Abstract:
Methods, systems, and devices for wireless communication are described for precursory client configuration for network access. A configurator station (STA) may receive, from a key management device, an identity key of a client STA and may receive, from the client STA, a network configuration probe that includes a first cryptographic value based at least in part on the identity key and a request for network access. The configurator STA may apply a cryptographic function to the identity key to generate a second cryptographic value. The configurator STA may configure the client STA to access a network based at least in part on a match between the first cryptographic value and the second cryptographic value.
Abstract:
Methods, systems, and devices for wireless communication are described. Methods, systems, and devices provide for determining or identifying a client device that is monopolizing a channel associated with a first basic service set (BSS). Once identified, a second BSS is dynamically created and configured with parameters that are throttled with respect to the first BSS. The client device is steered to the second BSS and is prevented from reassociating with the first BSS until a change in device status.
Abstract:
A user device can be configured for network access, such as for guest network access. In one example, a first device receives an indication of a transaction that uses the first device. The first device communicates a request for network access to an access point of the network in response to receiving the indication of the transaction. The first device then receives a first key from the access point. The first device provides the first key to the user device. The user device is to use the first key to obtain the network access to the network.
Abstract:
Various aspects are provided for wireless communication channel management. For instance, aspects of an example method are provided, the method including detecting a trigger condition for changing an operating frequency of a wireless communication link between a first device and a second device. In addition, the example method may include obtaining a target operating frequency for the wireless communication link based on detecting the trigger condition. Moreover, the example method may include tuning a transceiver to the target operating frequency. In an example, the first device may be an unmanned aerial vehicle (UAV) and the second device may be a controller associated with the UAV. Additionally, example apparatuses and computer-readable media are provided for wireless communication channel management, the example apparatuses and computer-readable media being configured to perform, or store computer-executable code to perform, the disclosed example methods.
Abstract:
Described herein are implementations for using a remote control device to control a target device on a network via a remote control proxy device. A remote control device may determine an IoT device capable of functioning as a remote control proxy device. The remote control device may generate a data packet comprising a command for controlling the target device and a network address associated with the target device, and transmit the data packet to the IoT device. If the IoT device determines, using the network address, that it is not the target device, the IoT device may either unicast the data packet to the target device or multicast the data packet to multiple intermediate IoT devices on the network.
Abstract:
An apparatus and method for registering and configuring a wireless device for use within a wireless local area network (WLAN) are disclosed. In at least one exemplary embodiment, a registration authority may obtain a public key and connection attributes of the wireless device. The registration authority may be distinct from the wireless device and an access point of the WLAN. The registration authority may provide the public key and the connection attributes to a certification authority. The certification authority, distinct from the registration authority, may certify the public key and generate a certificate for the wireless device. The certificate may authenticate the wireless device with access points or other wireless devices. In some embodiments, a certification revocation list may be generated to identify the certificates that may have expired or are otherwise invalid. The certification revocation list may permit or deny access of a wireless device to the WLAN.
Abstract:
An apparatus and method for configuring a wireless station for use within a wireless local area network are disclosed. In at least one exemplary embodiment, a pairwise master key is generated by the wireless station and an access point within the wireless local area network. The pairwise master key may be based, at least in part, on a transient identity key pair of the wireless station. The transient identity key pair may be generated by the wireless station in response to receiving a message from the access point. In some embodiments, a public transient identity key of the transient identity key pair may be provided to additional access points to enable the wireless station to authenticate with the additional access points.
Abstract:
Methods and apparatus are provided for adapting femtocell properties based on changes detected in network topology. A method includes detecting a network topology change associated with a network node. The method includes determining an availability factor of the network node based on the topology change. The method includes setting mobility parameters of at least one mobile entity serviced by the network entity and mitigating interference with at least one neighboring network node based at least in part on the network topology and on at least one adjusted resource parameter of the network entity.
Abstract:
An access point is identified for providing service for an access terminal. In some aspects, the identification of an access point is based on loading at one or more access points. In some implementations, an access terminal selects a cell (e.g., the cell that provides maximum throughput) based on the cell load at one or more cells. In some implementations, load estimation is based on information acquired by an access terminal from nearby access points.
Abstract:
The present disclosure presents methods and apparatuses for improved paging area identifier selection in low power base stations. In some examples described in the present disclosure, a method is provided for updating a paging area identifier, which may include observing one or more parameters of signals received in a wireless network, updating a previously selected paging area identifier to a new paging area identifier based at least in part on the one or more parameters, and transmitting the new paging area identifier. In addition, example methods are provided for paging devices in a wireless network, which may include determining a paging area identifier related to a last known low power base station for a device, determining a plurality of low power base stations using the paging area identifier, and causing the plurality of low power base stations to transmit a paging signal for the device.