[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2024110949A1 - Re-establishment of trusted ip security for trusted non-3gpp access point (tnap) mobility - Google Patents

Re-establishment of trusted ip security for trusted non-3gpp access point (tnap) mobility Download PDF

Info

Publication number
WO2024110949A1
WO2024110949A1 PCT/IB2024/050949 IB2024050949W WO2024110949A1 WO 2024110949 A1 WO2024110949 A1 WO 2024110949A1 IB 2024050949 W IB2024050949 W IB 2024050949W WO 2024110949 A1 WO2024110949 A1 WO 2024110949A1
Authority
WO
WIPO (PCT)
Prior art keywords
tngf
authentication
key
tnap
usage type
Prior art date
Application number
PCT/IB2024/050949
Other languages
French (fr)
Inventor
Sheeba Backia Mary BASKARAN
Andreas Kunz
Original Assignee
Lenovo (Singapore) Pte Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo (Singapore) Pte Limited filed Critical Lenovo (Singapore) Pte Limited
Publication of WO2024110949A1 publication Critical patent/WO2024110949A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information

Definitions

  • the present disclosure relates to wireless communications, and more specifically to Trusted Non-3GPP Access Point (TNAP) Mobility.
  • TNAP Trusted Non-3GPP Access Point
  • a wireless communications system may include one or multiple network communication devices, such as base stations, which may be otherwise known as an eNodeB (eNB), a next-generation NodeB (gNB), or other suitable terminology.
  • Each network communication device such as a base station, may support wireless communications for one or multiple user communication devices, which may be otherwise known as user equipment (UE), or other suitable terminology.
  • the wireless communications system may support wireless communications with one or multiple user communication devices by utilizing resources of the wireless communication system (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers).
  • the wireless communications system may support wireless communications across various radio access technologies including third generation (3G) radio access technology, fourth generation (4G) radio access technology, fifth generation (5G) radio access technology, among other suitable radio access technologies beyond 5G (e.g., sixth generation (6G)).
  • 3G third generation
  • 4G fourth generation
  • 5G fifth generation
  • 6G sixth generation
  • the 5G network supports authentication for trusted non-3GPP access by UEs, where a UE connects (e.g., registers) to a 5G core network via a trusted Non-3GPP Access Network (TNAN).
  • TNAN trusted Non-3GPP Access Network
  • a UE connects (e.g., registers) to a 5G core network via a trusted Non-3GPP Access Network (TNAN).
  • TNAP Non-3GPP Access Network
  • a full authentication involves a security establishment at all levels, including access network security (e.g., a security establishment between the UE and the access network, or TNAN) and non-access stratum security (e.g., a security establishment between the UE and the 5G core network).
  • access network security e.g., a security establishment between the UE and the access network, or TNAN
  • non-access stratum security e.g., a security establishment between the UE and the 5G core network.
  • the present disclosure relates to methods, apparatuses, and systems that support UE TNAP Mobility authentication and security establishment procedures, such as procedures that utilize new input parameters and security key refreshes during the authentication and security establishment procedures, among other techniques.
  • Some implementations of the method and apparatuses described herein may further include a Trusted Non-3GPP Gateway Function (TNGF), comprising: a processor and a memory coupled with the processor, the processor configured to cause the TNGF to derive a Trusted IP Security (TIPSec) Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receive, from user equipment (UE), a reauthentication identifier for the UE, identify the TIPSec Key using the re-authentication identifier; and re-establish an IPSec Security Association (SA) based on the identified TIPSec Key.
  • TIPSec Trusted IP Security
  • SA IPSec Security Association
  • the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information
  • the input parameter includes: a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the re-authentication counter, a random number, a length of the random number, and combinations thereof.
  • the TNGF sends the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE.
  • the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
  • IKE Internet Key Exchange
  • the TNGF derives the TIPSec Key during UE mobility from a previous TNAP to a target TNAP associated with the TNGF.
  • Some implementations of the method and apparatuses described herein may further include a method performed by a TNGF, including deriving a Trusted IP Security (TIPSec) Key using: a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receiving, from user equipment (UE), a re-authentication identifier for the UE, identifying the TIPSec Key using the re-authentication identifier, and re-establishing an IPSec Security Association (SA) based on the identified TIPSec Key.
  • TIPSec Trusted IP Security
  • SA IPSec Security Association
  • the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information
  • the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
  • the TNGF sends the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE.
  • the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
  • IKE Internet Key Exchange
  • the TNGF derives the TIPSec Key in response to UE mobility from a previous TNAP to a target TNAP associated with the TNGF.
  • Some implementations of the method and apparatuses described herein may further include a UE, comprising: a processor; and a memory coupled with the processor, the processor configured to cause the UE to derive a TIPSec Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmit, to a TNGF, a re-authentication identifier for the UE.
  • the UE transmit the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
  • IKE Internet Key Exchange
  • the UE transmits a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
  • the UE derives the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
  • the re-authentication identifier is part of a Network Access Identifier (NAI) transmitted from the UE to the TNGF.
  • NAI Network Access Identifier
  • the re-authentication usage type distinguisher includes re-authentication identification/identifier related usage type information
  • the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
  • Some implementations of the method and apparatuses described herein may further include a method performed by UE, including deriving a TIPSec Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmitting, to a TNGF, a re-authentication identifier for the UE.
  • the UE transmits the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
  • IKE Internet Key Exchange
  • the UE transmits a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
  • the UE derives the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
  • the re-authentication identifier is part of an NAI transmitted from the UE to the TNGF.
  • the re-authentication usage type distinguisher includes re-authentication identification/identifier related usage type information
  • the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
  • Some implementations of the method and apparatuses described herein may further include a processor for wireless communication, comprising at least one controller coupled with at least one memory and configured to cause the processor to derive a TIPSec Key using a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmit, to a TNGF, a re-authentication identifier for the processor.
  • a processor for wireless communication comprising at least one controller coupled with at least one memory and configured to cause the processor to derive a TIPSec Key using a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmit, to a TNGF, a re-authentication identifier for the processor.
  • the controller is further configured to cause the processer to transmit the re-authentication identifier during IKE authentication exchange with the TNGF.
  • the controller is further configured to cause the processor to transmit a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
  • the controller is further configured to cause the processor to derive the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a reauthentication identification usage type distinguisher.
  • FIG. 1 illustrates an example of a wireless communications system that supports TNAP Mobility in accordance with aspects of the present disclosure.
  • FIG. 2 illustrates an example of a diagram that supports UE mobility from a source TNAP to a target TNAP in accordance with aspects of the present disclosure.
  • FIG. 3 illustrates an example of a diagram that supports authentication and Protocol Data Unit (PDU) Session establishment for Trusted Non-3GPP access in accordance with aspects of the present disclosure.
  • PDU Protocol Data Unit
  • FIG. 4 illustrates an example of a diagram that supports a security establishment procedure for TNAP Mobility in accordance with aspects of the present disclosure.
  • FIG. 5 illustrates an example of a diagram that supports a UE TNAP Mobility Procedure in accordance with aspects of the present disclosure.
  • FIG. 6 illustrates an example of a diagram that supports TNAP Mobility using a Fast BSS (Basic Service Set) Transition (FT) protocol in accordance with aspects of the present disclosure.
  • FT Base Service Set
  • FIG. 7 illustrates an example of a block diagram of a device that supports TNAP Mobility in accordance with aspects of the present disclosure.
  • FIG. 8 illustrates a flowchart of a method that supports establishing an IPSec Security Association between a UE and a TGNF in accordance with aspects of the present disclosure.
  • FIG. 9 illustrates a flowchart of a method that supports authentication of a UE to a TGNF in accordance with aspects of the present disclosure.
  • FIG. 10 illustrates a flowchart of a method that supports generating a security context between a UE and a TNAP in accordance with aspects of the present disclosure.
  • FIG. 11 illustrates a flowchart of a method that supports generating a security context for a UE in accordance with aspects of the present disclosure.
  • a 5G network could support both the re-authentication and the security establishment of the UE to the core network without performing the full authentication procedures, such as by enabling a fresh TNAP key generation at a TNGF (Trusted Non-3GPP Gateway Function) associated with a target TNAP.
  • TNGF Trusted Non-3GPP Gateway Function
  • TIPSec Trusted Access IP Security
  • KTIPSCC Trusted Access IP Security
  • a re-authentication ID e.g., Re-auth ID
  • new TNAP key for the target TNAP
  • the technology described herein adapts the UE TNAP Mobility authentication and security establishment procedures to avoid reliance on full authentication during UE Mobility between TNAPs without the various issues described herein (e.g., key reuse).
  • the technology provides for re-authentication identity or identifier (ID) generation using new input parameters.
  • the input parameters can include a usage type parameter, such as “re-authentication identification/identifier related usage type information,” to distinguish the ID from the other security keys generated from a same or shared root key (e.g., a TNGF Key).
  • the technology provides for a TNAP Key (KTNAP) refresh by a UE and/or a TNGF using a TNGF Key, as well as other input parameters, such as freshness parameters (e.g., Nonces, Counter, Random, and so on) and/or a re-authentication TNAP/TNAP Key Refresh related usage type distinguisher.
  • KTNAP TNAP Key
  • other input parameters such as freshness parameters (e.g., Nonces, Counter, Random, and so on) and/or a re-authentication TNAP/TNAP Key Refresh related usage type distinguisher.
  • the technology can also provide a TlPSec Key (KTIPSCC) refresh mechanism between a UE and a TNGF to establish a secure connection (e.g., an IPSec following IKE Auth messaging between the UE and the TNGF).
  • KTIPSCC TlPSec Key
  • the technology can provide for an exchange of a re-auth ID during IKE Auth message within ID Payloads to indicate a UE context containing a UE TNAP Mobility related re-authentication security context.
  • the re-authentication security context which includes a fresh Knpsec, can identify and establish the security connection (e.g., the IPSec) between the UE and the TNGF.
  • the 5G network can support UE TNAP Mobility without reliance on the full authentication procedures and while avoiding issues with security key reuse and related drawbacks.
  • FIG. 1 illustrates an example of a wireless communications system 100 that supports TNAP Mobility in accordance with aspects of the present disclosure.
  • the wireless communications system 100 may include one or more network entities 102, one or more UEs 104, a core network 106, and a packet data network 108.
  • the wireless communications system 100 may support various radio access technologies.
  • the wireless communications system 100 may be a 4G network, such as an LTE network or an LTE- Advanced (LTE- A) network.
  • LTE- A LTE- Advanced
  • the wireless communications system 100 may be a 5G network, such as an NR network.
  • the wireless communications system 100 may be a combination of a 4G network and a 5G network, or other suitable radio access technology including Institute of Electrical and Electronics Engineers (IEEE) 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20.
  • IEEE Institute of Electrical and Electronics Engineers
  • Wi-Fi Wi-Fi
  • WiMAX IEEE 802.16
  • IEEE 802.20 The wireless communications system 100 may support radio access technologies beyond 5G. Additionally, the wireless communications system 100 may support technologies, such as time division multiple access (TDMA), frequency division multiple access (FDMA), or code division multiple access (CDMA), etc.
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • CDMA code division multiple access
  • the one or more network entities 102 may be dispersed throughout a geographic region to form the wireless communications system 100.
  • One or more of the network entities 102 described herein may be or include or may be referred to as a network node, a base station, a network element, a radio access network (RAN), a base transceiver station, an access point, a NodeB, an eNodeB (eNB), a next-generation NodeB (gNB), or other suitable terminology.
  • a network entity 102 and a UE 104 may communicate via a communication link 110, which may be a wireless or wired connection.
  • a network entity 102 and a UE 104 may perform wireless communication (e.g., receive signaling, transmit signaling) over a Uu interface.
  • a network entity 102 may provide a geographic coverage area 112 for which the network entity 102 may support services (e.g., voice, video, packet data, messaging, broadcast, etc.) for one or more UEs 104 within the geographic coverage area 112.
  • a network entity 102 and a UE 104 may support wireless communication of signals related to services (e.g., voice, video, packet data, messaging, broadcast, etc.) according to one or multiple radio access technologies.
  • a network entity 102 may be moveable, for example, a satellite associated with a non-terrestrial network.
  • different geographic coverage areas 112 associated with the same or different radio access technologies may overlap, but the different geographic coverage areas 112 may be associated with different network entities 102.
  • Information and signals described herein may be represented using any of a variety of different technologies and techniques.
  • data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
  • the one or more UEs 104 may be dispersed throughout a geographic region of the wireless communications system 100.
  • a UE 104 may include or may be referred to as a mobile device, a wireless device, a remote device, a remote unit, a handheld device, or a subscriber device, or some other suitable terminology.
  • the UE 104 may be referred to as a unit, a station, a terminal, or a client, among other examples.
  • the UE 104 may be referred to as an Internet-of-Things (loT) device, an Internet-of-Everything (loE) device, or machine-type communication (MTC) device, among other examples.
  • a UE 104 may be stationary in the wireless communications system 100.
  • a UE 104 may be mobile in the wireless communications system 100.
  • the one or more UEs 104 may be devices in different forms or having different capabilities. Some examples of UEs 104 are illustrated in FIG. 1.
  • a UE 104 may be capable of communicating with various types of devices, such as the network entities 102, other UEs 104, or network equipment (e.g., the core network 106, the packet data network 108, a relay device, an integrated access and backhaul (IAB) node, or another network equipment), as shown in FIG. 1.
  • a UE 104 may support communication with other network entities 102 or UEs 104, which may act as relays in the wireless communications system 100.
  • a UE 104 may also be able to support wireless communication directly with other UEs 104 over a communication link 114.
  • a UE 104 may support wireless communication directly with another UE 104 over a device-to-device (D2D) communication link.
  • D2D device-to-device
  • the communication link 114 may be referred to as a sidelink.
  • a UE 104 may support wireless communication directly with another UE 104 over a PC5 interface.
  • a network entity 102 may support communications with the core network 106, or with another network entity 102, or both.
  • a network entity 102 may interface with the core network 106 through one or more backhaul links 116 (e.g., via an SI, N2, N2, or another network interface).
  • the network entities 102 may communicate with each other over the backhaul links 116 (e.g., via an X2, Xn, or another network interface).
  • the network entities 102 may communicate with each other directly (e.g., between the network entities 102).
  • the network entities 102 may communicate with each other or indirectly (e.g., via the core network 106).
  • one or more network entities 102 may include subcomponents, such as an access network entity, which may be an example of an access node controller (ANC).
  • An ANC may communicate with the one or more UEs 104 through one or more other access network transmission entities, which may be referred to as a radio heads, smart radio heads, or transmission-reception points (TRPs).
  • TRPs transmission-reception points
  • a network entity 102 may be configured in a disaggregated architecture, which may be configured to utilize a protocol stack physically or logically distributed among two or more network entities 102, such as an integrated access backhaul (IAB) network, an open RAN (O-RAN) (e.g., a network configuration sponsored by the O-RAN Alliance), or a virtualized RAN (vRAN) (e.g., a cloud RAN (C- RAN)).
  • IAB integrated access backhaul
  • O-RAN open RAN
  • vRAN virtualized RAN
  • C- RAN cloud RAN
  • a network entity 102 may include one or more of a central unit (CU), a distributed unit (DU), a radio unit (RU), a RAN Intelligent Controller (RIC) (e.g., a NearReal Time RIC (Near-RT RIC), a Non-Real Time RIC (Non-RT RIC)), a Service Management and Orchestration (SMO) system, or any combination thereof.
  • CU central unit
  • DU distributed unit
  • RU radio unit
  • RIC RAN Intelligent Controller
  • RIC e.g., a NearReal Time RIC (Near-RT RIC), a Non-Real Time RIC (Non-RT RIC)
  • SMO Service Management and Orchestration
  • An RU may also be referred to as a radio head, a smart radio head, a remote radio head (RRH), a remote radio unit (RRU), or a transmission reception point (TRP).
  • RRH remote radio head
  • RRU remote radio unit
  • TRP transmission reception point
  • One or more components of the network entities 102 in a disaggregated RAN architecture may be co-located, or one or more components of the network entities 102 may be located in distributed locations (e.g., separate physical locations).
  • one or more network entities 102 of a disaggregated RAN architecture may be implemented as virtual units (e.g., a virtual CU (VCU), a virtual DU (VDU), a virtual RU (VRU)).
  • VCU virtual CU
  • VDU virtual DU
  • VRU virtual RU
  • Split of functionality between a CU, a DU, and an RU may be flexible and may support different functionalities depending upon which functions (e.g., network layer functions, protocol layer functions, baseband functions, radio frequency functions, and any combinations thereof) are performed at a CU, a DU, or an RU.
  • functions e.g., network layer functions, protocol layer functions, baseband functions, radio frequency functions, and any combinations thereof
  • a functional split of a protocol stack may be employed between a CU and a DU such that the CU may support one or more layers of the protocol stack and the DU may support one or more different layers of the protocol stack.
  • the CU may host upper protocol layer (e.g., a layer 3 (L3), a layer 2 (L2)) functionality and signaling (e.g., Radio Resource Control (RRC), service data adaption protocol (SDAP), Packet Data Convergence Protocol (PDCP)).
  • RRC Radio Resource Control
  • SDAP service data adaption protocol
  • PDCP Packet Data Convergence Protocol
  • the CU may be connected to one or more DUsor RUs, and the one or more DUs or RUs may host lower protocol layers, such as a layer 1 (LI) (e.g., physical (PHY) layer) or an L2 (e.g., radio link control (RLC) layer, medium access control (MAC) layer) functionality and signaling, and may each be at least partially controlled by the CU 160.
  • LI layer 1
  • PHY physical
  • L2 radio link control
  • MAC medium access control
  • a functional split of the protocol stack may be employed between a DU and an RU such that the DU may support one or more layers of the protocol stack and the RU may support one or more different layers of the protocol stack.
  • the DU may support one or multiple different cells (e.g., via one or more RUs).
  • a functional split between a CU and a DU, or between a DU and an RU may be within a protocol layer (e.g., some functions for a protocol layer may be performed by one of a CU, a DU, or an RU, while other functions of the protocol layer are performed by a different one of the CU, the DU, or the RU).
  • a CU may be functionally split further into CU control plane (CU-CP) and CU user plane (CU-UP) functions.
  • a CU may be connected to one or more DUs via a midhaul communication link (e.g., Fl, Fl-c, Fl-u), and a DU may be connected to one or more RUs via a fronthaul communication link (e.g., open fronthaul (FH) interface).
  • a midhaul communication link or a fronthaul communication link may be implemented in accordance with an interface (e.g., a channel) between layers of a protocol stack supported by respective network entities 102 that are in communication via such communication links.
  • the core network 106 may support user authentication, access authorization, tracking, connectivity, and other access, routing, or mobility functions.
  • the core network 106 may be an evolved packet core (EPC), or a 5G core (5GC), which may include a control plane entity that manages access and mobility (e.g., a mobility management entity (MME), an access and mobility management functions (AMF)) and a user plane entity that routes packets or interconnects to external networks (e.g., a serving gateway (S-GW), a Packet Data Network (PDN) gateway (P-GW), or a user plane function (UPF)).
  • EPC evolved packet core
  • 5GC 5G core
  • MME mobility management entity
  • AMF access and mobility management functions
  • S-GW serving gateway
  • PDN gateway Packet Data Network gateway
  • UPF user plane function
  • control plane entity may manage non-access stratum (NAS) functions, such as mobility, authentication, and bearer management (e.g., data bearers, signal bearers, etc.) for the one or more UEs 104 served by the one or more network entities 102 associated with the core network 106.
  • NAS non-access stratum
  • the core network 106 may communicate with the packet data network 108 over one or more backhaul links 116 (e.g., via an SI, N2, N2, or another network interface).
  • the packet data network 108 may include an application server 118.
  • one or more UEs 104 may communicate with the application server 118.
  • a UE 104 may establish a session (e.g., a protocol data unit (PDU) session, or the like) with the core network 106 via a network entity 102.
  • the core network 106 may route traffic (e.g., control information, data, and the like) between the UE 104 and the application server 118 using the established session (e.g., the established PDU session).
  • the PDU session may be an example of a logical connection between the UE 104 and the core network 106 (e.g., one or more network functions of the core network 106).
  • the network entities 102 and the UEs 104 may use resources of the wireless communication system 100 (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers)) to perform various operations (e.g., wireless communications).
  • the network entities 102 and the UEs 104 may support different resource structures.
  • the network entities 102 and the UEs 104 may support different frame structures.
  • the network entities 102 and the UEs 104 may support a single frame structure.
  • the network entities 102 and the UEs 104 may support various frame structures (i.e., multiple frame structures).
  • the network entities 102 and the UEs 104 may support various frame structures based on one or more numerologies.
  • One or more numerologies may be supported in the wireless communications system 100, and a numerology may include a subcarrier spacing and a cyclic prefix.
  • a first subcarrier spacing e.g., 15 kHz
  • a normal cyclic prefix e.g. 15 kHz
  • the first subcarrier spacing e.g., 15 kHz
  • a time interval of a resource may be organized according to frames (also referred to as radio frames).
  • Each frame may have a duration, for example, a 10 millisecond (ms) duration.
  • each frame may include multiple subframes.
  • each frame may include 10 subframes, and each subframe may have a duration, for example, a 1 ms duration.
  • each frame may have the same duration.
  • each subframe of a frame may have the same duration.
  • a time interval of a resource may be organized according to slots.
  • a subframe may include a number (e.g., quantity) of slots.
  • the number of slots in each subframe may also depend on the one or more numerologies supported in the wireless communications system 100.
  • Each slot may include a number (e.g., quantity) of symbols (e.g., OFDM symbols).
  • the number (e.g., quantity) of slots for a subframe may depend on a numerology.
  • a slot For a normal cyclic prefix, a slot may include 14 symbols.
  • a slot For an extended cyclic prefix (e.g., applicable for 60 kHz subcarrier spacing), a slot may include 12 symbols.
  • a first subcarrier spacing e.g. 15 kHz
  • an electromagnetic (EM) spectrum may be split, based on frequency or wavelength, into various classes, frequency bands, frequency channels, etc.
  • the wireless communications system 100 may support one or multiple operating frequency bands, such as frequency range designations FR1 (410 MHz - 7.125 GHz), FR2 (24.25 GHz - 52.6 GHz), FR3 (7.125 GHz - 24.25 GHz), FR4 (52.6 GHz - 114.25 GHz), FR4a or FR4-1 (52.6 GHz - 71 GHz), and FR5 (114.25 GHz - 300 GHz).
  • FR1 410 MHz - 7.125 GHz
  • FR2 24.25 GHz - 52.6 GHz
  • FR3 7.125 GHz - 24.25 GHz
  • FR4 (52.6 GHz - 114.25 GHz
  • FR4a or FR4-1 52.6 GHz - 71 GHz
  • FR5 114.25 GHz - 300 GHz
  • the network entities 102 and the UEs 104 may perform wireless communications over one or more of the operating frequency bands.
  • FR1 may be used by the network entities 102 and the UEs 104, among other equipment or devices for cellular communications traffic (e.g., control information, data).
  • FR2 may be used by the network entities 102 and the UEs 104, among other equipment or devices for short-range, high data rate capabilities.
  • FR1 may be associated with one or multiple numerologies (e.g., at least three numerologies).
  • FR2 may be associated with one or multiple numerologies (e.g., at least 2 numerologies).
  • a 5G network can utilize various techniques to provide authentication and security establishment between a UE and a core network during UE TNAP Mobility, without employ a full authentication procedure for the UE.
  • FIG. 2 illustrates an example of a diagram 200 that supports UE mobility from a source TNAP to a target TNAP in accordance with aspects of the present disclosure.
  • a UE 210 which is connected to a 5G core network (such as a TNAN) 220 moves from a source TNAP 222 (e.g., TNAP-1) to a target TNAP 226 (e.g., TNAP-2).
  • the TNAP-1 and TNAP-2 are associated with a TNGF 224 of the TNAN 220.
  • the UE 210 which had a secure connection 230 to the source TNAP 222, connects 235 with the target TNAP 226.
  • the UE 210 moves between access points (e.g., from TNAP-1 to TNAP-2), and thus the TNAN 220 can utilize the various authentication and security establishment procedures described herein to authenti cate/ establish the UE 210 to the target TNAP 226, without performing a full authentication (e.g., procedures that involve components of the core network itself).
  • access points e.g., from TNAP-1 to TNAP-2
  • the TNAN 220 can utilize the various authentication and security establishment procedures described herein to authenti cate/ establish the UE 210 to the target TNAP 226, without performing a full authentication (e.g., procedures that involve components of the core network itself).
  • a TNGF (e.g., the TNGF 224) can derive a unique reauthentication identity/identifier (e.g., Re-auth ID) to identify a security context related to the UE (e.g., the UE 210), which can derive and utilize any re-authentication specific security context.
  • a unique reauthentication identity/identifier e.g., Re-auth ID
  • the TNGF can generate a fresh TNAP key and/or TIPSec key during UE TNAP Mobility, to re-establish security connections between the UE and a target TNAP (e.g., the target TNAP 226), as well as to re-establish an IP security association between the UE and the TNGF during the UE TNAP Mobility.
  • a target TNAP e.g., the target TNAP 2266
  • An initial registration procedure (e.g., after a successful authentication for access to the NTAN 220) includes generation of a Re-auth ID by a TNGF and/or UE to enable an identification of the UE context to support the UE TNAP Mobility related reauthentication and security establishment.
  • the security establishment procedure can be adaptable to support a UE moving from a source TNAP (e.g., TNAP-1) to a target TNAP (e.g., TNAP-2) during UE Mobility.
  • FIG. 3 illustrates an example of a diagram 300 that supports authentication and Protocol Data Unit (PDU) Session establishment for Trusted Non-3GPP access in accordance with aspects of the present disclosure.
  • the procedure can include the following steps (and new adaptations):
  • Step 0 A UE 310 selects a PLMN and a TNAN 320 for connecting to this PLMN by using the Trusted Non-3GPP Access Network selection procedure.
  • the UE 310 discovers the PLMNs with which the TNAN 320 supports trusted connectivity (e.g., "5G connectivity").
  • Step 1 A layer-2 connection is established between the UE 310 and a TNAP 325.
  • Steps 2- 10a An EAP authentication procedure is initiated. EAP messages shall be encapsulated into layer-2 packets. Between the TNAP 325 and TNGF 330 the EAP packets are encapsulated into AAA messages. An EAP-5G procedure is executed. During this procedure authentication and key agreement happens between the UE 310 and the network. A KTNGF key is created in the UE 310 and in an AMF 340 after the successful authentication. The KTNGF is transferred from the AMF 340 to TNGF 330 in step 10a.
  • Step 10b The TNGF 330 sends TNGF address and TNGF Nonce (TNonce) (e.g., information required to generate a Re-auth ID) to the UE 310.
  • the TNAP 325 is a trusted entity.
  • the TNGF 330 can generate the KTNAP (e.g., the TNAP Key) and transfers it from TNGF 330 to TNAP 325 in step 10b (within an AAA message).
  • KTNAP e.g., the TNAP Key
  • Step lOcl The UE sends to TNGF 330 a UE Nonce (UNonce) (e.g., information required to generate a Re-auth ID).
  • UE Nonce e.g., information required to generate a Re-auth ID
  • Step 10c2 The UE 310 and the TNGF 330 can derive a Re-auth ID for the UE 310 from TNGF key using the inputs parameters such as TNGF-ID/address, Nonce from TNGF, Nonce from UE and a re-authentication identification/identifier related usage type information (e.g., 0x03).
  • TNGF-ID/address e.g., TNGF-ID/address
  • Nonce from TNGF e.g., Nonce from UE
  • a re-authentication identification/identifier related usage type information e.g., 0x03
  • FC Oxxx (e.g., any value);
  • P0 Usage type distinguisher (i.e., re-authentication identification/identifier related usage type information (e.g., 0x03));
  • L0 length of Usage type distinguisher (e.g., 0x00 0x01);
  • L0 Length of TNGF Nonce
  • L0 Length of UE Nonce
  • the usage type distinguisher Re-authentication Identification/Re- authentication Identifier can also be termed a UE context identifier for UE TNAP Mobility Re-authentication.
  • the usage type distinguishers related to the UE TNAP Mobility have the following values:
  • Steps lOd-e The TNGF 330 can generate the KTNAP (TNAP Key) if not derived in step 10b and transfer the key from the TNGF 330 to the TNAP 325 (within an AAA message). Further, the TNGF 330 can also send a message containing the EAP-Success packet.
  • Step 11 The common TNAP key is used by the UE 310 and TNAP 325 to derive security keys according to the applied non-3GPP technology and to establish a security association to protect all subsequent traffic.
  • the KTNAP is the Pairwise Master Key (PMK) and a 4-way handshake is executed (see IEEE 802.11 [80]) which establishes a security context between the WLAN AP and the UE 310 that is used to protect unicast and multicast traffic over the air. All messages between UE 310 and TNAP 325 are encrypted and integrity protected from this step onwards.
  • PMK Pairwise Master Key
  • Step 12 The UE 310 receives IP configuration from the TNAN 320, e.g., with DHCP.
  • Step 13 The UE 310 shall initiate an IKE INIT exchange with the TNGF 330.
  • the UE 310 has received the IP address of TNGF 330 during the EAP-5G signalling in step 9b, subsequently, the UE 310 shall initiate an IKE AUTH exchange and shall include the same UE Id (e.g., SUCI or 5G-GUTI) as in the UE Id provided in step 5.
  • the common KTIPSCC is used for mutual authentication.
  • the key Knpsec is derived as specified in Annex A.22.NULL encryption is negotiated as specified in RFC 2410.
  • an IPsec SA (Security Association) is established between the UE 310 and the TNGF 330 (e.g., a NWt connection) and it is used to transfer all subsequent NAS messages.
  • This IPsec SA does not apply encryption but only apply integrity protection.
  • Step 14 After the NWt connection is successfully established, the TNGF 330 responds to AMF 340 with an N2 Initial Context Setup Response message.
  • Step 15 Finally, the NAS Registration Accept message is sent by the AMF 340 and is forwarded to UE 310 via the established NWt connection.
  • Steps 16-18 The UE 310 initiates a PDU session establishment.
  • the TNGF 330 may establish one or more IPSec child SA’s per PDU session.
  • Step 19 User plane data for the established PDU session is transported between the UE 310 and TNGF 330 inside the established IPSec child SA.
  • a UE TNAP Mobility Scenario can include a UE moving from one TNAP (e.g., TNAP-1) to another TNAP (e.g., TNAP-2) that are connected to or associated with the same TNGF (e.g., TNGF 224), or the TNAPs belong to the same TNGF domain.
  • FIG. 4 illustrates an example of a diagram 400 that supports a security establishment procedure for TNAP Mobility in accordance with aspects of the present disclosure.
  • the procedure can include the following steps (and new adaptations), where Nonces and usage type distinguishers can be inputs:
  • Step 1 A UE 410 established a layer-2 (L2) connection with a TNAP2424.
  • Step 2 The TNAP2 424 initiates an EAP session as usually by requesting the UE 410 identity.
  • NAI Network Access Identifier
  • the Reauth-ID was derived as described herein and the TNGF-ID was received when the UE 410 was first connected to a TNGF 426 of an TNAN, e.g., with an Initial Registration via the TNGF 426.
  • Step 4 A TNAP1 422 selects the TNGF 426 based on the TNG1 -ID in the received realm and forwards the NAI to TNGF 426.
  • the TNGF 426 finds a stored UE context containing the received Re- auth ID, thus, it determines that the UE 410 is a known UE which requests reauthentication. Therefore, it initiates the following steps. If the TNGF 426 cannot find a stored UE context containing the received Re-auth ID, then the TNGF 426 sends either an error response to UE 410, it initiates the signalling procedure related to normal full authentication for trusted non-3GPP access as described herein and in TS 33.501 Clause 7A.2.1. In some cases, the UE context was created in the TNGF 426 when the UE 410 performed an initial registration (see FIG. 3) via a TNGF.
  • Step 6 The TNGF 426 sends a 5G-Challenge packet to UE 410 which contains a TNonce value and a Message Authentication Codel (MAC1) derived by using the TNGF key stored in TNGF 426.
  • MAC1 Message Authentication Codel
  • Step 7 The UE 410 derives an expected MAC1 (XMAC1) using TNGF key stored in UE 410, and TNonce and compares XMAC1 with the received MACE If they match, the TNGF 426 is authenticated by the UE 410.
  • XMAC1 expected MAC1
  • Step 8 The UE 410 generates a UNonce and derives a MAC2 using TNGF key stored in UE 410, and with UNonce and TNonce.
  • Step 9 The UE 410 responds with a 5G-Challenge containing UNonce, TNonce and MAC2.
  • Step 10 The TNGF 426 derives an expected MAC2 (XMAC2) using TNGF and with UNonce and TNonce. Compares XMAC2 with the received MAC2. If they match, the UE 410 is authenticated by TNGF 426.
  • XMAC2 expected MAC2
  • Step 11 The TNGF 426 derives a fresh Re-auth ID for the UE, e.g., by using TNGF key stored in TNGF, TNGF-ID, TNonce, UNonce (exchanged in step 6a, 6b, 9a, 9b) and re-authentication identification/identifier related usage type information (e.g., 0x03).
  • the TNGF 426 derives a new TNAP key by using the TNGF key stored in TNGF, the TNGF-ID, the TNonce, UNonce values and a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh.
  • FC Oxxx (e.g., any value);
  • P0 Usage type distinguisher (i.e., Re-authentication TNAP/TNAP Key Refresh related usage type information (e.g., 0x04));
  • L0 length of Usage type distinguisher (e.g., 0x00 0x01);
  • L0 Length of TNGF Nonce
  • P0 UE Nonce
  • LO Length of UE Nonce
  • the TNGF 426 determines or is configured to reestablish the secure connection (e.g., IP sec between UE 410 and TNGF 426) with the UE 410 via the new target TNAP-2 (e.g., TNAP2 424), the TNGF 426 can refresh the Knpsec.
  • the secure connection e.g., IP sec between UE 410 and TNGF 426
  • the new target TNAP-2 e.g., TNAP2 424
  • FC Oxxx (e.g., any value);
  • P0 Usage type distinguisher (i.e., Re-authentication IPSec/IPSec Key Refresh related usage type information (e.g., 0x05));
  • L0 length of Usage type distinguisher (e.g., 0x00 0x01);
  • L0 Length of TNGF Nonce
  • L0 Length of UE Nonce
  • the TNGF 426 stores the Re-auth ID (derived as described herein and received as the current Re-auth ID), along with UE context such as the TNGF Key, a new TNAP Key, a new TlPSec Key, and Re-auth ID (derived in step 11 as the future/new Re-auth ID).
  • Step 12 The TNGF 426 completes the EAP-5G session by sending an EAP- Success packet to UE 410 and the new TNAP key to TNAP2 424.
  • Step 13 The UE 410 derives a new Re-auth ID by using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce and re-authentication identification/identifier related usage type information (e.g., 0x03) similar to the TNGF (as described in step 11). If the UE 410 and the TNGF 426 share the same TNGF key, then the Reauth-ID derived independently in the UE 410 and in the TNGF will be the same.
  • the UE 410 also derives a new/fresh TNAP key using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce, and a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh (e.g., 0x04) similarly to the TNGF (as in step 11). Additionally, the UE 410 also derives new/fresh TlPSec Key using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce, and a usage type distinguisher specific to Re-authentication IPSec/IPSec Key Refresh (e.g., 0x05) similar to the TNGF.
  • the TNGF 426 provides the Re-auth ID generated in step 11 to the UE 410 in step 12a and 12b. Further, the UE can store the Re-auth ID (derived/received in FIG. 3 and sent in step 4b as the current Re-auth ID), along with UE context such as the TNGF Key, new TNAP Key, new TIPSec Key, and Re-auth ID (derived in step 13 or received in step 12b as the future/new Re-auth ID).
  • Steps 14a-b The new TNAP key is applied to establish over-the-air security between the UE 410 and TNAP2 424. If some cases the UE 410 may receive new IP configuration information (e.g., a new IP address) from the TN AN 420.
  • new IP configuration information e.g., a new IP address
  • Steps 15a-c The UE 410 can initiate an IKE INIT exchange with the TNGF 426.
  • the UE 410 has received the IP address of TNGF in the earlier steps, subsequently, the UE can initiate (in step 15b) an IKE AUTH exchange, which can include the NAI containing the Re-auth ID (or Reauth-ID) as in the UE Id provided in step 3.
  • an IKE AUTH exchange can include the NAI containing the Re-auth ID (or Reauth-ID) as in the UE Id provided in step 3.
  • names in the ID pay loads may correspond to the keys used to generate the AUTH payload.
  • the UE 410 In case the UE 410 utilizes the Re-auth ID based NAI /Re-auth ID in step 5, the UE 410 shall initiate an IKE AUTH exchange and shall include the Re-auth ID based NAI /Re-auth ID in ID payloads.
  • the Re-auth ID based NAI /Re-auth ID is used in step 13b.
  • the fresh Knpsec derived (in step 11 by TNGF and 13 by UE) is used for mutual authentication.
  • NULL encryption is negotiated as specified in RFC 2410.
  • an IPsec SA is established between the UE 410 and TNGF 426 (e.g., a NWt connection) and is used to transfer all subsequent NAS messages. This IPsec SA applies integrity protection.
  • Step 16 The UE 410 resumes communication with TNGF 526 via TNAP2 424.
  • a TNGF (e.g., the TNGF 224) can derive a unique reauthentication identity/identifier (e.g., Re-auth ID) to identify the security context related to the UE to derive and use any re-authentication specific security context. Further, the TNGF can generate a fresh TNAP key and/or TIPSec key during the UE TNAP mobility to re- establish security connections between the UE and a target TNAP, as well as to re-establish IP security associations between the UE and TNGF during UE TNAP mobility.
  • a unique reauthentication identity/identifier e.g., Re-auth ID
  • FIG. 5 illustrates an example of a diagram 500 that supports a UE TNAP Mobility Procedure in accordance with aspects of the present disclosure.
  • the procedure can include the following steps (and new adaptations), where random numbers, counters, and/or usage type distinguishers can be inputs:
  • Step 1 A UE 510 is connected to a TNAP#1 522 of a TNAN 520 by performing authentication for trusted non-3GPP access with the 5G system.
  • a TNGF 526 of the TNAN 520 sends the re-auth Id to UE 510 over the protected interface (e.g., in any step 10b or lOd of FIG. 3).
  • the Re-auth ID can be a generated as ⁇ PLMNID> ⁇ TNGF_ID> ⁇ Temp Id>, where the Temp Id can be equivalent to the TNGF nonce described herein.
  • the TNGF 526 may contain TNGF Address (e.g., FQDN) Information.
  • Steps 2, 3 The UE 510 decides to move from the TNAP#1 522 to a TNAP#2 524 and creates an L2 connection with TNAP#2 524.
  • Steps 4, 5, 6 TNAP#2 524 sends the L2 EAP-Request for Identity towards the UE 510 and the UE 510 responds back with an L2 EAP-Response with Identity (e.g., Re- auth ID) and a TNAP Mobility Indication flag.
  • Identity e.g., Re- auth ID
  • TNAP Mobility Indication flag e.g., Re- auth ID
  • the TNAP2 524 forwards the EAP response with Re-auth ID and the TNAP Mobility lndication flag towards TNGF 526.
  • Step 7-8 Based on the Re-auth ID, TNGF 526 identifies the UE 510 and retrieves the context and TNAP Mobility Indication, and the TNGF 526 checks if the stored context in step 1 is valid and then derives the TNAP keys as described herein. The TNGF 526 responds back to TNAP#2 524 with the generated key RAND (random number) value and MAC for the RAND value. The Message Authentication Code (MAC) is derived by using the TNGF key stored in TNGF 526. In TNAP#2 524, the newly received TNAP key is considered as a Pairwise Master Key (PMK). In some cases, instead of RAND, a counter be used as a freshness parameter.
  • RAND Random number
  • PMK Pairwise Master Key
  • LI length of RAND (e.g., 0x00 0x04);
  • P2 a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh
  • L2 Length of the usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh; and so on.
  • the input key KEY can be the KTNGF.
  • the RAND/COUNTER can be generated and shared with the UE 510.
  • the TNGF 526 determines or is configured to reestablish the secure connection (e.g., IP sec between UE 510 and TNGF 526) with the UE 510 via the new target TNAP#2 524, the TNGF 526can refresh the Knpsec.
  • the secure connection e.g., IP sec between UE 510 and TNGF 526
  • the TNGF 526 can refresh the Knpsec.
  • the following parameters can be used to form the input S to the KDF:
  • FC Oxxx (e.g., any value);
  • P0 Usage type distinguisher (e.g., Re-authentication IPSec/IPSec Key Refresh related usage type information (e.g., 0x05));
  • L0 length of Re-authentication IPSec/IPSec Key Refresh specific Usage type distinguisher (e.g., 0x00 0x01);
  • L0 Length of RAND/COUNTER
  • the TNGF 526 stores the Re-auth ID (derived herein), along with UE context such as the TNGF Key, new TNAP Key, new TlPSec Key, and Re-auth ID (derived in step 11 as the future/new Re-auth ID).
  • the input key KEY shall be KTNGF.
  • the RAND/COUNTER can be generated and shared with the UE 510.
  • Steps 9, 10, 11 The TNAP#2 524 sends an EAP-notifi cation back to the UE 510 with the RAND value along with MAC. If MAC validation is successful then based on the RAND value, UE 510 derives the keys. A 4- way handshake is executed (see IEEE 802.11) which establishes a security context between the WLAN AP and the UE 510 that is used to protect unicast and multicast traffic over the air. In some cases, a counter can be used instead of the RAND.
  • the TNGF 526 sends the new Re-auth ID Id to UE 510 over the secure interface (e.g., in Step 17a-b or in any steps after step 7), which the UE 510 can use for the next interaction.
  • the Re-auth ID can be derived similar to step 1, but with a new TNGF Nonce or new Temp ID, e.g.,, Re-auth ID can be a generated as ⁇ PLMNID> ⁇ TNGF_ID> ⁇ new Temp Id or new TNGF Nonce>.
  • a hash/MAC of the new TNAP key generated in step 7 and the Re-auth ID related usage type distinguisher can be used as the new Temp ID in step 7 or in later steps to generate the new Re-auth ID.
  • Step 12 The new TNAP key is applied to establish over-the-air security between the UE 510 and TNAP#2 524. If needed, the UE 510 may receive new IP configuration information (e.g., a new IP address) from the TN AN 520. When the UE 510 gets the new IP configurations from TNAP#2 524, then the UE 510 updates the SA address using an IKE informational request "UPDATE SA ADDRESS" to TNGF 526 for further communications.
  • new IP configuration information e.g., a new IP address
  • Steps 13a-c The UE 510 can initiate an IKE INIT exchange with the TNGF 526.
  • the UE 510 has received the IP address of TNGF 526 in the earlier steps, subsequently, the UE 510 can initiate (in step 13b) an IKE AUTH exchange which can include the NAI containing the Re-auth ID or Re-auth ID as in the UE Id provided in earlier step 3.
  • an IKE AUTH exchange which can include the NAI containing the Re-auth ID or Re-auth ID as in the UE Id provided in earlier step 3.
  • names in the ID payloads should correspond to the keys used to generate the AUTH payload.
  • the UE 510 In case the UE 510 utilizes the Re-auth ID based NAI /Re-auth ID in step 5, the UE 510 shall initiate an IKE AUTH exchange and shall include the Re-auth ID based NAI /Re-auth ID in ID payloads.
  • the Re-auth ID based NAI /Re-auth ID is used in step 13b.
  • the fresh Knpsec derived (in step 11 by TNGF and 13 by UE) is used for mutual authentication.
  • NULL encryption is negotiated as specified in RFC 2410.
  • an IPsec SA is established between the UE 510 and TNGF 526 (e.g., a NWt connection) and the connection is used to transfer all subsequent NAS messages.
  • the IPsec SA applies integrity protection.
  • Step 16 The UE 510 resumes communication with TNGF 526 via TNAP#2 524.
  • Step 17a-b The TNGF 526 sends the new Re-auth ID generated in earlier steps to the UE 510 via the TNAP#2 524.
  • the UE 510 can derive the new Re-auth ID as derived by the TNGF 526 (e.g., Re-auth ID can be a generated as ⁇ PLMNID> ⁇ TNGF_ID> ⁇ new Temp Id>, where a hash/MAC of the new TNAP key generated in step 10 and the Re-auth ID related usage type distinguisher can be used as the new Temp ID.
  • the TNAP Mobility can utilize a Fast BSS Transition protocol.
  • a FT key hierarchy is established based on the Master Session Key (MSK) by the R0 Key Holder (R0KH) that is co-located with an 802. IX authenticator.
  • MSK Master Session Key
  • R0KH R0 Key Holder
  • 802. IX authenticator 802. IX authenticator
  • KFT 256 bit key
  • FIG. 6 illustrates an example of a diagram 600 that supports TNAP Mobility using a Fast BSS (Basic Service Set) Transition (FT) protocol in accordance with aspects of the present disclosure.
  • the key KFT is derived from KTNGF using fixed inputs similar to the derivation of KTNAP from KTNGF described in Annex A.22 of TS 33.501, but using a new Usage type distinguisher, e.g. 0x03.
  • the key KFT is used to create the FT key hierarchy specified in 802.11. Specifically, KFT is used as Master PMK (MPMK) that is used as an input key for RO-Key-Data derivation. With the RO-Key-Data, the FT key hierarchy is established. In effect, KFT links the 5G key hierarchy and FT key hierarchy as it is derived from a key in the 5G key hierarchy and being used to create the FT key hierarchy.
  • MPMK Master PMK
  • a UE When a UE switches to a new TNAP within the same mobility domain identified by the Mobility domain identifier (MDID), the UE performs the fast BSS transition procedure.
  • the entity that has received KFT from the TNGF takes the role of PMK R0 Key Holder (R0KH) that holds the key, PMK-R0.
  • the R0KH derives PMK-R1 from PMK-RO and provides it to the new AP (e.g., TNAP in TNAN) during the FT procedure.
  • the steps for the key handling during a TNAP change are as follows:
  • Step 1 Before the TNAP change the following has happened, RO Key Holder (ROKH) (entity that holds the FT root key) has received KFT from the TNGF and has used this to derive PMK-RO which the ROKH stores to derive further keys.
  • ROKH entity that holds the FT root key
  • the UE is connected to a TNAP.
  • Step 2 The UE contacts the new TNAP.
  • Step 3 The new TNAP contacts the ROKH to request a key for the UE.
  • the ROKH calculates the key PMK-R1 from PMK-RO and sends a PMK-R1 to the new TNAP.
  • Step 4 The UE and new TNAP use PMK-R1 as the pairwise master key to secure the connection between the UE and new TNAP.
  • the 5G and FT key hierarchies link together.
  • the TNGF can send both KTNAP and KFT to the entity that holds the root key of the FT key hierarchies an MSK.
  • the TNGF sets the MSK to KTNAP
  • the TNGF sends the MSK using existing mechanisms.
  • the TNGF can send both KTNAP (e.g., a fresh TNAP Key generated) and KFT to the entity that holds the root key of the FT key hierarchies an MSK.
  • KTNAP e.g., a fresh TNAP Key generated
  • KFT a fresh TNAP Key generated
  • the TNGF sets the MSK to KTNAP
  • the TNGF sends the MSK using mechanisms described herein.
  • the fresh TNAP key generation and usage is based on various techniques described herein.
  • FIG. 7 illustrates an example of a block diagram 700 of a device 702 that supports UE TNAP Mobility in accordance with aspects of the present disclosure.
  • the device 702 may be an example of a network entity 102 as described herein.
  • the device 702 may support wireless communication with one or more network entities 102, UEs 104, or any combination thereof.
  • the device 702 may include components for bi-directional communications including components for transmitting and receiving communications, such as a processor 704, a memory 706, a transceiver 708, and an I/O controller 710. These components may be in electronic communication or otherwise coupled (e.g., operatively, communicatively, functionally, electronically, electrically) via one or more interfaces (e.g., buses).
  • the processor 704, the memory 706, the transceiver 708, or various combinations thereof or various components thereof may be examples of means for performing various aspects of the present disclosure as described herein.
  • the processor 704, the memory 706, the transceiver 708, or various combinations or components thereof may support a method for performing one or more of the operations described herein.
  • the processor 704, the memory 706, the transceiver 708, or various combinations or components thereof may be implemented in hardware (e.g., in communications management circuitry).
  • the hardware may include a processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field- programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic, discrete hardware components, or any combination thereof configured as or otherwise supporting a means for performing the functions described in the present disclosure.
  • the processor 704 and the memory 706 coupled with the processor 704 may be configured to perform one or more of the functions described herein (e.g., executing, by the processor 704, instructions stored in the memory 706).
  • the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein.
  • the processor 704 may be configured as or otherwise support a means for deriving a TIPSec Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receiving, from a UE, a re-authentication identifier for the UE, identifying the TIPSec Key using the reauthentication identifier, and re-establishing an IPSec SA based on the identified TIPSec Key.
  • the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein.
  • the processor 704 may be configured as or otherwise support a means for deriving a TIPSec Key using, a stored TNGF Key, an input parameter, and a re-authentication usage type distinguisher, and transmitting, to a TNGF, a re-authentication identifier for the UE.
  • the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein.
  • the processor 704 may be configured as or otherwise support a means for generating a security context between a UE and a TNAP by deriving a TNAP key using a TNGF key, a freshness parameter, and a TNAP key refresh usage type distinguisher, deriving a re-authentication identifier using the TNGF key, the freshness parameter, and a re-authentication identification usage type distinguisher, and sending the derived re-authentication identifier to the UE.
  • the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein.
  • the processor 704 may be configured as or otherwise support a means for receiving information from a TNGF, including TNGF information, a freshness parameter, and a re-authentication identifier, and refreshing a TNAP key using the information received from the TNGF and a TNAP/TNAP Key refresh related usage type distinguisher.
  • the processor 704 may include an intelligent hardware device (e.g., a general- purpose processor, a DSP, a CPU, a microcontroller, an ASIC, an FPGA, a programmable logic device, a discrete gate or transistor logic component, a discrete hardware component, or any combination thereof).
  • the processor 704 may be configured to operate a memory array using a memory controller.
  • a memory controller may be integrated into the processor 704.
  • the processor 704 may be configured to execute computer-readable instructions stored in a memory (e.g., the memory 706) to cause the device 702 to perform various functions of the present disclosure.
  • the memory 706 may include random access memory (RAM) and read-only memory (ROM).
  • the memory 706 may store computer-readable, computer-executable code including instructions that, when executed by the processor 704 cause the device 702 to perform various functions described herein.
  • the code may be stored in a non-transitory computer-readable medium such as system memory or another type of memory.
  • the code may not be directly executable by the processor 704 but may cause a computer (e.g., when compiled and executed) to perform functions described herein.
  • the memory 706 may include, among other things, a basic I/O system (BIOS) which may control basic hardware or software operation such as the interaction with peripheral components or devices.
  • BIOS basic I/O system
  • the I/O controller 710 may manage input and output signals for the device 702.
  • the I/O controller 710 may also manage peripherals not integrated into the device M02.
  • the I/O controller 710 may represent a physical connection or port to an external peripheral.
  • the I/O controller 710 may utilize an operating system such as iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®, UNIX®, LINUX®, or another known operating system.
  • the I/O controller 710 may be implemented as part of a processor, such as the processor M04.
  • a user may interact with the device 702 via the I/O controller 710 or via hardware components controlled by the I/O controller 710.
  • the device 702 may include a single antenna 712. However, in some other implementations, the device 702 may have more than one antenna 712 (i.e., multiple antennas), including multiple antenna panels or antenna arrays, which may be capable of concurrently transmitting or receiving multiple wireless transmissions.
  • the transceiver 708 may communicate bi-directionally, via the one or more antennas 712, wired, or wireless links as described herein.
  • the transceiver 708 may represent a wireless transceiver and may communicate bi-directionally with another wireless transceiver.
  • the transceiver 708 may also include a modem to modulate the packets, to provide the modulated packets to one or more antennas 712 for transmission, and to demodulate packets received from the one or more antennas 712.
  • FIG. 8 illustrates a flowchart of a method 800 that supports establishing an IPSec Security Association between a UE and a TGNF in accordance with aspects of the present disclosure.
  • the operations of the method 800 may be implemented by a device or its components as described herein.
  • the operations of the method 800 may be performed by the network entity 102 (e.g., a TGNF) as described with reference to FIGs. 1 through 6.
  • the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using specialpurpose hardware.
  • the method may include deriving a UPSec Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher.
  • the operations of 805 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 805 may be performed by a device as described with reference to FIG. 1.
  • the method may include receiving, from a UE, a re-authentication identifier for the UE.
  • the operations of 810 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 810 may be performed by a device as described with reference to FIG. 1.
  • the method may include identifying the UPSec Key using the reauthentication identifier.
  • the operations of 815 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 815 may be performed by a device as described with reference to FIG. 1.
  • the method may include re-establishing an IPSec SA based on the identified TIPSec Key.
  • the operations of 820 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 820 may be performed by a device as described with reference to FIG. 1.
  • FIG. 9 illustrates a flowchart of a method 900 that supports authentication of a UE to a TGNF in accordance with aspects of the present disclosure.
  • the operations of the method 900 may be implemented by a device or its components as described herein.
  • the operations of the method 900 may be performed by the UE 104 as described with reference to FIGs. 1 through 6.
  • the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using special-purpose hardware.
  • the method may include deriving a Trusted IP Security (TIPSec) Key using a stored TNGF Key, an input parameter, and a re- authentication IPSec Key Refresh usage type distinguisher.
  • TIPSec Trusted IP Security
  • the operations of 905 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 905 may be performed by a device as described with reference to FIG. 1.
  • the method may include transmitting, to a TNGF, a re-authentication identifier for the UE.
  • the operations of 910 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 910 may be performed by a device as described with reference to FIG. 1.
  • FIG. 10 illustrates a flowchart of a method 1000 that supports generating a security context between a UE and a TNAP in accordance with aspects of the present disclosure.
  • the operations of the method 1000 may be implemented by a device or its components as described herein.
  • the operations of the method 1000 may be performed by the network entity 102 (e.g., a TGNF) as described with reference to FIGs. 1 through 6.
  • the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using specialpurpose hardware.
  • the method may include deriving a TNAP key using a TNGF key, a freshness parameter, and a TNAP key refresh usage type distinguisher.
  • the operations of 1005 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1005 may be performed by a device as described with reference to FIG. 1.
  • the method may include deriving a re-authentication identifier using the TNGF key, the freshness parameter, and a re-authentication identification usage type distinguisher.
  • the operations of 1010 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1010 may be performed by a device as described with reference to FIG. 1.
  • the method may include sending the derived re-authentication identifier to the UE.
  • the operations of 1015 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1015 may be performed by a device as described with reference to FIG. 1.
  • FIG. 11 illustrates a flowchart of a method 1100 that supports generating a security context for a UE in accordance with aspects of the present disclosure.
  • the operations of the method 1100 may be implemented by a device or its components as described herein.
  • the operations of the method 1000 may be performed by the UE 104 as described with reference to FIGs. 1 through 6.
  • the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using special-purpose hardware.
  • the method may include receiving information from a TNGF, including TNGF information, a freshness parameter, and a re-authentication identifier.
  • the operations of 1105 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1105 may be performed by a device as described with reference to FIG. 1.
  • the method may include refreshing a TNAP key using the information received from the TNGF and a TNAP/TNAP Key refresh related usage type distinguisher.
  • the operations of 1110 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1110 may be performed by a device as described with reference to FIG. 1.
  • a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices (e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • the functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope of the disclosure and appended claims. For example, due to the nature of software, functions described herein may be implemented using software executed by a processor, hardware, firmware, hardwiring, or combinations of any of these. Features implementing functions may also be physically located at various positions, including being distributed such that portions of functions are implemented at different physical locations.
  • Computer-readable media includes both non-transitory computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a non-transitory storage medium may be any available medium that may be accessed by a general-purpose or special-purpose computer.
  • non-transitory computer-readable media may include RAM, ROM, electrically erasable programmable ROM (EEPROM), flash memory, compact disk (CD) ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other non-transitory medium that may be used to carry or store desired program code means in the form of instructions or data structures and that may be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor.
  • RAM random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable ROM
  • CD compact disk
  • magnetic disk storage or other magnetic storage devices or any other non-transitory medium that may be used to carry or store desired program code means in the form of instructions or data structures and that may be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor.
  • any connection may be properly termed a computer-readable medium.
  • the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of computer-readable medium.
  • Disk and disc include CD, laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer- readable media.
  • a list of items indicates an inclusive list such that, for example, a list of at least one of A, B, or C means A or B or C or AB or AC or BC or ABC (i.e., A and B and C).
  • the phrase “based on” shall not be construed as a reference to a closed set of conditions. For example, an example step that is described as “based on condition A” may be based on both a condition A and a condition B without departing from the scope of the present disclosure.
  • the phrase “based on” shall be construed in the same manner as the phrase “based at least in part on.
  • a “set” may include one or more elements.
  • the terms “transmitting,” “receiving,” or “communicating,” when referring to a network entity, may refer to any portion of a network entity (e.g., a base station, a CU, a DU, a RU) of a RAN communicating with another device (e.g., directly or via one or more other network entities).
  • a network entity e.g., a base station, a CU, a DU, a RU
  • another device e.g., directly or via one or more other network entities.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Various aspects of the present disclosure relate to UE TNAP Mobility. For example, the technology can provide UE TNAP Mobility authentication and security establishment procedures, such as procedures that utilize new input parameters and security key refreshes during the authentication and security establishment procedures when a UE moves from a source TNAP to a target TNAP.

Description

RE-ESTABLISHMENT OF TRUSTED IP SECURITY FOR TRUSTED NON-3GPP ACCESS POINT (TNAP) MOBILITY
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Patent Application No. 63/482,715, filed on February 1, 2023, entitled RE-ESTABLISHMENT OF TRUSTED IP SECURITY FOR TRUSTED NON-3GPP ACCESS POINT (TNAP) MOBILITY, which is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
[0002] The present disclosure relates to wireless communications, and more specifically to Trusted Non-3GPP Access Point (TNAP) Mobility.
BACKGROUND
[0003] A wireless communications system may include one or multiple network communication devices, such as base stations, which may be otherwise known as an eNodeB (eNB), a next-generation NodeB (gNB), or other suitable terminology. Each network communication device, such as a base station, may support wireless communications for one or multiple user communication devices, which may be otherwise known as user equipment (UE), or other suitable terminology. The wireless communications system may support wireless communications with one or multiple user communication devices by utilizing resources of the wireless communication system (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers). Additionally, the wireless communications system may support wireless communications across various radio access technologies including third generation (3G) radio access technology, fourth generation (4G) radio access technology, fifth generation (5G) radio access technology, among other suitable radio access technologies beyond 5G (e.g., sixth generation (6G)).
[0004] The 5G network supports authentication for trusted non-3GPP access by UEs, where a UE connects (e.g., registers) to a 5G core network via a trusted Non-3GPP Access Network (TNAN). For example, as stated in Rel.17, when a UE moves from a source TN Access Point (TNAP) to a target TNAP, the UE performs a full authentication via the target TNAP to re-connect to the 5G network. Typically, a full authentication involves a security establishment at all levels, including access network security (e.g., a security establishment between the UE and the access network, or TNAN) and non-access stratum security (e.g., a security establishment between the UE and the 5G core network).
SUMMARY
[0005] The present disclosure relates to methods, apparatuses, and systems that support UE TNAP Mobility authentication and security establishment procedures, such as procedures that utilize new input parameters and security key refreshes during the authentication and security establishment procedures, among other techniques.
[0006] Some implementations of the method and apparatuses described herein may further include a Trusted Non-3GPP Gateway Function (TNGF), comprising: a processor and a memory coupled with the processor, the processor configured to cause the TNGF to derive a Trusted IP Security (TIPSec) Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receive, from user equipment (UE), a reauthentication identifier for the UE, identify the TIPSec Key using the re-authentication identifier; and re-establish an IPSec Security Association (SA) based on the identified TIPSec Key.
[0007] In some implementations of the method and apparatuses described herein, the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information, and wherein the input parameter includes: a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the re-authentication counter, a random number, a length of the random number, and combinations thereof.
[0008] In some implementations of the method and apparatuses described herein, the TNGF sends the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE. [0009] In some implementations of the method and apparatuses described herein, the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
[0010] In some implementations of the method and apparatuses described herein, the TNGF derives the TIPSec Key during UE mobility from a previous TNAP to a target TNAP associated with the TNGF.
[0011] Some implementations of the method and apparatuses described herein may further include a method performed by a TNGF, including deriving a Trusted IP Security (TIPSec) Key using: a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receiving, from user equipment (UE), a re-authentication identifier for the UE, identifying the TIPSec Key using the re-authentication identifier, and re-establishing an IPSec Security Association (SA) based on the identified TIPSec Key.
[0012] In some implementations of the method and apparatuses described herein, the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information, and wherein the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
[0013] In some implementations of the method and apparatuses described herein, the TNGF sends the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE.
[0014] In some implementations of the method and apparatuses described herein, the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
[0015] In some implementations of the method and apparatuses described herein, the TNGF derives the TIPSec Key in response to UE mobility from a previous TNAP to a target TNAP associated with the TNGF. [0016] Some implementations of the method and apparatuses described herein may further include a UE, comprising: a processor; and a memory coupled with the processor, the processor configured to cause the UE to derive a TIPSec Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmit, to a TNGF, a re-authentication identifier for the UE.
[0017] In some implementations of the method and apparatuses described herein, the UE transmit the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
[0018] In some implementations of the method and apparatuses described herein, the UE transmits a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
[0019] In some implementations of the method and apparatuses described herein, the UE derives the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
[0020] In some implementations of the method and apparatuses described herein, the re-authentication identifier is part of a Network Access Identifier (NAI) transmitted from the UE to the TNGF.
[0021] In some implementations of the method and apparatuses described herein, the re-authentication usage type distinguisher includes re-authentication identification/identifier related usage type information, and wherein the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
[0022] Some implementations of the method and apparatuses described herein may further include a method performed by UE, including deriving a TIPSec Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmitting, to a TNGF, a re-authentication identifier for the UE. [0023] In some implementations of the method and apparatuses described herein, the UE transmits the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
[0024] In some implementations of the method and apparatuses described herein, the UE transmits a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
[0025] In some implementations of the method and apparatuses described herein, the UE derives the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
[0026] In some implementations of the method and apparatuses described herein, the re-authentication identifier is part of an NAI transmitted from the UE to the TNGF.
[0027] In some implementations of the method and apparatuses described herein, the re-authentication usage type distinguisher includes re-authentication identification/identifier related usage type information, and wherein the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a re-authentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
[0028] Some implementations of the method and apparatuses described herein may further include a processor for wireless communication, comprising at least one controller coupled with at least one memory and configured to cause the processor to derive a TIPSec Key using a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher, and transmit, to a TNGF, a re-authentication identifier for the processor.
[0029] In some implementations of the method and apparatuses described herein, the controller is further configured to cause the processer to transmit the re-authentication identifier during IKE authentication exchange with the TNGF. [0030] In some implementations of the method and apparatuses described herein, the controller is further configured to cause the processor to transmit a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
[0031] In some implementations of the method and apparatuses described herein, the controller is further configured to cause the processor to derive the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a reauthentication identification usage type distinguisher.
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] FIG. 1 illustrates an example of a wireless communications system that supports TNAP Mobility in accordance with aspects of the present disclosure.
[0033] FIG. 2 illustrates an example of a diagram that supports UE mobility from a source TNAP to a target TNAP in accordance with aspects of the present disclosure.
[0034] FIG. 3 illustrates an example of a diagram that supports authentication and Protocol Data Unit (PDU) Session establishment for Trusted Non-3GPP access in accordance with aspects of the present disclosure.
[0035] FIG. 4 illustrates an example of a diagram that supports a security establishment procedure for TNAP Mobility in accordance with aspects of the present disclosure.
[0036] FIG. 5 illustrates an example of a diagram that supports a UE TNAP Mobility Procedure in accordance with aspects of the present disclosure.
[0037] FIG. 6 illustrates an example of a diagram that supports TNAP Mobility using a Fast BSS (Basic Service Set) Transition (FT) protocol in accordance with aspects of the present disclosure.
[0038] FIG. 7 illustrates an example of a block diagram of a device that supports TNAP Mobility in accordance with aspects of the present disclosure. [0039] FIG. 8 illustrates a flowchart of a method that supports establishing an IPSec Security Association between a UE and a TGNF in accordance with aspects of the present disclosure.
[0040] FIG. 9 illustrates a flowchart of a method that supports authentication of a UE to a TGNF in accordance with aspects of the present disclosure.
[0041] FIG. 10 illustrates a flowchart of a method that supports generating a security context between a UE and a TNAP in accordance with aspects of the present disclosure.
[0042] FIG. 11 illustrates a flowchart of a method that supports generating a security context for a UE in accordance with aspects of the present disclosure.
DETAILED DESCRIPTION
[0043] During UE TNAP Mobility, the access network changes, while the core network remains unchanged. Thus, current procedures that cause the UE to perform a full authentication with the core network during TNAP Mobility can lead to inefficiencies, such as unnecessary multiple message exchanges between the UE and the core network. These message exchanges can cause resource exhaustion and delays during the re-establishment of the connection between the UE and the core network.
[0044] In some cases, a 5G network could support both the re-authentication and the security establishment of the UE to the core network without performing the full authentication procedures, such as by enabling a fresh TNAP key generation at a TNGF (Trusted Non-3GPP Gateway Function) associated with a target TNAP. However, some issues can arise, such as (1) the reuse of the same Trusted Access IP Security (TIPSec) Key (KTIPSCC) to perform IKE Auth messaging and secure connection establishment between the UE and a TNGF via the target TNAP, (2) a re-authentication ID (e.g., Re-auth ID) and new TNAP key (for the target TNAP) that is generated can result in the same output due to same input usage for the key derivation function, which can lead to an exposure of a new TNAP key, among other drawbacks. [0045] The technology described herein adapts the UE TNAP Mobility authentication and security establishment procedures to avoid reliance on full authentication during UE Mobility between TNAPs without the various issues described herein (e.g., key reuse).
[0046] For example, the technology provides for re-authentication identity or identifier (ID) generation using new input parameters. The input parameters can include a usage type parameter, such as “re-authentication identification/identifier related usage type information,” to distinguish the ID from the other security keys generated from a same or shared root key (e.g., a TNGF Key).
[0047] Further, the technology provides for a TNAP Key (KTNAP) refresh by a UE and/or a TNGF using a TNGF Key, as well as other input parameters, such as freshness parameters (e.g., Nonces, Counter, Random, and so on) and/or a re-authentication TNAP/TNAP Key Refresh related usage type distinguisher.
[0048] The technology can also provide a TlPSec Key (KTIPSCC) refresh mechanism between a UE and a TNGF to establish a secure connection (e.g., an IPSec following IKE Auth messaging between the UE and the TNGF).
[0049] Also, the technology can provide for an exchange of a re-auth ID during IKE Auth message within ID Payloads to indicate a UE context containing a UE TNAP Mobility related re-authentication security context. The re-authentication security context, which includes a fresh Knpsec, can identify and establish the security connection (e.g., the IPSec) between the UE and the TNGF.
[0050] Thus, by utilizing the technology described herein, the 5G network can support UE TNAP Mobility without reliance on the full authentication procedures and while avoiding issues with security key reuse and related drawbacks.
[0051] Aspects of the present disclosure are described in the context of a wireless communications system. Aspects of the present disclosure are further illustrated and described with reference to device diagrams and flowcharts.
[0052] FIG. 1 illustrates an example of a wireless communications system 100 that supports TNAP Mobility in accordance with aspects of the present disclosure. The wireless communications system 100 may include one or more network entities 102, one or more UEs 104, a core network 106, and a packet data network 108. The wireless communications system 100 may support various radio access technologies. In some implementations, the wireless communications system 100 may be a 4G network, such as an LTE network or an LTE- Advanced (LTE- A) network. In some other implementations, the wireless communications system 100 may be a 5G network, such as an NR network. In other implementations, the wireless communications system 100 may be a combination of a 4G network and a 5G network, or other suitable radio access technology including Institute of Electrical and Electronics Engineers (IEEE) 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20. The wireless communications system 100 may support radio access technologies beyond 5G. Additionally, the wireless communications system 100 may support technologies, such as time division multiple access (TDMA), frequency division multiple access (FDMA), or code division multiple access (CDMA), etc.
[0053] The one or more network entities 102 may be dispersed throughout a geographic region to form the wireless communications system 100. One or more of the network entities 102 described herein may be or include or may be referred to as a network node, a base station, a network element, a radio access network (RAN), a base transceiver station, an access point, a NodeB, an eNodeB (eNB), a next-generation NodeB (gNB), or other suitable terminology. A network entity 102 and a UE 104 may communicate via a communication link 110, which may be a wireless or wired connection. For example, a network entity 102 and a UE 104 may perform wireless communication (e.g., receive signaling, transmit signaling) over a Uu interface.
[0054] A network entity 102 may provide a geographic coverage area 112 for which the network entity 102 may support services (e.g., voice, video, packet data, messaging, broadcast, etc.) for one or more UEs 104 within the geographic coverage area 112. For example, a network entity 102 and a UE 104 may support wireless communication of signals related to services (e.g., voice, video, packet data, messaging, broadcast, etc.) according to one or multiple radio access technologies. In some implementations, a network entity 102 may be moveable, for example, a satellite associated with a non-terrestrial network. In some implementations, different geographic coverage areas 112 associated with the same or different radio access technologies may overlap, but the different geographic coverage areas 112 may be associated with different network entities 102. Information and signals described herein may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
[0055] The one or more UEs 104 may be dispersed throughout a geographic region of the wireless communications system 100. A UE 104 may include or may be referred to as a mobile device, a wireless device, a remote device, a remote unit, a handheld device, or a subscriber device, or some other suitable terminology. In some implementations, the UE 104 may be referred to as a unit, a station, a terminal, or a client, among other examples. Additionally, or alternatively, the UE 104 may be referred to as an Internet-of-Things (loT) device, an Internet-of-Everything (loE) device, or machine-type communication (MTC) device, among other examples. In some implementations, a UE 104 may be stationary in the wireless communications system 100. In some other implementations, a UE 104 may be mobile in the wireless communications system 100.
[0056] The one or more UEs 104 may be devices in different forms or having different capabilities. Some examples of UEs 104 are illustrated in FIG. 1. A UE 104 may be capable of communicating with various types of devices, such as the network entities 102, other UEs 104, or network equipment (e.g., the core network 106, the packet data network 108, a relay device, an integrated access and backhaul (IAB) node, or another network equipment), as shown in FIG. 1. Additionally, or alternatively, a UE 104 may support communication with other network entities 102 or UEs 104, which may act as relays in the wireless communications system 100.
[0057] A UE 104 may also be able to support wireless communication directly with other UEs 104 over a communication link 114. For example, a UE 104 may support wireless communication directly with another UE 104 over a device-to-device (D2D) communication link. In some implementations, such as vehicle-to-vehicle (V2V) deployments, vehicle-to-everything (V2X) deployments, or cellular-V2X deployments, the communication link 114 may be referred to as a sidelink. For example, a UE 104 may support wireless communication directly with another UE 104 over a PC5 interface.
[0058] A network entity 102 may support communications with the core network 106, or with another network entity 102, or both. For example, a network entity 102 may interface with the core network 106 through one or more backhaul links 116 (e.g., via an SI, N2, N2, or another network interface). The network entities 102 may communicate with each other over the backhaul links 116 (e.g., via an X2, Xn, or another network interface). In some implementations, the network entities 102 may communicate with each other directly (e.g., between the network entities 102). In some other implementations, the network entities 102 may communicate with each other or indirectly (e.g., via the core network 106). In some implementations, one or more network entities 102 may include subcomponents, such as an access network entity, which may be an example of an access node controller (ANC). An ANC may communicate with the one or more UEs 104 through one or more other access network transmission entities, which may be referred to as a radio heads, smart radio heads, or transmission-reception points (TRPs).
[0059] In some implementations, a network entity 102 may be configured in a disaggregated architecture, which may be configured to utilize a protocol stack physically or logically distributed among two or more network entities 102, such as an integrated access backhaul (IAB) network, an open RAN (O-RAN) (e.g., a network configuration sponsored by the O-RAN Alliance), or a virtualized RAN (vRAN) (e.g., a cloud RAN (C- RAN)). For example, a network entity 102 may include one or more of a central unit (CU), a distributed unit (DU), a radio unit (RU), a RAN Intelligent Controller (RIC) (e.g., a NearReal Time RIC (Near-RT RIC), a Non-Real Time RIC (Non-RT RIC)), a Service Management and Orchestration (SMO) system, or any combination thereof.
[0060] An RU may also be referred to as a radio head, a smart radio head, a remote radio head (RRH), a remote radio unit (RRU), or a transmission reception point (TRP). One or more components of the network entities 102 in a disaggregated RAN architecture may be co-located, or one or more components of the network entities 102 may be located in distributed locations (e.g., separate physical locations). In some implementations, one or more network entities 102 of a disaggregated RAN architecture may be implemented as virtual units (e.g., a virtual CU (VCU), a virtual DU (VDU), a virtual RU (VRU)).
[0061] Split of functionality between a CU, a DU, and an RU may be flexible and may support different functionalities depending upon which functions (e.g., network layer functions, protocol layer functions, baseband functions, radio frequency functions, and any combinations thereof) are performed at a CU, a DU, or an RU. For example, a functional split of a protocol stack may be employed between a CU and a DU such that the CU may support one or more layers of the protocol stack and the DU may support one or more different layers of the protocol stack. In some implementations, the CU may host upper protocol layer (e.g., a layer 3 (L3), a layer 2 (L2)) functionality and signaling (e.g., Radio Resource Control (RRC), service data adaption protocol (SDAP), Packet Data Convergence Protocol (PDCP)). The CU may be connected to one or more DUsor RUs, and the one or more DUs or RUs may host lower protocol layers, such as a layer 1 (LI) (e.g., physical (PHY) layer) or an L2 (e.g., radio link control (RLC) layer, medium access control (MAC) layer) functionality and signaling, and may each be at least partially controlled by the CU 160.
[0062] Additionally, or alternatively, a functional split of the protocol stack may be employed between a DU and an RU such that the DU may support one or more layers of the protocol stack and the RU may support one or more different layers of the protocol stack. The DU may support one or multiple different cells (e.g., via one or more RUs). In some implementations, a functional split between a CU and a DU, or between a DU and an RU may be within a protocol layer (e.g., some functions for a protocol layer may be performed by one of a CU, a DU, or an RU, while other functions of the protocol layer are performed by a different one of the CU, the DU, or the RU).
[0063] A CU may be functionally split further into CU control plane (CU-CP) and CU user plane (CU-UP) functions. A CU may be connected to one or more DUs via a midhaul communication link (e.g., Fl, Fl-c, Fl-u), and a DU may be connected to one or more RUs via a fronthaul communication link (e.g., open fronthaul (FH) interface). In some implementations, a midhaul communication link or a fronthaul communication link may be implemented in accordance with an interface (e.g., a channel) between layers of a protocol stack supported by respective network entities 102 that are in communication via such communication links.
[0064] The core network 106 may support user authentication, access authorization, tracking, connectivity, and other access, routing, or mobility functions. The core network 106 may be an evolved packet core (EPC), or a 5G core (5GC), which may include a control plane entity that manages access and mobility (e.g., a mobility management entity (MME), an access and mobility management functions (AMF)) and a user plane entity that routes packets or interconnects to external networks (e.g., a serving gateway (S-GW), a Packet Data Network (PDN) gateway (P-GW), or a user plane function (UPF)). In some implementations, the control plane entity may manage non-access stratum (NAS) functions, such as mobility, authentication, and bearer management (e.g., data bearers, signal bearers, etc.) for the one or more UEs 104 served by the one or more network entities 102 associated with the core network 106.
[0065] The core network 106 may communicate with the packet data network 108 over one or more backhaul links 116 (e.g., via an SI, N2, N2, or another network interface). The packet data network 108 may include an application server 118. In some implementations, one or more UEs 104 may communicate with the application server 118. A UE 104 may establish a session (e.g., a protocol data unit (PDU) session, or the like) with the core network 106 via a network entity 102. The core network 106 may route traffic (e.g., control information, data, and the like) between the UE 104 and the application server 118 using the established session (e.g., the established PDU session). The PDU session may be an example of a logical connection between the UE 104 and the core network 106 (e.g., one or more network functions of the core network 106).
[0066] In the wireless communications system 100, the network entities 102 and the UEs 104 may use resources of the wireless communication system 100 (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers)) to perform various operations (e.g., wireless communications). In some implementations, the network entities 102 and the UEs 104 may support different resource structures. For example, the network entities 102 and the UEs 104 may support different frame structures. In some implementations, such as in 4G, the network entities 102 and the UEs 104 may support a single frame structure. In some other implementations, such as in 5G and among other suitable radio access technologies, the network entities 102 and the UEs 104 may support various frame structures (i.e., multiple frame structures). The network entities 102 and the UEs 104 may support various frame structures based on one or more numerologies.
[0067] One or more numerologies may be supported in the wireless communications system 100, and a numerology may include a subcarrier spacing and a cyclic prefix. A first numerology (e.g., /r=0) may be associated with a first subcarrier spacing (e.g., 15 kHz) and a normal cyclic prefix. In some implementations, the first numerology (e.g., /r=0) associated with the first subcarrier spacing (e.g., 15 kHz) may utilize one slot per subframe. A second numerology (e.g., /r=l) may be associated with a second subcarrier spacing (e.g., 30 kHz) and a normal cyclic prefix. A third numerology (e.g., /r=2) may be associated with a third subcarrier spacing (e.g., 60 kHz) and a normal cyclic prefix or an extended cyclic prefix. A fourth numerology (e.g., /r=3) may be associated with a fourth subcarrier spacing (e.g., 120 kHz) and a normal cyclic prefix. A fifth numerology (e.g., /r=4) may be associated with a fifth subcarrier spacing (e.g., 240 kHz) and a normal cyclic prefix.
[0068] A time interval of a resource (e.g., a communication resource) may be organized according to frames (also referred to as radio frames). Each frame may have a duration, for example, a 10 millisecond (ms) duration. In some implementations, each frame may include multiple subframes. For example, each frame may include 10 subframes, and each subframe may have a duration, for example, a 1 ms duration. In some implementations, each frame may have the same duration. In some implementations, each subframe of a frame may have the same duration.
[0069] Additionally or alternatively, a time interval of a resource (e.g., a communication resource) may be organized according to slots. For example, a subframe may include a number (e.g., quantity) of slots. The number of slots in each subframe may also depend on the one or more numerologies supported in the wireless communications system 100. For instance, the first, second, third, fourth, and fifth numerologies (i.e., /r=0, jU=l, /r=2, jU=3, /r=4) associated with respective subcarrier spacings of 15 kHz, 30 kHz, 60 kHz, 120 kHz, and 240 kHz may utilize a single slot per subframe, two slots per subframe, four slots per subframe, eight slots per subframe, and 16 slots per subframe, respectively. Each slot may include a number (e.g., quantity) of symbols (e.g., OFDM symbols). In some implementations, the number (e.g., quantity) of slots for a subframe may depend on a numerology. For a normal cyclic prefix, a slot may include 14 symbols. For an extended cyclic prefix (e.g., applicable for 60 kHz subcarrier spacing), a slot may include 12 symbols. The relationship between the number of symbols per slot, the number of slots per subframe, and the number of slots per frame for a normal cyclic prefix and an extended cyclic prefix may depend on a numerology. It should be understood that reference to a first numerology (e.g., /r=0) associated with a first subcarrier spacing (e.g., 15 kHz) may be used interchangeably between subframes and slots.
[0070] In the wireless communications system 100, an electromagnetic (EM) spectrum may be split, based on frequency or wavelength, into various classes, frequency bands, frequency channels, etc. By way of example, the wireless communications system 100 may support one or multiple operating frequency bands, such as frequency range designations FR1 (410 MHz - 7.125 GHz), FR2 (24.25 GHz - 52.6 GHz), FR3 (7.125 GHz - 24.25 GHz), FR4 (52.6 GHz - 114.25 GHz), FR4a or FR4-1 (52.6 GHz - 71 GHz), and FR5 (114.25 GHz - 300 GHz). In some implementations, the network entities 102 and the UEs 104 may perform wireless communications over one or more of the operating frequency bands. In some implementations, FR1 may be used by the network entities 102 and the UEs 104, among other equipment or devices for cellular communications traffic (e.g., control information, data). In some implementations, FR2 may be used by the network entities 102 and the UEs 104, among other equipment or devices for short-range, high data rate capabilities.
[0071] FR1 may be associated with one or multiple numerologies (e.g., at least three numerologies). For example, FR1 may be associated with a first numerology (e.g., /r=0), which includes 15 kHz subcarrier spacing; a second numerology (e.g., /r=l), which includes 30 kHz subcarrier spacing; and a third numerology (e.g., /r=2), which includes 60 kHz subcarrier spacing. FR2 may be associated with one or multiple numerologies (e.g., at least 2 numerologies). For example, FR2 may be associated with a third numerology (e.g., /r=2), which includes 60 kHz subcarrier spacing; and a fourth numerology (e.g., /r=3), which includes 120 kHz subcarrier spacing.
[0072] As described herein, a 5G network can utilize various techniques to provide authentication and security establishment between a UE and a core network during UE TNAP Mobility, without employ a full authentication procedure for the UE. FIG. 2 illustrates an example of a diagram 200 that supports UE mobility from a source TNAP to a target TNAP in accordance with aspects of the present disclosure.
[0073] For example, a UE 210, which is connected to a 5G core network (such as a TNAN) 220 moves from a source TNAP 222 (e.g., TNAP-1) to a target TNAP 226 (e.g., TNAP-2). The TNAP-1 and TNAP-2 are associated with a TNGF 224 of the TNAN 220. During UE Mobility of the UE 210, the UE 210, which had a secure connection 230 to the source TNAP 222, connects 235 with the target TNAP 226. As described herein, the UE 210 moves between access points (e.g., from TNAP-1 to TNAP-2), and thus the TNAN 220 can utilize the various authentication and security establishment procedures described herein to authenti cate/ establish the UE 210 to the target TNAP 226, without performing a full authentication (e.g., procedures that involve components of the core network itself).
[0074] In some embodiments, a TNGF (e.g., the TNGF 224) can derive a unique reauthentication identity/identifier (e.g., Re-auth ID) to identify a security context related to the UE (e.g., the UE 210), which can derive and utilize any re-authentication specific security context.
[0075] Further, in some cases, the TNGF can generate a fresh TNAP key and/or TIPSec key during UE TNAP Mobility, to re-establish security connections between the UE and a target TNAP (e.g., the target TNAP 226), as well as to re-establish an IP security association between the UE and the TNGF during the UE TNAP Mobility.
[0076] An initial registration procedure (e.g., after a successful authentication for access to the NTAN 220) includes generation of a Re-auth ID by a TNGF and/or UE to enable an identification of the UE context to support the UE TNAP Mobility related reauthentication and security establishment. Further, the security establishment procedure can be adaptable to support a UE moving from a source TNAP (e.g., TNAP-1) to a target TNAP (e.g., TNAP-2) during UE Mobility.
[0077] FIG. 3 illustrates an example of a diagram 300 that supports authentication and Protocol Data Unit (PDU) Session establishment for Trusted Non-3GPP access in accordance with aspects of the present disclosure. The procedure can include the following steps (and new adaptations):
[0078] Step 0: A UE 310 selects a PLMN and a TNAN 320 for connecting to this PLMN by using the Trusted Non-3GPP Access Network selection procedure. The UE 310 discovers the PLMNs with which the TNAN 320 supports trusted connectivity (e.g., "5G connectivity").
[0079] Step 1 : A layer-2 connection is established between the UE 310 and a TNAP 325.
[0080] Steps 2- 10a: An EAP authentication procedure is initiated. EAP messages shall be encapsulated into layer-2 packets. Between the TNAP 325 and TNGF 330 the EAP packets are encapsulated into AAA messages. An EAP-5G procedure is executed. During this procedure authentication and key agreement happens between the UE 310 and the network. A KTNGF key is created in the UE 310 and in an AMF 340 after the successful authentication. The KTNGF is transferred from the AMF 340 to TNGF 330 in step 10a.
[0081] Step 10b: The TNGF 330 sends TNGF address and TNGF Nonce (TNonce) (e.g., information required to generate a Re-auth ID) to the UE 310. The TNAP 325 is a trusted entity. The TNGF 330 can generate the KTNAP (e.g., the TNAP Key) and transfers it from TNGF 330 to TNAP 325 in step 10b (within an AAA message).
[0082] Step lOcl : The UE sends to TNGF 330 a UE Nonce (UNonce) (e.g., information required to generate a Re-auth ID).
[0083] Step 10c2: The UE 310 and the TNGF 330 can derive a Re-auth ID for the UE 310 from TNGF key using the inputs parameters such as TNGF-ID/address, Nonce from TNGF, Nonce from UE and a re-authentication identification/identifier related usage type information (e.g., 0x03). [0084] When deriving a Re-auth ID from KTNGF the following parameters can be used to form the input S to the KDF:
FC = Oxxx (e.g., any value);
P0 = Usage type distinguisher (i.e., re-authentication identification/identifier related usage type information (e.g., 0x03));
L0 = length of Usage type distinguisher (e.g., 0x00 0x01);
P0 = TNGF Nonce;
L0 = Length of TNGF Nonce;
P0 = UE Nonce;
L0 = Length of UE Nonce; and so on.
[0085] In some cases, the usage type distinguisher Re-authentication Identification/Re- authentication Identifier can also be termed a UE context identifier for UE TNAP Mobility Re-authentication.
[0086] In some cases, the usage type distinguishers related to the UE TNAP Mobility have the following values:
Figure imgf000019_0001
Table 1 : Usage Type Distinguishers
[0087] Steps lOd-e: The TNGF 330 can generate the KTNAP (TNAP Key) if not derived in step 10b and transfer the key from the TNGF 330 to the TNAP 325 (within an AAA message). Further, the TNGF 330 can also send a message containing the EAP-Success packet. [0088] Step 11 : The common TNAP key is used by the UE 310 and TNAP 325 to derive security keys according to the applied non-3GPP technology and to establish a security association to protect all subsequent traffic. In case of IEEE 802.11 [80], the KTNAP is the Pairwise Master Key (PMK) and a 4-way handshake is executed (see IEEE 802.11 [80]) which establishes a security context between the WLAN AP and the UE 310 that is used to protect unicast and multicast traffic over the air. All messages between UE 310 and TNAP 325 are encrypted and integrity protected from this step onwards.
[0089] Step 12: The UE 310 receives IP configuration from the TNAN 320, e.g., with DHCP.
[0090] Step 13: The UE 310 shall initiate an IKE INIT exchange with the TNGF 330. The UE 310 has received the IP address of TNGF 330 during the EAP-5G signalling in step 9b, subsequently, the UE 310 shall initiate an IKE AUTH exchange and shall include the same UE Id (e.g., SUCI or 5G-GUTI) as in the UE Id provided in step 5. The common KTIPSCC is used for mutual authentication. The key Knpsec is derived as specified in Annex A.22.NULL encryption is negotiated as specified in RFC 2410. After step 13c, an IPsec SA (Security Association) is established between the UE 310 and the TNGF 330 (e.g., a NWt connection) and it is used to transfer all subsequent NAS messages. This IPsec SA does not apply encryption but only apply integrity protection.
[0091] Step 14: After the NWt connection is successfully established, the TNGF 330 responds to AMF 340 with an N2 Initial Context Setup Response message.
[0092] Step 15: Finally, the NAS Registration Accept message is sent by the AMF 340 and is forwarded to UE 310 via the established NWt connection.
[0093] Steps 16-18: The UE 310 initiates a PDU session establishment. The TNGF 330 may establish one or more IPSec child SA’s per PDU session.
[0094] Step 19: User plane data for the established PDU session is transported between the UE 310 and TNGF 330 inside the established IPSec child SA.
[0095] In some embodiments, a UE TNAP Mobility Scenario can include a UE moving from one TNAP (e.g., TNAP-1) to another TNAP (e.g., TNAP-2) that are connected to or associated with the same TNGF (e.g., TNGF 224), or the TNAPs belong to the same TNGF domain. FIG. 4 illustrates an example of a diagram 400 that supports a security establishment procedure for TNAP Mobility in accordance with aspects of the present disclosure.
[0096] The procedure can include the following steps (and new adaptations), where Nonces and usage type distinguishers can be inputs:
[0097] Step 1 : A UE 410 established a layer-2 (L2) connection with a TNAP2424.
[0098] Step 2: The TNAP2 424 initiates an EAP session as usually by requesting the UE 410 identity.
[0099] Step 3: The UE 410 provides a Network Access Identifier (NAI) containing username = Reauth-ID and realm = nai.5gc.tngf<TNGF- ID>.mnc<MNC>.mcc<MCC>.3gppnetwork.org.
[0100] The Reauth-ID was derived as described herein and the TNGF-ID was received when the UE 410 was first connected to a TNGF 426 of an TNAN, e.g., with an Initial Registration via the TNGF 426. The UE 410 provides username = Re-auth ID because the UE 410 does not want to initiate NAS signaling with 5GC, but it wants to reauthenticate with the TNGF 426.
[0101] Step 4: A TNAP1 422 selects the TNGF 426 based on the TNG1 -ID in the received realm and forwards the NAI to TNGF 426.
[0102] Step 5. The TNGF 426 finds a stored UE context containing the received Re- auth ID, thus, it determines that the UE 410 is a known UE which requests reauthentication. Therefore, it initiates the following steps. If the TNGF 426 cannot find a stored UE context containing the received Re-auth ID, then the TNGF 426 sends either an error response to UE 410, it initiates the signalling procedure related to normal full authentication for trusted non-3GPP access as described herein and in TS 33.501 Clause 7A.2.1. In some cases, the UE context was created in the TNGF 426 when the UE 410 performed an initial registration (see FIG. 3) via a TNGF. [0103] Step 6: The TNGF 426 sends a 5G-Challenge packet to UE 410 which contains a TNonce value and a Message Authentication Codel (MAC1) derived by using the TNGF key stored in TNGF 426.
[0104] Step 7: The UE 410 derives an expected MAC1 (XMAC1) using TNGF key stored in UE 410, and TNonce and compares XMAC1 with the received MACE If they match, the TNGF 426 is authenticated by the UE 410.
[0105] Step 8: The UE 410 generates a UNonce and derives a MAC2 using TNGF key stored in UE 410, and with UNonce and TNonce.
[0106] Step 9: The UE 410 responds with a 5G-Challenge containing UNonce, TNonce and MAC2.
[0107] Step 10: The TNGF 426 derives an expected MAC2 (XMAC2) using TNGF and with UNonce and TNonce. Compares XMAC2 with the received MAC2. If they match, the UE 410 is authenticated by TNGF 426.
[0108] Step 11 : The TNGF 426 derives a fresh Re-auth ID for the UE, e.g., by using TNGF key stored in TNGF, TNGF-ID, TNonce, UNonce (exchanged in step 6a, 6b, 9a, 9b) and re-authentication identification/identifier related usage type information (e.g., 0x03). In addition, the TNGF 426 derives a new TNAP key by using the TNGF key stored in TNGF, the TNGF-ID, the TNonce, UNonce values and a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh.
[0109] When deriving a fresh KTNAP from KTNGF the following parameters can be used to form the input S to the KDF:
FC = Oxxx (e.g., any value);
P0 = Usage type distinguisher (i.e., Re-authentication TNAP/TNAP Key Refresh related usage type information (e.g., 0x04));
L0 = length of Usage type distinguisher (e.g., 0x00 0x01);
P0 = TNGF Nonce;
L0 = Length of TNGF Nonce;
P0 = UE Nonce; LO = Length of UE Nonce; and so on.
[0110] Further, if the TNGF 426 determines or is configured to reestablish the secure connection (e.g., IP sec between UE 410 and TNGF 426) with the UE 410 via the new target TNAP-2 (e.g., TNAP2 424), the TNGF 426 can refresh the Knpsec. When deriving a fresh Knpsec from KTNGF the following parameters can be used to form the input S to the KDF:
FC = Oxxx (e.g., any value);
P0 = Usage type distinguisher (i.e., Re-authentication IPSec/IPSec Key Refresh related usage type information (e.g., 0x05));
L0 = length of Usage type distinguisher (e.g., 0x00 0x01);
P0 = TNGF Nonce;
L0 = Length of TNGF Nonce;
P0 = UE Nonce;
L0 = Length of UE Nonce; and so on.
[0111] In some cases, the TNGF 426 stores the Re-auth ID (derived as described herein and received as the current Re-auth ID), along with UE context such as the TNGF Key, a new TNAP Key, a new TlPSec Key, and Re-auth ID (derived in step 11 as the future/new Re-auth ID).
[0112] Step 12: The TNGF 426 completes the EAP-5G session by sending an EAP- Success packet to UE 410 and the new TNAP key to TNAP2 424.
[0113] Step 13: The UE 410 derives a new Re-auth ID by using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce and re-authentication identification/identifier related usage type information (e.g., 0x03) similar to the TNGF (as described in step 11). If the UE 410 and the TNGF 426 share the same TNGF key, then the Reauth-ID derived independently in the UE 410 and in the TNGF will be the same. In addition, the UE 410 also derives a new/fresh TNAP key using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce, and a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh (e.g., 0x04) similarly to the TNGF (as in step 11). Additionally, the UE 410 also derives new/fresh TlPSec Key using the TNGF key stored in UE, TNGF-ID, TNonce, UNonce, and a usage type distinguisher specific to Re-authentication IPSec/IPSec Key Refresh (e.g., 0x05) similar to the TNGF.
[0114] In some cases, the TNGF 426 provides the Re-auth ID generated in step 11 to the UE 410 in step 12a and 12b. Further, the UE can store the Re-auth ID (derived/received in FIG. 3 and sent in step 4b as the current Re-auth ID), along with UE context such as the TNGF Key, new TNAP Key, new TIPSec Key, and Re-auth ID (derived in step 13 or received in step 12b as the future/new Re-auth ID).
[0115] Steps 14a-b: The new TNAP key is applied to establish over-the-air security between the UE 410 and TNAP2 424. If some cases the UE 410 may receive new IP configuration information (e.g., a new IP address) from the TN AN 420.
[0116] Steps 15a-c: The UE 410 can initiate an IKE INIT exchange with the TNGF 426. The UE 410 has received the IP address of TNGF in the earlier steps, subsequently, the UE can initiate (in step 15b) an IKE AUTH exchange, which can include the NAI containing the Re-auth ID (or Reauth-ID) as in the UE Id provided in step 3. For the IKE AUTH exchange part in step 13 a, names in the ID pay loads may correspond to the keys used to generate the AUTH payload. In case the UE 410 utilizes the Re-auth ID based NAI /Re-auth ID in step 5, the UE 410 shall initiate an IKE AUTH exchange and shall include the Re-auth ID based NAI /Re-auth ID in ID payloads. To help TNGF 426 identify fresh KTIPSCC, the Re-auth ID based NAI /Re-auth ID is used in step 13b. The fresh Knpsec derived (in step 11 by TNGF and 13 by UE) is used for mutual authentication. NULL encryption is negotiated as specified in RFC 2410. After step 15c, an IPsec SA is established between the UE 410 and TNGF 426 (e.g., a NWt connection) and is used to transfer all subsequent NAS messages. This IPsec SA applies integrity protection.
[0117] Step 16: The UE 410 resumes communication with TNGF 526 via TNAP2 424.
[0118] In some embodiments, a TNGF (e.g., the TNGF 224) can derive a unique reauthentication identity/identifier (e.g., Re-auth ID) to identify the security context related to the UE to derive and use any re-authentication specific security context. Further, the TNGF can generate a fresh TNAP key and/or TIPSec key during the UE TNAP mobility to re- establish security connections between the UE and a target TNAP, as well as to re-establish IP security associations between the UE and TNGF during UE TNAP mobility.
[0119] FIG. 5 illustrates an example of a diagram 500 that supports a UE TNAP Mobility Procedure in accordance with aspects of the present disclosure. The procedure can include the following steps (and new adaptations), where random numbers, counters, and/or usage type distinguishers can be inputs:
[0120] Step 1: A UE 510 is connected to a TNAP#1 522 of a TNAN 520 by performing authentication for trusted non-3GPP access with the 5G system. Once authenticated, a TNGF 526 of the TNAN 520 sends the re-auth Id to UE 510 over the protected interface (e.g., in any step 10b or lOd of FIG. 3). The Re-auth ID can be a generated as <PLMNID><TNGF_ID> <Temp Id>, where the Temp Id can be equivalent to the TNGF nonce described herein. In some cases, the TNGF 526 may contain TNGF Address (e.g., FQDN) Information.
[0121] Steps 2, 3: The UE 510 decides to move from the TNAP#1 522 to a TNAP#2 524 and creates an L2 connection with TNAP#2 524.
[0122] Steps 4, 5, 6: TNAP#2 524 sends the L2 EAP-Request for Identity towards the UE 510 and the UE 510 responds back with an L2 EAP-Response with Identity (e.g., Re- auth ID) and a TNAP Mobility Indication flag. The TNAP2 524 forwards the EAP response with Re-auth ID and the TNAP Mobility lndication flag towards TNGF 526.
[0123] Step 7-8: Based on the Re-auth ID, TNGF 526 identifies the UE 510 and retrieves the context and TNAP Mobility Indication, and the TNGF 526 checks if the stored context in step 1 is valid and then derives the TNAP keys as described herein. The TNGF 526 responds back to TNAP#2 524 with the generated key RAND (random number) value and MAC for the RAND value. The Message Authentication Code (MAC) is derived by using the TNGF key stored in TNGF 526. In TNAP#2 524, the newly received TNAP key is considered as a Pairwise Master Key (PMK). In some cases, instead of RAND, a counter be used as a freshness parameter.
[0124] In some embodiments, a derivation of the key KTNAP' from the key KTNGF during mobility can include some or all of the following input parameters: FC = OxWX;
Pl = RAND/ COUNTER;
LI = length of RAND (e.g., 0x00 0x04);
P2 = a usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh;
L2 = Length of the usage type distinguisher specific to the Re-authentication TNAP/TNAP Key Refresh; and so on.
[0125] The input key KEY can be the KTNGF. When KTNAP' is derived in Mobility, the RAND/COUNTER can be generated and shared with the UE 510. Further, when the TNGF 526 determines or is configured to reestablish the secure connection (e.g., IP sec between UE 510 and TNGF 526) with the UE 510 via the new target TNAP#2 524, the TNGF 526can refresh the Knpsec. For example, when deriving a fresh KriPSec from KTNGF the following parameters can be used to form the input S to the KDF:
FC = Oxxx (e.g., any value);
P0 = Usage type distinguisher (e.g., Re-authentication IPSec/IPSec Key Refresh related usage type information (e.g., 0x05));
L0 = length of Re-authentication IPSec/IPSec Key Refresh specific Usage type distinguisher (e.g., 0x00 0x01);
P0 = RAND/COUNTER;
L0 = Length of RAND/COUNTER; and so on.
[0126] The TNGF 526 stores the Re-auth ID (derived herein), along with UE context such as the TNGF Key, new TNAP Key, new TlPSec Key, and Re-auth ID (derived in step 11 as the future/new Re-auth ID). In some cases, the input key KEY shall be KTNGF. Further, when a fresh Knpsec' is derived in Mobility, the RAND/COUNTER can be generated and shared with the UE 510.
[0127] Steps 9, 10, 11 : The TNAP#2 524 sends an EAP-notifi cation back to the UE 510 with the RAND value along with MAC. If MAC validation is successful then based on the RAND value, UE 510 derives the keys. A 4- way handshake is executed (see IEEE 802.11) which establishes a security context between the WLAN AP and the UE 510 that is used to protect unicast and multicast traffic over the air. In some cases, a counter can be used instead of the RAND.
[0128] Once the procedure is complete, the TNGF 526 sends the new Re-auth ID Id to UE 510 over the secure interface (e.g., in Step 17a-b or in any steps after step 7), which the UE 510 can use for the next interaction. The Re-auth ID can be derived similar to step 1, but with a new TNGF Nonce or new Temp ID, e.g.,, Re-auth ID can be a generated as <PLMNID><TNGF_ID> <new Temp Id or new TNGF Nonce>.
[0129] In some cases, a hash/MAC of the new TNAP key generated in step 7 and the Re-auth ID related usage type distinguisher can be used as the new Temp ID in step 7 or in later steps to generate the new Re-auth ID.
[0130] Step 12: The new TNAP key is applied to establish over-the-air security between the UE 510 and TNAP#2 524. If needed, the UE 510 may receive new IP configuration information (e.g., a new IP address) from the TN AN 520. When the UE 510 gets the new IP configurations from TNAP#2 524, then the UE 510 updates the SA address using an IKE informational request "UPDATE SA ADDRESS" to TNGF 526 for further communications.
[0131] Steps 13a-c: The UE 510 can initiate an IKE INIT exchange with the TNGF 526. The UE 510 has received the IP address of TNGF 526 in the earlier steps, subsequently, the UE 510 can initiate (in step 13b) an IKE AUTH exchange which can include the NAI containing the Re-auth ID or Re-auth ID as in the UE Id provided in earlier step 3. For the IKE AUTH exchange part in step 13a, names in the ID payloads should correspond to the keys used to generate the AUTH payload. In case the UE 510 utilizes the Re-auth ID based NAI /Re-auth ID in step 5, the UE 510 shall initiate an IKE AUTH exchange and shall include the Re-auth ID based NAI /Re-auth ID in ID payloads. To help TNGF identify fresh KTIPSCC, the Re-auth ID based NAI /Re-auth ID is used in step 13b. The fresh Knpsec derived (in step 11 by TNGF and 13 by UE) is used for mutual authentication. NULL encryption is negotiated as specified in RFC 2410. [0132] After step 15c, an IPsec SA is established between the UE 510 and TNGF 526 (e.g., a NWt connection) and the connection is used to transfer all subsequent NAS messages. The IPsec SA applies integrity protection.
[0133] Step 16: The UE 510 resumes communication with TNGF 526 via TNAP#2 524.
[0134] Step 17a-b: The TNGF 526 sends the new Re-auth ID generated in earlier steps to the UE 510 via the TNAP#2 524. In some cases, the UE 510 can derive the new Re-auth ID as derived by the TNGF 526 (e.g., Re-auth ID can be a generated as <PLMNID><TNGF_ID> <new Temp Id>, where a hash/MAC of the new TNAP key generated in step 10 and the Re-auth ID related usage type distinguisher can be used as the new Temp ID.
[0135] In some embodiments, the TNAP Mobility can utilize a Fast BSS Transition protocol. A FT key hierarchy is established based on the Master Session Key (MSK) by the R0 Key Holder (R0KH) that is co-located with an 802. IX authenticator. To support the Fast BSS Transition, the entity that will hold the root key can obtain a 256 bit key (KFT) from a TNGF, which is then used as an input key to create the FT key hierarchy.
[0136] FIG. 6 illustrates an example of a diagram 600 that supports TNAP Mobility using a Fast BSS (Basic Service Set) Transition (FT) protocol in accordance with aspects of the present disclosure. The key KFT is derived from KTNGF using fixed inputs similar to the derivation of KTNAP from KTNGF described in Annex A.22 of TS 33.501, but using a new Usage type distinguisher, e.g. 0x03. The key KFT is used to create the FT key hierarchy specified in 802.11. Specifically, KFT is used as Master PMK (MPMK) that is used as an input key for RO-Key-Data derivation. With the RO-Key-Data, the FT key hierarchy is established. In effect, KFT links the 5G key hierarchy and FT key hierarchy as it is derived from a key in the 5G key hierarchy and being used to create the FT key hierarchy.
[0137] When a UE switches to a new TNAP within the same mobility domain identified by the Mobility domain identifier (MDID), the UE performs the fast BSS transition procedure. The entity that has received KFT from the TNGF takes the role of PMK R0 Key Holder (R0KH) that holds the key, PMK-R0. The R0KH derives PMK-R1 from PMK-RO and provides it to the new AP (e.g., TNAP in TNAN) during the FT procedure.
[0138] In some cases (e.g., TNAP mobility using the Fast BSS Transition protocol), the steps for the key handling during a TNAP change are as follows:
[0139] Step 1 : Before the TNAP change the following has happened, RO Key Holder (ROKH) (entity that holds the FT root key) has received KFT from the TNGF and has used this to derive PMK-RO which the ROKH stores to derive further keys. The UE is connected to a TNAP.
[0140] Step 2: The UE contacts the new TNAP.
[0141] Step 3: The new TNAP contacts the ROKH to request a key for the UE. The ROKH calculates the key PMK-R1 from PMK-RO and sends a PMK-R1 to the new TNAP.
[0142] Step 4: The UE and new TNAP use PMK-R1 as the pairwise master key to secure the connection between the UE and new TNAP.
[0143] As shown in FIG. 6, the 5G and FT key hierarchies link together. The TNGF can send both KTNAP and KFT to the entity that holds the root key of the FT key hierarchies an MSK. The TNGF sets the MSK to KTNAP || KFT, where MSK is 512 bits and the KTNAP and KFT are 256 bits. The TNGF sends the MSK using existing mechanisms.
[0144] Also, the TNGF can send both KTNAP (e.g., a fresh TNAP Key generated) and KFT to the entity that holds the root key of the FT key hierarchies an MSK. The TNGF sets the MSK to KTNAP || KFT, where MSK is 512 bits and the KTNAP and KFT are 256 bits. The TNGF sends the MSK using mechanisms described herein. In some cases, the fresh TNAP key generation and usage is based on various techniques described herein.
[0145] FIG. 7 illustrates an example of a block diagram 700 of a device 702 that supports UE TNAP Mobility in accordance with aspects of the present disclosure. The device 702 may be an example of a network entity 102 as described herein. The device 702 may support wireless communication with one or more network entities 102, UEs 104, or any combination thereof. The device 702 may include components for bi-directional communications including components for transmitting and receiving communications, such as a processor 704, a memory 706, a transceiver 708, and an I/O controller 710. These components may be in electronic communication or otherwise coupled (e.g., operatively, communicatively, functionally, electronically, electrically) via one or more interfaces (e.g., buses).
[0146] The processor 704, the memory 706, the transceiver 708, or various combinations thereof or various components thereof may be examples of means for performing various aspects of the present disclosure as described herein. For example, the processor 704, the memory 706, the transceiver 708, or various combinations or components thereof may support a method for performing one or more of the operations described herein.
[0147] In some implementations, the processor 704, the memory 706, the transceiver 708, or various combinations or components thereof may be implemented in hardware (e.g., in communications management circuitry). The hardware may include a processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field- programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic, discrete hardware components, or any combination thereof configured as or otherwise supporting a means for performing the functions described in the present disclosure. In some implementations, the processor 704 and the memory 706 coupled with the processor 704 may be configured to perform one or more of the functions described herein (e.g., executing, by the processor 704, instructions stored in the memory 706).
[0148] For example, the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein. The processor 704 may be configured as or otherwise support a means for deriving a TIPSec Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher, receiving, from a UE, a re-authentication identifier for the UE, identifying the TIPSec Key using the reauthentication identifier, and re-establishing an IPSec SA based on the identified TIPSec Key.
[0149] As another example, the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein. The processor 704 may be configured as or otherwise support a means for deriving a TIPSec Key using, a stored TNGF Key, an input parameter, and a re-authentication usage type distinguisher, and transmitting, to a TNGF, a re-authentication identifier for the UE.
[0150] As another example, the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein. The processor 704 may be configured as or otherwise support a means for generating a security context between a UE and a TNAP by deriving a TNAP key using a TNGF key, a freshness parameter, and a TNAP key refresh usage type distinguisher, deriving a re-authentication identifier using the TNGF key, the freshness parameter, and a re-authentication identification usage type distinguisher, and sending the derived re-authentication identifier to the UE.
[0151] As another example, the processor 704 may support wireless communication at the device 702 in accordance with examples as disclosed herein. The processor 704 may be configured as or otherwise support a means for receiving information from a TNGF, including TNGF information, a freshness parameter, and a re-authentication identifier, and refreshing a TNAP key using the information received from the TNGF and a TNAP/TNAP Key refresh related usage type distinguisher.
[0152] The processor 704 may include an intelligent hardware device (e.g., a general- purpose processor, a DSP, a CPU, a microcontroller, an ASIC, an FPGA, a programmable logic device, a discrete gate or transistor logic component, a discrete hardware component, or any combination thereof). In some implementations, the processor 704 may be configured to operate a memory array using a memory controller. In some other implementations, a memory controller may be integrated into the processor 704. The processor 704 may be configured to execute computer-readable instructions stored in a memory (e.g., the memory 706) to cause the device 702 to perform various functions of the present disclosure.
[0153] The memory 706 may include random access memory (RAM) and read-only memory (ROM). The memory 706 may store computer-readable, computer-executable code including instructions that, when executed by the processor 704 cause the device 702 to perform various functions described herein. The code may be stored in a non-transitory computer-readable medium such as system memory or another type of memory. In some implementations, the code may not be directly executable by the processor 704 but may cause a computer (e.g., when compiled and executed) to perform functions described herein. In some implementations, the memory 706 may include, among other things, a basic I/O system (BIOS) which may control basic hardware or software operation such as the interaction with peripheral components or devices.
[0154] The I/O controller 710 may manage input and output signals for the device 702. The I/O controller 710 may also manage peripherals not integrated into the device M02. In some implementations, the I/O controller 710 may represent a physical connection or port to an external peripheral. In some implementations, the I/O controller 710 may utilize an operating system such as iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®, UNIX®, LINUX®, or another known operating system. In some implementations, the I/O controller 710 may be implemented as part of a processor, such as the processor M04. In some implementations, a user may interact with the device 702 via the I/O controller 710 or via hardware components controlled by the I/O controller 710.
[0155] In some implementations, the device 702 may include a single antenna 712. However, in some other implementations, the device 702 may have more than one antenna 712 (i.e., multiple antennas), including multiple antenna panels or antenna arrays, which may be capable of concurrently transmitting or receiving multiple wireless transmissions. The transceiver 708 may communicate bi-directionally, via the one or more antennas 712, wired, or wireless links as described herein. For example, the transceiver 708 may represent a wireless transceiver and may communicate bi-directionally with another wireless transceiver. The transceiver 708 may also include a modem to modulate the packets, to provide the modulated packets to one or more antennas 712 for transmission, and to demodulate packets received from the one or more antennas 712.
[0156] FIG. 8 illustrates a flowchart of a method 800 that supports establishing an IPSec Security Association between a UE and a TGNF in accordance with aspects of the present disclosure. The operations of the method 800 may be implemented by a device or its components as described herein. For example, the operations of the method 800 may be performed by the network entity 102 (e.g., a TGNF) as described with reference to FIGs. 1 through 6. In some implementations, the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using specialpurpose hardware.
[0157] At 805, the method may include deriving a UPSec Key using a TGNF Key, an input parameter, and a re-authentication usage type distinguisher. The operations of 805 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 805 may be performed by a device as described with reference to FIG. 1.
[0158] At 810, the method may include receiving, from a UE, a re-authentication identifier for the UE. The operations of 810 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 810 may be performed by a device as described with reference to FIG. 1.
[0159] At 815, the method may include identifying the UPSec Key using the reauthentication identifier. The operations of 815 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 815 may be performed by a device as described with reference to FIG. 1.
[0160] At 820, the method may include re-establishing an IPSec SA based on the identified TIPSec Key. The operations of 820 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 820 may be performed by a device as described with reference to FIG. 1.
[0161] FIG. 9 illustrates a flowchart of a method 900 that supports authentication of a UE to a TGNF in accordance with aspects of the present disclosure. The operations of the method 900 may be implemented by a device or its components as described herein. For example, the operations of the method 900 may be performed by the UE 104 as described with reference to FIGs. 1 through 6. In some implementations, the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using special-purpose hardware. [0162] At 905, the method may include deriving a Trusted IP Security (TIPSec) Key using a stored TNGF Key, an input parameter, and a re- authentication IPSec Key Refresh usage type distinguisher. The operations of 905 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 905 may be performed by a device as described with reference to FIG. 1.
[0163] At 910, the method may include transmitting, to a TNGF, a re-authentication identifier for the UE. The operations of 910 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 910 may be performed by a device as described with reference to FIG. 1.
[0164] FIG. 10 illustrates a flowchart of a method 1000 that supports generating a security context between a UE and a TNAP in accordance with aspects of the present disclosure. The operations of the method 1000 may be implemented by a device or its components as described herein. For example, the operations of the method 1000 may be performed by the network entity 102 (e.g., a TGNF) as described with reference to FIGs. 1 through 6. In some implementations, the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using specialpurpose hardware.
[0165] At 1005, the method may include deriving a TNAP key using a TNGF key, a freshness parameter, and a TNAP key refresh usage type distinguisher. The operations of 1005 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1005 may be performed by a device as described with reference to FIG. 1.
[0166] At 1010, the method may include deriving a re-authentication identifier using the TNGF key, the freshness parameter, and a re-authentication identification usage type distinguisher. The operations of 1010 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1010 may be performed by a device as described with reference to FIG. 1. [0167] At 1015, the method may include sending the derived re-authentication identifier to the UE. The operations of 1015 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1015 may be performed by a device as described with reference to FIG. 1.
[0168] FIG. 11 illustrates a flowchart of a method 1100 that supports generating a security context for a UE in accordance with aspects of the present disclosure. The operations of the method 1100 may be implemented by a device or its components as described herein. For example, the operations of the method 1000 may be performed by the UE 104 as described with reference to FIGs. 1 through 6. In some implementations, the device may execute a set of instructions to control the function elements of the device to perform the described functions. Additionally, or alternatively, the device may perform aspects of the described functions using special-purpose hardware.
[0169] At 1105, the method may include receiving information from a TNGF, including TNGF information, a freshness parameter, and a re-authentication identifier. The operations of 1105 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1105 may be performed by a device as described with reference to FIG. 1.
[0170] At 1110, the method may include refreshing a TNAP key using the information received from the TNGF and a TNAP/TNAP Key refresh related usage type distinguisher. The operations of 1110 may be performed in accordance with examples as described herein. In some implementations, aspects of the operations of 1110 may be performed by a device as described with reference to FIG. 1.
[0171] It should be noted that the methods described herein describes possible implementations, and that the operations and the steps may be rearranged or otherwise modified and that other implementations are possible. Further, aspects from two or more of the methods may be combined.
[0172] The various illustrative blocks and components described in connection with the disclosure herein may be implemented or performed with a general-purpose processor, a DSP, an ASIC, a CPU, an FPGA or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices (e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
[0173] The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope of the disclosure and appended claims. For example, due to the nature of software, functions described herein may be implemented using software executed by a processor, hardware, firmware, hardwiring, or combinations of any of these. Features implementing functions may also be physically located at various positions, including being distributed such that portions of functions are implemented at different physical locations.
[0174] Computer-readable media includes both non-transitory computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A non-transitory storage medium may be any available medium that may be accessed by a general-purpose or special-purpose computer. By way of example, and not limitation, non-transitory computer-readable media may include RAM, ROM, electrically erasable programmable ROM (EEPROM), flash memory, compact disk (CD) ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other non-transitory medium that may be used to carry or store desired program code means in the form of instructions or data structures and that may be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor.
[0175] Any connection may be properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of computer-readable medium. Disk and disc, as used herein, include CD, laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer- readable media.
[0176] As used herein, including in the claims, “or” as used in a list of items (e.g., a list of items prefaced by a phrase such as “at least one of’ or “one or more of’ or “one or both of’) indicates an inclusive list such that, for example, a list of at least one of A, B, or C means A or B or C or AB or AC or BC or ABC (i.e., A and B and C). Also, as used herein, the phrase “based on” shall not be construed as a reference to a closed set of conditions. For example, an example step that is described as “based on condition A” may be based on both a condition A and a condition B without departing from the scope of the present disclosure. In other words, as used herein, the phrase “based on” shall be construed in the same manner as the phrase “based at least in part on. Further, as used herein, including in the claims, a “set” may include one or more elements.
[0177] The terms “transmitting,” “receiving,” or “communicating,” when referring to a network entity, may refer to any portion of a network entity (e.g., a base station, a CU, a DU, a RU) of a RAN communicating with another device (e.g., directly or via one or more other network entities).
[0178] The description set forth herein, in connection with the appended drawings, describes example configurations and does not represent all the examples that may be implemented or that are within the scope of the claims. The term “example” used herein means “serving as an example, instance, or illustration,” and not “preferred” or “advantageous over other examples.” The detailed description includes specific details for the purpose of providing an understanding of the described techniques. These techniques, however, may be practiced without these specific details. In some instances, known structures and devices are shown in block diagram form to avoid obscuring the concepts of the described example.
[0179] The description herein is provided to enable a person having ordinary skill in the art to make or use the disclosure. Various modifications to the disclosure will be apparent to a person having ordinary skill in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the disclosure is not limited to the examples and designs described herein but is to be accorded the broadest scope consistent with the principles and novel features disclosed herein.

Claims

CLAIMS What is claimed is:
1. A Trusted Non-3GPP Gateway Function (TNGF), comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the TNGF to: derive a Trusted IP Security (TTPSec) Key using: a TGNF Key, an input parameter, and a re-authentication usage type distinguisher; receive, from user equipment (UE), a re-authentication identifier for the UE; identify the TlPSec Key using the re-authentication identifier; and re-establish an IPSec Security Association (SA) based on the identified TlPSec Key.
2. The TNGF of claim 1, wherein the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information, and wherein the input parameter includes: a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a reauthentication counter, a length of the re-authentication counter, a random number, a length of the random number, and combinations thereof.
3. The TNGF of claim 1, further comprising: sending the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE.
4. The TNGF of claim 3, wherein the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
5. The TGNF of claim 1, wherein the processor is further configured to cause the TNGF to derive the TIPSec Key during UE mobility from a previous Trusted Non-3GPP Gateway Function (TNAP) to a target TNAP associated with the TNGF.
6. A method performed by a Trusted Non-3GPP Gateway Function (TNGF), the method comprising: deriving a Trusted IP Security (TIPSec) Key using: a TGNF Key, an input parameter, and a re-authentication usage type distinguisher; receiving, from user equipment (UE), a re-authentication identifier for the UE; identifying the TIPSec Key using the re-authentication identifier; and re-establishing an IPSec Security Association (SA) based on the identified TIPSec Key.
7. The method of claim 6, wherein the re-authentication usage type distinguisher includes re-authentication IPSec/IPSec Key refresh related usage type information, and wherein the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a reauthentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
8. The method of claim 6, further comprising: sending the re-authentication identifier to the UE in response to receiving the reauthentication identifier from the UE.
9. The method of claim 8, wherein the TNGF sends the re-authentication identifier to the UE during Internet Key Exchange (IKE) authentication exchange.
10. The method of claim 6, wherein the TNGF derives the TlPSec Key in response to UE mobility from a previous Trusted Non-3GPP Gateway Function (TNAP) to a target TNAP associated with the TNGF.
11. User Equipment (UE), comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the UE to: derive a Trusted IP Security (TlPSec) Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher; and transmit, to a Trusted Non-3GPP Gateway Function (TNGF), a reauthentication identifier for the UE.
12. The UE of claim 11, wherein the processor is configured to cause the UE to transmit the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
13. The UE of claim 12, wherein the processor is configured to cause the UE to transmit a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
14. The UE of claim 12, wherein the processor is configured to cause the UE to derive the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
15. The UE of claim 12, wherein the re-authentication identifier is part of a Network Access Identifier (NAI) transmitted from the UE to the TNGF.
16. The UE of claim 11, wherein the re-authentication usage type distinguisher includes re-authentication identification/identifier related usage type information, and wherein the input parameter includes a length of the usage type distinguisher, a TNGF Nonce, a length of the TNGF Nonce, a UE Nonce, a length of the UE Nonce, a reauthentication counter, a length of the reauthentication counter, a random number, a length of the random number, or combinations thereof.
17. A processor for wireless communication, comprising: at least one controller coupled with at least one memory and configured to cause the processor to: derive a Trusted IP Security (TIPSec) Key using: a stored TNGF Key, an input parameter, and a re-authentication IPSec Key Refresh usage type distinguisher; and transmit, to a Trusted Non-3GPP Gateway Function (TNGF), a reauthentication identifier for the processor.
18. The processor of claim 17, wherein the controller is further configured to cause the processer to transmit the re-authentication identifier during Internet Key Exchange (IKE) authentication exchange with the TNGF.
19. The processor of claim 18, wherein the controller is further configured to cause the processor to transmit a re-authentication identifier that is received from the TNGF during a previous successful full authentication procedure or re-authentication procedure between the UE and the TNGF.
20. The processor of claim 18, wherein the controller is further configured to cause the processor to derive the IPSec Key Refresh usage type distinguisher from a stored TNGF Key, a freshness parameter, and a re-authentication identification usage type distinguisher.
PCT/IB2024/050949 2023-02-01 2024-02-01 Re-establishment of trusted ip security for trusted non-3gpp access point (tnap) mobility WO2024110949A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202363482715P 2023-02-01 2023-02-01
US63/482,715 2023-02-01

Publications (1)

Publication Number Publication Date
WO2024110949A1 true WO2024110949A1 (en) 2024-05-30

Family

ID=89853610

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2024/050949 WO2024110949A1 (en) 2023-02-01 2024-02-01 Re-establishment of trusted ip security for trusted non-3gpp access point (tnap) mobility

Country Status (1)

Country Link
WO (1) WO2024110949A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021223861A1 (en) * 2020-05-06 2021-11-11 Lenovo (Singapore) Pte. Ltd. Gateway function reauthentication
WO2021223862A1 (en) * 2020-05-06 2021-11-11 Lenovo (Singapore) Pte. Ltd. Gateway function reauthentication

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021223861A1 (en) * 2020-05-06 2021-11-11 Lenovo (Singapore) Pte. Ltd. Gateway function reauthentication
WO2021223862A1 (en) * 2020-05-06 2021-11-11 Lenovo (Singapore) Pte. Ltd. Gateway function reauthentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3 rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 17)", no. 20221201, 16 December 2022 (2022-12-16), XP052230977, Retrieved from the Internet <URL:https://ftp.3gpp.org/tsg_sa/WG3_Security/TSGS3_109/SA_98e/33501-h80.doc> [retrieved on 20221216] *
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Security aspects for 5WWC Phase 2 (Release 18)", no. V0.5.0, 25 January 2023 (2023-01-25), pages 1 - 36, XP052235399, Retrieved from the Internet <URL:https://ftp.3gpp.org/Specs/archive/33_series/33.887/33887-050.zip TR 33887-050.docx> [retrieved on 20230125] *

Similar Documents

Publication Publication Date Title
US11818566B2 (en) Unified authentication for integrated small cell and Wi-Fi networks
US10939294B2 (en) Network access identifier including an identifier for a cellular access network node
US10841302B2 (en) Method and apparatus for authenticating UE between heterogeneous networks in wireless communication system
US10419994B2 (en) Non-access stratum based access method and terminal supporting the same
WO2018170617A1 (en) Network access authentication method based on non-3gpp network, and related device and system
US9226153B2 (en) Integrated IP tunnel and authentication protocol based on expanded proxy mobile IP
JP2017538345A (en) Method, apparatus and system
KR20230124621A (en) UE authentication method and system for non-3GPP service access
US10595254B2 (en) Non-access stratum based access method and terminal supporting the same
WO2024110949A1 (en) Re-establishment of trusted ip security for trusted non-3gpp access point (tnap) mobility
WO2024121828A1 (en) Generating a security context for user equipment (ue) trusted non-3gpp access point (tnap) mobility
WO2024069616A1 (en) User equipment (ue) access support for a standalone non-public network (snpn)
WO2024069502A1 (en) Providing security keys to a serving network of a user equipment
US20240056804A1 (en) Method, apparatus and computer program
US20240098492A1 (en) Using a passphrase with wi-fi protected access 3
US20240155439A1 (en) Securing communications at a change of connection
US20240146732A1 (en) Automatic periodic pre-shared key update
WO2024208444A1 (en) Secure connections in a wireless communication network
WO2024110951A1 (en) Method to authorize an application function for a personal internet of things network
WO2024160413A1 (en) Reauthentication for user equipment mobility in a wireless communication network
WO2023131860A1 (en) User equipment authentication for applications
WO2024105650A1 (en) Providing information about provisioning servers to user equipment (ue) during onboarding procedures
WO2023187610A1 (en) Network initiated primary authentication
CN118947156A (en) Network initiated master authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24703863

Country of ref document: EP

Kind code of ref document: A1