Abstract:
Some aspects described herein relate to provisioning aerial vehicles with identifiers, certificates, or other credentials for communicating based on a mobile network. The UAV can transmit a request to register with the mobile network, where the request includes at least a hardware identifier of the UAV. The UAV may receive, from a component of the mobile network, a response to the request, where the response includes a unique UAV identifier, a UAV certificate, and a network certificate generated by at least one of the component of the mobile network or a unmanned aircraft system service supplier (USS).
Abstract:
A user equipment (UE) may receive a quality of service (QoS) flow for a multicast or broadcast service that is secured with a multicast-broadcast key. The UE may transmit a data session establishment request to a service management function (SMF) for the multicast or broadcast service. The UE may receive at least one multicast-broadcast key for the PDU session. The UE may determine a radio bearer (RB) configuration for the multicast or broadcast service. The UE may receive one or more QoS flow packets for the multicast or broadcast service over the RB. The UE may decode the one or more QoS flow packets using the at least one multicast-broadcast key, or a key derived from the at least one multicast-broadcast key. Decoding may include decrypting, verifying the integrity, or a combination thereof.
Abstract:
A method, operational at a device, includes receiving at least one packet belonging to a first set of packets of a packet flow marked with an identification value, determining that the at least one packet is marked with the identification value, determining to change a quality of service (QoS) treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received, and sending a request to change the QoS treatment of packets belonging to the first set of packets marked with the identification value that are yet to be received to trigger a different QoS treatment of packets within the packet flow, responsive to determining to change the QoS treatment. Other aspects, embodiments, and features are also claimed and described.
Abstract:
The present disclosure provides techniques that may be applied, for example, in a multi-slice network for maintaining privacy when attempting to access the network. An exemplary method generally includes transmitting a registration request message to a serving network to register with the serving network; receiving a first confirmation message indicating a secure connection with the serving network has been established; transmitting, after receiving the first confirmation message, a secure message to the serving network comprising an indication of at least one configured network slice that the UE wants to communicate over, wherein the at least one configured network slice is associated with a privacy flag that is set; and receiving a second confirmation message from the serving network indicating that the UE is permitted to communicate over the at least one configured network slice.
Abstract:
A wireless device for wireless communication is configured to determine a schedule in association with one or more wake times. In addition, the wireless device is configured to determine a lifetime in association with the determined schedule. The lifetime indicates at least one of when the determined schedule associated with the one or more wake times will expire, a validity time associated with the determined schedule, or a boundary associated with the schedule. Further, the wireless device is configured to transmit to one or more wireless devices information indicating the determined schedule associated with the one or more wake times and information indicating the determined lifetime associated with the determined schedule.
Abstract:
Certain aspects of the present disclosure relate to methods and apparatus enabling connectivity session and internet protocol (IP) establishment. An exemplary method generally generating a request to establish at least one data network (DN) session for providing connectivity between the UE and a DN, wherein the at least one DN session supports a plurality of data sessions for enabling communication between one or more local endpoints in the UE and one or more endpoints in the DN, wherein each data session of the plurality of data sessions supports one or more connectivity requirements specified by the UE, wherein a first data session of the plurality of data sessions is associated with a first gateway, and wherein a second data session of the plurality of data sessions is associated with a second gateway, and transmitting the request to establish the at least one DN session.
Abstract:
A method, an apparatus, and a computer-readable medium for wireless communication are provided. In one aspect, an apparatus is configured to determine a multicast schedule for communicating data associated with a service over an NDL and to transmit the multicast schedule to at least one other wireless device.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may select a user plane for a service. The UE may transmit a request for a service over the user plane. Numerous other aspects are described.
Abstract:
Methods, systems, and devices are provided for supporting user plane integrity protection (UP IP) for communications with a radio access network (RAN). Various embodiments may include indicating whether or not a wireless device supports UP IP over Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (eUTRA) by including UP IP support indications in user equipment (UE) security capability information elements (IEs).
Abstract:
Techniques and apparatus for protecting sequence numbers used in authentication procedures are described. One technique includes receiving, from a network, an authentication request comprising at least a random challenge. After receipt of the authentication request, a synchronization parameter is generated based at least in part on a key shared by the network and the UE, the random challenge, and a first message authentication code (MAC). The synchronization parameter and the first MAC are transmitted to the network in response to the authentication request.