Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR DEVICE COMMISSIONING IN A NETWORK SYSTEM AND NETWORK SYSTEM
Document Type and Number:
WIPO Patent Application WO/2023/094373
Kind Code:
A1
Abstract:
The invention relates to a network system (200) with a network core unit (302), a network- managing unit (304), a device-managing unit (306), and a network data-infrastructure (312, 314) and to a method for admitting an application device (310) in this network system (200). The method comprises the steps: authenticating (802), by the network core unit (302), the application device (310) on network-level, notifying (803), by the network core unit (302), the network-managing unit (304) about an authenticating result, configuring (804), by the network-managing unit (304), the network data-infrastructure (312, 314) to provide a connectivity between the network-managing unit (304) and the device-managing unit (306), performing (805), by the device-managing unit (306), an authenticating action for the application device (310) for authenticating the access device (310) on application-level, notifying (807), by the device-managing unit (306), the network-managing unit about the authentication result, and configuring (808), by the network-managing unit (304), the network data-infrastructure (312, 314) to provide an isolated logical network connectivity between the application device (310) and other equally authenticated application devices.

Inventors:
SCHULZ DIRK (DE)
Application Number:
PCT/EP2022/082787
Publication Date:
June 01, 2023
Filing Date:
November 22, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ABB SCHWEIZ AG (CH)
International Classes:
H04W12/06
Domestic Patent References:
WO2005015875A12005-02-17
Foreign References:
EP3668043A12020-06-17
Attorney, Agent or Firm:
MAIWALD GMBH (DE)
Download PDF:
Claims:
Claims

1 . Method (800) for admitting an application device (310) in a network system (200) with a network core unit (302), a network-managing unit (304), a device-managing unit (306), and a network data-infrastructure (312, 314), the method comprising the steps: authenticating (802), by the network core unit (302), the application device (310) on network-level; notifying (803), by the network core unit (302), the network-managing unit (304) about an authenticating result; configuring (804), by the network-managing unit (304), the network data- infrastructure (312, 314) to provide a connectivity between the network-managing unit (304) and the device-managing unit (306); performing (805), by the device-managing unit (306), an authenticating action for the application device (310) for authenticating the access device (310) on application-level; notifying (807), by the device-managing unit (306), the network-managing unit about the authentication result; and configuring (808), by the network-managing unit (304), the network data- infrastructure (312, 314) to provide an isolated logical network connectivity between the application device (310) and other equally authenticated application devices.

2. Method according to claim 1 , wherein before the step authenticating (802), by the network core unit (302), an application device (310) on network-level, the step configuring (801) the network-managing unit (304) and the device-managing unit (306), as a network (304, 306) for commissioning is performed; and the step configuring (804), by the network-managing unit (304), the network data- infrastructure (312, 314) to provide a connectivity between the network-managing unit (304) and the device-managing unit (306), further comprises admitting the application device (310) to the commissioning network (304, 306).

3. A network system (200) comprising: a network data-infrastructure (312, 314); a network core unit (302) connected to the network data-infrastructure (312) and configured for authenticating (802) an application device (310) on network-level and for notifying (803) the network-managing unit (304) about an authenticating result; a network-managing unit (304) connected to the network core unit (302) and the network data-infrastructure (314) and configured for configuring (804) the network data-infrastructure (312, 314) to provide a connectivity between the network-managing unit (304) and the devicemanaging unit (306), and admitting an application device (310) to the network system (200); a device-managing unit (306) connected to the network-managing unit (304) and configured for performing (805) an authenticating action for the application device (310) for authenticating the access device (310) on application-level; and notifying (807) the network-managing unit about the authentication result; wherein the network-managing unit (304) is further configured for configuring (808) the network data-infrastructure (312, 314) to provide an isolated logical network connectivity between the application device (310) and other equally authenticated application devices.

4. The network system (200) according to claim 3, wherein the network managing unit (304) comprises a network resource-managing unit configured to setup a commissioning network (304, 306) comprising the network-managing unit and the device-managing unit as a separated sub-network and to move the application device (310) to the commissioning network (304, 306) if a verified network-level identity of the application device (310) is available; wherein the device-managing unit (306) is further configured to perform the authenticating action within the commissioning network; and wherein the network resource-managing unit is further configured to move the application device (310) from the commissioning network (304, 306) to an application network in a step after the performing the authenticating action by the device-managing unit (306).

5. The network system (200) according to claim 4, wherein the commissioning network (304, 306) is configurable to be a temporary network or a resident network.

6. The network system (200) according to claim 4 or 5, wherein the network-managing unit (304) is further configured for checking connectivity requirements before moving the access requesting application device (310) to the application network and configuring the data forwarding to fulfill these requirements. 7. The network system (200) according to any one of the previous claims, wherein the authenticating action includes using predefined credentials.

8. The network system (200) according to any one of the claims 3 - 6, wherein the authenticating action is based on a single secure identity used also in network-level authentication of the application device (310) in the device-managing unit (306).

9. The network system (200) according to any one of the previous claims wherein the commissioning network (304, 306) and the application network are logical networks, wherein at least the commissioning network (304, 306) and/or the application network is a VLAN or a stream forwarding domain identified by any combination Ethernet and IP header and service information.

10. The network system (200) according to any one of the previous claims, wherein the physical network is one or several of IEEE 802.3 Ethernet, IEEE 802.3cg APL, 3GPP rel 15, 5G, 3GPP NB-loT, Bluetooth Low Energy, BLE.

11 . The network system (200) according to any one of the previous claims, wherein the application is based on OPC UA client/server sessions or publish/subscribe or Representational State Transfer, REST, -based application and management protocols.

12. The network system (200) according to any one of the previous claims, wherein the device-managing unit (306) is configured to use additionally location based data for authentication.

13. The network system (200) according to any one of the previous claims, wherein the location is one of the following: a geospatial location, a radio direction, a wired connection point, a switch port, GPS coordinates, a radio beam direction, a distance, an IO port.

14. Use of a device-managing unit (306) or network-managing unit (304) in a network system (200) according to any of claims 3 to 13.

15. Computer program element, which when being executed by one or more processors in the network system according to any of claims 3 to 13, instructs the network core unit (302), the network-managing unit (304), the device-managing unit (306), and the network- managing unit (304) to perform the steps of the method according to claim 1 or 2.

Description:
Method for device commissioning in a network system and network system

Technical Field

The invention relates to a network system, a method for admitting an application device in a network system, a use of a device-managing unit or network-managing unit in a network system, and a computer program element.

Acronyms used in this disclosure are listed at the end of the description.

Background

Toward the use of converged IP-networks and technologies from IT/telecoms domain (5G, TSN, OPC UA, etc.), a variety of authentication mechanisms become required that devices and services have to pass before becoming productive in a system. Toward the use of connected digital services based on (public) cloud and edge infrastructures and with the open system architectures of e.g. OPAF and NOA, connectivity is moving toward converged IP-based networks using OPC UA or REST-based application and management protocols, using wired and (cellular) wireless network infrastructures based on TSN, APL, 5G, NB-loT, etc.

This use of Internet and telecommunications technologies in automation systems raises the need to apply zero-trust principles to the industrial network, including the mutual authentication of communication partners, fine-granular network segmentation within the network beyond the use and configuration of network barriers for perimeter security like routers and firewalls. The zero-trust guiding principles for system architectures are verify explicitly, use least privileged access, and assume breach. These are applied to these foundational elements: identities, devices, applications, data, infrastructure, and networks, plus users (added as seventh element). The externalization of network technology (TSN, APL, 5G, NB-loT, etc.) and operation (e.g. cellular networks hosted by public infrastructure) makes it necessary to integrate the security functions of 5G, TSN, OPC UA, and the automation system in general. Given the different standards, vendors, and operators, it is not possible to consolidate all network authentication and configuration functions in one system like the DCS.

Even the individual mechanisms and processes are typically considered tedious, from creating a common source of trust to managing security credentials in the system and transferring them to devices.

The situation that presents itself now includes several such security mechanisms that must be “satisfied” and are still not integrated with each other. For example, no relation is made between a 5G or TSN device being admitted to a network, the secure discovery of an OPC UA device on application layer, and the overall configuration of network resources and security functions.

Summary of the invention

There may be a desire to improve the admission of an application device in a network system, for example for commissioning the application device in the network.

The problem is solved by the subject-matter of the independent claims. Embodiments are provided by the dependent claims, the following description and the accompanying figures.

The described embodiments similarly pertain to the network system, the method for admitting an application device in a network system, the use of a device-managing unit device or network-managing unit in the network system, and the computer program element. Synergetic effects may arise from different combinations of the embodiments although they might not be described in detail.

Further on, it shall be noted that all embodiments of the present invention concerning a method might be carried out with the order of the steps as described, nevertheless this has not to be the only and essential order of the steps of the method. The herein presented methods can be carried out with another order of the disclosed steps without departing from the respective method embodiment, unless explicitly mentioned to the contrary hereinafter. Technical terms are used by their common sense. If a specific meaning is conveyed to certain terms, definitions of terms will be given in the following in the context of which the terms are used.

According to a first aspect, a method for admitting an application device in a network system with a network core unit, a network-managing unit, a device-managing unit, and a network data-infrastructure is provided. The method comprises as a first step authenticating, by the network core unit, an application device on network- 1 eve I. The application device is requesting an access to the network system. In a next step, the network-managing unit is notified about an authenticating result. In a further step, the network data-infrastructure is configured, by the network-managing unit, to provide a connectivity between the networkmanaging unit and the device-managing unit. In a further step, an authenticating action for the application device is performed, by the device-managing unit, for authenticating the access device on application-level. In a next step, the network-managing unit is notified, by the device-managing unit, about the authentication result. In a further step, the network data- infrastructure is configured, by the network-managing unit, to provide an isolated logical network connectivity between the application device and other equally authenticated application devices.

The network data-infrastructure may comprise an access network such as a 5G RAN, including a packet gateway, bridges and switches such as TSN Ethernet switches, etc. Hence, the network data-infrastructure is responsible for physically accessing the network and fortransporting and routing data to and from an end device. The network core unit may be, for example, a unit of the 5G core with network exposure. Thus, the network core unit may also be part of the data network; however, it is not responsible for forwarding the application data of the application device to the end device. Therefore, the network core unit is not defined as being part of the network data-infrastructure in this disclosure. Operations or devices relating to the network responsible for physically transporting the data to and/or from the application device are denominated as “network-level” operations or devices herein, whereas operations or devices relating to the application, which the application desires to initiate or to join, are denominated as “application-level” operations or devices.

The method provides a two-fold authentication in a merged network. The first one is performed for accessing the data network, e.g. the 5G network, and the second one is performed for “accessing” the application. Forthat, the core unit provides after successful authentication of the application device the access to entities responsible for the authentication for the application. The network-management unit is a central element, which communicates with the network core unit on one side and the device management device on the other side and which has an interface to the network data-infrastructure for configuring the devices of the network data-infrastructure. The device management device performs the authentication of the application device on application-level. Once the authentication has been successfully finished, the network-management unit configures the network data- infrastructure devices such as gateways and switches so that the application device can communicate over these network data-infrastructure devices with the end device. The end device is, for example, a further application device of the same application. One important point is that the data is only transmitted via and transmitted to devices that have been configured by the network-management unit. That is, only devices that are necessary or part of the application and that have been authenticated already themselves in the network system for the same application are allowed to be involved in the communication. In this way, an isolated logical network is created. The term “logical” expresses the configurability of the network. That is, the network is created by the network-management unit by configuring the devices.

For performing its tasks, the network-managing unit may include a network-level authentication unit and a network resource-managing unit configured for managing network resources such as reserving, configuring, monitoring the network resources.

The device-managing unit may perform tasks such as discovering, identifying, authentication, parameterizing/configuring, and monitoring the application devices.

In this way, application units that run an application can exchange data and/or information over a transparent application network configured for the application and according to an application protocol.

According to an embodiment, before the step “authenticating, by the network core unit, an application device on network-level”, the step configuring the network-managing unit and the device-managing unit as a network for commissioning is performed. Further, the step “configuring, by the network-managing unit, the network data-infrastructure to provide a connectivity between the network-managing unit and the device-managing unit” further comprises admitting or moving the application device to the commissioning network. In other words, the devices that are responsible for the second authentication and for configuring the network data-infrastructure devices are configured devices themselves to form a commissioning network. That is, also the commissioning network is a separated network created by configuration. The step may be performed by an operator, the networkmanaging device, or a controller in the network. The step may be performed at a later stage, e.g., after the step notifying, by the network core unit, the network-managing unit about an authenticating result. The commissioning network may comprise further devices such as a device directory, data storage devices comprising information about the application device, further devices, or the application in general. The step admitting the application device to the commissioning network implicates that the second authentication, i.e., application-level authentication is not performed when the first authentication, i.e. network-level authentication has failed. In this case, also the setup of the commissioning network is not required, if the commissioning network is setup after the notifying step.

Since it is configurable, the commissioning network may be a temporary or a resident network. However, it may be in any case available as long as the application is running, to ensure that application devices for this application can still be authenticated and integrated in the network.

According to a second aspect, a network system is provided. The network system comprises a network data-infrastructure, a network core unit connected to the network data- infrastructure, a network-managing unit connected to the network core unit and the network data-infrastructure, and a device-managing unit connected to the network-managing unit. The network core unit is configured for authenticating an application device on network-level and for notifying the network-managing unit about an authenticating result. The networkmanaging unit is configured for configuring the network data-infrastructure to provide a connectivity between the network-managing unit and the device-managing unit, and admitting an application device to the network system. The device-managing unit is configured for performing an authenticating action for the application device for authenticating the access device on application-level, and notifying the network-managing unit about the authentication result. The network-managing unit is further configured for configuring the network data-infrastructure to provide an isolated logical network connectivity between the application device and other equally authenticated application devices.

The network data-infrastructure may comprise an access network such as a radio access network, packet gateways, switches and the like. The access network may comprise means to connect with an application device and an end device, which may also be for example an application device. The network data-infrastructure has means to forward data between the application device and the end device. The term “is connected” relates to the structure of the system and can also be expressed as “has an interface to”. The structural connections may be functionally configurable, e.g., to form an isolated network connectivity between the network-level-authentication unit and the device-managing unit, and admitting an application device to the network system, or, for example, the network-managing unit may include a network-level authentication unit and a network resource-managing unit configured for managing network resources. The network resource-managing unit may, for example configure a switch as one of the resources to be part of the sub-network for connecting the application devices with the end device via the switch. The network-level authentication unit may be configured for receiving and managing the authentication performed by the network core unit on network- 1 eve I. In addition, the functions, such as represented by the devicemanaging unit, could be initiated or instantiated only after an event, such as a successful network authorization at the network level, has occurred.

The network system may further comprise one or more application units configured for being operated as an application for exchanging defined data and/or information over a transparent application network configured for the application and according to an application protocol.

The access requesting application device, “the application device” for short herein, may be, for example a user equipment in general, and in particular a sensor, an actuator, a monitoring device, a control device, an OPC client or server, a virtual application container (e.g. Docker or Kubernetes) eventually deployed on a physical execution host, or another device capable to communicate according to a physical network standard. Such a standard may be an IP standard and based, for example, on a 5G standard or related standards such as TSN, APL, NB-loT, etc. “Network-level” or “physical network-level” therefore also refers to functions and devices of the physical network such as the 5G radio access network or Ethernet copper/fiber, providing the physical access to the network system and the data transport infrastructure. The physical network is the underlying network of, for example, the (logical) commissioning and the application network. Therefore, the network-level may be considered to be below the application layer.

In this disclosure, the term “network context” is used. A network context may include network addresses, packets, fingerprints, or other types of data suited to direct data forwarding in the network. A “unit” as used herein may be a physical and/or a logical device and represents a function or service, i.e., a unit may be based on hardware and/or software and may be implemented on a single hardware device or on a plurality of hardware devices.

In other words, the network system provides a structure and functions that enable dual authentication of an application device that desires access to the network system. First, on network-level, and second, before starting the application such as an OPC application, on application-level. The device-managing unit may use the verified identity of the application device afterthe, e.g. 5G, authentication or IEEE 802.1X for Ethernet of the physically connected device. When the first authentication was successful, the network resourcemanaging unit configures the network such that the device-managing unit is connected to the network resource-managing unit in an isolated way. Hereby, “Network resource-managing unit” is seen as a logical unit, which may host several services such as IEEE 802.1 Q TSN CUC and CNC, and which may be implemented on one or several physical devices. The second authentication uses the device-managing unit.

The device-managing unit is part of the application. Since the application involves several units and hardware devices such as servers and clients, the application may be seen as forming or being based on an application-network. For example, OPC UA is such a network. The second authentication is performed capsuled from network-level and application-level by the device-managing unit. That is, the device-managing unit authentication service is completely separated from the network-level authentication functions and from an access by the application. Device-managing unit services are initiated afterthe network-level authentication has been finished and the device-managing unit has been notified by the authentication function of the network. Using the result and information gained from the network, for the further authentication, no further authentication interaction with the network is required. When the network resource-managing unit has successfully gained all required authentications and verifications, the application can effectively be run, provided the end devices are running and are configured. Since the network resource-managing unit may accommodate, for example, CUC and CNC, the application device and a connection end device may be configured by the CUC, and physical network devices for the data transport or streams such as gateways between the physical access network and a TSN and switches of the TSN are configured. The distributed application is communicating within the separated application network context, that is, only in the required and separated context comprising only those peer devices, to which the application device, rather, one specific application service instance on the device, needs to connect to, i.e. only to all application partners.

According to an embodiment, the network managing unit comprises a network resourcemanaging unit configured to setup a commissioning network comprising the networkmanaging unit and the device-managing unit as a separated sub-network and to move the application device to the commissioning network if a verified network-level identity of the application device is available. The device-managing unit is further configured to perform the authenticating action within the commissioning network. The network resource-managing unit is further configured to move the application device from the commissioning network to an application network in a step after the performing the authenticating action by the devicemanaging unit.

“Moving” in this context means, that data traffic from and/or to the device takes place only within the respective network. For example, data traffic from the application-requesting authentication or the automation application is forwarded only within the logical application network to other network members. The application network is the network connecting the devices of an application on application-level, that is, communicating with each other using an application protocol after the application is started.

It is understood that the identities of all communication partners may explicitly be verified on network and application layer before configuring any level of network admission. That is, the entities or units described herein may be used for authenticating more than one application devices, or several instances of a unit may be present in the network system.

According to an embodiment, the commissioning network is configurable to be a temporary network or a resident network.

This means, the authentication performed by the device-managing unit and the network authentication is performed in a separate network context, which exists only for the time of the second authentication. It therefore supports the separation from the underlying network and the application network. The device-managing unit device may therefore further be configured to tear down the temporary commissioning network after the commissioning is completed. In this context, “setup” and “tear down” may be a “configuration” performed by the network resource-managing unit. The tearing down may relate to the commissioning network, however single instances, as for example, the device-managing unit may be kept alive. According to an embodiment, the network-managing unit is configured further for checking connectivity requirements before moving the access requesting application device to the application network and configuring the data forwarding to fulfill these requirements, for example, beyond basic reachability of the members of the same network.

The NWM checks the connectivity requirements indicating the device, e.g. within a Time Sensitive Network Centralized User Configuration (TSN CUC) or within IO signal lists in a Distributed Control System (DCS). Such connectivity requirements are for example high availability, high throughput, real-time transmission, low latency and low jitter. The CUC collects the requirements of the application and forwards them in collections per stream to the centralized network configuration (CNC). After configuration by the CNC, the CUC forwards the final configurations to the end-devices, including the application device.

According to an embodiment, the authenticating action includes using predefined credentials.

Using predefined credentials is one option for authenticating the access requesting application device. In this case, a complete set of identities is exchanged, e.g. between the application device and the device-managing unit, which may access the LDAP to retrieve and check the predefined credentials, and the trust gained via these individual identities is stacked/chained in the authentication processes.

According to an embodiment, the authenticating action is based on a single secure identity used also in network-level authentication of the access requesting application device in the device-managing unit.

Using a network-level authenticity as source of trust is another option for authenticating the access requesting application device. In this case, only one common strong device identity (based on IEEE 802.1 AR) is necessary from which the identities and credentials of devices, systems and services reaching from the network layer to the application layer, and from wired to wireless protocols are derived. This allows bootstrapping application-level authentication by using network-level credentials and authenticity, i.e., identity and certificates, only having to exchange low-level networking identities during device ordering.

According to an embodiment, the commissioning network and the application network are logical networks, wherein at least the commissioning network is a VLAN or a stream forwarding domain identified by any combination of Ethernet, IP header and service information.

The application network and the commissioning layer may be logical networks. “Logical” means that the instances, services and functions are defined by software and/or hardware that may be configured or re-configured to form an individual network or a sub-network. The hardware used may be shared with other instances, services or functions, which may also belong to other parts of the network. Vice versa, the instances, services or functions may be distributed over several hardware devices. The logical commissioning network may be implemented as VLAN to reach a capsuling and to be not accessible directly by devices or applications except of the interfaces described herein. Similarly, the application device may get access to a VLAN that represents the application network.

According to an embodiment, the physical network is one or several of IEEE 802.3 Ethernet, IEEE 802.3cg APL, 3GPP rel15 (and beyond) 5G, 3GPP NB-loT, Bluetooth Low Energy (BLE).

According to an embodiment, the application is based on OPC UA client/server sessions or publish/subscribe or Representational State Transfer (REST)-based application and management protocols.

For example, the entire device management system can be a combination of an FDI compliant client server infrastructure with an OPC UA GDS extended with an OPC UA alias server.

According to an embodiment, the device-managing unit is configured to use additionally location data for authentication.

Location-based authentication may be performed, for example, as an addition step in the authentication procedure. Alternatively, location data may be part of e.g., the credentials or they may be compared with an allowed region, a black list or a white list. Location data such as automation tags associated with the application device may further be used for configuring the network data-infrastructure. The application device therefore is usable for radio-based localization. According to an embodiment, the location is one of a geospatial location, a radio direction, a wired connection point, GPS coordinates, a radio beam direction, a distance, or a switch port or an IO port.

According to a further aspect, a computer program element is provided, which when being executed by one or more processors in the network system as described herein, instructs the network core unit, the network-managing unit, the device-managing unit, and the network-managing unit to perform the steps of the method as described herein .

The computer program element may be part of a computer program, but it can also be an entire program by itself. For example, the computer program element may be used to update an already existing computer program to get to the present invention.

The program element may be stored on a computer readable medium.

The computer readable medium may be seen as a storage medium, such as for example, a USB stick, a CD, a DVD, a data storage device, a hard disk, or any other medium on which a program element as described above can be stored.

The invention realizes a zero-trust network admission for connected devices and services. Application-layer authentication is used to authorize network-layer admission. Security aspects of different connectivity technologies like 5G, APL, TSN, OPC UA sessions and pub/sub are integrated. With respect to conventional system, the effort is reduced and the confidence for authentication in private networks is improved. Resource efficiency to reserve resources only exactly as needed is enabled. The invention allows further for enabling micro segmentation and perfect application isolation with minimum needed access.

Initially, only the 5G network-level authentication device is accessible by the access requesting application device. After 5G network-level authentication, only the devicemanaging unit is accessible by the access requesting application device. After applicationlevel authentication, only connection points on physical network-level and application-level that are required for a use-case for which the access requesting application device is requesting the access are accessible by the access requesting application device.

An admission to an application conventionally requires access rights to all parts of the network. Here, instead of granting access to the complete network, only access to those parts is granted that are involved by running the application, which may also include transit networks if they are not tunneled. Moreover, only access to the devices and services according to the determined connectivity is granted. This policy is compliant to a network- wide zero-Trust policy.

Trust in devices/systems is gradually specialized and hosted services toward the access rights needed for legitimate application use-cases. With respect to conventional networks, this is different from simply raising the trust level for a device or service toward full network access. Therefore, a zero-trust admission approach is implemented, using a trust stacking/chaining of the mutual authentication on physical network- (e.g. 5G-AKA/EAP-TLS) and application-layer (e.g. OPC UA via GDS) and a stepwise authorization of network access (e.g. commissioning VLAN, control-loop TSN stream) based on the previous authentication step of the physical network layer.

Other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from the study of the drawings, the disclosure, and the appended claims. In the claims, the word “comprising” does not exclude other elements or steps and the indefinite article “a” or “an” does not exclude a plurality. A single processor or other unit may fulfill the functions of several items or steps recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage. Any reference signs in the claims should not be construed as limiting the scope of the claims.

These and other features, aspects and advantages of the present invention will become better understood with reference to the accompanying figures and the following description.

Short Description of the Figures

Fig. 1 shows a diagram illustrating the commissioning of the access requesting application device in the network system.

Fig. 2 shows a block diagram of the network system.

Fig. 3 shows a block diagram of commissioning units during a first step of the commissioning. Fig. 4a and 4b shows a block diagram of commissioning units during a second step of the commissioning.

Fig. 5a, 5b and 5c shows a block diagram of commissioning units during a third step of the commissioning.

Fig. 6 shows a block diagram of commissioning units during a fourth step of the commissioning.

Fig. 7 shows a block diagram of commissioning units during a fifth step of the commissioning.

Fig. 8 shows a flow diagram of the method for commissioning an access requesting application device in a network system.

Detailed Description of Embodiments

Corresponding parts are provided with the same reference symbols in all figures.

Fig. 1 shows a diagram illustrating the commissioning of the access requesting application device 310 in the network system. In the description of the figures, the network-managing unit is also referred to as “network management”.

In a preparing step, see black circle numbered “1 , a network separation is setup. The network system is separated into physical access network 104, a logical commissioning network 102, and an application network 106. In a next step of the commissioning, see black circle numbered “2”, the application device is authenticated on network-level by network core unit 302, for example a 5G core, and the network management is notified through the 5G core, in this example with network exposure (5GNI) 302. In a further step of the commissioning, see black circle numbered “2, the network-managing unit (NWM) 304 checks a device directory and moves the device into the commissioning network. In the next step, see black circle numbered “4”, an application-level registration with device-managing unit 306, for example, an OPC GDS 306 is performed and the network management is notified. There are for example two options. Option 1 : GDS 306 further authenticates the device using predefined credentials. Option 2: network-level authenticity (identity and certificates) is used as source of trust to authenticate and register the device in the GDS 306. In the next step, see black circle numbered “5”, the NWM 304 checks connectivity requirements indicating the device, for example, within a TSN CUC or within IO signal lists in a Distributed Control System (DCS), and moves the device to the application network. In the final step, see black circle numbered “6”, when the end-to-end connectivity has been established, the protocolspecific startup and the start of the application takes place within the separated network context. After commissioning, the application device 310 can communicate via 5G RAN including packet gateway 312, and (TSN) Ethernet switches 314 with an end device 316 or end station 316.

Fig. 2 shows a block diagram of functions, which may be implemented to realize a converged network system 200 as described herein. The network system 200 includes a 3GPP system that provides an application device 310 or mobile device with access to the network system 200. The 3GPP (sub-) system has interfaces on data plane and on system authentication level to the Internet, where the communication is performed using the Ethernet based TSN standard. These standards are defined by IEEE and IETF. The Internet and TSN- system has an interface to the OPC system defined by the OPCF on device and service directories-level and on data plane level. On data plane level, the data sent by an application device (UE) 212, which is for example a 5G device, is received by the RAN 214 and forwarded via a PGW216 and switches 218 to a TSN end station 316, i.e., an Ethernet device, e.g. an OPC UA client. Application device 212 is further connected to a SIM/eSIM/eUICC 222 that stores authentication data and keys. The precondition for sending data to the TSN end station 316 is an authentication of the application device 212 in the different networks and a gain of access rights. This is provided by the network controller 204. After accessing the 3GPP system via RAN 112, the application device 212 is authenticated by the AMF 224. The AMF 224 utilizes the UDM 228 to retrieve any access based information/restrictions of the subscriber. It also uses the UDM to identify the allowed functionalities of the SMF 226 for the subscriber to make a decision with respect to authentication. The SMF 226 provides functions such as session establishment, modify, release, etc. The NE 230 then exposes the application device 212 to the Network, and the network management 204 is notified about the authenticated application device 212. The network management 204 comprises the CUC 232 and CNC 238 functions, which are functions of a TSN. The CUC 232 configures the streams between the application device 212 and the TSN end station 316, and the CNC 238 configures the switches on data plane. The network management receives certificates from the CA 242 and may use LDAP 234 for data localization or other services. The GDS 240, which also receives certificates from the CA 242 and which has access to the LDAP 234 authenticates the application device 212 on application level, where the application is an OPC application.

Hierarchically, above the data plane is the control plan with SMF and CNC, controlling the RAN 214, the PGW216 and the switches 218. The next higher level is the system authentication including the AMF 224 and the RADIUS 236. Above this level, there are the device and service directories including the UDM 228, LDAP 234 and GDS 240. This level is also referred to as management plane. The CUC 232 belongs to the Intent and Policies level. The highest level is the corporate level comprising a virtual container environment 244 for the implementation and the certificates.

Block 202 indicates the 3GPP units or functions to be implemented, blocks 204, 238 and 218 the IEEE and IETF network-managing unit related units or functions, and block 206 the OPCF related units or functions.

Figures 3 to 7, in combination with Fig. 8, show step by step the access and startup procedure, i.e., the method 800, when an application device, e.g., a 5G application device 310, wants to connect to a TSN Ethernet device 316 and requests an access to an application such as an OPC application, in a converged network system 200. The diagrams in Figures 3 to 7 show the involved blocks that represent functional units in the converged network system 200. The single-lined arrows show available connections between the blocks, the white double-lined arrows show the communication paths used in the steps described in Figures 3 to 7, and the black double-lined arrows show the communication paths of a single step that is described by means of a particular figure. The bold line between blocks 302 and 312 indicate the 5G backhaul and the bold line between the further blocks indicate the TSN.

In a first step, 801 (blocks and bold lines in Figs. 3 to 7), the network is separated into a physical access network, a logical application network, and a logical commissioning network. The physical access network comprises the RAN 312, and the logical commissioning network comprises the network management including, in this example, CUC and CNC and the OPC UA GDS. On the logical application network, the application is run after the 5G device has finally verified.

As a second step, 802 in Figs. 8 and 3, the 5G device accesses the RAN core 302 via a packet gateway 312 in the data plane by requesting a connection setup. The request is forwarded from the RAN to the 5G core including network exposure (NE), where the 5G device is authenticated on 5G network-level. Generally, in the NE, applications can subscribe to certain changes in the network and command the network to exploit its programmable capabilities providing new services for the end-users.

In step 803, as shown in Figs. 8 and 4a, the 5G core unit 302 notifies the network-managing unit 304 about the 5G application device 310 requesting an access to an OPC application (Fig. 4a). The notification contains authentication information about the 5G device 310. The network management 304 moves the 5G application device 310 to the commissioning level. The network-managing unit 304 may include, in an example, CUC 232 and CNC 238 that may be part of a TSN. The CUC 232 receives a notification of the stream that shall be transmitted from the 5G device to the TSN Ethernet device 316, i.e. an end device of the data connection, according to an application specific configuration protocol. The CUC communicates with the CNC using a User/Network configuration protocol. In step 804, as shown in Fig. 4b, the network-managing unit configures the TSN Ethernet switches or bridges using a network management protocol, and configures the TSN functions and parameters. Further, the network-managing unit 304 configures the 5G RAN packet gateway 312 such that the data packets are routed to the (TSN) Ethernet switches 314.

In step 805, as shown in Figs. 8 and 5a, the 5G RAN packet gateway 312 and the Ethernet switches 314 being already configured, the 5G device 310 is connected via the 5G RAN 312 and the switches 314 over the TSN to the network management 304 and to the OPC UA GDS 306. The GDS 306 performs an authenticating action for the 5G device 310 for authenticating the 5G device on application level. Forthat, the GDS 306 communicates in step 806 with the LDAP service 308, as shown in Fig. 5b. The LDAP service 308 provides a central place to store usernames and passwords. In step 807, the GDS 306 notifies the network management 304 about the authentication as shown in Fig. 5c.

In step 808, as shown in Fig. 6, the network management 304 starts the application within the separated application network context, and grants the admission to the application network i.e., the OPC application network in this example, to which it subsequently moves the 5G device from the commissioning network. Further, it configures the gateway 312 and switches 314 such that in step 809 of Fig. 7 the 5G device 310 can access the application and communicate with the (TSN) Ethernet device 316, including mutual OPC UA authentication, and transmit and receive data to/from the (TSN) Ethernet device 316. All functions may be logical functions realized in hardware and/or software. Each of the functions may be implemented on one or on several hardware devices, or may be distributed over more than one hardware devices. Usually, services are implemented as a server. Further, there may be several instantiations of a function, and one of the several instantiations may be responsible for servicing the 5G device, e.g., process a request, an authentication, etc. Furthermore, some functions rely on several instantiations such as switches, which may locally be distributed over the data network for routing the data packets through the data network, i.e. in the data plane of the network.

In this disclosure, the following abbreviations are used:

AKA Authentication and Key Agreement

AMF Authentication Management files (UMTS)

AMF/SEAF Core Access and Mobility Management Function

APL Ethernet Advanced Physical Layer (Ethernet-APL)

BLE Bluetooth Low Energy

CA Certificate Authorities

CNC Centralized Network Controller

CUC Centralized User Configuration

DCS Distributed Control System

DSA Directory System Agent

EAP-TLS Extensible Authentication Protocol - Transport Layer Security

FDI Field Device Integration

GDS Global Discovery Server

IP Internet Protocol

LDAP Lightweight Directory Access Protocol

NB-IOT Narrowband Internet of Things (NB-loT)

N E N etwo rk expos u re

NOA NAMUR Open Architecture

OPAF Open Process Automation Forum

OPC Open Platform Communications

OPC UA OPC Unified Architecture

OPCF OPC Foundation

PGW-U PDN Gateway User Plane function

PLC Programmable logic controller

RAN Radio Access Network REST Representational State Transfer

SDM Subscriber Data Management

SEAF Security Anchor Function

SMF Session Management Function. Session establishment, modify, release TSN Time Sensitive Network

UDM Unified Data Management

UE User Equipment

VLAN Virtual Local Area Network

Reference Numerals

102 logical commissioning network

104 physical access to RAN

106 logical application networks)

200 network system

202 3GPP units or functions for implementation

204 IEEE and IETF network-managing unit related units or functions for implementation

206 OPCF related units or functions for implementation

212 application device I UE

214 RAN

216 PGW/TT

218 Switch

222 SIM/eSIM/eUICC

224 AMF/SEAF

226 SMF

228 UDM

230 NE

232 CUC

234 LDAP

236 RADIUS

238 CNC

240 GDS

242 CA

244 virtual container environment

302 5G core with network exposure

304 network-management unit; Network Management

306 device-managing unit; OPC UA GDS

308 LDAP

310 application device; 5G Device

312 RAN; gateway; 5G RAN with packet gateway

314 switch; (TSN) Ethernet Switch

316 (TSN) Ethernet Device; end device/station

800 Method

801-809 Method steps