Abstract:
A systems and method for gateway discovery and Layer-2 mobility is operable by an access terminal that connects to an access point. The access terminal determines security credentials and addressing and routing configurations used previously. The access terminal determines whether the security credentials may be reused by the access terminal to perform authentication with an access network and also determines whether the addressing and routing configurations may be reused by the access terminal. In a related system and method, a network entity receives an inquiry from an access terminal regarding whether a prior Trusted Wireless Access Gateway (TWAG) is reusable by the access terminal as a current TWAG. The network entity determines whether the prior TWAG is reusable and may send response to the access terminal indicating whether the prior TWAG is reusable.
Abstract:
Methods, systems, and devices are described for network selection by a mobile device that enables a network selection based, at least in part, on a network access policy that indicates use of a radio access technology (RAT) based on one or more network characteristics. The network access policy may be selectively applied based on one or more predetermined conditions, such as a time of day, mobile device location, RAT access cost, roaming status, subscription profile, and/or data usage, for example, In some examples, when the network access policy is applied, the mobile device may be configured to select from among a number of access nodes that may operate using different RATs, such as cellular access node(s) or Wireless Local Area Network (WLAN) access node(s). Communications may be established with a selected access node based at least in part on network conditions such as available bandwidth for an access node.
Abstract:
Various aspects of the present disclosure include methods, network servers or components and user equipment devices configured to authorize network slices that are associated with services provided by external providers. Various aspects enable access and use of network slices by user equipment devices connected to a network (e.g., 5G or New Radio network) via network components associated with a service provider by generating an allowed network slice selection assistance information (Allowed NSSAI) and an Unauthorized NSSAI, and sending the Allowed NSSAI and Unauthorized NSSAI to a user equipment device.
Abstract:
Techniques for managing access combinations for multiple access protocol data unit (PDU) sessions are described. A communication device may receive control signaling indicating a configuration for a multiple access PDU session associated with a plurality of access links. The plurality of access links may be associated with a first type of access, a second type of access, or a combination thereof. The communication device may select a mode for allocation of a data flow associated with the multiple access PDU session to the plurality of access links based at least in part on the received control signaling. The communication device may allocate the data flow associated with the multiple access PDU session to the plurality of access links based at least in part on the selected mode, and transmit the allocated data flow over the plurality of access links associated with the two types of access.
Abstract:
Methods, systems, and devices for wireless communications are described. Generally, the described techniques at a network provide for efficiently considering parameters of a network slice when determining whether to provide access to the network slice, allow the establishment of a session via the network slice, or grant access to resources for communications via the network slice. Further, the described techniques at a user equipment (UE) provide for efficiently determining when or whether to retry to access a network slice, retry to establish a session via the network slice, or retry to access resources for communicating via the network slice.
Abstract:
Various embodiments enable broadcast communications security. Various embodiments enable the authentication of broadcast communications. Various embodiments may enable asymmetric authentication and integrity protection of small size messages, such as one or more signed messages totaling a length of 250 bytes or less. Various embodiments may support cryptographic signing of beacon type messages using certificates. Various embodiments may include generating a beacon type message, cryptographically signing the beacon type message at least in part using a certificate to generate a signed beacon message, and sending the signed beacon type message in one or more broadcast transmissions in conjunction with, or independently of, certificate information used to verify the signed beacon message.
Abstract:
Methods, systems, and devices for wireless communications are described. A wireless device may receive a broadcast remote identification (BRID) message from a unmanned aerial vehicle (UAV), where the BRID message may include an identity of the UAV. The wireless device may identify UAV information associated with the UAV based on the UAV ID. In some cases, the wireless device may be configured with information that enables the identification of the UAV information. In other cases, the wireless device may request the UAV information from a network entity, such as a UAV flight management system (UFMS), which provides the requested UAV information. In some examples, the UFMS may request the UAV information from an unmanned aerial system (UAS) service supplier (USS) based on the BRID information. Upon identifying the UAV information, the wireless device may broadcast the UAV information to manned aerial vehicles, thereby indicating a presence of the UAV.
Abstract:
Wireless communications systems and methods related to on-demand communications are provided. A first network entity receives, from a user equipment (UE), a network slice request. The first network entity transmits to a second network entity, a request for capability information associated with the UE based on the UE's network slice request. Additionally, the first network entity receives from the second networking entity, a response indicating the capability information associated with the UE.
Abstract:
Methods, systems, and devices for wireless communication are described. In one example, an aerial user equipment (UE) may receive an indication of a priority for cell selection for aerial UEs from each cell in a set of cells and may select a cell from the set of cells based on the priority of each cell in the set of cells. In another example, an aerial UE may connect to a network available to aerial UEs and non-aerial UEs for auxiliary communications, when appropriate. In yet another example, when an aerial UE transitions to a new mission status, the aerial UE may transmit a tracking area update (TAU) if the aerial UE is connected to a cell in a tracking area that does not support the new mission status. In yet another example, a base station may page an aerial UE based on a mission status of the aerial UE.
Abstract:
A gateway device detects a trigger associated with a device and, in response, identifies an application service associated with the device, obtains a traffic network policy associated with the application service, and obtains a network access token based on the traffic network policy. The network access token facilitates validating and/or mapping a downlink data packet obtained at the gateway device in user-plane traffic that is destined for the device. The network access token is sent to an entity in control-plane signaling. Subsequently, the gateway device obtains a downlink data packet including the network access token. The gateway device verifies the network access token and/or maps the downlink data packet to the device using data obtained from the network access token. The network access token may be removed from the downlink data packet before the downlink data packet is sent to the device according to the mapping.