+

WO2023168167A1 - Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche - Google Patents

Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche Download PDF

Info

Publication number
WO2023168167A1
WO2023168167A1 PCT/US2023/062498 US2023062498W WO2023168167A1 WO 2023168167 A1 WO2023168167 A1 WO 2023168167A1 US 2023062498 W US2023062498 W US 2023062498W WO 2023168167 A1 WO2023168167 A1 WO 2023168167A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
aspects
network node
reception occasion
pattern
Prior art date
Application number
PCT/US2023/062498
Other languages
English (en)
Inventor
Ahmed Elshafie
Hung Dinh LY
Alexandros MANOLAKOS
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Publication of WO2023168167A1 publication Critical patent/WO2023168167A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/125Protection against power exhaustion attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • H04L5/0007Time-frequency the frequencies being orthogonal, e.g. OFDM(A) or DMT
    • H04L5/0012Hopping in multicarrier systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is leader and terminal is follower using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0229Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. Transmission Power Control [TPC] or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • H04W52/0258Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/02Arrangements for increasing efficiency of notification or paging channel
    • H04W68/025Indirect paging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/28Discontinuous transmission [DTX]; Discontinuous reception [DRX]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0686Hybrid systems, i.e. switching and simultaneous transmission
    • H04B7/0695Hybrid systems, i.e. switching and simultaneous transmission using beam selection

Definitions

  • Each of the antenna elements may include one or more sub-elements for radiating or receiving radio frequency signals.
  • a single antenna element may include a first sub-element cross-polarized with a second sub-element that can be used to independently transmit cross-polarized signals.
  • the antenna elements may include patch antennas, dipole antennas, or other types of antennas arranged in a linear pattern, a two-dimensional pattern, or another pattern.
  • a spacing between antenna elements may be such that signals with a desired wavelength transmitted separately by the antenna elements may interact or interfere (e.g., to form a desired beam). For example, given an expected range of wavelengths or frequencies, the spacing may provide a quarter wavelength, half wavelength, or other fraction of a wavelength of spacing between neighboring antenna elements to allow for interaction or interference of signals transmitted by the separate antenna elements within that expected range.
  • a network node 305 such as a UE can wake up a cell using a cell-WUS (C-WUS). For example, during some certain time during the day (e.g., off-peak times), there may be no traffic or very light traffic load in a cell.
  • C-WUS cell-WUS
  • a network node 310 associated with the cell can be configured to still periodically transmit broadcast signals on a broadcast channel. For example, the network node 310 can periodically transmit synchronization signal blocks (SSB) and system information (SI).
  • SSB synchronization signal blocks
  • SI system information
  • a first network node may receive a signal in at least one reception occasion from a second network node, where the signal is a WUS or a paging signal.
  • the first network node may determine an authenticity status of the signal based at least in part on the physical layer security scheme and may perform a wireless communication task based at least in part on the authenticity status of the signal.
  • the first network node may detect an attack and report the attack. In this way, some aspects of the present disclosure may minimize attacks using WUSs and paging signals, thereby reducing unnecessary power consumption and keeping network nodes free to engage in meaningful communications. As a result, some aspects of the present disclosure may have a positive impact on network communications.
  • the receiver network node 405 may use a corresponding decoder to decode a received signal. If the received signal is able to be accurately decoded using the decoder corresponding to the specified coding method, the receiver network node 405 may determine that the signal is authentic.
  • a security pattern configuration may include a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
  • the configuration may include an attack detection configuration that indicates an attack criterion for enabling the receiver network node 405 to detect attacks.
  • the transmitter network node 410 may configure the receiver network node 405 with a certain threshold parameter to be used to generate an attack report that may indicate a number of times the receiver network node 405 had been woken up (e.g., received WUSs) without receiving any associated downlink or sidelink transmissions.
  • the attack report may indicate that the receiver network node 405 had been woken up 100 times in the past hour without receiving any subsequent data.
  • the transmitter network node 410 may transmit, and the receiver network node 405 may receive, a signal in at least one reception occasion.
  • the signal may include a signal that is secured based at least in part on a physical layer security scheme.
  • the signal may include a WUS (e.g., a Uu-WUS, a C-WUS, or an SL-WUS) or a paging signal.
  • the at least one reception occasion may correspond to a reception occasion pattern.
  • the at least one reception occasion may include at least one WUS reception occasion or a paging reception occasion.
  • the reception occasion pattern may correspond to a pattern time period. In some aspects, for example, the pattern time period may correspond to a DRX cycle.
  • the added signal component may include at least a portion of a cyclic redundancy check (CRC) associated with a prior communication.
  • CRC cyclic redundancy check
  • the network node 405 may receive a first WUS 430.
  • the network node 405 may wake up in response to receiving the first WUS 430 and may receive a PDSCH communication 435 that includes a CRC 440.
  • the network node 405 may later receive a WUS 445 that includes a portion 450 of the CRC 440.
  • the added signal component may include at least a portion of a payload associated with the prior communication (e.g., the communication 435).
  • the transmitter network node 410 may generate a private key and a public key and may transmit the public key to the receiver network node 405 and/or other network nodes (e.g., using Layer 1 signaling, Layer 2 signaling, and/or Layer 3 signaling).
  • the transmitter network node 410 may digitally sign the portion of the CRC and/or the portion of the payload using the private key and may transmit the signature to the receiver network node 405 along with the signal 425.
  • the signature may be multiplexed with the signal.
  • the signature and the signal may be multiplexed on different resource elements and/or resource blocks (e.g., after encoding).
  • the receiver network node 405 may receive the signal and the signature and may verify the signature based at least in part on the public security key and the portion of the CRC and/or the portion of the payload.
  • the receiver network node 405 may determine whether the signal is authentic based at least in part on whether the receiver network node 405 receives at least one data communication within a specified time period after receiving the signal.
  • the physical layer security scheme may indicate that, for a WUS signal and/or a paging signal to be authentic, a data communication must be received within a specified time period of receiving the WUS signal and/or the paging signal.
  • the receiver network node 405 may perform a wireless communication task by transmitting a confirmation signal that indicates successful receipt of the signal.
  • the receiver network node 405 may transmit the confirmation signal on at least one dedicated channel.
  • the transmitter network node 410 may transmit, and the receiver network node 405 may receive, an indication of the at least one configured channel.
  • the at least one dedicated channel may include, for example, a set of time domain resources and frequency domain resources indicated via an RRC message and/or a MAC CE.
  • the receiver network node 405 may transition to the inactive mode (sometimes referred to as a “sleep mode”) based at least in part on expiration of the configured inactive mode transition time period.
  • the inactive mode transition time period may start when the signal is received. In some other aspects, the inactive mode transition time period may start upon expiration of the specified time period within which at least one data communication is expected to be received.
  • the specified authentication offset may include a maximum time offset before a first expected data communication. In some aspects, the specified authentication offset may correspond to an expected time of a first expected data communication. In some aspects, the transmitter network node 410 may transmit (e.g., as part of the configuration) a prior signal that includes an indication of the specified authentication offset. In some aspects, the indication of the specified authentication offset may be transmitted as part of a WUS payload.
  • the receiver network node 405 may perform any number of different responsive actions. For example, in some aspects, the receiver network node 405 may activate a secure mode based at least in part on detecting the attack. The physical layer security scheme may correspond to the secure mode. In some aspects, the receiver network node 405 may activate an inactive mode based at least in part on detecting the attack. In some other aspects, the receiver network node 405 may activate the inactive mode based at least in part on a configured inactive switch time. In some other aspects, the transmitter network node 410 may transmit, and the receiver network node 405 may receive, a secure mode activation indication, and the receiver network node 405 may activate a secure mode based at least in part on receiving the secure mode activation indication.
  • FIG. 4 is provided as an example. Other examples may differ from what is described with respect to Fig. 4.
  • Fig. 5 is a diagram illustrating an example process 500 performed, for example, by a first network node, in accordance with the present disclosure.
  • Example process 500 is an example where the first network node (e.g., receiver network node 405) performs operations associated with physical layer security schemes for WUSs and paging signals.
  • the first network node e.g., receiver network node 405
  • process 500 includes selecting the reception occasion pattern. In some aspects, process 500 includes determining a security key configuration corresponding to a security key, and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key. In some aspects, an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key. In some aspects, an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
  • the signal comprises a C-WUS
  • process 500 includes transmitting a security pattern configuration that indicates the reception occasion pattern.
  • transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
  • the configuration message comprises at least one of an RRC message or a MAC CE.
  • the channel measurement metric comprises an expected RSRP.
  • the signal comprises a C-WUS.
  • receiving the signal comprises receiving the signal in at least one reception occasion corresponding to a reception occasion pattern.
  • process 500 further includes transmitting a security pattern configuration that indicates a reception occasion pattern.
  • process 500 includes receiving at least one data communication within a specified time period.
  • determining the authenticity status of the signal comprises determining that the signal is authentic based at least in part on receiving the at least one data communication within the specified time period.
  • process 500 includes detecting an attack based at least in part on failing to receive at least one data communication after receiving the signal.
  • process 500 includes transmitting an attack report based at least in part on detecting the attack.
  • process 500 includes receiving at least one additional signal, and transmitting the attack report comprises transmitting the attack report based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one signal of the signal or the at least one additional signal, wherein a quantity of received signals satisfies an attack criterion.
  • the attack criterion comprises a threshold quantity of received signals within a specified time period.
  • process 500 includes receiving an attack detection configuration that indicates the attack criterion.
  • process 500 includes activating a secure mode based at least in part on detecting the attack, wherein physical layer security scheme corresponds to the secure mode.
  • detecting the attack comprises detecting the attack based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving at least one of the plurality of signals.
  • the specified authentication offset comprises a maximum time offset before a first expected data communication.
  • the specified authentication offset corresponds to an expected time of a first expected data communication.
  • process 500 includes receiving a prior signal that includes an indication of the specified authentication offset.
  • process 500 includes activating an inactive mode based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one of the plurality of signals.
  • activating the inactive mode comprises activating the inactive mode based at least in part on a configured inactive switch time.
  • process 500 includes receiving a secure mode activation indication, and activating a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
  • the signal comprises the paging signal, and the paging signal corresponds to a group- based paging operation or a 2-stage paging operation.
  • the paging signal corresponds to the 2-stage paging operation, and process 500 includes receiving a shared channel signal, and decoding the shared channel signal based at least in part on the authenticity status of the signal, wherein the shared channel signal indicates a paged network node.
  • process 500 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 5. Additionally, or alternatively, two or more of the blocks of process 500 may be performed in parallel.
  • Fig. 6 is a diagram illustrating an example process 600 performed, for example, by a first network node, in accordance with the present disclosure.
  • Example process 600 is an example where the first network node (e.g., transmitter network node 410) performs operations associated with physical layer security schemes for WUSs and paging signals.
  • the first network node e.g., transmitter network node 410 performs operations associated with physical layer security schemes for WUSs and paging signals.
  • process 600 may include transmitting a signal in at least one reception occasion, wherein the signal comprises a WUS or a paging signal (block 610).
  • the first network node e.g., using communication manager 708 and/or transmission component 704, depicted in Fig. 7
  • process 600 may include receiving a communication based at least in part on an authenticity status of the signal (block 620).
  • the first network node may receive a communication based at least in part on an authenticity status of the signal, as described above, for example, with reference to Fig. 4.
  • Process 600 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
  • the at least one reception occasion corresponds to a reception occasion pattern.
  • the reception occasion pattern corresponds to a pattern time period.
  • the pattern time period corresponds to a DRX cycle.
  • process 600 includes transmitting a security pattern configuration that indicates the reception occasion pattern.
  • transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
  • the configuration message comprises at least one of an RRC message or a MAC CE.
  • process 600 includes transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
  • transmitting the security pattern configuration comprises transmitting a sidelink message that indicates the security pattern configuration.
  • the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
  • the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
  • process 600 includes determining a security key configuration corresponding to a security key, and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
  • an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
  • an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
  • determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of a sidelink message, an RRC message, a PDSCH message, or a MAC CE.
  • determining the security key configuration comprises extracting the security key configuration from a physical channel based at least in part on a physical channel security scheme.
  • process 600 includes determining the physical channel security scheme based at least in part on a prior secured communication.
  • the signal comprises a C-WUS
  • process 600 includes receiving a security pattern configuration that indicates the reception occasion pattern.
  • receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
  • the configuration message comprises at least one of an RRC message or a MAC CE.
  • process 600 includes transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
  • process 600 includes transmitting a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
  • the coding method comprises a sequence based coding method or a polar coding method.
  • process 600 includes receiving a confirmation signal that indicates successful receipt of the signal.
  • receiving the confirmation signal comprises receiving the confirmation signal on at least one dedicated channel.
  • process 600 includes transmitting a confirmation configuration that indicates the at least one dedicated channel.
  • transmitting the confirmation configuration comprises transmitting at least one of an RRC message or a MAC CE.
  • the signal comprises a C-WUS.
  • the transmitting the signal comprises transmitting the signal in at least one reception occasion corresponding to a reception occasion pattern, further comprising receiving a security pattern configuration that indicates a reception occasion pattern.
  • process 600 includes transmitting at least one additional signal, and receiving an attack report based at least in part on a detection of an attack, wherein the detection of the attack is based at least in part on a failure to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal.
  • the detection of the attack is based at least in part on a failure to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
  • the specified authentication offset comprises a maximum time offset before a first expected data communication.
  • the specified authentication offset corresponds to an expected time of a first expected data communication.
  • process 600 includes transmitting a prior signal that includes an indication of the specified authentication offset.
  • process 600 includes transmitting a secure mode activation indication associated with a secure mode corresponding to a second network node.
  • the signal comprises the paging signal, and the paging signal corresponds to a group-based paging operation or a 2-stage paging operation.
  • process 600 may include additional blocks, fewer blocks, different blocks, or differently arranged blocks than those depicted in Fig. 6. Additionally, or alternatively, two or more of the blocks of process 600 may be performed in parallel.
  • Fig. 7 is a diagram of an example apparatus 700 for wireless communication.
  • the apparatus 700 may be a network node, or a network node may include the apparatus 700.
  • the apparatus 700 includes a reception component 702 and a transmission component 704, which may be in communication with one another (for example, via one or more buses and/or one or more other components).
  • the apparatus 700 may communicate with another apparatus 706 (such as a UE, a base station, or another wireless communication device) using the reception component 702 and the transmission component 704.
  • the apparatus 700 may include the communication manager 708.
  • the communication manager 708 may include a determination component 710.
  • the apparatus 700 may be configured to perform one or more operations described herein in connection with Fig. 4. Additionally, or alternatively, the apparatus 700 may be configured to perform one or more processes described herein, such as process 500 of Fig. 5, process 600 of Fig. 6, or a combination thereof.
  • the apparatus 700 and/or one or more components shown in Fig. 7 may include one or more components of the UE and/or the base station described in connection with Fig. 2. Additionally, or alternatively, one or more components shown in Fig. 7 may be implemented within one or more components described in connection with Fig. 2. Additionally, or alternatively, one or more components of the set of components may be implemented at least in part as software stored in a memory. For example, a component (or a portion of a component) may be implemented as instructions or code stored in a non-transitory computer-readable medium and executable by a controller or a processor to perform the functions or operations of the component.
  • the reception component 702 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 706.
  • the reception component 702 may provide received communications to one or more other components of the apparatus 700.
  • the reception component 702 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples), and may provide the processed signals to the one or more other components of the apparatus 700.
  • the transmission component 704 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 706.
  • one or more other components of the apparatus 700 may generate communications and may provide the generated communications to the transmission component 704 for transmission to the apparatus 706.
  • the transmission component 704 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples), and may transmit the processed signals to the apparatus 706.
  • the transmission component 704 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2. In some aspects, the transmission component 704 may be co-located with the reception component 702 in a transceiver.
  • the reception component 702 may receive a signal from a second network node in at least one reception occasion, wherein the signal comprises a WUS or a paging signal.
  • the communication manager 708 and/or the determination component 710 may determine an authenticity status of the signal based at least in part on the physical layer security scheme.
  • the communication manager 708 may be, be similar to, include, or be included in the communication manager 140 and/or the communication manager 150 depicted in Figs. 1 and 2.
  • the communication manager 708 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2.
  • the communication manager 708 may include the reception component 702 and/or the transmission component 704.
  • the determination component 710 may include one or more antennas, a modem, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with Fig. 2.
  • the determination component 710 may include the reception component 702 and/or the transmission component 704.
  • the communication manager 708, the reception component 702, and/or the transmission component 704 may perform a wireless communication task based at least in part on the authenticity status of the signal.
  • the reception component 702 may receive a security pattern configuration that indicates the reception occasion pattern.
  • the reception component 702 may receive an updated security pattern configuration that indicates an updated reception occasion pattern.
  • the determination component 710 may select the reception occasion pattern.
  • the determination component 710 may determine a security key configuration corresponding to a security key.
  • the determination component 710 may determine at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
  • the determination component 710 may determine the physical channel security scheme based at least in part on a prior secured communication.
  • the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
  • the reception component 702 may receive a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
  • the transmission component 704 may transmit a confirmation signal that indicates successful receipt of the signal.
  • the reception component 702 may receive a confirmation configuration that indicates the at least one dedicated channel.
  • the reception component 702 may receive at least one additional signal.
  • the communication manager 708 and/or the reception component 702 may detect an attack based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one signal of the signal or the at least one additional signal.
  • the transmission component 704 may transmit an attack report based at least in part on detecting the attack.
  • the reception component 702 may receive an attack detection configuration that indicates the attack criterion.
  • the communication manager 708 and/or the reception component 702 may activate a secure mode based at least in part on detecting the attack, wherein the physical layer security scheme corresponds to the secure mode.
  • the reception component 702 may receive a prior signal that includes an indication of the specified authentication offset.
  • the communication manager 708 and/or the reception component 702 may activate an inactive mode based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
  • the reception component 702 may receive a secure mode activation indication.
  • the communication manager 708 and/or the reception component 702 may activate a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
  • the transmission component 704 may transmit a signal in at least one reception occasion, wherein the signal comprises a WUS or a paging signal.
  • the reception component 702 may receive a communication based at least in part on an authenticity status of the signal.
  • the transmission component 704 may transmit a security pattern configuration that indicates a reception occasion pattern.
  • the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
  • the determination component 710 may determine a security key configuration corresponding to a security key.
  • the determination component 710 may determine at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
  • the determination component 710 may determine the physical channel security scheme based at least in part on a prior secured communication.
  • the transmission component 704 may transmit an updated security pattern configuration that indicates an updated reception occasion pattern.
  • the transmission component 704 may transmit a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
  • the reception component 702 may receive a confirmation signal that indicates successful receipt of the signal.
  • the transmission component 704 may transmit a confirmation configuration that indicates the at least one dedicated channel.
  • the transmission component 704 may transmit at least one additional signal.
  • the reception component 702 may receive an attack report based at least in part on a detection of an attack, wherein the detection of the attack is based at least in part on a failure to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal.
  • the transmission component 704 may transmit an attack detection configuration that indicates the attack criterion.
  • the transmission component 704 may transmit a prior signal that includes an indication of the specified authentication offset.
  • the transmission component 704 may transmit a secure mode activation indication associated with a secure mode corresponding to a second network node.
  • a set of (one or more) components shown in Fig. 7 may perform one or more functions described as being performed by another set of components shown in Fig. 7.
  • Aspect 1 A method of wireless communication performed by a first network node, comprising: receiving a signal in at least one reception occasion from a second network node, wherein the signal comprises a wake up signal (WUS) or a paging signal; determining an authenticity status of the signal based at least in part on a physical layer security scheme; and performing a wireless communication task based at least in part on the authenticity status of the signal.
  • WUS wake up signal
  • paging signal determining an authenticity status of the signal based at least in part on a physical layer security scheme
  • performing a wireless communication task based at least in part on the authenticity status of the signal.
  • Aspect 2 The method of Aspect 1, wherein the at least one reception occasion corresponding to a reception occasion pattern.
  • Aspect 3 The method of Aspect 2, wherein the reception occasion pattern corresponds to a pattern time period.
  • Aspect 4 The method of Aspect 3, wherein the pattern time period corresponds to a discontinuous reception cycle.
  • Aspect 5 The method of any of Aspects 2-4, further comprising receiving a security pattern configuration that indicates the reception occasion pattern.
  • Aspect 6 The method of Aspect 5, wherein receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
  • Aspect 7 The method of Aspect 6, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 9 The method of any of Aspects 5-8, wherein receiving the security pattern configuration comprises receiving a sidelink message that indicates the security pattern configuration.
  • Aspect 10 The method of Aspect 9, wherein receiving the security pattern configuration comprises receiving the security pattern configuration from a third network node, wherein the signal comprises a sidelink signal.
  • Aspect 11 The method of any of Aspects 5-10, wherein the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
  • Aspect 12 The method of any of Aspects 5-11, wherein the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
  • Aspect 13 The method of Aspect 12, further comprising selecting the reception occasion pattern.
  • Aspect 14 The method of any of Aspects 2-13, further comprising: determining a security key configuration corresponding to a security key; and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
  • Aspect 15 The method of Aspect 14, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
  • Aspect 16 The method of either of Aspects 14 or 15, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
  • Aspect 17 The method of any of Aspects 14-16, wherein determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
  • RRC radio resource control
  • PDSCH physical downlink shared channel
  • MAC CE medium access control control element
  • Aspect 19 The method of Aspect 18, further comprising determining the physical channel security scheme based at least in part on a prior secured communication.
  • Aspect 20 The method of any of Aspects 14-19, wherein determining the security key configuration comprises transmitting a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
  • RRC radio resource control
  • PDSCH physical downlink shared channel
  • MAC CE medium access control control element
  • Aspect 21 The method of any of Aspects 2-20, wherein the signal comprises a cellwake up signal (C-WUS), the method further comprising transmitting a security pattern configuration that indicates the reception occasion pattern.
  • C-WUS cellwake up signal
  • Aspect 22 The method of Aspect 21, wherein transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
  • Aspect 23 The method of Aspect 22, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 24 The method of any of Aspects 2-23, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
  • Aspect 25 The method of any of Aspects 1-24, further comprising receiving a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
  • Aspect 26 The method of Aspect 25, wherein the coding method comprises a sequence based coding method or a polar coding method.
  • Aspect 27 The method of any of Aspects 1-26, further comprising transmitting a confirmation signal that indicates successful receipt of the signal.
  • Aspect 28 The method of Aspect 27, wherein transmitting the confirmation signal comprises transmitting the confirmation signal on at least one dedicated channel.
  • Aspect 29 The method of Aspect 28, further comprising receiving a confirmation configuration that indicates the at least one dedicated channel.
  • Aspect 30 The method of Aspect 29, wherein receiving the confirmation configuration comprises receiving at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 31 The method of any of Aspects 1-30, wherein the physical layer security scheme corresponds to an added signal component, and wherein the signal comprises the added signal component.
  • Aspect 32 The method of Aspect 31, wherein the added signal component comprises at least one of: a channel measurement metric, a portion of a cyclic redundancy check (CRC) associated with a prior communication, a digitally-signed portion of the CRC associated with the prior communication, wherein the digitally-signed portion of the CRC comprises a signature based at least in part on a private key associated with the second network node, a portion of a payload associated with the prior communication, or a digitally-signed portion of the payload associated with the prior communication, wherein the digitally-signed portion of the payload comprises a signature based at least in part on the private key associated with the second network node.
  • CRC cyclic redundancy check
  • Aspect 33 The method of Aspect 32, wherein the channel measurement metric comprises an expected reference signal received power.
  • Aspect 34 The method of any of Aspects 1-33, wherein the signal comprises a cellwake up signal (C-WUS).
  • C-WUS cellwake up signal
  • Aspect 35 The method of Aspect 34, further comprising receiving at least one data communication within a specified time period, wherein determining the authenticity status of the signal comprises determining that the signal is authentic based at least in part on receiving the at least one data communication within the specified time period.
  • Aspect 36 The method of any of Aspects 1-35, further comprising: failing to receive at least one data communication within a specified time period after receiving the signal, wherein determining the authenticity status of the signal comprises determining that the signal is not authentic based at least in part on failing to receive the at least one data communication within the specified time period; and transitioning to an inactive mode based at least in part on determining that the signal is not authentic, wherein transitioning to the inactive mode comprises transitioning to the inactive mode based at least in part on expiration of a configured inactive mode transition time period.
  • Aspect 38 The method of Aspect 37, further comprising receiving at least one additional signal, and wherein transmitting the attack report comprises transmitting the attack report based at least in part on failing to receive at least one data communication after receiving at least one signal of a plurality of signals that includes at least one of the signal or the at least one additional signal, wherein a quantity of received signals satisfies an attack criterion.
  • Aspect 39 The method of Aspect 38, wherein the attack criterion comprises a threshold quantity of received signals within a specified time period.
  • Aspect 40 The method of either of Aspects 38 or 39, further comprising receiving an attack detection configuration that indicates the attack criterion.
  • Aspect 41 The method of any of Aspects 36-40, further comprising activating a secure mode based at least in part on detecting the attack, wherein the physical layer security scheme corresponds to the secure mode.
  • Aspect 42 The method of any of Aspects 36-41, wherein detecting the attack comprises detecting the attack based at least in part on failing to receive at least one data communication within a specified authentication offset after receiving the at least one signal.
  • Aspect 43 The method of Aspect 42, wherein the specified authentication offset comprises a maximum time offset before a first expected data communication.
  • Aspect 47 The method of Aspect 46, wherein activating the inactive mode comprises activating the inactive mode based at least in part on a configured inactive switch time.
  • Aspect 48 The method of any of Aspects 1-47, further comprising: receiving a secure mode activation indication; and activating a secure mode based at least in part on receiving the secure mode activation indication, wherein the physical layer security scheme corresponds to the secure mode.
  • Aspect 49 The method of any of Aspects 1-48, wherein the signal comprises the paging signal, and wherein the paging signal corresponds to a group-based paging operation or a 2-stage paging operation.
  • Aspect 50 The method of Aspect 49, wherein the paging signal corresponds to the 2- stage paging operation, the method further comprising: receiving a shared channel signal; and decoding the shared channel signal based at least in part on the authenticity status of the signal, wherein the shared channel signal indicates a paged network node.
  • a method of wireless communication performed by a first network node comprising: transmitting a signal in at least one reception occasion, wherein the signal comprises a wake up signal (WUS) or a paging signal; and receiving a communication based at least in part on an authenticity status of the signal.
  • WUS wake up signal
  • Aspect 52 The method of Aspect 51, wherein the at least one reception occasion corresponds to a reception occasion pattern.
  • Aspect 54 The method of Aspect 53, wherein the pattern time period corresponds to a discontinuous reception cycle.
  • Aspect 55 The method of any of Aspects 52-54, further comprising transmitting a security pattern configuration that indicates the reception occasion pattern.
  • Aspect 56 The method of Aspect 55, wherein transmitting the security pattern configuration comprises transmitting a configuration message that indicates the security pattern configuration.
  • Aspect 57 The method of Aspect 56, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 58 The method of any of Aspects 55-57, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
  • Aspect 59 The method of any of Aspects 55-58, wherein transmitting the security pattern configuration comprises transmitting a sidelink message that indicates the security pattern configuration.
  • Aspect 60 The method of any of Aspects 55-59, wherein the security pattern configuration comprises a sidelink resource pool configuration that includes a plurality of reception occasion patterns.
  • Aspect 61 The method of any of Aspects 55-60, wherein the security pattern configuration indicates a set of reception occasion patterns corresponding to a security time period, wherein the set of reception occasion patterns includes the reception occasion pattern.
  • Aspect 62 The method of any of Aspects 52-61, further comprising: determining a security key configuration corresponding to a security key; and determining at least one of the reception occasion pattern or a payload of the signal based at least in part on the security key.
  • Aspect 63 The method of Aspect 62, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is interleaved with a communication based at least in part on the security key.
  • Aspect 64 The method of either of Aspects 62 or 63, wherein an indication of the at least one of the reception occasion pattern or the payload of the signal is scrambled based at least in part on the security key.
  • Aspect 65 The method of any of Aspects 62-64, wherein determining the security key configuration comprises receiving a security key configuration message that indicates the security key configuration, wherein the security key configuration message comprises at least one of: a sidelink message, a radio resource control (RRC) message, a physical downlink shared channel (PDSCH) message, or a medium access control control element (MAC CE).
  • RRC radio resource control
  • PDSCH physical downlink shared channel
  • MAC CE medium access control control element
  • Aspect 66 The method of any of Aspects 62-65, wherein determining the security key configuration comprises extracting the security key configuration from a physical channel based at least in part on a physical channel security scheme.
  • Aspect 67 The method of Aspect 66, further comprising determining the physical channel security scheme based at least in part on a prior secured communication.
  • Aspect 68 The method of any of Aspects 52-67, wherein the signal comprises a cellwake up signal (C-WUS), the method further comprising receiving a security pattern configuration that indicates the reception occasion pattern.
  • C-WUS cellwake up signal
  • Aspect 69 The method of Aspect 68, wherein receiving the security pattern configuration comprises receiving a configuration message that indicates the security pattern configuration.
  • Aspect 70 The method of Aspect 69, wherein the configuration message comprises at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 71 The method of any of Aspects 52-70, further comprising transmitting an updated security pattern configuration that indicates an updated reception occasion pattern.
  • Aspect 72 The method of any of Aspects 51-71, further comprising transmitting a physical layer security scheme configuration that indicates a coding method for reception occasion coding corresponding to the physical layer security scheme.
  • Aspect 73 The method of Aspect 72, wherein the coding method comprises a sequence based coding method or a polar coding method.
  • Aspect 74 The method of any of Aspects 51-73, further comprising receiving a confirmation signal that indicates successful receipt of the signal.
  • Aspect 75 The method of Aspect 74, wherein receiving the confirmation signal comprises receiving the confirmation signal on at least one dedicated channel.
  • Aspect 76 The method of Aspect 75, further comprising transmitting a confirmation configuration that indicates the at least one dedicated channel.
  • Aspect 77 The method of Aspect 76, wherein transmitting the confirmation configuration comprises transmitting at least one of a radio resource control (RRC) message or a medium access control control element (MAC CE).
  • RRC radio resource control
  • MAC CE medium access control control element
  • Aspect 78 The method of any of Aspects 51-77, wherein the physical layer security scheme corresponds to an added signal component, and wherein the signal comprises the added signal component.
  • Aspect 81 The method of any of Aspects 51-80, wherein the signal comprises a cellwake up signal (C-WUS).
  • C-WUS cellwake up signal
  • Aspect 82 The method of Aspect 81, wherein the transmitting the signal comprises transmitting the signal in at least one reception occasion corresponding to a reception occasion pattern, further comprising receiving a security pattern configuration that indicates a reception occasion pattern.
  • Aspect 98 An apparatus for wireless communication at a device, comprising a processor; memory coupled with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to perform the method of one or more of Aspects 51-92.
  • Aspect 99 A device for wireless communication, comprising a memory and one or more processors coupled to the memory, the one or more processors configured to perform the method of one or more of Aspects 51-92.
  • Aspect 100 An apparatus for wireless communication, comprising at least one means for performing the method of one or more of Aspects 51-92.
  • Aspect 101 A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable by a processor to perform the method of one or more of Aspects 51-92.
  • Aspect 102 A non-transitory computer-readable medium storing a set of instructions for wireless communication, the set of instructions comprising one or more instructions that, when executed by one or more processors of a device, cause the device to perform the method of one or more of Aspects 51-92.
  • the term “component” is intended to be broadly construed as hardware and/or a combination of hardware and software.
  • “Software” shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, and/or functions, among other examples, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
  • a “processor” is implemented in hardware and/or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware and/or a combination of hardware and software.
  • “at least one of: a, b, or c” is intended to cover a, b, c, a + b, a + c, b + c, and a + b + c, as well as any combination with multiples of the same element (e.g., a + a, a + a + a, a + a + b, a + a + c, a + b + b, a + c + c, b + b, b + b + b, b + b + c, c + c, and c + c + c, or any other ordering of a, b, and c).
  • the terms “has,” “have,” “having,” or the like are intended to be open-ended terms that do not limit an element that they modify (e.g., an element “having” A may also have B). Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or,” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of’).

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Divers aspects de la présente divulgation portent d'une manière générale sur la communication sans fil. Selon certains aspects, un premier nœud de réseau peut recevoir un signal lors d'au moins une occasion de réception en provenance d'un second nœud de réseau, le signal comprenant un signal de réveil ou un signal de radiorecherche. Le premier nœud de réseau peut déterminer un état d'authenticité du signal sur la base, au moins en partie, du mécanisme de sécurité de la couche physique. Le premier nœud de réseau peut effectuer une tâche de communication sans fil sur la base, au moins en partie, de l'état d'authenticité du signal. L'invention concerne de nombreux autres aspects.
PCT/US2023/062498 2022-03-04 2023-02-13 Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche WO2023168167A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GR20220100207 2022-03-04
GR20220100207 2022-03-04

Publications (1)

Publication Number Publication Date
WO2023168167A1 true WO2023168167A1 (fr) 2023-09-07

Family

ID=87884311

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2023/062498 WO2023168167A1 (fr) 2022-03-04 2023-02-13 Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche

Country Status (1)

Country Link
WO (1) WO2023168167A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160057703A1 (en) * 2014-08-20 2016-02-25 Qualcomm Incorporated Secure wireless wake-up companion
WO2018237180A1 (fr) * 2017-06-21 2018-12-27 Intel Corporation Signature dynamique pour authentification de paquet de réveil
US20200196244A1 (en) * 2017-07-06 2020-06-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for handling wake-up signals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160057703A1 (en) * 2014-08-20 2016-02-25 Qualcomm Incorporated Secure wireless wake-up companion
WO2018237180A1 (fr) * 2017-06-21 2018-12-27 Intel Corporation Signature dynamique pour authentification de paquet de réveil
US20200196244A1 (en) * 2017-07-06 2020-06-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for handling wake-up signals

Similar Documents

Publication Publication Date Title
US11627598B2 (en) Mask-based configuration for discontinuous reception
TW202002693A (zh) 連接模式不連續接收模式中的波束追蹤和恢復
US20230362889A1 (en) Adaptive sub-grouping and paging for user equipment
US11985514B2 (en) Discontinuous reception configuration in sidelink communication deployments
US11546738B2 (en) Always-on short messages
US11877335B2 (en) Load balancing inter-frequency measurement activities for dual network link scenarios
US11425647B2 (en) Group wake-up signaling using sidelink zone identifier
US12041588B2 (en) Sidelink resource selection for discontinuous reception
US20230136011A1 (en) Connected mode synchronization in a scalable cell system
US20220256636A1 (en) Link recovery between sidelink user equipments based at least in part on keep-alive messages
WO2023168167A1 (fr) Mécanismes de sécurité de couche physique pour signaux de réveil et signaux de radiorecherche
US20240172115A1 (en) Relayed wake-up signal for an access link using a sidelink
US11895639B2 (en) Group-based discontinuous reception alignment
US20220070964A1 (en) Sidelink feedback in discontinuous reception mode operation
WO2023102876A1 (fr) Transmission à faible consommation d'énergie
WO2024065604A1 (fr) Terminaison précoce d'une retransmission de demande de répétition automatique hybride d'une configuration de réception discontinue
US20240114588A1 (en) Message for network entity discontinuous reception or discontinuous transmission
US20240340998A1 (en) Dynamic indication to skip channel reception or transmission
EP4410052A1 (fr) Sélection de ressources de liaison latérale pour réception discontinue
CN119896028A (zh) 用于网络实体非连续接收或非连续发送的消息
CN115380557A (zh) 侧链路的链路管理

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23710951

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 23710951

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载