Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND ARRANGEMENTS FOR CIPHERING MANAGEMENT IN A TELECOMMUNICATION SYSTEM
Document Type and Number:
WIPO Patent Application WO/2008/054276
Kind Code:
A1
Abstract:
The present invention relates to a method in a base station for ciphering of configuration messages in a cellular telecommunications system. The system comprises a network node, such as an AGW in which means for ciphering are located, at least one base station connected to said network node and at least one User Equipment. Configuration messages such as RRC messages are terminated in the base station. The method comprises the steps of receiving a ciphering mask from the network node and utilizing the ciphering mask for ciphering of a configuration message for downlink communication or deciphering of a ciphered configuration message received by the base station in uplink communication. Hereby, it is possible to apply ciphering to critical configuration messages in the base station without having a ciphering algorithm or ciphering key in the base station.

Inventors:
TORSNER JOHAN (FI)
SAAGFORS MATS (FI)
Application Number:
PCT/SE2006/050450
Publication Date:
May 08, 2008
Filing Date:
November 02, 2006
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
TORSNER JOHAN (FI)
SAAGFORS MATS (FI)
International Classes:
G06F21/00; H04W12/02; H04L9/20; H04W88/08
Other References:
ERICSSON: "Key management for LTE RRC", S3-060236, 3GPP TSG SA WG3 SECURITY SA3#43, 4 April 2006 (2006-04-04) - 7 April 2006 (2006-04-07), ATHENS, GREECE, XP003013036
NORTEL: "LTE Security Architecture", R3-060008, TSG-RAN WG2 & WG3 - TSG SA WG3 MEETING SOPHIA ANTIPOLIS, FRANCE, 10 January 2005 (2005-01-10) - 11 January 2005 (2005-01-11), pages 6 - 13, XP003013037
Attorney, Agent or Firm:
HASSELGREN, Joakim (Patent Unit LTE, Stockholm, SE)
Download PDF:
Claims:

CLAIMS

1. A method in a base station (4) for ciphering of configuration messages in a cellular telecommunications system, the system comprises a network node (6) in which means for ciphering are located, at least one base station

(4) connected to said network node (6) and at least one User Equipment (5) , hereinafter referred to as UE, wherein configuration messages are terminated in the base station

( 4 ) , c h a r a c t e r i z e d b y the steps of :

- receiving a ciphering mask from the network node (6);

- utilizing the ciphering mask for ciphering of a configuration message for downlink communication or deciphering of a ciphered configuration message received by the base station (4) in uplink communication.

2. The method according to claim 1, comprising the step of applying an x-or operation (16) on the ciphering mask and the configuration message in order to cipher or decipher the configuration message.

3. The method according to claim 1 or 2, comprising the step of the base station (4) requesting at least one ciphering mask from the network node (6) .

4. The method according to claim 3, whereby the request comprises signaling of certain parameters, such as a configuration message sequence number and the length of the configuration message.

5. The method according to claim 3 or 4 , comprising the steps of the base station (4) requesting a number of ciphering masks and storing the masks to be used when needed.

6. The method according to any of the preceding claims, wherein the configuration message is a Radio Resource Control (RRC) message.

7. A base station (4) capable of generating configuration messages and communicating such configuration messages with a UE (5) in uplink and downlink communication, characterized in that said base station (4) is arranged to receive a ciphering mask from a network node (6) accommodating ciphering means, wherein the base station (4) furthermore comprises means for utilizing the ciphering mask for ciphering of a configuration message for downlink communication or deciphering of a ciphered configuration message received in uplink communication.

8. The base station according to claim 7, wherein said means performs an x-or operation (16) on the ciphering mask and the configuration message in order to cipher or decipher the configuration message.

9. The base station according to claim 7 or 8, comprising means for requesting at least one ciphering mask from the network node (6) .

10. The base station according to any of claim 7 to 9, wherein the base station (4) is a Node-B.

11. A radio network node (6) accommodating ciphering means, characterized in that it is capable of generating ciphering masks, and to transmit at least one ciphering mask to a base station (4) according to claims 7- 10.

12. The radio network node (6) according to claim

11, capable of receiving a request from the base station (4) and upon said request transmit said at least one ciphering mask to the base station (4) .

13. The radio network node according to claim 11 or

12, wherein said network node (6) is an Access Gateway (AGW) node.

Description:

Method and Arrangements for Ciphering Management in a Telecommuncation System

FIELD OF THE INVENTION

The present invention relates to ciphering of configuration messages in cellular mobile communication systems .

BACKGROUND

In the current UMTS architecture, a number of base stations called Node-Bs are connected to a Radio Network Controller (RNC), and a number of RNC : s are connected to a Serving GPRS Support Node (SGSN) . In this type of architecture, configuration messages such as RRC (Radio Resource Control) messages are terminated in the RNC, in which ciphering algorithms and ciphering keys are located. Thus, ciphering of e.g. configuration messages between User Equipment (UE) and the network takes place in the RNC.

However, in order to reduce the number of nodes and achieve a less complex network, a network architecture where a number of base stations are connected directly to a single network node could be preferred. In such network architecture, most of the RNC functionality of the conventional architecture has been transferred to the base stations, and the RNC nodes are omitted. In an architecture of the type described, the network node is handling, e.g., distribution of paging messages to the base stations, IP Header Compression and encryption of user data streams, termination of user plane packets for paging reasons and switching of U-plane for support of UE mobility. The base station handles functions for Radio Resource Management

such as Radio Bearer Control, Radio Admission Control, Connection Mobility Control, and Resource Allocation.

Thus, ciphering algorithms and ciphering keys are located in the central node. The reason for this is that a base station is not considered to be a secure node, since it is often located in places where it is within reach of the public.

According to this type of architecture, configuration signalling is terminated in the base station. Such configuration signalling can for example be messages ordering a handover, requesting a measurement report from the UE or any type of message for configuration of the UE. Most of the configuration messages do not contain any critical information and can be transmitted without requirements of ciphering or integrity protection. However, some specific configuration messages would be desirable to protect, for example messages containing information on UE identity or the like. A direct implication of the use of the distributed architecture described above is however that configuration messages terminated in the base station is not ciphered, since the ciphering means are located in a node that hierarchically is located "above" the base station.

SUMMARY

The problem experienced with previously known technique is thus that configuration messages terminated in the base station are sent unencrypted, since ciphering algorithms and keys and are not available in the base station. It is therefore an object of the present invention to provide a method for ciphering that solves this problem.

The present invention thus relates to ciphering of configuration messages in a system architecture where the ciphering means is located in a network node different from the node where the configuration message is terminated. More specifically, the invention relates to a method in a base station for ciphering of configuration messages in a cellular telecommunications system. The system comprises a network node in which means for ciphering are located, at least one base station connected to said network node and at least one User Equipment, hereinafter referred to as UE. Configuration messages are terminated in the base station. The method comprises the steps of receiving a ciphering mask from the network node and utilizing the ciphering mask for ciphering of a configuration message for downlink communication or deciphering of a ciphered configuration message received by the base station in uplink communication .

Hereby, according to one aspect of the invention, it is possible to apply ciphering to critical configuration messages in the base station without having a ciphering algorithm or ciphering key in the base station.

The term ciphering mask is herein intended to cover a cryptographically generated bit-string.

The invention furthermore relates to a base station capable of generating configuration messages and communicating such configuration messages with a UE in uplink and downlink communication. Said base station is arranged to receive a ciphering mask from a network node accommodating ciphering means . The base station furthermore comprises means for utilizing the ciphering mask for ciphering of a configuration message for downlink communication or

deciphering of a ciphered configuration message received in uplink communication.

The invention furthermore relates to a radio network node accommodating ciphering means . Said radio network node is capable of generating ciphering masks, and to transmit at least one ciphering mask to a base station as described above .

According to an embodiment of the invention, an x- or operation is applied on the ciphering mask and the configuration message in the base station in order to cipher or decipher the configuration message. The network node can transmit a ciphering mask to the base station upon request from the said base station, or the base station can request a number of ciphering masks and store the masks to be used when needed, which means that no delay would be associated with the ciphering. A request from the base station preferably comprises signaling of certain parameters, such as a configuration message sequence number and the length of the configuration message.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other objects, features and advantages of the invention will be apparent from the following detailed description of preferred embodiments as illustrated in the drawings.

Fig. Ia illustrates the current UMTS architecture

Fig. Ib illustrates the architecture that has been adopted for LTE.

Fig. 2 shows a flow chart schematically illustrating an embodiment of the invention.

DESCRIPTION

The present invention can be exemplified in the following non-limiting description of an embodiment of the invention.

The work of the study item UTRAN long term evolution (LTE) is currently ongoing in the 3rd Generation Partnership Project (3GPP) . As part of the study item a new architecture (compared to the current UMTS architecture) has been decided. Fig. 1 shows a comparison between the current UMTS architecture (Fig. Ia) and the architecture that has been adopted for LTE (Fig. Ib) . In the current UMTS architecture shown in Fig. Ia, interconnected Radio Network Controllers 2 (RNCs) are each connected to a number of base stations 4 such as Node-Bs . The RNCs are connected to a Serving GPRS Support Node 3 (SGSN) , which in turn is connected to a Gateway GPRS Support Node 1 (GGSN) . Ciphering means such as ciphering algorithms and security keys are located in the RNC 2, where configuration signaling such as RRC messages are terminated, whereby the RRC messages are ciphered and deciphered in the RNC 2.

An architecture to which the present invention is relevant is shown in Fig. Ib. A network node, here represented by an access gateway node (AGW) 6, is connected directly to a number of base stations 4 called Node-Bs, each of which are provided with most of the functionality that the RNC 2 has in the current UMTS architecture illustrated in Fig. Ia. However, since the Node-Bs 4 are not considered to be secure nodes, the ciphering means need to be located in the AGW 6, while the RRC messages are terminated in the Node- B 4.

The method according to the invention can be carried out in the following steps, as illustrated in Fig. 2:

When a critical RRC message needs to be transmitted from the Node-B 4 to the UE 5, the Node-B 4 signals a request for a ciphering mask for the critical message from the AGW 6 in step 10. There are several ways to do this. One example is that the Node-B 4 signals certain parameters to the AGW 6 such as RRC message sequence number, length of the RRC message and potentially other information. In step 12, the AGW 6 responds to the request by generating a ciphering mask with the received parameters as input and in step 14 the AGW 6 signals the ciphering mask back to the Node-B 4.

In step 16, the ciphering mask is available in the Node-B 4 and the RRC message is ciphered in the Node B by applying a bitwise x-or operation, which is a well known mathematic operation, on the ciphering mask and the RRC message.

In step 18, the message is transmitted to the UE 5 where the message is deciphered in accordance with known techniques .

The Node-B 4 can alternatively request ciphering masks in advance. This is done by requesting ciphering masks for a range of message sequence numbers and potentially stating a maximum length of the messages. The AGW 6 then responds with the requested number of ciphering masks with the length according to the indicated maximum length of the messages. In this case the Node-B has ciphering masks available when a critical RRC message needs to be transmitted. Thus, no delay would be associated with the ciphering in contrast to the case where the message is sent to the AGW for ciphering.

In the uplink direction, the same procedure as illustrated in Fig 2 is applied at reception of RRC messages

in the Node-B. The Node-B requests ciphering masks from the

AGW, (either when needed or in advance) for the expected RRC message sequence number (s) and performs deciphering when the message is received.

If only few of the RRC messages actually need to be ciphered, it could potentially happen that requested ciphering masks are left unused since the Node-B can not know in advance which RRC messages that needs to be ciphered or deciphered. That could however be avoided by using either separate RRC sequence numbering for ciphered and unciphered RRC messages or only applying RRC sequence numbers on the ciphered RRC messages.

Even though the invention has been described in relation to UTRAN Long Term Evolution, it could be applied to any type of network in which means for ciphering is located in a network node different from the node where configuration messages are terminated. The invention is thus not to be limited to the disclosed embodiments, but is intended to cover various modifications within the scope of the appended claims .