Abstract:
This document discusses, among other things, a Cellular Internet-of-Things (CIoT) network architecture to enable communication between an apparatus of a CIoT User Equipment (UE) and a network through a CIoT enhanced Node B (eNB) according to a lightweight Non-Access Stratum (NAS) protocol. An apparatus of a CIoT eNB can process data for communication between the CIoT UE and the network. The lightweight NAS protocol supports a reduced set of NAS messages for communication between, for example, the CIoT UE and the CIoT eNB, such as using a modified NAS message, or one or more new messages.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
A cellular IoT (CIoT) device can comprise a coverage and/or processing constrained device e.g., devices operating primarily MTC or M2M (e.g., sensor devices, controller devices, etc.). These devices can have limited or no user interface, and can be used for machines or devices with little mobility. CIoT devices can be deployed in usage scenarios such as home automation (e.g., security, appliances, energy packages, etc.), industry automation, and smart cities with low-power devices (e.g., devices having a battery life of several years), and can be easily installed and operated in challenging coverage conditions, such as lower or basement levels of buildings. CIoT devices can be provisioned to connect to a cellular carrier network and an associated CSP. The CSP can execute end2end solutions (e.g., service portal, service sign-up, etc.) while the cellular carrier can provide the bulk data pipe to the CSP.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Methods and apparatus to support secure Wi-Fi AP protocols are disclosed. An example method includes in response to receiving a request from a computing device to connect to a network, limiting, with a processor of a Wi-Fi access point, access of the computing device to the network to connect to a server; authenticating, with the processor of the Wi-Fi access point, the computing device based on data received from the server; and expanding, with the processor of the Wi-Fi access point, the access of the computing device to connect to the network.
Abstract:
A user equipment (UE) is configured to send a direct communication request to a peer UE, wherein the direct communication request comprises a signature authenticating an identity of the UE. The UE is configured to process a direct communication response from the peer UE to authenticate an identity of the peer UE, wherein the direct communication response comprises a signature authenticating the identity of the peer UE. In response to processing the direct communication response from the peer UE to authenticate the identity of the peer UE, the UE is configured to engage in direct communication with the peer UE.
Abstract:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
Abstract:
Disclosed herein are user equipment (UE) configured to communicate with a vehicle-to-everything (V2X) control function (CF) and a V2X Key Management Function (KMF). The UE includes processing circuitry configured to select a broadcast service from a plurality of available broadcast services and encode a key request message for transmission to the V2X KMF. The key request message includes a service identification (ID) of the selected broadcast service and identification of V2X security techniques supported by the UE. A key response message received from the V2X KMF in response to the key request message is decoded. The key response message identifies a V2X security technique of the V2X security techniques. The identified V2X security technique is execute to obtain security credentials provisioned by the V2X KMF. Data is encoded for transmission to a second UE during the selected broadcast service, where the encoding is based on the provisioned security credentials.
Abstract:
Some demonstrative embodiments include devices, systems and/or methods of communicating between a cellular manager and a User Equipment (UE) via a Wireless Local Area network (WLAN) node. For example, an Evolved Node B (eNB) may be configured to communicate with a User Equipment (UE) traffic of at least one Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (E-UTRAN) Radio Access Bearer (E-RAB); to participate in establishment of an IP tunnel with the UE via a Wireless Local Area Network (WLAN) node; to encapsulate an IP payload comprising downlink traffic of the E-RAB in an IP tunneling packet; and to send the IP tunneling packet to the UE via the IP tunnel.
Abstract:
A cellular IoT (CIoT) device can comprise a coverage and/or processing constrained device e.g., devices operating primarily MTC or M2M (e.g., sensor devices, controller devices, etc.). These devices can have limited or no user interface, and can be used for machines or devices with little mobility. CIoT devices can be deployed in usage scenarios such as home automation (e.g., security, appliances, energy packages, etc.), industry automation, and smart cities with low-power devices (e.g., devices having a battery life of several years), and can be easily installed and operated in challenging coverage conditions, such as lower or basement levels of buildings. CIoT devices can be provisioned to connect to a cellular carrier network and an associated CSP. The CSP can execute end2end solutions (e.g., service portal, service sign-up, etc.) while the cellular carrier can provide the bulk data pipe to the CSP.