Abstract:
Provided is a method for providing a service by a Base Station (BS) in a wireless communication system. The method includes setting up a radio link to a Mobile Station (MS) to provide the service; receiving BS information from at least one BS that cooperates to provide the service; and selecting an alternative BS for replacing the BS from among the at least one BS based on the BS information.
Abstract:
A method of establishing synchronization with a base station by a mobile station in a communication system using beamforming includes: receiving a downlink signal transmitted through at least one transmission beam by using at least one reception beam; determining at least one of a propagation delay and a signal strength of the received downlink signal for each downlink transmission/reception beam pair through which the downlink signal is transmitted/received, wherein each downlink transmission/reception beam pair includes a transmission beam through which the downlink signal is transmitted from the base station and a reception beam through which the downlink signal is received by the mobile station; and establishing a downlink frame boundary of the mobile station by using the determined at least one of the propagation delay and the signal strength for each downlink transmission/reception beam pair.
Abstract:
A method and apparatus for improving a mobile problem caused by a narrow handover region in a boundary region between virtual cells constructed by a plurality of small base stations are provided. A plurality of Virtual Cells (VCs) include a plurality of Distributed Base Stations (DBSs) whose VCs cooperatively communicate with each other. An Intermediate Distributed Base Station (I-DBS) is located in a region where adjacent at least two VCs among the plurality of VCs are superimposed, and belongs to a different VC according to a time division scheme.
Abstract:
Methods and apparatuses are provided for operating a Machine-to-Machine (M2M) Subscriber Station (SS) for a time-controlled service in an M2M communication system. The M2M SS registers the time-controlled service. The M2M SS establishes a service flow with an M2M Base Station (BS), after registering the time-controlled service. Data is transferred, from the M2M SS, to the M2M BS, through the service flow during an access admission time period. Transmission of the data to the M2M BS is ceased during an access restriction time period.
Abstract:
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce. A Medium Access Control (MAC) Protocol Data Unit (PDU) is generated by attaching a MAC header and a CMAC digest for integrity protection to the RNG-REQ message carrying the encrypted short data burst. The MAC PDU is transmitted to the BS.
Abstract translation:一种方法和装置能够在无线通信系统中加密短数据当终端在空闲模式下生成短数据突发时,该装置使用基于密码的消息认证码(CMAC)-TEK生成业务加密密钥(TEK) 从与终端和基站(BS)之间的安全关联(SA)相关的授权密钥(AK)派生的预密钥。 构成与具有与承载短数据脉冲串的测距请求(RNG-REQ)消息一起发送的上行链路CMAC PN(CMAC-PN_U)相同的分组号(PN)的随机数。短数据突发使用TEK和 随机数 通过将MAC报头和用于完整性保护的CMAC摘要附加到携带加密的短数据突发的RNG-REQ消息来生成媒体接入控制(MAC)协议数据单元(PDU)。 MAC PDU被发送到BS。
Abstract:
A method of determining member Base Stations (BSs) providing cooperative communication to a Mobile Station (MS) in a communication system. The method includes when a candidate list of the member BSs generated using at least one of strengths of signals received from adjacent BSs and cell loading state information of the adjacent BSs is received from the MS, selecting candidate BSs having a service quality larger than or equal to a threshold from candidate BSs included in the candidate list as targets to receive a member negotiation; and performing a capability negotiation with each of the selected targets to receive the member negotiation to select final member BSs and transmitting information on the determined final member BSs to the MS.
Abstract:
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce. A Medium Access Control (MAC) Protocol Data Unit (PDU) is generated by attaching a MAC header and a CMAC digest for integrity protection to the RNG-REQ message carrying the encrypted short data burst. The MAC PDU is transmitted to the BS.
Abstract translation:一种方法和装置能够在无线通信系统中加密短数据当终端在空闲模式下生成短数据突发时,该装置使用基于密码的消息认证码(CMAC)-TEK生成业务加密密钥(TEK) 从与终端和基站(BS)之间的安全关联(SA)相关的授权密钥(AK)派生的预密钥。 构成与具有与承载短数据脉冲串的测距请求(RNG-REQ)消息一起发送的上行链路CMAC PN(CMAC-PN_U)相同的分组号(PN)的随机数。短数据突发使用TEK和 随机数 通过将MAC报头和用于完整性保护的CMAC摘要附加到携带加密的短数据突发的RNG-REQ消息来生成媒体接入控制(MAC)协议数据单元(PDU)。 MAC PDU被发送到BS。
Abstract:
A subscriber station performs a method for managing a security key. The method includes generating, for each of the base stations, an input value for generation of the security key for data transmission and reception with the each base station; transmitting, to the each base station, the input value for a corresponding base station; and generating the security key of the corresponding base station by using the input value of the each base station. A base station provides cooperative communication to the subscriber station.
Abstract:
Provided is a method for managing a security key for communication authentication with a Mobile Station (MS) in a communication system. The method includes acquiring a first authentication key by performing an authentication procedure for the communication authentication in a cloud cell having member Base Stations (BSs) that include a master BS and at least one slave BS for providing a service to the MS; and communicating with at least one member BS using a first encryption key that is generated using the first authentication key.
Abstract:
Beam selection is provided. A method for handover in a mobile station includes sending a scan request message for scanning a downlink (DL) beam with respect to a serving base station (BS) and a neighboring BS, to the serving BS, and receiving a scan response message; determining the DL beam for the MS by performing scanning with the serving BS and the neighboring BS based on the scan response message; sending a scan report message comprising a result of the scanning to the serving BS; when receiving an air-HO request message from the serving BS, generating an air-HO response message comprising information of a neighboring BS to which the MS hands over based on the air-HO request message; performing beam selection with the neighboring BS of the handover based on the air-HO request message; and performing the handover.