ENHANCED SECURITY FOR WIRELESS DATA TRANSMISSION SYSTEMS
RELATED APPLICATION This application relates to U.S. Application Serial No. 09/851,681, filed on May
8, 2001, which is commonly assigned and incorporated herein by reference in its entirety.
BACKGROUND OF THE INVENTION
The present disclosure relates generally to a communications system and, more particularly, to a method and apparatus for an enhanced security mechanism for wireless data transmission systems.
Due to the nature of the wireless transmission, the data exchange over a mobile communication link is particularly vulnerable to misuse and/or fraud by unauthorized mobile users. Network resources may be accessed by unauthorized persons using manipulated Mobile Stations (MS) trying to impersonate an authorized subscriber. Additionally, there is also a danger of someone eavesdropping on the radio path.
Various wireless standards including Global Systems for Mobile communications (GSM) include security related services and functions. Among those services and functions are: subscriber identity confidentiality by using a temporary identity; subscriber identity authentication by generating a random challenge and verifying the signature response! and signaling information and data confidentiality for physical connections through a process called ciphering which disguises digital data in order to hide information content. However, although these services and functions exist, no known system protects the mobile network from unauthorized third parties adequately.
Therefore, what is needed, is a security mechanism designed to protect authorized users of a mobile data network from undesirable intrusion of unauthorized parties. SUMMARY OF THE INVENTION
The present disclosure provides a method for protecting authorized users of a mobile data network from undesirable intrusion.
An enhanced security method and system for a wireless telecommunications network is described. The method can include: determining a random number from within a wireless network; providing a key from within the wireless network;
executing a first procedure in the network with the key and the random number to produce a first ciphering key! executing a second procedure in the network with the key and the random number to produce a first expected response; sending the random number, the expected response and the ciphering key to a first enhanced security procedure within the network; executing a third procedure within the first enhanced security procedure and producing a first modified expected response; sending the random number to a mobile station! executing the first procedure in the mobile station with the key and the random number to produce a second ciphering key; executing a second procedure in the mobile station with the key and the random number to produce a second expected response; executing a third procedure within a second enhanced security procedure within the mobile station and producing a second modified expected response; and comparing the first modified response and the second modified response to determine a match.
Therefore, in accordance with the previous summary, objects, features and advantages of the present disclosure will become apparent to one skilled in the art from the subsequent description and the appended claims taken in conjunction with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 illustrates the network architecture of a mobile network! Figure 2 illustrates standard security functions of a mobile network;
Figure 3 illustrates a wireless access Internet node (WAIN);
Figure 4 illustrates WAIN security functions!
Figure 5 illustrates a ciphering process for mobile networks!
Figure 6 illustrates a WAIN client with ESP and a SIM interface on a USB module! and
Figure 7 illustrates a WAIN client with ESP, a SIM interface and Radio system on a PCMCIA module. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present disclosure can be described by the embodiments given below. It is understood, however, that the embodiments below are not necessarily hmitations to the present disclosure, but are used to describe a typical implementation of the invention. A list of definitions and abbreviations will first be described and then the details of the embodiment will be described.
Definitions and Abbreviations
AuC Authentication Center
BSC Base Station Controller
BSS Base Station System
BTS Base Transceiver Station
ESP Enhanced Security Protocol
GGSN Gateway GPRS Support Node
GPRS General Packet Radio Service
GSM Global System for Mobile communications
HLR Home Location Register
IMSI International Mobile Subscriber Identity
IP Internet Protocol
MS Mobile Station
MT Mobile Terminal
PDN Packet Data Network
SGSN Serving GPRS Support Node
SIM Subscriber Identity Module
UMTS Universal Mobile Telecommunications System
WAIN Wireless Access Internet Node
WC WAIN Client
WS WAIN Server
Now turning to a description of the embodiment, Figure 1 shows a General Packet Radio Service (GPRS) based mobile data network architecture. GPRS is a new enhancement to GSM communications for supporting packet data transfer over a mobile network. The GPRS is the basis for packet data service in a 3rd Generation (3G) mobile standard called Universal Mobile Telecommunications System (UMTS). UMTS is one of the major new 3G mobile communications systems being developed within the framework which has been defined by the ITU and known as IMT-2000. The subject of intense worldwide efforts on research and development throughout the present decade, UMTS has the support of many major telecommunications operators and manufacturers because it represents a unique opportunity to create a mass market for highly personalized and user-friendly mobile access to tomorrow's "Information Society".
UMTS delivers pictures, graphics, video communications and other wide-band information as well as voice and data, directed to people who may be on the move. UMTS builds on and extends the capability of mobile technologies (like digital cellular and cordless) by providing increased capacity, data capability and a far greater range of services using an innovative radio access scheme and an enhanced, evolving core network.
The Base Station System (BSS) 50 is responsible for radio transmission, radio source management and access control. The BSS 50 includes a Base Station antenna 47 and a Base Station Controller 49. The BSS 50 serves the Mobile Station (MS) 52 in its coverage area via a radio link 54.
One or more mobile BSSs 50 are connected to a Serving GPRS Support Node (SGSN) 56 which performs packet switching and mobility management functions. The SGSN 56 also detects MSs 52 in the local area for the transmission and receipt of packets. Additionally, it locates and identifies the status of MSs 52 and gathers crucial call information, which is an essential aspect of billing. In addition to providing mobility management and connectivity between the BSS 50 and the Gateway GPRS Serving Node 58, other key SGSN 56 functions include ciphering, compression and interaction with GSM circuit switched services for mobile paging and Short Message Services. One or more SGSNs 56 can be connected to a GGSN 58 for interworking with external Packet Data Networks (PDN) 60. The GGSN 58 acts as a gateway between GSM networks and public data networks. The GGSN 58 can connect directly to the Internet using IP over a variety of physical and tunneling protocols. The GGSN 58 also functions as a fire wall, to ensure that all incoming and outgoing data is authorized adding security to enterprise network. In addition to providing GSM connectivity to external data networks such as the Internet, the GGSN 58 includes all standard based functionality and even more with authentication, encryption, routing, firewall filtering, bandwidth and system management.
Moreover, there is a database called Home Location Register (HLR) 62 connected to the SGSN 56 that stores subscription data for all mobile users that are subscribed in any particular home network 59. Moreover, an MS's security information is stored in an Authentication Center (AuC) 64 which communicates with the SGSN 56 via the HLR 62 for authentication purposes.
In the GSM/GPRS architecture, a MS 52 consists of a Mobile Terminal (MT) 66 and a Subscriber Identity Module (SIM) 68. The MT 66 supports the radio interface communicating with the BSS 50 and the SIM 68 card stores a subscriber's subscription and security information (however, SIM is also referred as Service Identity Module in the UMTS standard).
The SIM 68, the MT 66, the SGSN 56 and the AuC 64 are the only entities involved in the security procedure. In particular, the SIM 68 on the mobile station side and the AuC 64 on the home network side 59 are the two authenticating entities where a unique authentication key (Ki) is stored for each mobile subscriber. The authentication information is exchanged between the MT 66 and SGSN 56. However, the SIM 68 is the key to the personalized service, security and bilhng. Before a MS 52 can use any GPRS services, it must attach itself to the network 59 through a GPRS Attach procedure.
Now referring to Figure 2, the MS 52 provides the network 59 its identity which can be a unique International Mobile Subscriber Identity (IMSI), or a temporary identity previously assigned by the network. Once a valid mobile identity 80 is received, the network 59 may authenticate the identity. Figure 2 shows the Authentication and Ciphering Key Setting procedure specified in the GPRS standard. With the MS's identity 80, the AuC 64 in the GPRS network 59 determines the mobile unit's authentication key, Ki 82, and generates a random challenge "RAND" 84. The Ki 82 and RAND 84 are used to compute the expected Response XRES 86 using a GSM/GPRS standard authentication algorithm 88 such as an A3 algorithm and the ciphering key Kc 90 using a ciphering key setting algorithm 92 such as an A8 algorithm. The authentication triplet {RAND, XRES, Kc} associated with a MS's ID 80 is sent to the SGSN 56 upon request. A vector of triplets 94 can be passed altogether and stored in the SGSN 56 for subsequent authentication.
In the GPRS architecture, the SGSN 56 initiates the Authentication and Ciphering Key Setting procedure by sending the MS 52 a random challenge RAND 84 selected from an unused authentication triplet. Once the RAND 84 is passed to the SIM 68 through the MT 66, a Signature Response SRES 96 of the RAND 84 is computed using the Ki 82 and A3 algorithm 92 stored in the SIM 68. In addition, the ciphering key, Kc, 90 is also computed using the RAND 84, Ki 82 and A8 algorithm 92. The SRES 96 and the Kc 90 are then passed to the MT 66 from the SIM 68. The SRES 96 is then sent to the SGSN 56 for comparison with the XRES 86. If the two match, the MS 52 is successfully authenticated. The ciphering key Kc 90, generated
on both sides 52, 59 are also used for subsequent encryption of the signahng and user data.
Now turning to Figure 3, the Wireless Access Internet Node (WAIN) technology of the invention is shown. The WAIN integrates the GPRS network and security functionality with an independent high speed radio system such as IEEE 802.11. The WAIN system consists of a WAIN Client (WC) 110 in the MS 52 and a WAIN Server (WS) 112 in the network 59. The WAIN supports wireless Internet access and data transfer at a high speed while providing connectivity to the mobile network for mobility, security and bilhng services. The WC 110 supports high layer GPRS terminal functions, interfaces 114 to the SIM card and adapts to the underlying radio system 116.
The WS 112 supports the GPRS network functions of the BSS/SGSN/GGSN, interfaces 118 to the HLR 62 and the AuC 64, and adapts 120 to the underlying radio system 119. By combining the multiple network elements into one single node, all unnecessary intermediate interfaces and protocols are removed in the WS 112. Therefore, the system architecture can be greatly simplified and cost can be significantly reduced compared to the conventional mobile network architecture. More detail about the WAIN technology can be found in co-pending U.S. Application Serial No. 09/851,681, which is commonly assigned. The radio link adaptation 116, 120 in both the WC 110 and the WS 112 allows the WAIN to support multiple radio technologies.
Although the GSM/GPRS security mechanism is more robust than the one defined for 802.11, it still has its limitation. Since the maximum length of the actual ciphering key is fixed by the GSM MoU, the A8 algorithm produces the actual ciphering key and extends it (if necessary) into a 64 bit word where the nonsignificant bits are forced to zero for the GSM/GPRS. However, in UMTS, the ciphering key is 128 bits long. Even though sophisticated intruders may be able to guess the key needed to decode the encrypted data after intercepting enough digital data over the air, the longer the key sequence and the more complicated the algorithm, the harder it is to guess the key. The Enhanced Security Protocol (ESP) implemented in the WC 122 and WS 124 ensures the robustness of the WAIN security system while preserving the end-to-end open security standard between the SIM 68 and the AuC 64.
Moreover, the ESP 122, 124 included in the WAIN provides authentication discrimination. An intruder may try to impersonate an authorized subscriber by
using a manipulated MS with a known identity that may produce the standard SRES of a RAND. To prevent this type of unauthorized user from accessing the mobile network through the WAIN Server, the standard SRES is modified to SRES' 130 by the ESP 110 at the WC using a cryptographical algorithm as shown in Figure 4. Similarly, the XRES 86 received from the AuC 64 is modified to XRES' 132 by the ESP 124 at the WS 112 using the same algorithm. This will ensure that only those users using the WC 110 are properly validated while those using non-WAIN terminals are rejected.
In the WAIN security system, the ciphering key, Kc 90, is modified into a new key, Kc' 134, by the ESP 122 at the WC 110 using another cryptographical algorithm. This algorithm may be very different from the cryptographical algorithm mentioned above. The same operation is executed by the ESP 124 at the WS 112 using the same algorithm. The new ciphering key, Kc' 134, may be of the same or greater length than the original key generated using the standard A8 algorithm. In case of the same length, the same standard ciphering algorithm can still be used. If a longer key is desired, a more advanced ciphering algorithm may be used together with the key to provide a better protection.
Now turning to Figure 5, once the ciphering key 134 is determined, the transmitter 140 across the radio interface of a mobile network will generate a ciphering sequence 142 using a known ciphering algorithm 144 with the key 134 and some input parameters 146. The ciphering sequence 142 is bit-wise added (modulo 2) to the unciphered bit sequence 148 to produce a ciphered stream 150. The ciphered stream 150 received at the receiver 152 is bit-wise added (modulo 2) again to the same ciphering sequence generated locally using the same algorithm 144, key 134 and input parameters 146 as the transmitting side. This deciphering process recovers the original clear text 148 sent from the transmitter 140 before ciphering. Ideally, the encryption should be implemented on hardware to provide more processing power and a better protection.
Now turning to an example of using the ESP technique in a laptop MS 164 in Figure 6, a commercially available SIM card reader 160 is shown implemented on a USB module 162 that is connected to a laptop computer 164 by the USB interface 168 and the USB port 170. This reader 160 is GSM/GPRS compatible. The ESP 122 is shown implemented on the same USB module 162 that the SIM card reader 160 is on. The process starts by sending an authentication challenge RAND from the GPRS Signahng and Data Transfer (GSDT) subsystem 172 to the ESP 122, then a
modified Signature Response SRES' is generated and returned to the GSDT subsystem 172 as the authentication response. Once the ciphering key is modified in the ESP 122, clear text is passed from the GSDT subsystem 172 to the ESP 122 for encryption with the newly generated key. The encrypted sequence is then sent back to the GSDT subsystem 172 for transmission from the terminal 164 through the Radio Link adaptation 161 and radio system 163 to the network (not shown in this figure).
In another embodiment, the ESP 122 is implemented on a PCMCIA module 180 together with the SIM interface 182 and the radio system 184 (such as 802.11) as shown in the laptop terminal 190 example in Figure 7. The PCMCIA port 188 is connected to the terminal 190 via the PCMCIA port 192.
An authentication challenge RAND is first sent from to the GSDT subsystem 186 to the ESP 122, and a modified Signature Response SRES' is then generated and returned to the GSDT subsystem 186 as the authentication response. Once the ciphering key is modified in the ESP 122, the clear text is passed from the GSDT subsystem 186 to the ESP 122 for encryption with the newly generated key. The encrypted sequence is then sent to the radio system 184 for transmission to the network (not shown in this figure).
It is understood that several modifications, changes and substitutions are intended in the foregoing disclosure and in some instances some features of the invention will be employed without a corresponding use of other features. Accordingly, it is appropriate that the appended claims be construed broadly and in a manner consistent with the scope of the invention.