EP1992185A2 - Fast re-authentication method in umts - Google Patents
Fast re-authentication method in umtsInfo
- Publication number
- EP1992185A2 EP1992185A2 EP07715525A EP07715525A EP1992185A2 EP 1992185 A2 EP1992185 A2 EP 1992185A2 EP 07715525 A EP07715525 A EP 07715525A EP 07715525 A EP07715525 A EP 07715525A EP 1992185 A2 EP1992185 A2 EP 1992185A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- authentication
- message
- mobile terminal
- umts
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 230000008569 process Effects 0.000 claims abstract description 67
- 230000004044 response Effects 0.000 claims description 76
- 238000012545 processing Methods 0.000 claims description 2
- 239000013598 vector Substances 0.000 abstract description 41
- 238000010295 mobile communication Methods 0.000 abstract description 5
- 239000000463 material Substances 0.000 description 14
- 238000010586 diagram Methods 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000004846 x-ray emission Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000002441 reversible effect Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/144—Reselecting a network or an air interface over a different radio air interface technology
- H04W36/1446—Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Definitions
- the present invention relates to a re-authentication method in a mobile communication system during handover between a wireless local area network (WLAN) access system and the mobile communication system, and more particularly, to a fast re-authentication method of more quickly authenticating a subscriber during handover to a UMTS (universal mobile telecommunication system).
- WLAN wireless local area network
- WLAN to the UMTS network occurs, a user should pass through a user authentication process requested by the network to access the network.
- the user authentication process in the network is an important process that is necessarily performed to protect user information and prevent an unauthorized user from accessing the network.
- the user authentication process causes a large amount of handover delay.
- the UMTS uses a UMTS AKA (authentication and key agreement) authentication mechanism.
- a 3GPP (3rd generation partnership project) standard group defining the UMTS standard has defined and used a 3GPP-WLAN in- terworking standard for providing a 3GPP service through the WLAN.
- the standard uses an EAP-AKA (extensible authentication protocol AKA) authentication mechanism in order to access the 3GPP network through the WLAN.
- EAP-AKA includes a full authentication process and a fast re-authentication process.
- the full authentication process an authentication vector related to authentication is newly generated in a network, and the generated authentication vector is transmitted to a mobile terminal such that the mobile terminal checks the authentication vector. It takes a large amount of time to process an authentication algorithm and to generate a ciphering key.
- the fast re-authentication process accepts user authentication that is identified through the previous authentication process, and identifies only the re-authentication identifier that has been previously received, which makes it unnecessary to perform an authentication algorithm and generate a new key. As a result, it is possible to simplify the authentication process and thus reduce the time required to perform authentication.
- the present invention has been made in an effort to provide a method of perform fast re-authentication on a mobile terminal subscriber in a mobile communication system.
- a re-authentication method in a universal mobile telecommunications system includes: transmitting an identity request message for requesting an identifier of a mobile terminal to the mobile terminal according to an attach request message transmitted from the mobile terminal; receiving an identity response message from the mobile terminal in response to the identity request message, the identity response message including a first re-authentication identifier that the mobile terminal is given by a home network through an authentication of the home network; requesting the home network to authenticate the mobile terminal on the basis of the first re- authentication identifier; receiving a response message agreeing on fast re- authentication from the home network identifying the first re-authentication identifier; and, when receiving the response message from the home network in response to the authentication request, transmitting a re-authentication request message to the mobile terminal and transmitting a response message to the attach request message.
- FlG. 1 is a flowchart illustrating an authentication process for an attach request from a subscriber in a mobility management sub-protocol PMM (packet mobility management) which is a general UMTS layer 3 protocol.
- PMM packet mobility management
- FlGs. 2 and 3 are diagrams illustrating the configuration of general PMM authentication and ciphering request/response messages.
- FlG. 4 is a flowchart illustrating a general EAP-AKA full authentication process.
- FlG. 5 is a flowchart illustrating a general EAP-AKA fast re-authentication process.
- FlGs. 6 and 7 are diagrams illustrating the configuration of a PMM re- authentication request message and a response message thereto according to an exemplary embodiment of the present invention.
- FlG. 8 is a diagram illustrating the configuration of a MAP re-authentication data request message and a response message thereto according to an exemplary embodiment of the present invention.
- FlG. 9 is a flowchart illustrating a fast re-authentication process in UMTS AKA according to an exemplary embodiment of the present invention.
- FlG. 10 is a diagram illustrating the configuration of a modified authentication and ciphering request message according to an exemplary embodiment of the present invention. Best Mode for Carrying Out the Invention
- FlG. 1 is a flowchart illustrating an authentication process in response to an attach request from a subscriber in mobility management sub-protocol PMM (packet mobility management), which is a general UMTS layer 3 protocol.
- PMM packet mobility management
- an authentication center (AuC) 40 in a home network and a USIM 10 of a user may share a secret key K (subscriber specific secret key) and an authentication algorithm distributed there between.
- the AuC 40 generates a random number RAND and a sequence number SQN, and the USIM 10 checks that the sequence number having been generated and received from the AuC 40 is the latest sequence number.
- sequence number SQN generated by the AuC 40 is transmitted to a mobile terminal 20
- the sequence number SQN is generated using an algorithm provided in the mobile terminal 20, and the generated sequence number is compared with the sequence number SQN transmitted from the AuC 40.
- the USIM 10 checks that the sequence number SQN is the latest sequence number. Since the method of checking whether the sequence number SQN is the latest is known, a detailed description thereof will be omitted in this exemplary embodiment of the present invention.
- the AuC 40 When an SGSN/VLR (serving general packet radio services service node/visitor location register) 30 in a visited network to which a user is accessing requests transmission of authentication data, the AuC 40 generates a set of authentication vectors and transmits the set of authentication vectors to the SGSN/VLR 30.
- the SGSN/VLR 30 selects one authentication vector from the set of authentication vectors received from the AuC 40 and transmits the selected authentication vector to the USIM 10 of the user.
- the authentication vector transmitted to the USIM 10 of the user is used to perform authentication and key setting between the SGSN/VLR 30 and the USIM 10 at once.
- the authentication vector is composed of a random number RAND, an expected response XRES, a ciphering key CK, an integrity key IK, and an authentication token AUTN.
- the authentication token AUTN is generated by combining the sequence number SQN, an authentication management field AMF, and a message authentication code MAC.
- the transmission of authentication vector parameters between the SGSN/ VLR 30 and the USIM 10 is performed by an authentication signaling process of transmitting/receiving an authentication and ciphering request/response message of PMM.
- the mobile terminal 20 transmits an attach request message to the SGSN/VLR 30 disposed in the visited network to be connected to the visited network (SlO).
- the SGSN/VLR 30 in the visited network having received the attach request message transmits an identity request message for requesting a user identifier to the mobile terminal 20 (Sl 1), and the USIM 10 of the mobile terminal 20 transmits an international mobile subscriber identity IMSI or a temporary mobile subscriber identity TMSI as a response (S 12).
- the SGSN/VLR 30 transmits a MAP (mobile application part) request message to an HLR/AuC 40 in the home network of the user on the basis of the received user identifiers (S 13).
- the HLR/AuC 40 having received the MAP request message generates an authentication vector AV having n arrays on the basis of the random number RAND, the sequence number SQN, and the secret key K previously shared with the mobile terminal 20 (S 14).
- the HLR/AuC 40 After generating the authentication vector AV, the HLR/AuC 40 includes the generated authentication vector AV (1, ..., n) in the MAP response message and transmits the MAP response message to the VLR/SGSN 30 (S15).
- AuC 40 stores the authentication vector AV, and selects one of the authentication vector values 1 to n (S 16). That is, the VLR/SGSN 30 stores n authentication vectors, and selects an i* authentication vector.
- the VLR/SGSN 30 includes the random number RAND and the authentication token AUTN in a PMM authentication/ciphering request message and transmits the PMM authentication/ciphering request message to the USIM 10 of the mobile terminal (S 17).
- the USIM 10 of the mobile terminal 20 determines whether the authentication token AUTN is available on the basis of the authentication vector received from the VLR/SGSN 30, and calculates a user response RES (S 18). After calculating the user response RES, the USIM 10 includes the calculated user response RES to the PMM authentication/ciphering response message and transmits the PMM authentication/ ciphering response message to the VLR/SGSN 30 (S 19).
- the USIM 10 of the mobile terminal 20 calculates the ciphering key CK and the integrity key IK (S20), and compares the user response received from the USIM 10 of the VLR/SGSN 30 with the expected response XRES previously stored to perform the authentication of the mobile terminal 20 and the user. Then, the USIM 10 checks that key setting has been completed and selects the ciphering key CK and the integrity key IK (S21). Thereafter, the VLR/SGSN 30 transmits an attach accept message to the mobile terminal 20 (S22). In this way, the authentication process in PMM is completed.
- FIGs. 2 and 3 are diagrams illustrating the configuration of general PMM authentication and ciphering request/response messages.
- An authentication security method using a UMTS AKA process is set in the current standard (3GPP TSG 33.102) related to a 3G wireless communication system.
- Information required to perform the UMTS AKA process is stored in an information block called an authentication vector.
- the authentication vector is an information block including various parameters, that is, the random number RAND, the expected response XRES, the integrity key IK, the ciphering key CK, and the authentication token AUTN.
- the authentication/ciphering request message includes a protocol identifier field, a skip indicator field, an authentication/ciphering request message identity field, a ciphering algorithm field, an IMEISV (international mobile equipment identity together with the software version number) request field, and an A &C reference number field.
- the authentication/ciphering response message includes an SRES value in addition to the fields included in the request message.
- the protocol identifier is a first field value for designating that message data is a message defined by the protocol.
- the protocol identifiers only when first field values of input data are the same, interfacing is approved and data is processed. If the first field values are not equal to each other, the interfacing is not approved, and data is not processed but is ignored.
- the authentication token AUTN is an information block that is transmitted to VLR by HLR in order to perform the authentication of an SN (serving node) with respect to the mobile terminal 20. That is, the authentication token AUTN includes various parameters, and the USIM 10 of the mobile terminal 20 processes some of the parameters in order to check whether the authentication token AUTN is actually transmitted to a lawful base station at the service node SN.
- the authentication token AUTN includes the subsequent parameters, that is, the sequence number SQN, an anonymity key AK, the authentication management field AMF, and the message authentication code MAC.
- the anonymity key AK is used to hide the value of the sequence number SQN, which is a dedicated sequence vector for identifying an authentication vector.
- the anonymity key AK is calculated by applying an algorithm non-reversible function to the random number RAND and a secret key Ki.
- the secret key Ki is associated with an 1 th subscriber, and "algorithm non-reversible function" means a specific step of mathematically adjusting and processing information such that raw information is not reproduced to final information.
- the sequence number SQN is independently generated by the USIM and the HLR in a synchronous method, and the authentication management filed AMF is for identifying different commands to transmit specific values from the HLR to the USIM.
- the message authentication code MAC indicates the signature of the message transmitted between the network and the mobile terminal, and also indicates that the message includes correct information.
- EAP- SIM is used to be compatible with 2G, a detailed description thereof will be omitted in this exemplary embodiment of the present invention.
- EAP-AKA is an authentication method in a 3G network, such as UMTS or
- EAP-AKA includes a full authentication method that frequently generates authentication vectors and new keys and a fast re-authentication method that reuses keys introduced in the full authentication method.
- FIG. 4 is a flowchart illustrating the full authentication method of EAP-AKA.
- AKA is based on symmetric encryption with respect to an attempt-response mechanism, and is operated in USIM, which is a UMTS subscriber identification module similar to a smart card.
- the mobile terminal 20 and a WLAN AN 50 are connected to each other by using a WLAN-specific technique (S30).
- the WLAN AN 50 connected to the mobile terminal 20 transmits an EAP identity request message to the mobile terminal 20 (S31).
- an EAP packet is encapsulated in a security protocol based on a WLAN technique, and is then transmitted to a WLAN interface.
- the mobile terminal 20 reads the pseudonym allocated in the previous authentication process from USIM or reads IMSI in the case of a first authentication process (S32), and converts it into an NAI (network access identifier) format specified in RFC 2486 (S33).
- the pseudonym is an anonymous identifier corresponding to a telephone number of the mobile terminal 20 that is used while the mobile terminal 20 is connected to a call in order to hide the telephone number of the mobile terminal 20.
- the mobile terminal After the pseudonym or IMSI is converted into the NAI format (S33), the mobile terminal transmits an EAP identity response message including the NAI format to an AAA (authentication, authorization, and accounting) server 70 in the home network.
- AAA authentication, authorization, and accounting
- the AAA server 70 having received the EAP identity response message is a 3GPP AAA server that is appropriately routed on the basis of a "realm" portion of NAI.
- the message may be routed to one AAA proxy server or several AAA proxy servers.
- the AAA server 70 After receiving the EAP identity response message including the identifier of the subscriber, the AAA server 70 identifies the subscriber for EAP-AKA authentication on the basis of the identifier of the subscriber included in the received message (S34). The AAA server 70 checks whether an authentication vector that is usable for the subscriber is present. In this case, "usable authentication vector" means an au- thentication vector that has never been used before.
- the authentication vector when it is determined that the authentication vector that has never been used before exists, the authentication vector is used for the identification of a subscriber for EAP-AKA authentication.
- the AAA server 70 receives new authentication vectors from an HSS 80.
- mapping from a temporary identifier to the IMSI may be requested.
- the HSS 80 manages different networks such that the networks can share mutual information when they are incorporated into one network. Therefore, the mapping from a temporary identifier to the IMSI means mapping from a temporary identifier to information of the mobile terminal 20 stored in the HSS 80 and the above-mentioned pseudonym when the mobile terminal 20 performs authentication over a WLAN.
- the AAA server 70 having checked the authentication vector, checks whether the subscriber has a WLAN access profile (S35). As the check result, when the subscriber does not have the WLAN access profile, the AAA server 70 retrieves the profile from the HSS 80. Further, the AAA server 70 verifies whether the subscriber has authority to use the WLAN service.
- new keying material is introduced from the integrity key IK and the ciphering key CK (S36).
- additional keying materials may be generated.
- the keying material may be protected by a keying material generated by selection of a new pseudonym.
- the keying material is a parameter requested for encryption, and the introduction of the keying material may or may not be performed.
- the AAA server 70 transmits an EAP request/AKA-challenge message to the
- the EAP request/AKA-challenge message includes the random number RAND, the authentication token AUTN, the message authentication code MAC, protected pseudonym, and re-authentication ID information.
- the WLAN AN 50 transmits the EAP request/AKA-challenge message received from the AAA server 70 to the mobile terminal 20 (S37).
- the mobile terminal 20 performs an AKA authentication algorithm in the USIM 10
- the USIM 10 verifies whether the authentication token AUTN included in the message is correct to authenticate a network having the mobile terminal 20 connected thereto. If the authentication token AUTN is incorrect, the mobile terminal 20 rejects the authentication of the network. When the verification of the authentication token AUTN is completed, the USIM 10 checks whether the sequence number SQN is synchronized. When the sequence number SQN is not synchronized, the mobile terminal 20 performs a synchronization process. [53] When it is verified that the authentication token AUTN is correct, the USIM 10 calculates the user response RES, the integrity key IK, and the ciphering key CK.
- the mobile terminal 20 introduces requested additional keying materials from the integrity key IK and the ciphering key CK calculated by the USIM 10.
- the mobile terminal 20 verifies a received message authentication code MAC on the basis of a newly introduced keying material.
- the mobile terminal 20 stores the pseudonym for subsequent authentication. Then, the mobile terminal 20 calculates the value of a new message authentication code MAC for an EAP message on the basis of the new keying material.
- the mobile terminal 20 transmits the EAP response/AKA-challenge message including the calculated user response RES and message authentication code MAC to the WLAN AN 50, and the WLAN AN 50 transmits the EAP response/AKA-challenge message to the AAA server 70 through the AAA proxy 60 (S39).
- the AAA server 70 having received the EAP response/AKA-challenge message checks the received message authentication code MAC and compares the received user response RES with the expected response XRES (S40).
- the AAA server 70 transmits an EAP success message to the WLAN AN 50.
- the AAA server 70 transmits the EAP success message including the generated keying material to the WLAN AN 50 (S41).
- the WLAN AN 50 stores the keying material included in the message in order to allow communication with the authenticated mobile terminal 20.
- the WLAN AN 50 transmits an EAP success message indicating the success of authentication to the mobile terminal 20.
- EAP AKA the exchange of EAP AKA is successfully completed, the mobile terminal 20 and the WLAN-AN 50 share the keying material.
- NAI which is a subscriber identifier of the mobile terminal described in FIG. 4, has, for example, the form of "username® realm.” Meanwhile, when authentication is frequently performed, the larger the number of users connected to the network b ecomes, the larger the load applied to the network becomes. Therefore, rapid re- authentication is effective in reducing the load of the network.
- the fast re-authentication reuses the key introduced in the full authentication process described in FIG. 4, which makes it possible to perform user authentication faster than the structure in which the WLAN AN 50 performs full authentication.
- the use of the fast re-authentication depends on the policy of the service provider, but EAP-AKA should include the fast re-authentication mechanism.
- the use of the fast re-authentication makes it possible to shorten the time required to perform authentication in the mobile terminal 20 and the AAA server 70 and to reduce the power consumption of the mobile terminal 20.
- the fast re-authentication is used when the user accesses the WLAN AN 50 having high reliability.
- FIG. 5 is a flowchart illustrating a fast re-authentication process in a general EAP-
- the AAA server 70 determines the use of the fast re-authentication. In order to perform the fast re-authentication, in the authentication process, the AAA server 70 transmits a re-authentication identifier (re-auth id) to the mobile terminal 20.
- a re-authentication identifier (re-auth id)
- the use of the fast re-authentication depends on the policy of a 3GPP service provider, and the reliability of the WLAN AN 50. If the mobile terminal 20 receives the re- authentication identifier, the AAA server 70 will perform the fast re-authentication in the next authentication process. If the mobile terminal 20 receives only the pseudonym, the AAA server 70 will perform full authentication.
- the WLAN AN 50 transmits an EAP identity request message to the mobile terminal 20, the fast re-authentication process starts (S50).
- the mobile terminal 20 transmits the EAP identity request message including the re- authentication identifier allocated in the full authentication process described in FIG. 4 to the AAA server 70 (S51).
- the AAA server 70 having received the EAP identity request message starts a counter initialized to "1" in the full authentication process, includes the value of the counter together with NONCE, MAC, and a re-authentication identifier to be used in the next stage in the EAP-request/AKA-re-authentication message, and transmits the message to the mobile terminal 20 (S52). If the AAA server 70 cannot transmit the re- authentication identifier to the mobile terminal 20, the mobile terminal 20 should perform full authentication in the next authentication process. In this case, the AAA server 70 may transmit a result indicator to the WLAN AN 50 in order to encrypt a success message.
- the WLAN AN 50 having received the result indicator transmits the EAP- response/AKA-re-authentication message to the mobile terminal 20, and the mobile terminal 20 checks whether the value of the counter included in the message is a new value and whether the message authentication code MAC is correct (S53). As the check result, when the value of the counter is a new value and the message authentication code MAC is correct, the mobile terminal 20 transmits to the WLAN AN 50 the EAP-response/AKA-re-authentication message received from the WLAN AN 50, and the WLAN AN 50 transmits the message to the AAA server 70 (S54). On the other hand, when the value of the counter is not a new value or when the message authentication code MAC is incorrect, re-authentication fails.
- the AAA server 70 transmits the EAP request/AKA-notification message to the mobile terminal 20 before the EAP success message (S56).
- the EAP-request/AKA-Notification message is encoded to the message authentication code MAC, and includes an encrypted copy of the counter that has been used in the previous re-authentication process.
- the mobile terminal 20 transmits the EAP response/AKA-Notification message to the WLAN AN 50, and the WLAN AN 50 transmits the message to the AAA server 70.
- the AAA server 70 transmits the EAP success message to the mobile terminal 20 regardless of the content of the message (S57).
- the UMTS AKA and EAP-AKA have the same structure, except that when a lower level packet transmission protocol for transmitting AKA is the UMTS a PMM protocol is used and when the lower level packet transmission protocol is WLAN an EAP protocol is used, and the UMTS AKA does not have the fast re-authentication function, unlike the EAP-AKA. This means that the two systems can share information on authentication vectors and keys.
- fields included in each AKA message can have a one-to-one correspondence.
- the counter of the EAP-AKA corresponds to the sequence number SQN of the UMTS AKA
- NONCE and MAC of the EAP- request/AKA-re-authentication message correspond to RAND and AUTN of UMTS AKA, respectively.
- the message authentication code MAC of the EAP- response/AKA-re-authentication message corresponds to the user response of UMTS AKA
- the key generation of the fast re-authentication corresponds to a random or fresh material of UMTS AKA.
- UMTS and WLAN can mutually share the authentication vector and state of the mobile terminal.
- EAP-AKA uses the fast re-authentication process when it is unnecessary to perform the algorithm and to generate the new authentication vector.
- the fast re-authentication process does not cause overhead in the USIM 10 and the AAA server 70.
- the fast re-authentication process can be performed more simply than the full authentication process.
- the fast re-authentication process is optional in the EAP-AKA server, and the mobile terminal 20 should necessarily perform the process.
- the transmission of a re-authentication identifier depends on the policy of a 3GPP subscriber for the use of the fast authentication process.
- a new PMM message needs to be defined between the mobile terminal 20 and the SGSN 30. Therefore, in this exemplary embodiment of the present invention, a new re- authentication request/response message is defined to the PMM message of UMTS.
- the newly defined re-authentication request/response message will be described in detail with reference to FIGs. 6 and 7.
- a re-authentication identifier to be used in the next stage should be transmitted in the existing UMTS AKA authentication process, which makes it necessary to add the re-authentication identifier to be used in the next stage to the existing authentication/ciphering request message.
- FIGs. 6 and 7 are diagrams illustrating the configuration of a PMM re- authentication request message and a PMM re-authentication response message according to an exemplary embodiment of the present invention.
- the PMM re-authentication response message each includes a plurality of fields.
- the PMM re-authentication request message includes a COUNTER field, a NONCE field, a MAC field, and a Reauth id field
- the PMM re-authentication response message includes a COUNTER field and a MAC field.
- the COUNTER field indicates the number of times re-authentication succeeds, and the NONCE field indicates a random number.
- the MAC field indicates a message authentication code, and the Reauth id field indicates a re-authentication identifier.
- the PMM message does not have fields for performing re-authentication. Therefore, in order to perform the re-authentication, the PMM message must additionally have the above-mentioned fields.
- FIG. 8 is a diagram illustrating the configuration of a MAP re-authentication data request and a response message thereto according to an exemplary embodiment of the present invention.
- a MAP message transmitted between a VLR/SGSN 200 and an AuC/HSS 300 has a primitive added thereto for the re-authentication data request and response.
- a Reauth-id parameter is added to the MAP message transmitted from the VLR/SGSN 200 to the AuC/HSS 300, and parameters such as Count, NONCE, MAC, and Reauth-id, are added to the MAP message transmitted from the AuC/HSS 300 to the VLR/SGSN 200.
- FIG. 9 is a flowchart illustrating a fast re-authentication process in UMTS AKA according to an exemplary embodiment of the present invention.
- the fast re-authentication process in UMTS AKA starts when a mobile terminal 110 transmits an attach request message to the VLR/SGSN 200 of a visited network (SlOO).
- authentication is also performed when a service request message and a location update message other than the attach request message are transmitted. Therefore, the message for starting the authentication is not limited to the attach request message.
- the VLR/SGSN 200 having received the attach request message transmits an identity request message for identifying a user identifier to the USIM 100 of the mobile terminal 110 (Sl 10).
- the identity request message includes the type of identifier for identifying the identifier of the mobile terminal 110.
- the USIM 100 indicates a smart card.
- the USIM 100 may be inserted into the mobile terminal 110, or it may be independently provided to have the same size as a standard credit card.
- FIG. 9 it is assumed that the USIM 100 is independently provided, but the invention is not limited thereto.
- the USIM 100 includes the re-authentication identifier that has been received and stored in the previous EAP-AKA authentication process in the WLAN, and transmits an identity response message to the SGSN/VLR 200 (S 120).
- the SGSN/VLR 200 having received the message including the re-authentication identifier generates the MAP request message shown in FIG. 8 that includes the received re-authentication identifier, and transmits the generated message to the HSS/AuC 300 in the home network (S 130).
- the HSS/AuC 300 checks the re-authentication identifier included in the received message, and agrees on the re-authentication process to start the counter. Then, the HSS/AuC 300 generates a MAP response message including the value of the counter, the random number NONCE, the message authentication code MAC, and the re- authentication identifier Reauth-id to be used in the next stage (S 140), and transmits the message to the VLR/SGSN 200 in the visited network (S 150).
- the MAP response message includes information on the identification of an identifier and the agreement on fast re-authentication.
- the existing full authentication process is performed.
- the VLR/SGSN 200 having received the MAP response message from the home network transmits a re-authentication request message to the mobile terminal 110 (S 160), and the mobile terminal 110 having received the message checks whether the value of the counter is a new value and the message authentication code MAC is correct (S 170).
- the mobile terminal 110 when the value of the counter is a new value and the message authentication code MAC is correct, the mobile terminal 110 generates a re- authentication response message including the value of the counter and the message authentication code MAC and transmits the message to the VLR/SGSN 200 (S 180).
- the VLR/SGSN 200 having received the re-authentication response message determines whether the value of the counter included in the message is equal to the value of the counter included in the re-authentication request message transmitted to the mobile terminal 110 and whether the message authentication code MAC is correct (S 190).
- the VLR/SGSN 200 transmits an access accept message to the mobile terminal 110 (S200).
- the authentication process fails, which makes it difficult to set up a call.
- the mobile terminal 110 In order for fast re-authentication, the mobile terminal 110 always receives a re- authentication identifier to be used in the next stage from the HSS/AuC 300 and stores the identifier during the previous successful authentication process.
- the re-authentication identifier field that is, the Reauth id field, needs to be added to an authentication and ciphering request message, which is a UMTS PMM authentication message, such that the re-authentication identifier can always be transmitted.
- next pseudonym field which is the pseudonym field
- Next re-auth id field which is the re-authentication identifier field
- FIG. 10 is a diagram illustrating the configuration of a modified authentication and ciphering request message according to an exemplary embodiment of the present invention.
- the authentication and ciphering request message is modified to transmit a re- authentication identifier to be used in the fast re-authentication process that may be performed when full authentication is executed on the mobile terminal.
- a re-authentication identifier to be used in the fast re-authentication process that may be performed when full authentication is executed on the mobile terminal.
- an encrypted next pseudonym field which is the pseudonym identifier field
- an encrypted next re-auth id field which is the re-authentication identifier field
- the identity request and response message includes the type of identifier, which allows fast re-authentication to be performed on the subscriber of the mobile terminal having the corresponding identifier type.
- the re-authentication request message includes counter, NONCE, MAC, and re-auth id, which make it possible to perform fast re-authentication.
- a program for realizing functions corresponding to the structure of the exemplary embodiment of the present invention or a recording medium having the program recorded thereon are also included in the scope of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20060021334 | 2006-03-07 | ||
KR1020060113448A KR100755394B1 (en) | 2006-03-07 | 2006-11-16 | Method for fast re-authentication in umts for umts-wlan handover |
PCT/KR2007/001125 WO2007102702A2 (en) | 2006-03-07 | 2007-03-07 | Fast re-authentication method in umts |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1992185A2 true EP1992185A2 (en) | 2008-11-19 |
EP1992185A4 EP1992185A4 (en) | 2013-01-02 |
Family
ID=38736464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07715525A Withdrawn EP1992185A4 (en) | 2006-03-07 | 2007-03-07 | Fast re-authentication method in umts |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1992185A4 (en) |
KR (1) | KR100755394B1 (en) |
WO (1) | WO2007102702A2 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101061899B1 (en) | 2007-09-12 | 2011-09-02 | 삼성전자주식회사 | Fast Authentication Method and Device for Heterogeneous Network Handover |
KR100977114B1 (en) | 2008-02-28 | 2010-08-23 | 주식회사 케이티 | Method for re-authentication of indoor mobile terminal in indoor WiBro system, and method for authentication of indoor RAS using it |
FR2929060B1 (en) * | 2008-03-18 | 2014-09-12 | Eads Secure Networks | MANAGING USER IDENTITY IN A SYSTEM |
CN101621374A (en) * | 2008-06-30 | 2010-01-06 | 华为技术有限公司 | Method, device and system for network authentication and server |
US8645695B2 (en) * | 2009-10-07 | 2014-02-04 | Blackberry Limited | System and method for managing security key architecture in multiple security contexts of a network environment |
KR101718096B1 (en) * | 2009-12-01 | 2017-03-20 | 삼성전자주식회사 | Method and system for authenticating in wireless communication system |
KR101018470B1 (en) | 2010-07-03 | 2011-03-02 | 주식회사 유비즈코아 | Secure authentication system in binary cdma communication networks and drive method of the same |
KR101236894B1 (en) | 2010-11-11 | 2013-03-06 | 주식회사 유비즈코아 | Mutuality Secure Authentication System in Wire-Wireless Communication Networks and Authentication Method of the Same |
KR101832366B1 (en) * | 2011-10-12 | 2018-02-27 | 주식회사 케이티 | Method for Providing WiFi Wireless Internet Service Without SIM Card to Inbound Roamer |
US10448286B2 (en) | 2013-05-13 | 2019-10-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobility in mobile communications network |
JP6715867B2 (en) * | 2015-06-05 | 2020-07-01 | コンヴィーダ ワイヤレス, エルエルシー | Unified authentication for integrated small cell and WIFI networks |
SG10201605752PA (en) * | 2016-07-13 | 2018-02-27 | Huawei Int Pte Ltd | A unified authentication work for heterogeneous network |
FR3057132A1 (en) * | 2016-10-04 | 2018-04-06 | Orange | METHOD FOR MUTUAL AUTHENTICATION BETWEEN USER EQUIPMENT AND A COMMUNICATION NETWORK |
BR112020000870A2 (en) * | 2017-07-21 | 2020-07-21 | Huawei International Pte. Ltd. | method of data transmission, device and system related to it |
CN108513295A (en) * | 2018-04-12 | 2018-09-07 | 北京佰才邦技术有限公司 | Rapid authentication method, server and user equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003107584A1 (en) * | 2002-01-02 | 2003-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Non-repudiation of service agreements |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040105413A1 (en) | 2002-07-02 | 2004-06-03 | Interdigital Technology Corporation | System and method for tight inter-working between wireless local area network (WLAN) and universal mobile telecommunication systems (UMTS) |
US7047036B2 (en) | 2002-07-02 | 2006-05-16 | Interdigital Technology Corporation | Method and apparatus for handoff between a wireless local area network (WLAN) and a universal mobile telecommunication system (UMTS) |
FR2842055B1 (en) * | 2002-07-05 | 2004-12-24 | Nortel Networks Ltd | METHOD FOR CONTROLLING ACCESS TO A CELLULAR RADIO COMMUNICATION SYSTEM THROUGH A WIRELESS LOCAL AREA NETWORK, AND CONTROL MEMBER FOR IMPLEMENTING THE METHOD |
AU2003258718A1 (en) * | 2003-09-12 | 2005-04-06 | Docomo Communications Laboratories Europe Gmbh | Seamless handover in heterogeneous network |
KR100735242B1 (en) * | 2003-12-16 | 2007-07-03 | 삼성전자주식회사 | Method for providing/notifying interworking information of mobile telecommunication network and wireless local area network and therefor system |
US7546459B2 (en) * | 2004-03-10 | 2009-06-09 | Telefonaktiebolaget L M Ericsson (Publ) | GSM-like and UMTS-like authentication in a CDMA2000 network environment |
KR100762644B1 (en) * | 2004-12-14 | 2007-10-01 | 삼성전자주식회사 | WLAN-UMTS Interworking System and Authentication Method Therefor |
-
2006
- 2006-11-16 KR KR1020060113448A patent/KR100755394B1/en not_active IP Right Cessation
-
2007
- 2007-03-07 EP EP07715525A patent/EP1992185A4/en not_active Withdrawn
- 2007-03-07 WO PCT/KR2007/001125 patent/WO2007102702A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003107584A1 (en) * | 2002-01-02 | 2003-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Non-repudiation of service agreements |
Non-Patent Citations (4)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group GSM/EDGE Radio Access Network; Generic access to the A/Gb interface; Stage 2 (Release 6)", 3GPP STANDARD; 3GPP TS 43.318, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V6.5.0, 1 January 2006 (2006-01-01), pages 1-70, XP050378328, * |
HAVERINEN H ET AL: "Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM); rfc4186.txt", 20060101, 1 January 2006 (2006-01-01), XP015054875, ISSN: 0000-0003 * |
HYEYEON KWON ET AL: "Consideration of UMTS-WLAN Seamless Handover", MULTIMEDIA, SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON IRVINE, CA, USA 12-14 DEC. 2005, PISCATAWAY, NJ, USA,IEEE, 12 December 2005 (2005-12-12), pages 649-656, XP010870597, DOI: 10.1109/ISM.2005.45 ISBN: 978-0-7695-2489-4 * |
See also references of WO2007102702A2 * |
Also Published As
Publication number | Publication date |
---|---|
KR100755394B1 (en) | 2007-09-04 |
WO2007102702A2 (en) | 2007-09-13 |
WO2007102702A3 (en) | 2008-11-13 |
EP1992185A4 (en) | 2013-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100755394B1 (en) | Method for fast re-authentication in umts for umts-wlan handover | |
US10425808B2 (en) | Managing user access in a communications network | |
US8122250B2 (en) | Authentication in data communication | |
US7181196B2 (en) | Performing authentication in a communications system | |
EP1719316B1 (en) | Means and method for single sign-on access to a service network through an access network | |
US8261078B2 (en) | Access to services in a telecommunications network | |
CN102318386B (en) | To the certification based on service of network | |
US9668139B2 (en) | Secure negotiation of authentication capabilities | |
JP4624785B2 (en) | Interworking function in communication system | |
US20060019635A1 (en) | Enhanced use of a network access identifier in wlan | |
US11159940B2 (en) | Method for mutual authentication between user equipment and a communication network | |
KR102456280B1 (en) | Method for authenticating a secure element cooperating with a mobile device within a terminal of a telecommunications network | |
US20050135624A1 (en) | System and method for pre-authentication across wireless local area networks (WLANS) | |
CN106921965B (en) | Method for realizing EAP authentication in W L AN network | |
US20060095959A1 (en) | System and method to provide umts and internet authentication | |
Abdelkader et al. | A novel advanced identity management scheme for seamless handoff in 4G wireless networks | |
Lin et al. | Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks. | |
Lin et al. | Authentication schemes based on the EAP-SIM mechanism in GSM-WLAN heterogeneous mobile networks | |
Latze | Towards a secure and user friendly authentication method for public wireless networks | |
KR20100054191A (en) | Improved 3gpp-aka method for the efficient management of authentication procedure in 3g network | |
GB2450096A (en) | Network Authentication and Reauthentication | |
Park et al. | An authentication mechanism for the UMTS-WiFi networks | |
Audestad | Mobile Security | |
Bluszcz | UMTS Security UMTS Security | |
KR20050016605A (en) | Inter-working function for a communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080806 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
R17D | Deferred search report published (corrected) |
Effective date: 20081113 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: KTFREETEL CO., LTD. Owner name: SK TELECOM. CO., LTD. Owner name: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTIT |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 29/06 20060101ALI20090305BHEP Ipc: H04L 12/28 20060101ALI20090305BHEP Ipc: H04W 4/00 20090101AFI20090305BHEP |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: KTFREETEL CO., LTD. Owner name: SK TELECOM CO., LTD. Owner name: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTIT |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20121204 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 4/00 20090101AFI20121128BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20130720 |