Unlock instant, AI-driven research and patent intelligence for your innovation.

Security procedures for the cellular internet of things

A related and user equipment technology, applied in security devices, network data management, electrical components, etc., can solve problems such as not indicating HLR or HSS, non-existence, etc.

Inactive Publication Date: 2018-04-17
NOKIA NETWORKS OY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, for LTE, this indication may not make sense because of the strong encryption algorithms installed in LTE
[0012] The second issue concerns authentication and key usage policies in the visited network
However, there is no conventional way of communicating such policies to the SGSN or MME
[0013] The third question concerns the use of e2m security
However, there is no conventional way for the AuC to know whether a bit in the AMF related to e2m security for CIoT has to be set
Also, neither 3GPP TR 33.863v0.2.0 nor S3-151367 indicate how the HLR or HSS can know whether a key for establishing e2m security is required for a particular subscription
[0015] The fourth question concerns key derivation for HSE
In general, there is no mechanism to derive multiple keys "E2E CK / IK", one for each such termination point

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security procedures for the cellular internet of things
  • Security procedures for the cellular internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] As mentioned above, battery efficiency safety may involve several issues. Some of these issues may be relevant in that certain embodiments may address them through extensions to subscriber profiles for CIoT purposes. Another issue involves deriving different keys for use with different servers, but this can be addressed in conjunction with or separately from the other issues.

[0036] Certain embodiments may address the issue of encryption policies in GPRS access networks. For example, some embodiments may include fields in a GPRS subscriber profile. This field may determine the minimum strength(s) for the encryption algorithm(s) to be used between the UE with this subscription and the SGSN. For 3G and 4G subscriptions, this field may not be required. This field may determine the total minimum strength for all encryption algorithms or the respective minimum strength for each corresponding encryption algorithm. Other ways of indicating minimum strength are also allow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Various communication systems may benefit from appropriate security measures. For example, the cellular internet of things may benefit from suitable security procedures. A method can include includinga first field in a subscriber profile. The first field can be configured to determine a minimum strength for at least one cryptographic algorithm to be used between a user equipment associated with this subscription and a support node. The method can also include transmitting the subscriber profile between a subscriber database and the support node.

Description

[0001] Cross references to related applications: [0002] This application is related to and claims the benefit of and priority to US Provisional Patent Application No. 62 / 205,774, filed August 17, 2015, which is hereby incorporated herein by reference. technical field [0003] Various communication systems can benefit from appropriate security measures. For example, cellular IoT can benefit from proper security procedures. Background technique [0004] Cellular Internet of Things (CIoT) is the domain of the 3rd Generation Partnership Project (3GPP) and is involved in various 3GPP working groups, notably Global System for Mobile Communications (GSM) Enhanced Data Rates for GSM Evolution (EDGE) radio access Network (GERAN), RAN2, SA2 and SA3, including security. [0005] 3GPP's work on security for CIoT is divided into two streams: one involves making improvements with respect to General Packet Radio Service (GPRS) security, and the other involves providing security for CIo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20H04W12/04H04W12/06H04L29/06
CPCH04L63/102H04L63/105H04L63/20H04L67/306H04W8/20H04W12/06H04W12/041H04W12/043
Inventor G.霍尔恩
Owner NOKIA NETWORKS OY