WO2023168167A1 - Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche - Google Patents
Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche Download PDFInfo
- Publication number
- WO2023168167A1 WO2023168167A1 PCT/US2023/062498 US2023062498W WO2023168167A1 WO 2023168167 A1 WO2023168167 A1 WO 2023168167A1 US 2023062498 W US2023062498 W US 2023062498W WO 2023168167 A1 WO2023168167 A1 WO 2023168167A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- aspects
- network node
- reception occasion
- pattern
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 227
- 238000000034 method Methods 0.000 claims description 268
- 238000012790 confirmation Methods 0.000 claims description 27
- 230000004913 activation Effects 0.000 claims description 14
- 230000007704 transition Effects 0.000 claims description 13
- 230000003213 activating effect Effects 0.000 claims description 12
- 238000005259 measurement Methods 0.000 claims description 12
- 125000004122 cyclic group Chemical group 0.000 claims description 5
- 230000008569 process Effects 0.000 description 71
- 230000005540 biological transmission Effects 0.000 description 45
- 230000006870 function Effects 0.000 description 28
- 238000001514 detection method Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 10
- 230000011664 signaling Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 8
- 238000012544 monitoring process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 230000002776 aggregation Effects 0.000 description 3
- 238000004220 aggregation Methods 0.000 description 3
- 241000700159 Rattus Species 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000003321 amplification Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 2
- 239000000872 buffer Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 101000741965 Homo sapiens Inactive tyrosine-protein kinase PRAG1 Proteins 0.000 description 1
- 102100038659 Inactive tyrosine-protein kinase PRAG1 Human genes 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003116 impacting effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/125—Protection against power exhaustion attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
- H04L5/0003—Two-dimensional division
- H04L5/0005—Time-frequency
- H04L5/0007—Time-frequency the frequencies being orthogonal, e.g. OFDM(A) or DMT
- H04L5/0012—Hopping in multicarrier systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
- H04W52/0258—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/02—Arrangements for increasing efficiency of notification or paging channel
- H04W68/025—Indirect paging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/28—Discontinuous transmission [DTX]; Discontinuous reception [DRX]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/06—Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
- H04B7/0686—Hybrid systems, i.e. switching and simultaneous transmission
- H04B7/0695—Hybrid systems, i.e. switching and simultaneous transmission using beam selection
Definitions
- Each of the antenna elements may include one or more sub-elements for radiating or receiving radio frequency signals.
- a single antenna element may include a first sub-element cross-polarized with a second sub-element that can be used to independently transmit cross-polarized signals.
- the antenna elements may include patch antennas, dipole antennas, or other types of antennas arranged in a linear pattern, a two-dimensional pattern, or another pattern.
- a spacing between antenna elements may be such that signals with a desired wavelength transmitted separately by the antenna elements may interact or interfere (e.g., to form a desired beam). For example, given an expected range of wavelengths or frequencies, the spacing may provide a quarter wavelength, half wavelength, or other fraction of a wavelength of spacing between neighboring antenna elements to allow for interaction or interference of signals transmitted by the separate antenna elements within that expected range.
- a network node 305 such as a UE can wake up a cell using a cell-WUS (C-WUS). For example, during some certain time during the day (e.g., off-peak times), there may be no traffic or very light traffic load in a cell.
- C-WUS cell-WUS
- a network node 310 associated with the cell can be configured to still periodically transmit broadcast signals on a broadcast channel. For example, the network node 310 can periodically transmit synchronization signal blocks (SSB) and system information (SI).
- SSB synchronization signal blocks
- SI system information
- a first network node may receive a signal in at least one reception occasion from a second network node, where the signal is a WUS or a paging signal.
- the first network node may determine an authenticity status of the signal based at least in part on the physical layer security scheme and may perform a wireless communication task based at least in part on the authenticity status of the signal.
- the first network node may detect an attack and report the attack. In this way, some aspects of the present disclosure may minimize attacks using WUSs and paging signals, thereby reducing unnecessary power consumption and keeping network nodes free to engage in meaningful communications. As a result, some aspects of the present disclosure may have a positive impact on network communications.
- the receiver network node 405 may use a corresponding decoder to decode a received signal. If the received signal is able to be accurately decoded using the decoder corresponding to the specified coding method, the receiver network node 405 may determine that the signal is authentic.
- a security pattern configuration may include a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
- the configuration may include an attack detection configuration that indicates an attack criterion for enabling the receiver network node 405 to detect attacks.
- the transmitter network node 410 may configure the receiver network node 405 with a certain threshold parameter to be used to generate an attack report that may indicate a number of times the receiver network node 405 had been woken up (e.g., received WUSs) without receiving any associated downlink or sidelink transmissions.
- the attack report may indicate that the receiver network node 405 had been woken up 100 times in the past hour without receiving any subsequent data.
- the transmitter network node 410 may transmit, and the receiver network node 405 may receive, a signal in at least one reception occasion.
- the signal may include a signal that is secured based at least in part on a physical layer security scheme.
- the signal may include a WUS (e.g., a Uu-WUS, a C-WUS, or an SL-WUS) or a paging signal.
- the at least one reception occasion may correspond to a reception occasion pattern.
- the at least one reception occasion may include at least one WUS reception occasion or a paging reception occasion.
- the reception occasion pattern may correspond to a pattern time period. In some aspects, for example, the pattern time period may correspond to a DRX cycle.
- the added signal component may include at least a portion of a cyclic redundancy check (CRC) associated with a prior communication.
- CRC cyclic redundancy check
- the network node 405 may receive a first WUS 430.
- the network node 405 may wake up in response to receiving the first WUS 430 and may receive a PDSCH communication 435 that includes a CRC 440.
- the network node 405 may later receive a WUS 445 that includes a portion 450 of the CRC 440.
- the added signal component may include at least a portion of a payload associated with the prior communication (e.g., the communication 435).
- the transmitter network node 410 may generate a private key and a public key and may transmit the public key to the receiver network node 405 and/or other network nodes (e.g., using Layer 1 signaling, Layer 2 signaling, and/or Layer 3 signaling).
- the transmitter network node 410 may digitally sign the portion of the CRC and/or the portion of the payload using the private key and may transmit the signature to the receiver network node 405 along with the signal 425.
- the signature may be multiplexed with the signal.
- the signature and the signal may be multiplexed on different resource elements and/or resource blocks (e.g., after encoding).
- the receiver network node 405 may receive the signal and the signature and may verify the signature based at least in part on the public security key and the portion of the CRC and/or the portion of the payload.
- the receiver network node 405 may determine whether the signal is authentic based at least in part on whether the receiver network node 405 receives at least one data communication within a specified time period after receiving the signal.
- the physical layer security scheme may indicate that, for a WUS signal and/or a paging signal to be authentic, a data communication must be received within a specified time period of receiving the WUS signal and/or the paging signal.
- the receiver network node 405 may perform a wireless communication task by transmitting a confirmation signal that indicates successful receipt of the signal.
- the receiver network node 405 may transmit the confirmation signal on at least one dedicated channel.
- the transmitter network node 410 may transmit, and the receiver network node 405 may receive, an indication of the at least one configured channel.
- the at least one dedicated channel may include, for example, a set of time domain resources and frequency domain resources indicated via an RRC message and/or a MAC CE.
- the receiver network node 405 may transition to the inactive mode (sometimes referred to as a “sleep mode”) based at least in part on expiration of the configured inactive mode transition time period.
- the inactive mode transition time period may start when the signal is received. In some other aspects, the inactive mode transition time period may start upon expiration of the specified time period within which at least one data communication is expected to be received.
- the specified authentication offset may include a maximum time offset before a first expected data communication. In some aspects, the specified authentication offset may correspond to an expected time of a first expected data communication. In some aspects, the transmitter network node 410 may transmit (e.g., as part of the configuration) a prior signal that includes an indication of the specified authentication offset. In some aspects, the indication of the specified authentication offset may be transmitted as part of a WUS payload.
- the receiver network node 405 may perform any number of different responsive actions. For example, in some aspects, the receiver network node 405 may activate a secure mode based at least in part on detecting the attack. The physical layer security scheme may correspond to the secure mode. In some aspects, the receiver network node 405 may activate an inactive mode based at least in part on detecting the attack. In some other aspects, the receiver network node 405 may activate the inactive mode based at least in part on a configured inactive switch time. In some other aspects, the transmitter network node 410 may transmit, and the receiver network node 405 may receive, a secure mode activation indication, and the receiver network node 405 may activate a secure mode based at least in part on receiving the secure mode activation indication.
- FIG. 4 is provided as an example. Other examples may differ from what is described with respect to Fig. 4.
- Fig. 5 is a diagram illustrating an example process 500 performed, for example, by a first network node, in accordance with the present disclosure.
- Example process 500 is an example where the first network node (e.g., receiver network node 405) performs operations associated with physical layer security schemes for WUSs and paging signals.
- the first network node e.g., receiver network node 405
- process 500 includes selecting the reception occasion pattern. In some aspects, process 500 includes determining a security key configuration corresponding to a security key, and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key. In some aspects, an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key. In some aspects, an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
- the signal comprises a C-WUS
- process 500 includes transmitting a security pattern configuration that indicates the reception occasion pattern.
- transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
- the configuration message comprises at least one of an RRC message or a MAC CE.
- the channel measurement metric comprises an expected RSRP.
- the signal comprises a C-WUS.
- receiving the signal comprises receiving the signal in at least one reception occasion corresponding to a reception occasion pattern.
- process 500 further includes transmitting a security pattern configuration that indicates a reception occasion pattern.
- process 500 includes receiving at least one data communication within a specified time period.
- determining the authenticity status of the signal comprises determining that the signal is authentic based at least in part on receiving the at least one data communication within the specified time period.
- process 500 includes detecting an attack based at least in part on failing to receive at least one data communication after receiving the signal.
- process 500 includes transmitting an attack report based at least in part on detecting the attack.
- process 500 includes receiving at least one additional signal, and transmitting the attack report comprises transmitting the attack report based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one signal of the signal or the at least one additional signal, wherein a quantity of received signals satisfies an attack criterion.
- the attack criterion comprises a threshold quantity of received signals within a specified time period.
- process 500 includes receiving an attack detection configuration that indicates the attack criterion.
- process 500 includes activating a secure mode based at least in part on detecting the attack, wherein physical layer security scheme corresponds to the secure mode.
- detecting the attack comprises detecting the attack based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving at least one of the plurality of signals.
- the specified authentication offset comprises a maximum time offset before a first expected data communication.
- the specified authentication offset corresponds to an expected time of a first expected data communication.
- process 500 includes receiving a prior signal that includes an indication of the specified authentication offset.
- process 500 includes activating an inactive mode based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one of the plurality of signals.
- activating the inactive mode comprises activating the inactive mode based at least in part on a configured inactive switch time.
- process 500 includes receiving a secure mode activation indication, and activating a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
- the signal comprises the paging signal, and the paging signal corresponds to a group- based paging operation or a 2-stage paging operation.
- the paging signal corresponds to the 2-stage paging operation, and process 500 includes receiving a shared channel signal, and decoding the shared channel signal based at least in part on the authenticity status of the signal, wherein the shared channel signal indicates a paged network node.
- process 500 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 5. Additionally, or alternatively, two or more of the blocks of process 500 may be performed in parallel.
- Fig. 6 is a diagram illustrating an example process 600 performed, for example, by a first network node, in accordance with the present disclosure.
- Example process 600 is an example where the first network node (e.g., transmitter network node 410) performs operations associated with physical layer security schemes for WUSs and paging signals.
- the first network node e.g., transmitter network node 410 performs operations associated with physical layer security schemes for WUSs and paging signals.
- process 600 may include transmitting a signal in at least one reception occasion, wherein the signal comprises a WUS or a paging signal (block 610).
- the first network node e.g., using communication manager 708 and/or transmission component 704, depicted in Fig. 7
- process 600 may include receiving a communication based at least in part on an authenticity status of the signal (block 620).
- the first network node may receive a communication based at least in part on an authenticity status of the signal, as described above, for example, with reference to Fig. 4.
- Process 600 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
- the at least one reception occasion corresponds to a reception occasion pattern.
- the reception occasion pattern corresponds to a pattern time period.
- the pattern time period corresponds to a DRX cycle.
- process 600 includes transmitting a security pattern configuration that indicates the reception occasion pattern.
- transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
- the configuration message comprises at least one of an RRC message or a MAC CE.
- process 600 includes transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
- transmitting the security pattern configuration comprises transmitting a sidelink message that indicates the security pattern configuration.
- the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
- the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
- process 600 includes determining a security key configuration corresponding to a security key, and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
- an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
- an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
- determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of a sidelink message, an RRC message, a PDSCH message, or a MAC CE.
- determining the security key configuration comprises extracting the security key configuration from a physical channel based at least in part on a physical channel security scheme.
- process 600 includes determining the physical channel security scheme based at least in part on a prior secured communication.
- the signal comprises a C-WUS
- process 600 includes receiving a security pattern configuration that indicates the reception occasion pattern.
- receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
- the configuration message comprises at least one of an RRC message or a MAC CE.
- process 600 includes transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
- process 600 includes transmitting a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
- the coding method comprises a sequence based coding method or a polar coding method.
- process 600 includes receiving a confirmation signal that indicates successful receipt of the signal.
- receiving the confirmation signal comprises receiving the confirmation signal on at least one dedicated channel.
- process 600 includes transmitting a confirmation configuration that indicates the at least one dedicated channel.
- transmitting the confirmation configuration comprises transmitting at least one of an RRC message or a MAC CE.
- the signal comprises a C-WUS.
- the transmitting the signal comprises transmitting the signal in at least one reception occasion corresponding to a reception occasion pattern, further comprising receiving a security pattern configuration that indicates a reception occasion pattern.
- process 600 includes transmitting at least one additional signal, and receiving an attack report based at least in part on a detection of an attack, wherein the detection of the attack is based at least in part on a failure to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal.
- the detection of the attack is based at least in part on a failure to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
- the specified authentication offset comprises a maximum time offset before a first expected data communication.
- the specified authentication offset corresponds to an expected time of a first expected data communication.
- process 600 includes transmitting a prior signal that includes an indication of the specified authentication offset.
- process 600 includes transmitting a secure mode activation indication associated with a secure mode corresponding to a second network node.
- the signal comprises the paging signal, and the paging signal corresponds to a group-based paging operation or a 2-stage paging operation.
- process 600 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 6. Additionally, or alternatively, two or more of the blocks of process 600 may be performed in parallel.
- Fig. 7 is a diagram of an example apparatus 700 for wireless communication.
- the apparatus 700 may be a network node, or a network node may include the apparatus 700.
- the apparatus 700 includes a reception component 702 and a transmission component 704, which may be in communication with one another (for example, via one or more buses and/or one or more other components).
- the apparatus 700 may communicate with another apparatus 706 (such as a UE, a base station, or another wireless communication device) using the reception component 702 and the transmission component 704.
- the apparatus 700 may include the communication manager 708.
- the communication manager 708 may include a determination component 710.
- the apparatus 700 may be configured to perform one or more operations described herein in connection with Fig. 4. Additionally, or alternatively, the apparatus 700 may be configured to perform one or more processes described herein, such as process 500 of Fig. 5, process 600 of Fig. 6, or a combination thereof.
- the apparatus 700 and/or one or more components shown in Fig. 7 may include one or more components of the UE and/or the base station described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 7 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
- the reception component 702 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 706.
- the reception component 702 may provide received communications to one or more other components of the apparatus 700.
- the reception component 702 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples), and may provide the processed signals to the one or more other components of the apparatus 700.
- the transmission component 704 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 706.
- one or more other components of the apparatus 700 may generate communications and may provide the generated communications to the transmission component 704 for transmission to the apparatus 706.
- the transmission component 704 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples), and may transmit the processed signals to the apparatus 706.
- the transmission component 704 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2. In some aspects, the transmission component 704 may be co-located with the reception component 702 in a transceiver.
- the reception component 702 may receive a signal from a second network node in at least one reception occasion, wherein the signal comprises a WUS or a paging signal.
- the communication manager 708 and/or the determination component 710 may determine an authenticity status of the signal based at least in part on the physical layer security scheme.
- the communication manager 708 may be, be similar to, include, or be included in the communication manager 140 and/or the communication manager 150 depicted in Figs. 1 and 2.
- the communication manager 708 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2.
- the communication manager 708 may include the reception component 702 and/or the transmission component 704.
- the determination component 710 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2.
- the determination component 710 may include the reception component 702 and/or the transmission component 704.
- the communication manager 708, the reception component 702, and/or the transmission component 704 may perform a wireless communication task based at least in part on the authenticity status of the signal.
- the reception component 702 may receive a security pattern configuration that indicates the reception occasion pattern.
- the reception component 702 may receive an updated security pattern configuration that indicates an updated reception occasion pattern.
- the determination component 710 may select the reception occasion pattern.
- the determination component 710 may determine a security key configuration corresponding to a security key.
- the determination component 710 may determine at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
- the determination component 710 may determine the physical channel security scheme based at least in part on a prior secured communication.
- the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
- the reception component 702 may receive a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
- the transmission component 704 may transmit a confirmation signal that indicates successful receipt of the signal.
- the reception component 702 may receive a confirmation configuration that indicates the at least one dedicated channel.
- the reception component 702 may receive at least one additional signal.
- the communication manager 708 and/or the reception component 702 may detect an attack based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one signal of the signal or the at least one additional signal.
- the transmission component 704 may transmit an attack report based at least in part on detecting the attack.
- the reception component 702 may receive an attack detection configuration that indicates the attack criterion.
- the communication manager 708 and/or the reception component 702 may activate a secure mode based at least in part on detecting the attack, wherein the physical layer security scheme corresponds to the secure mode.
- the reception component 702 may receive a prior signal that includes an indication of the specified authentication offset.
- the communication manager 708 and/or the reception component 702 may activate an inactive mode based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
- the reception component 702 may receive a secure mode activation indication.
- the communication manager 708 and/or the reception component 702 may activate a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
- the transmission component 704 may transmit a signal in at least one reception occasion, wherein the signal comprises a WUS or a paging signal.
- the reception component 702 may receive a communication based at least in part on an authenticity status of the signal.
- the transmission component 704 may transmit a security pattern configuration that indicates a reception occasion pattern.
- the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
- the determination component 710 may determine a security key configuration corresponding to a security key.
- the determination component 710 may determine at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
- the determination component 710 may determine the physical channel security scheme based at least in part on a prior secured communication.
- the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
- the transmission component 704 may transmit a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
- the reception component 702 may receive a confirmation signal that indicates successful receipt of the signal.
- the transmission component 704 may transmit a confirmation configuration that indicates the at least one dedicated channel.
- the transmission component 704 may transmit at least one additional signal.
- the reception component 702 may receive an attack report based at least in part on a detection of an attack, wherein the detection of the attack is based at least in part on a failure to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal.
- the transmission component 704 may transmit an attack detection configuration that indicates the attack criterion.
- the transmission component 704 may transmit a prior signal that includes an indication of the specified authentication offset.
- the transmission component 704 may transmit a secure mode activation indication associated with a secure mode corresponding to a second network node.
- a set of (one or more) components shown in Fig. 7 may perform one or more functions described as being performed by another set of components shown in Fig. 7.
- Aspect 1 A method of wireless communication performed by a first network node, comprising: receiving a signal in at least one reception occasion from a second network node, wherein the signal comprises a wake up signal (WUS) or a paging signal; determining an authenticity status of the signal based at least in part on a physical layer security scheme; and performing a wireless communication task based at least in part on the authenticity status of the signal.
- WUS wake up signal
- paging signal determining an authenticity status of the signal based at least in part on a physical layer security scheme
- performing a wireless communication task based at least in part on the authenticity status of the signal.
- Aspect 2 The method of Aspect 1, wherein the at least one reception occasion corresponding to a reception occasion pattern.
- Aspect 3 The method of Aspect 2, wherein the reception occasion pattern corresponds to a pattern time period.
- Aspect 4 The method of Aspect 3, wherein the pattern time period corresponds to a discontinuous reception cycle.
- Aspect 5 The method of any of Aspects 2-4, further comprising receiving a security pattern configuration that indicates the reception occasion pattern.
- Aspect 6 The method of Aspect 5, wherein receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
- Aspect 7 The method of Aspect 6, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 9 The method of any of Aspects 5-8, wherein receiving the security pattern configuration comprises receiving a sidelink message that indicates the security pattern configuration.
- Aspect 10 The method of Aspect 9, wherein receiving the security pattern configuration comprises receiving the security pattern configuration from a third network node, wherein the signal comprises a sidelink signal.
- Aspect 11 The method of any of Aspects 5-10, wherein the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
- Aspect 12 The method of any of Aspects 5-11, wherein the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
- Aspect 13 The method of Aspect 12, further comprising selecting the reception occasion pattern.
- Aspect 14 The method of any of Aspects 2-13, further comprising: determining a security key configuration corresponding to a security key; and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
- Aspect 15 The method of Aspect 14, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
- Aspect 16 The method of either of Aspects 14 or 15, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
- Aspect 17 The method of any of Aspects 14-16, wherein determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
- RRC radio resource control
- PDSCH physical downlink shared channel
- MAC CE medium access control control element
- Aspect 19 The method of Aspect 18, further comprising determining the physical channel security scheme based at least in part on a prior secured communication.
- Aspect 20 The method of any of Aspects 14-19, wherein determining the security key configuration comprises transmitting a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
- RRC radio resource control
- PDSCH physical downlink shared channel
- MAC CE medium access control control element
- Aspect 21 The method of any of Aspects 2-20, wherein the signal comprises a cellwake up signal (C-WUS), the method further comprising transmitting a security pattern configuration that indicates the reception occasion pattern.
- C-WUS cellwake up signal
- Aspect 22 The method of Aspect 21, wherein transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
- Aspect 23 The method of Aspect 22, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 24 The method of any of Aspects 2-23, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
- Aspect 25 The method of any of Aspects 1-24, further comprising receiving a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
- Aspect 26 The method of Aspect 25, wherein the coding method comprises a sequence based coding method or a polar coding method.
- Aspect 27 The method of any of Aspects 1-26, further comprising transmitting a confirmation signal that indicates successful receipt of the signal.
- Aspect 28 The method of Aspect 27, wherein transmitting the confirmation signal comprises transmitting the confirmation signal on at least one dedicated channel.
- Aspect 29 The method of Aspect 28, further comprising receiving a confirmation configuration that indicates the at least one dedicated channel.
- Aspect 30 The method of Aspect 29, wherein receiving the confirmation configuration comprises receiving at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 31 The method of any of Aspects 1-30, wherein the physical layer security scheme corresponds to an added signal component, and wherein the signal comprises the added signal component.
- Aspect 32 The method of Aspect 31, wherein the added signal component comprises at least one of: a channel measurement metric, a portion of a cyclic redundancy check (CRC) associated with a prior communication, a digitally-signed portion of the CRC associated with the prior communication, wherein the digitally-signed portion of the CRC comprises a signature based at least in part on a private key associated with the second network node, a portion of a payload associated with the prior communication, or a digitally-signed portion of the payload associated with the prior communication, wherein the digitally-signed portion of the payload comprises a signature based at least in part on the private key associated with the second network node.
- CRC cyclic redundancy check
- Aspect 33 The method of Aspect 32, wherein the channel measurement metric comprises an expected reference signal received power.
- Aspect 34 The method of any of Aspects 1-33, wherein the signal comprises a cellwake up signal (C-WUS).
- C-WUS cellwake up signal
- Aspect 35 The method of Aspect 34, further comprising receiving at least one data communication within a specified time period, wherein determining the authenticity status of the signal comprises determining that the signal is authentic based at least in part on receiving the at least one data communication within the specified time period.
- Aspect 36 The method of any of Aspects 1-35, further comprising: failing to receive at least one data communication within a specified time period after receiving the signal, wherein determining the authenticity status of the signal comprises determining that the signal is not authentic based at least in part on failing to receive the at least one data communication within the specified time period; and transitioning to an inactive mode based at least in part on determining that the signal is not authentic, wherein transitioning to the inactive mode comprises transitioning to the inactive mode based at least in part on expiration of a configured inactive mode transition time period.
- Aspect 38 The method of Aspect 37, further comprising receiving at least one additional signal, and wherein transmitting the attack report comprises transmitting the attack report based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal, wherein a quantity of received signals satisfies an attack criterion.
- Aspect 39 The method of Aspect 38, wherein the attack criterion comprises a threshold quantity of received signals within a specified time period.
- Aspect 40 The method of either of Aspects 38 or 39, further comprising receiving an attack detection configuration that indicates the attack criterion.
- Aspect 41 The method of any of Aspects 36-40, further comprising activating a secure mode based at least in part on detecting the attack, wherein the physical layer security scheme corresponds to the secure mode.
- Aspect 42 The method of any of Aspects 36-41, wherein detecting the attack comprises detecting the attack based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
- Aspect 43 The method of Aspect 42, wherein the specified authentication offset comprises a maximum time offset before a first expected data communication.
- Aspect 47 The method of Aspect 46, wherein activating the inactive mode comprises activating the inactive mode based at least in part on a configured inactive switch time.
- Aspect 48 The method of any of Aspects 1-47, further comprising: receiving a secure mode activation indication; and activating a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
- Aspect 49 The method of any of Aspects 1-48, wherein the signal comprises the paging signal, and wherein the paging signal corresponds to a group-based paging operation or a 2-stage paging operation.
- Aspect 50 The method of Aspect 49, wherein the paging signal corresponds to the 2- stage paging operation, the method further comprising: receiving a shared channel signal; and decoding the shared channel signal based at least in part on the authenticity status of the signal, wherein the shared channel signal indicates a paged network node.
- a method of wireless communication performed by a first network node comprising: transmitting a signal in at least one reception occasion, wherein the signal comprises a wake up signal (WUS) or a paging signal; and receiving a communication based at least in part on an authenticity status of the signal.
- WUS wake up signal
- Aspect 52 The method of Aspect 51, wherein the at least one reception occasion corresponds to a reception occasion pattern.
- Aspect 54 The method of Aspect 53, wherein the pattern time period corresponds to a discontinuous reception cycle.
- Aspect 55 The method of any of Aspects 52-54, further comprising transmitting a security pattern configuration that indicates the reception occasion pattern.
- Aspect 56 The method of Aspect 55, wherein transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
- Aspect 57 The method of Aspect 56, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 58 The method of any of Aspects 55-57, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
- Aspect 59 The method of any of Aspects 55-58, wherein transmitting the security pattern configuration comprises transmitting a sidelink message that indicates the security pattern configuration.
- Aspect 60 The method of any of Aspects 55-59, wherein the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
- Aspect 61 The method of any of Aspects 55-60, wherein the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
- Aspect 62 The method of any of Aspects 52-61, further comprising: determining a security key configuration corresponding to a security key; and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
- Aspect 63 The method of Aspect 62, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
- Aspect 64 The method of either of Aspects 62 or 63, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
- Aspect 65 The method of any of Aspects 62-64, wherein determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
- RRC radio resource control
- PDSCH physical downlink shared channel
- MAC CE medium access control control element
- Aspect 66 The method of any of Aspects 62-65, wherein determining the security key configuration comprises extracting the security key configuration from a physical channel based at least in part on a physical channel security scheme.
- Aspect 67 The method of Aspect 66, further comprising determining the physical channel security scheme based at least in part on a prior secured communication.
- Aspect 68 The method of any of Aspects 52-67, wherein the signal comprises a cellwake up signal (C-WUS), the method further comprising receiving a security pattern configuration that indicates the reception occasion pattern.
- C-WUS cellwake up signal
- Aspect 69 The method of Aspect 68, wherein receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
- Aspect 70 The method of Aspect 69, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 71 The method of any of Aspects 52-70, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
- Aspect 72 The method of any of Aspects 51-71, further comprising transmitting a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
- Aspect 73 The method of Aspect 72, wherein the coding method comprises a sequence based coding method or a polar coding method.
- Aspect 74 The method of any of Aspects 51-73, further comprising receiving a confirmation signal that indicates successful receipt of the signal.
- Aspect 75 The method of Aspect 74, wherein receiving the confirmation signal comprises receiving the confirmation signal on at least one dedicated channel.
- Aspect 76 The method of Aspect 75, further comprising transmitting a confirmation configuration that indicates the at least one dedicated channel.
- Aspect 77 The method of Aspect 76, wherein transmitting the confirmation configuration comprises transmitting at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
- RRC radio resource control
- MAC CE medium access control control element
- Aspect 78 The method of any of Aspects 51-77, wherein the physical layer security scheme corresponds to an added signal component, and wherein the signal comprises the added signal component.
- Aspect 81 The method of any of Aspects 51-80, wherein the signal comprises a cellwake up signal (C-WUS).
- C-WUS cellwake up signal
- Aspect 82 The method of Aspect 81, wherein the transmitting the signal comprises transmitting the signal in at least one reception occasion corresponding to a reception occasion pattern, further comprising receiving a security pattern configuration that indicates a reception occasion pattern.
- Aspect 98 An apparatus for wireless communication at a device, comprising a processor; memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to perform the method of one or more of Aspects 51-92.
- Aspect 99 A device for wireless communication, comprising a memory and one or more processors coupled to the memory, the one or more processors configured to perform the method of one or more of Aspects 51-92.
- Aspect 100 An apparatus for wireless communication, comprising at least one means for performing the method of one or more of Aspects 51-92.
- Aspect 101 A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable by a processor to perform the method of one or more of Aspects 51-92.
- Aspect 102 A non-transitory computer-readable medium storing a set of instructions for wireless communication, the set of instructions comprising one or more instructions that, when executed by one or more processors of a device, cause the device to perform the method of one or more of Aspects 51-92.
- the term “component” is intended to be broadly construed as hardware and/or a combination of hardware and software.
- “Software” shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, and/or functions, among other examples, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
- a “processor” is implemented in hardware and/or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware and/or a combination of hardware and software.
- “at least one of: a, b, or c” is intended to cover a, b, c, a + b, a + c, b + c, and a + b + c, as well as any combination with multiples of the same element (e.g., a + a, a + a + a, a + a + b, a + a + c, a + b + b, a + c + c, b + b, b + b + b, b + b + c, c + c, and c + c + c, or any other ordering of a, b, and c).
- the terms “has,” “have,” “having,” or the like are intended to be open-ended terms that do not limit an element that they modify (e.g., an element “having” A may also have B). Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or,” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of’).
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Divers aspects de la présente divulgation portent d'une manière générale sur la communication sans fil. Selon certains aspects, un premier nœud de réseau peut recevoir un signal lors d'au moins une occasion de réception en provenance d'un second nœud de réseau, le signal comprenant un signal de réveil ou un signal de radiorecherche. Le premier nœud de réseau peut déterminer un état d'authenticité du signal sur la base, au moins en partie, du mécanisme de sécurité de la couche physique. Le premier nœud de réseau peut effectuer une tâche de communication sans fil sur la base, au moins en partie, de l'état d'authenticité du signal. L'invention concerne de nombreux autres aspects.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GR20220100207 | 2022-03-04 | ||
GR20220100207 | 2022-03-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023168167A1 true WO2023168167A1 (fr) | 2023-09-07 |
Family
ID=87884311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2023/062498 WO2023168167A1 (fr) | 2022-03-04 | 2023-02-13 | Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023168167A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160057703A1 (en) * | 2014-08-20 | 2016-02-25 | Qualcomm Incorporated | Secure wireless wake-up companion |
WO2018237180A1 (fr) * | 2017-06-21 | 2018-12-27 | Intel Corporation | Signature dynamique pour authentification de paquet de réveil |
US20200196244A1 (en) * | 2017-07-06 | 2020-06-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and device for handling wake-up signals |
-
2023
- 2023-02-13 WO PCT/US2023/062498 patent/WO2023168167A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160057703A1 (en) * | 2014-08-20 | 2016-02-25 | Qualcomm Incorporated | Secure wireless wake-up companion |
WO2018237180A1 (fr) * | 2017-06-21 | 2018-12-27 | Intel Corporation | Signature dynamique pour authentification de paquet de réveil |
US20200196244A1 (en) * | 2017-07-06 | 2020-06-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and device for handling wake-up signals |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11627598B2 (en) | Mask-based configuration for discontinuous reception | |
TW202002693A (zh) | 連接模式不連續接收模式中的波束追蹤和恢復 | |
US20230362889A1 (en) | Adaptive sub-grouping and paging for user equipment | |
US11985514B2 (en) | Discontinuous reception configuration in sidelink communication deployments | |
US11546738B2 (en) | Always-on short messages | |
US11877335B2 (en) | Load balancing inter-frequency measurement activities for dual network link scenarios | |
US11425647B2 (en) | Group wake-up signaling using sidelink zone identifier | |
US12041588B2 (en) | Sidelink resource selection for discontinuous reception | |
US20230136011A1 (en) | Connected mode synchronization in a scalable cell system | |
US20220256636A1 (en) | Link recovery between sidelink user equipments based at least in part on keep-alive messages | |
WO2023168167A1 (fr) | Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche | |
US20240172115A1 (en) | Relayed wake-up signal for an access link using a sidelink | |
US11895639B2 (en) | Group-based discontinuous reception alignment | |
US20220070964A1 (en) | Sidelink feedback in discontinuous reception mode operation | |
WO2023102876A1 (fr) | Transmission à faible consommation d'énergie | |
WO2024065604A1 (fr) | Terminaison précoce d'une retransmission de demande de répétition automatique hybride d'une configuration de réception discontinue | |
US20240114588A1 (en) | Message for network entity discontinuous reception or discontinuous transmission | |
US20240340998A1 (en) | Dynamic indication to skip channel reception or transmission | |
EP4410052A1 (fr) | Sélection de ressources de liaison latérale pour réception discontinue | |
CN119896028A (zh) | 用于网络实体非连续接收或非连续发送的消息 | |
CN115380557A (zh) | 侧链路的链路管理 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23710951 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 23710951 Country of ref document: EP Kind code of ref document: A1 |