Method and apparatus for supporting security for separation of CU-CP and CU-UP in wireless communication system
A wireless communication system, CU-UP technology, applied in the field of supporting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0110] Embodiment 1 of the present invention proposes an initial procedure of CU-UP to support security of data packets when CU-CP and CU-UP are separated. Hereinafter, a specific example of Embodiment 1 of the present invention will be described.
Embodiment 1-1
[0112] Figure 10 A method for supporting security of CU-UP according to Embodiment 1-1 of the present invention is illustrated. In embodiment 1-1, CU-CP is responsible for generating security keys and selecting encryption algorithms, and CU-UP is responsible for generating K UPenc .
[0113] In step S1000, the CU-CP generates a security key. Security keys may only be used by CU-UP for UP traffic. Alternatively, the security key can be used jointly by CU-CP and CU-UP for CP signaling and UP services. In addition, the CU-CP selects an encryption algorithm for the UE based on the UE's security-related capabilities. The UE's security-related capabilities may indicate all encryption algorithms supported by the UE. Encryption algorithms can be used by CU-UP only for UP traffic. Alternatively, the encryption algorithm can be used jointly by CU-CP and CU-UP for CP signaling and UP services.
[0114] In step S1010, the CU-CP sends the generated security key and the selected enc...
Embodiment 1-2
[0118] Figure 11 A method for supporting security of CU-UP according to Embodiment 1-2 of the present invention is illustrated. In Embodiment 1-2, the CU-CP is fully responsible for generating the security key, selecting the encryption algorithm, and generating the K UPenc .
[0119] In step S1100, the CU-CP generates a security key. Security keys can be used by CU-UP only for UP traffic. Alternatively, the security key can be used jointly by CU-CP and CU-UP for CP signaling and UP services. In addition, the CU-CP selects an encryption algorithm for the UE based on the UE's security-related capabilities. The UE's security-related capabilities may indicate all encryption algorithms supported by the UE. Encryption algorithms can be used by CU-UP only for UP traffic. Alternatively, the encryption algorithm can be used jointly by CU-CP and CU-UP for CP signaling and UP services. Furthermore, the CU-CP generates an encryption key K for the user plane based on the generated ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


