LTE ENodeB Security Networking and Data Configuration-20100331-A-1.0
LTE ENodeB Security Networking and Data Configuration-20100331-A-1.0
www.huawei.com
Scheme
Application
Military applications in ancient times
Plain text Cipher text
Advantages
The message sender does not need to exchange the key with the receiver.
Disadvantages
Compared with the symmetric encryption algorithm, the non-symmetric
encryption algorithm is slow. For applications that require short response time,
the non-symmetric encryption algorithm is impractical.
PKI Composition
Digital certificate/CRL storage library: used to store the digital
certificate or Certificate Revocation List (CRL) issued by the CA
system
Registration Authority (RA): used for information entry and
qualification of the digital certificate requestor
Certification Authority (CA): used to issue and manage digital
certificates
Encrypt by
using the private
key Compare the two
MD MDs. If they are
Package for Decompress the same, it
sending the package indicates that
verification
succeeds.
Requestor identity
information
Scheme
Scheme
Networking
Security Networking
Internet security protocol workgroup for IP security Link layer protocol Link layer
protocols and key management mechanisms under
Physical layer Physical
the IETF. Through years of efforts, this workgroup
protocol layer
has proposed a series of protocols that form a
security system, which is collectively called IP ISO network
protocol model
Security Protocol.
Current Implementation
The eNodeB supports the following verification algorithms:
NULL: not to perform integrity check for IP packets.
MD5: Enter a message of any length to generate a 128-byte message digest.
SHA-1: Enter a message smaller than 264 bytes to generate a 160-byte message digest.
Comparison and configuration of three verification algorithms
SHA-1 has the highest security level while NULL has the lowest.
AH is configured through AHAuthAlg, while ESP is configured through ESPAuthAlg. The verification
algorithms at both ends must be consistent.
Networking Scheme
Networking
Security Networking
M2000
DHCP SERVER
Core Network
eNodeB
Inner DNS
DNS
Access secuGW
Network
Public DHCP
SERVER
eNB
Issue device
certificate
Produce eNodeB
eNodeB SeGW
SeGW device certificate
The operation and maintenance personnel of the eNodeB sends orders to the eNodeB through the M2000 to instruct the
eNodeB to generate a certificate request file.
Upon receipt of the request, the eNodeB generates a key pair (if required) and certificate request file.
The maintenance personnel downloads the certificate request file to the local computer.
The maintenance personnel submits the certificate request file to the CA administrator for certificate registration.
The CA administrator submits the request after review to the CA system for issuance, and issues the request to the
certificate library.
The maintenance personnel downloads the certificate to the local computer.
The maintenance personnel configures a new certificate for the eNodeB through the M2000.
M2000