Abstract:
One or more selectively activated features needed at a device to use a network service may be identified. Authorization information and feature activation key(s) associated with features that the device has been authorized to activate may be obtained at the device. The feature activation key(s) may be used to activate and/or maintain activation of the authorized features that match the selectively activated feature(s) needed to use the network service. An authorization server may obtain a request to activate one or more selectively activated features of a device. The authorization server may verify that the selectively activated feature(s) are authorized to be used at the device based on an authorization agreement obtained at the authorization server. The authorization server may send proof that the device is authorized to use the selectively activated feature(s) and may send feature activation key(s) based on the authorization agreement in response to the request.
Abstract:
Aspects of the disclosure are related to a method for generating random numbers based on WLAN signal measurements, comprising: measuring WLAN signals; harvesting entropy based on the WLAN signal measurements; and generating a random number based on the harvested entropy.
Abstract:
A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a STA. The STA sends, in a re-association procedure, a re-association object to a first AP to establish a first security association with the first AP. The re-association object is encrypted by using a first key unknown to the STA. The re-association object includes a second key derived from a second security association in a previous association procedure between the STA and a second AP. The STA receives a response from the first AP indicating that the first security association has been successfully established. The STA authenticates the response.
Abstract:
A method, an apparatus, and a computer-readable medium for wireless communication are provided. In one aspect, an apparatus is configured to determine a data link attribute for scheduling a data link with a second wireless device and to transmit the determined data link attribute in a frame to the second wireless device.
Abstract:
An apparatus, method and computer-readable media are disclosed for performing wireless communications. For example, a process can include: transmitting, to a security service of the wireless network, a first service access request for accessing a service of the wireless network, wherein the service is separate from the security service; receiving, from the security service in response to the first service access request, service security information for accessing the service; deriving a service key based on the service security information; transmitting, to the service, a second service access request, the second service access request encoded based on the derived service key; and establishing a first security context with the service based on the derived service key.
Abstract:
Disclosed are techniques for performing wireless communication. In some aspects, a wireless communication device may perform operations including generating, at a user equipment (UE), a message including information associated with positioning-reference signaling. The operations may include obtaining: a group identifier, a group key, and a group-key identifier. The operations may include deriving a traffic key based on the group key and the group identifier. The operations may include deriving an encryption key and an integrity key based on the traffic key. The operations may include generating a message header including the group identifier and the group-key identifier. The operations may include calculating a message-authentication code (MAC) using the integrity key, the message, and the message header. The operations may include encrypting the message and the MAC using the encryption key. The operations may include transmitting the message header, the encrypted message, and the encrypted MAC.
Abstract:
Reference signals used in location estimation of a user equipment (UE) in a wireless data network can be secured against a man-in-the-middle attack by a transmitting device withholding the conveyance of transmission parameters for decoding portions of a reference signal until after the portions are transmitted. Thus, receiving devices can buffer received signals and, after receiving the transmission parameters, process the buffered signals. To further prevent an attacker device from attacking future reference signals, transmission parameters can be nondeterministic such that an attacker device obtaining a parameter at a certain period of time is unable to use the decoded parameter predict or determine subsequent transmission parameters.
Abstract:
Apparatus, methods, and computer-readable media for facilitating mobility in sidelink-assisted access link connectivity are disclosed herein. An example method for wireless communication at a user equipment (UE) includes establishing a sidelink connection with a first assistant node (AN) and establishing an access link connection with a first primary node (PN), the first AN and the first PN communicating via a first network interface. The example method also includes determining an occurrence of a node-change triggering event associated with at least one of the first AN and the first PN. The example method also includes performing a node-change procedure based on the occurrence of the node-change triggering event. The example method also includes communicating with at least one of a second AN or a second PN based on the node-change procedure, the second AN and the second PN communicating via a second network interface.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a relay user equipment (UE) may establish a sidelink unicast link with a remote UE via a sidelink signaling interface. The relay UE may identify configuration information for an adaptation layer of the sidelink signaling interface, the configuration information including at least one of: a remote UE identifier associated with the sidelink unicast link for a relay service, bearer identifier information identifying one or more bearers between the remote UE and a network entity for the relay service, a radio link control (RLC) channel mapping between a bearer identifier and one or more RLC channels, or data routing information associated with the relay service. The relay UE may relay communications between the remote UE and the network entity based at least in part on the configuration information. Numerous other aspects are described.
Abstract:
Methods, systems, and devices for wireless communications are described. In some systems, a first user equipment (UE) that is out-of-coverage of a base station and a second UE that is in-coverage of the base station may support signaling exchanges for transmitting or receiving a discovery message, an essential system information block (E-SIB), common SIB updates, or on-demand SIBs within a relaying network before and after a relay connection between the first UE and the second UE. The first UE may receive the discovery message and the E-SIB via same or different signaling and may acquire or decode the E-SIB according to various techniques. The first UE may receive common SIB updates via a dedicated logical channel between the first UE and the second UE and the first UE may initiate on-demand SIB acquisition after establishment of the relay connection and based on a connection type of the first UE.