-
移动互联网、物联网的飞速发展迫切需要更大带宽、更高速率、更少时延、更多接入容量的移动通信技术的支撑[1],尤其需要支持端到端通信和良好的移动性管理。第五代移动通信(5G)应运而生,相比4G,实现了千倍流量密度、百倍传输速率、毫秒级时延、千倍连接数密度。
网络与移动终端进行接入认证和密钥协商,对空口数据和空口信令进行加密和完整性保护是确保移动通信安全的通用技术手段。随着移动通信技术的发展,移动终端与网络间的认证和密钥协商技术不断完善,安全强度不断提高。
为支撑普遍的网络接入,满足不同应用场景的需求,5G将在4G技术基础上进行演进和创新,实现网络和无线传输关键技术的突破[2]。在网络方面,引入服务化网络架构、SDN、NFV、MEC等技术[3-4]。在无线方面,采用大规模天线、超密集组网、非正交多址、高频段通信、新型编码调制等技术[5]。同时,新的网络、空口技术和新的应用场景对5G网络的接入认证和密钥协商机制也提出了新的挑战。
5G Mobile Equipment Authentication State Roaming and Transmission Approach
-
摘要: 移动通信系统通过接入认证和密钥协商在网络与移动终端间建立信任关系,确保通信安全。5G中移动终端在移动过程中可能跨越多种接入方式,需要反复与网络进行认证和协商;物联网应用中存在大量功能相同、行为一致的成组终端,逐一与网络进行认证和协商对网络构成巨大压力。移动终端成功接入网络后,可由网络为其颁发认证状态标识,持该标识的设备可直接通过其他接入方式接入网或将该标识传递给组内成员。该方法可以实现认证状态的漫游,避免成组移动终端与网络逐一认证,从而提高接入效率,避免资源浪费,确保网络安全。Abstract: The mobile communication network establishes a trust relationship between the network and the user equipment with authentication and key agreement. 5G network is a convergence network. User equipment can access the network through a variety of ways and it needs to authenticate with the network repeatedly when it is moving between two access networks. In the application environment of Internet of Thing, a group of user equipment with same characteristics and behaviors need to authenticate with the network one by one, which will over-consumes network resource and lowers access efficiency. To solve this problem, an authentication state identification mechanism is designed. If the user equipment successfully accesses the network, the network grants it a status identification. It can access the network with any way, no need access authentication again for a while. It also can transfer such an identification to the other members of the group, thus avoiding the authentication one by one. This mechanism can improve the efficiency of access, avoid the waste of resources and ensure the security network.
-
Key words:
- 5G /
- authentication /
- key agreement /
- status identification
-
[1] 尤肖虎, 潘志文, 高西奇, 等. 5G移动通信发展趋势与若干关键技术[J].中国科学:信息科学, 2014, 44(5):551-563. http://d.old.wanfangdata.com.cn/Periodical/zgsjtx201508010 YOU Xiao-hu, PAN Zhi-wen, GAO Xi-qi, et al. Development trends and several key technologies of 5g mobile communication[J]. Scientia Sinica(Informationis), 2014, 44(5):551-563. http://d.old.wanfangdata.com.cn/Periodical/zgsjtx201508010 [2] IMT-2020(5G) Promotion Group. 5G Vision and requirementswhite paper[EB/OL].[2015-03-21]. http://www.IMT-2020.cn. [3] 王胡成, 徐晖, 程志密, 等. 5G网络技术研究现状和发展趋势[J].电信科学, 2015, 9:156-162. http://d.old.wanfangdata.com.cn/Periodical/dxkx201509021 WANG Hu-cheng, XU Hui, CHENG Zhi-mi, et al. Current research and development trend of 5G network technologies[J]. Telecommunications Science, 2015, 9:156-162. http://d.old.wanfangdata.com.cn/Periodical/dxkx201509021 [4] 赵国锋, 陈婧, 韩远兵, 等. 5G移动通信网络关键技术综述[J].重庆邮电大学学报(自然科学版), 2015, 27(4):441-452. http://d.old.wanfangdata.com.cn/Periodical/cqydxyxb-zrkx201504003 ZHAO Guo-feng, CHEN Jing, HAN Yuan-bing, et al. Prosective network techniques for 5G mobile communication:a survey[J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2015, 27(4):441-452. http://d.old.wanfangdata.com.cn/Periodical/cqydxyxb-zrkx201504003 [5] PIRINEN P. A brief overview of 5G research activities[C]//International Conference on 5g for Ubiquitous Connectivity.[S.l.]: ICST, 2015. [6] 王映民, 孙韶辉. TD-LTE技术原理与系统设计[M].北京:人民邮电出版社, 2010. WANG Ying-min, SUN Shao-hui. TD-LTE principles and system design[M]. Beijing:People's Posts and Telecommunications Press, 2010. [7] PARK Y, PARK T. A survey of security threats on 4G networks[C]//GLOBECOM Workshops.[S.l.]: IEEE, 2007. [8] 蒋黎明, 张琨, 徐建, 等.证据信任模型中的信任传递与聚合研究[J].通信学报, 2011, 32(8):91-100. doi: 10.3969/j.issn.1000-436X.2011.08.012 JIANG Li-ming, ZHANG Kun, XU Jian, et al. Research on trust transitivity and aggregation in evidential trust model[J]. Journal on Communications, 2011, 32(8):91-100. doi: 10.3969/j.issn.1000-436X.2011.08.012 [9] 王进, 孙怀江.基于Jφsang信任模型的信任传递与聚合研究[J].控制与决策, 2009, 24(12):1885-1889. doi: 10.3321/j.issn:1001-0920.2009.12.026 WANG Jin, SUN Huai-jiang. Trust transitivity and aggregation research based on Jφsang's trust model[J]. Control and decision, 2009, 24(12):1885-1889. doi: 10.3321/j.issn:1001-0920.2009.12.026 [10] ASAI T. 5G radio access network and its requirements on mobile optical network[C]//International Conference on Optical Network Design and Modeling.[S.l.]: IEEE, 2015. [11] ZENG L Y. A security framework for internet of things based on 4G communication[C]//International Conference on Computer Science and Network Technology.[S.l.]: IEEE, 2012.