobile station should be permitted to connect to the access controller and through this to the core network portion. In this manner only those mobile stations belonging to a network that is authorised to use the core network will be permitted to register with the access network and subsequently connect to the core network portion.
In accordance with a further embodiment of the invention, the screening module includes a module for extracting at least part of an equipment identity from information received from said mobile station. This module compares the extracted equipment identity with a list of permitted and/or barred equipment identities to determine whether said extracted equipment identity is authorised.
The screening module may additionally, or alternatively include a module for monitoring traffic between the mobile station and the access controller and from the mobile station to the core network portion. This monitoring module is adapted to signal to the connection controller to terminate the connection with the mobile station if it determines that the pattern of transactions initiated in said mobile station is abnormal. Such a module serves as an additional protection to the core network portion and also to the access controller by identifying defective and possibly malicious behavior that threatens to undermine the core network operation, and by terminating the communication rapidly and cleanly.
This traffic or transaction monitoring is performed in a particularly simple manner, when communication between a mobile station and the access controller takes place on an open connection. The monitoring module is then adapted to monitor an open connection between a mobile station and the access controller. This is achieved, for example, when communication over the broadband network uses a protocol that maintains a connection state in the broadband network between the mobile station and the access controller.
In order to avoid having to process repeated attempts to register by a mobile station that has been denied access due to abnormal behavior, a register associated with a mobile station is provided. This register is controlled by the connection controller, and is set by the connection controller when the connection with the mobile station is terminated. The connection controller then denies access to this mobile station while said register is set. Additionally a timer may be provided that is adapted to reset the register after a predetermined time period.
Further objects and advantages of the present invention will become apparent from the following description of the preferred embodiments that are given by way of example with reference to the accompanying drawings. In the figures:
The access portion essentially consists of base station subsystems BSS 10, one of which is illustrated in
In addition to the standard access network portion provided by the BSS's 10 the network depicted in
The components making up this unlicensed-radio access network portion 30 also enable the mobile station 1 to access the GSM core network portion, and through this, other communication networks via an unlicensed-radio interface X, represented in
The Bluetooth standard specifies a two-way digital radio link for short-range connections between different devices. Devices are equipped with a transceiver that transmits and receives in a frequency band around 2.45GHz. This band is available globally with some variation of bandwidth depending on the country. In addition to data, up to three voice channels are available. Each device has a unique 48-bit address from the IEEE 802 standard. Built-in encryption and verification is also available.
The access network portion 30 is accessed via access points AP 301 that are adapted to communicate across the Bluetooth interface. Only one access point AP 301 is illustrated in
The interface between the access point AP 301 and the access controller AC 303 is provided by a packet-switched broadband network, which may be a fixed network. The access point 301 is intended to be a small device that a subscriber can purchase and install in a desired location such as the home or an office environment to obtain a fixed access to the mobile network. However, they could also be installed by operators in traffic hotspots. In order to reduce the installation costs on the part of the operator, the interface between the access point 301 and the access controller 303 preferably exploits a connection provided by an already existing network 302. Suitable networks might include those based on ADSL, Ethernet, LMDS, or the like. Home connections to such networks are increasingly available to subscribers while access points to such networks are becoming widespread in public and commercial buildings. Although not shown in
The access point AP 301 may serve as a dedicated access point to the unlicensed-radio access network. In this case the access point AP 301 is capable of communicating independently with the mobile station 10 over the unlicensed-radio interface X or with the access controller 303 over the broadband network interface 302. The access point AP 301 utilizes the standard protocols and functions to ascertain to which access controller AC 303 it should connect, and also to establish a connection and register with this access controller AC 303.
In an alternative embodiment, the access point 301 serves as an essentially transparent access point when viewed both from the access controller 303 and the mobile station 1. In other words, this access point relays all information at the IP level and above between the mobile station 1 and the access controller 303. It simply effects the conversion between the OSI reference model layer 1 and 2 unlicensed-radio and terrestrial access layer services. Accordingly, the mobile station 1 establishes a connection with the access controller 303 without recognising the access point as a node in the connection. Similarly the access controller 303 could establish a connection with the mobile station 1 directly.
The link between the mobile station MS 1 and the access controller AC 303 over the broadband IP network 302 is always open, so that this connection is always available without the need for reserving a channel. Specifically, a transport protocol is utilised that maintains a connection state between a mobile station MS 1 and the access controller AC 303. One suitable transport protocol is the Transmission Control Protocol (TCP), however, other protocols such as the User Datagram Protocol (UDP) or the Signaling Control Transfer Protocol could also be used. While the network 302 is preferably an IP-based network, ATM-based networks could also be used. In particular when DSL technologies are used in this network, they could be used directly on top of the ATM layer, since they are based on ATM. Naturally, an ATM based network could also be used to transport IP, serving as a base layer.
The applications that run on the mobile station MS 1 on top of the public mobile network radio interfaces also run on top of Bluetooth radio between the mobile station 1 and the access point AP 301.
The access point AP 301 is installed by plugging it in to a port of a suitable modem, such as an ADSL or CATV modem, to access the fixed network 302. Alternatively, the access point AO 301 could be integrated in such a modem. The port is in contact with an intranet that is either bridged or routed on the IP level.
In a conventional GSM network or other public licensed mobile network PLMN, such as CDMA2000 or UTMS, a mobile station is authenticated and validated when it registers with a network. In a GSM system the Equipment Identity Register EIR typically contains three lists of International Mobile Equipment Identities IMEI for mobile stations that are barred, that are to be tracked and that are valid. The mobile services switching center MSC queries the EIR when a mobile station registers with the network to determine whether the mobile can be allowed to use the service. A further level of security is provided by an authentication center AUC. This links the International Mobile Subscriber Identity IMSI to authentication and encryption parameters to verify a users identity and ensure the confidentiality of each call. In both cases, the mobile station is authenticated and verified in the core network portion of the network.
In accordance with the present invention, an additional level of security is provided in the unlicensed access network so that unauthorised mobile stations can be prevented from accessing the core network portion. In addition mobile stations that behave in an unusual manner can be identified and barred from the network. By filtering the mobile stations in the unlicensed radio access network the core network is protected. In addition, this permits the right of access to the unlicensed radio access network itself to be verified.
In accordance with the simplified block structure of the access controller AC 303 as depicted in
A second, optional, block is an International Mobile Equipment Identifier IMEI extractor 3033. If the mobile station includes an IMEI in its registration request or is requested to do so by the access or core networks, this block extracts the IMEI from the registration message. This block then sends a query containing the received IMEI to the Equipment Identity Register EIR 205 via the mobile services switching center MSC 202 in the core network portion. As mentioned above, the Equipment Identity Register EIR 205 lists the International Mobile Equipment Identities IMEI of mobile stations that are barred, that are to be tracked and that are valid. Depending on the response to the query, the IMEI extractor block 3033 signals to the core network interface controller 3035 to either permit or deny registration of the mobile station. In an alternative embodiment, the IMEI extractor 3033 is capable of interfacing with the Equipment Identity Register EIR 205 directly without having to pass the query through the mobile services switching center MSC 202. This is illustrated in the figure by a dot-dashed double-headed arrow between these two elements. In a still farther embodiment, not illustrated in
The third block that intercepts communication between mobile stations MS 1 and the core network portion 20 is a transaction monitor 3034. This block operates only after registration of a mobile station MS 1 with the access and core network and serves to monitor the behavior of a mobile station. As mentioned above, once a mobile station is registered with the access controller AC 303, the connection through the IP network 302 between a mobile station MS 1 and the access controller AC 303 is always open, even when a mobile station is idle. There is no need to reserve channels, nor is it necessary to identify each communication separately, since all traffic on a designated open connection will originate from the same mobile station MS 1. Accordingly, the transaction monitor 3034 is able to monitor all traffic originating in a single mobile station MS 1. If the number of transactions started by the mobile station is too high, indicating defective operation or a malicious intent to destabilize the core network, the transaction monitor 3034 will signal the core network interface controller 3035 to terminate access for this mobile station to the core network. This could be the case, for example, if a mobile station is generating location update messages too often as a result of a loop. Such a transaction could cripple the mobile services switching center 202. At the same time as forcing the mobile station MS 1 out of the system, the core network interface controller 3035 also sets a register indicating that the mobile station should be denied access in the future. This register is preferably linked to a timer, so that after a predetermined time period, such as a number of days, for example, the register is reset and the mobile station MS 1 may reattempt registration to the access controller AC 303.
The separate block structure illustrated in
The function of the access controller 303 is illustrated in flow diagrams in
Turning to
Turning now to
It should be understood that while three functional blocks are shown in the access controller 303 and described with reference to the flow diagrams in
It will be appreciated that the arrangement described above applies also to the use of the access network to provide the General Packet Radio Service GPRS to the mobile station. In such an arrangement, the access controller AC is connected via a Gb interface to a GPRS support node (SGSN) and will extract the subscriber and/or equipment identifiers and/or monitor the packet service traffic to the access controller and to the core network node in the same way as described above.
While the above arrangement and method have been described with specific reference to a GSM system it will be understood that the present invention can equally be applied to other cellular systems, such as UTMS or CDMA2000, for example. In all cases an equivalent subscriber identifier capable of indicating the operator to which the mobile station belongs may be used in place of the IMSI, while an equipment identifier can be used in place of the IMEI.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP04/04396 | 4/26/2004 | WO | 10/24/2006 |