This solution addresses the security credentials establishment for the security requirements in key issue #3.1.
For establishment of the secure RRC connection with the network (IAB MT setup), the MT functionality in the IAB node performs authentication with the network and establish the AS security context for the secure exchange of the RRC messages (Solution #1.1). Further, for establishment of secure F1 interface (IAB DU setup), it is required to perform an authentication mechanism over IKEv2 to establish IPSec tunnels (Solution #3.1). As the IAB Node's MT functionality and DU functionality establish the security context independently, multiple authentication procedures are performed between the IAB Node and to the same network (for the same RAN technology). Instead of performing the mutual authentication again between the IAB Node and the IAB Donor, the Access Stratum (AS) security context key
KgNB (in possession of the MT functionality in the IAB node and in the IAB Donor) is used to derive a Shared Key, which will be used to compute the AUTH value directly and the authentication run is skipped (skipping full authentication run, for example, EAP-TLS or EAP-AKA procedure).
During the UE Registration procedure, the network performs verification of IAB subscription information for IAB-node authorization (see
TS 23.501). Therefore, only after successful verification of IAB-node authorization, the 5GC completes the Registration procedure and provides AS security context key
KgNB to the IAB-donor. By using the AS security context key
KgNB, the IAB Donor ensures that the IAB Node is authorized already by the core network.
During the topology adaptation (as detailed in
TS 38.401), it may be possible to allocate different TNL address(es) that is (are) routable via the target IAB-donor-DU. Therefore it is required to (re)establish the IPsec associations between the IAB-node and the IAB-donor.
This solution details the mechanism for establishment of secure F1 interface, performing an authentication mechanism over IKEv2 to establish IPsec tunnels, which is required for Solution #3.1 (concluded for normative work, see clause 7.4.1).
This solution does not require any additional pre-provisioned security credentials for performing an authentication mechanism over IKEv2 to establish IPsec tunnels. The security credential required to perform IKEv2 procedure is derived using the AS security context (which is established as part of IAB-UE setup procedure).
Further using the PSK authentication method for establishment of secure F1 due to IAB-node migration skips the full authentication run, therefore the solution is more efficient than performing an additional authentication procedure over IKEv2.