Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for enhancing security of authentication process between network elements of core network based on 5G AKA

A core network and security technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as information theft, achieve the effects of preventing leakage, low cost, and avoiding failure of security measures

Active Publication Date: 2018-12-18
XINGTANG TELECOMM TECH CO LTD +1
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the present invention aims to provide a 5G AKA-based method for enhancing the security of the authentication process between network elements of the core network to solve the problem of information theft caused by the existing plaintext transmission method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for enhancing security of authentication process between network elements of core network based on 5G AKA
  • A method for enhancing security of authentication process between network elements of core network based on 5G AKA
  • A method for enhancing security of authentication process between network elements of core network based on 5G AKA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0095] Embodiment 2 of the present invention discloses a 5G AKA-based authentication process security enhancement method between network elements of the core network, which is applied to the home network side, such as figure 2 As shown, the steps are as follows:

[0096] Receive the authentication request sent by the visited network side;

[0097] Generate an authentication vector according to the received authentication request;

[0098] Encrypt the key information in the authentication vector by using the push protection key, update the authentication vector, and generate an authentication response message;

[0099] Sending the authentication response message to the visited network side, so that the visited network side calculates feedback information and generates a terminal authentication request;

[0100] According to the terminal authentication request sent by the visited network side, it is judged whether the home network side has passed the authentication.

[0101] C...

Embodiment 3

[0102] Embodiment 3 of the present invention discloses that when the authentication method is 5G AKA, the following operations are performed inside the home network side, wherein the network elements on the home network side include AUSF and UDM:

[0103] The AUSF receives the authentication request sent by the visited network side, and sends the authentication request to the UDM;

[0104] UDM generates a 5G home authentication vector, and the 5G home authentication vector is RAND||XRES*||K AUSF ||AUTN, where, RAND (random number), XRES (Expected Response, expected response), K AUSF (AUSF security key), AUTN (Authentication Token, authentication token), AUTN contains serial number, AMF and MAC fields;

[0105] Protect key K with push T1 (Push protection key between AUSF and UDM) to AUSF security key K AUSF Encrypt to get the encrypted AUSF security key K AUSF ';

[0106] UDM assigns the K in the 5G home authentication vector AUSF Replaced with the encrypted AUSF security...

Embodiment 8

[0157] Embodiment 8 of the present invention discloses the encrypted transmission process of key information between network elements of the core network when the authentication method is 5G AKA, as shown in image 3 As shown, the steps are as follows:

[0158] Step S1: According to the 3GPP standard process, SEAF receives the registration of the terminal user UE, sends an authentication request to the network element AUSF on the home network side of the terminal user, and sends SUPI (Subscription Permanent Identifier, registered user permanent identification code) and service network name ( SN name) and other information are sent to AUSF;

[0159] Step S2: According to the 3GPP standard procedure, the AUSF sends the authentication request information to the UDM;

[0160] Step S3: UDM generates an authentication vector and encrypts the key information in it:

[0161] Step S3-1: According to the 3GPP standard process, the 5G home authentication vector generated by UDM include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for enhancing the security of authentication process between core network elements based on 5G AKA, belonging to the technical field of mobile communication, which solves the problem that key information such as key, user identity and the like caused by the prior plaintext transmission mode are stolen. The invention relates to a security enhancement method for enhancing security of authentication process between network elements of core network based on 5G AKA, which is applied to a home network side. The method comprises the following steps: receiving authentication request sent by a visiting network side; generating an authentication vector according to the received authentication request; encrypting the key information in the authentication vector by using the push protection key, updating the authentication vector, and generating an authentication response message; sending the authentication response message to the visiting network side so that thevisiting network side calculates feedback information and generates a terminal authentication request; according to the terminal authentication request sent by the visiting network side, judging whether or not the home network side has passed the authentication. By encrypting the key information transmitted between the network elements of the core network, the security of the authentication process between the network elements of the core network is effectively enhanced.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, in particular to a 5G AKA-based method for enhancing the security of an authentication process between network elements of a core network. Background technique [0002] In the 4G / 5G mobile communication system, the information transmitted between the terminal UE and the access network is protected by the air interface protection mechanism, and the information transmitted between the access network and the core network is generally protected by an IP transmission tunnel, but the core network is different. The information transmitted between network elements is transmitted in plain text, and no corresponding protection measures are provided. [0003] For application scenarios with high security requirements, the security of information transmitted between core network elements must be guaranteed, especially sensitive information or security-related information (such as derived ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/03H04W12/041
CPCH04W12/04H04W12/06
Inventor 刘畅叶琅贾云鹤徐彦吏
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products