Abstract:
Methods, systems, and devices are described for communications via a mesh network. To join an existing mesh network, a wireless communication device may identify a member device from a plurality of member devices of an existing mesh network. The wireless communication device may communicate with the identified member device to participate in a single authentication procedure. Upon successfully completing the single authentication procedure, the wireless communication device may join the existing mesh network without needing any additional authentication procedures with another member device of the plurality of member devices to join the existing mesh network. This approach may be used for any mesh network, such as a social Wi-Fi mesh network.
Abstract:
Methods, systems, apparatuses, and devices are described for wireless station privacy using encryption to protect destination and source addresses of data frames. In one example, a method includes identifying a source address, a destination address, or any combination thereof to be transmitted in a plain-text portion of a data frame. The method may also include extracting the identified source address, the identified destination address, or any combination thereof. The method also includes inserting the extracted source address, the extracted destination address, or any combination thereof in a frame body of the data frame. The method may further include encrypting the inserted source address, the inserted destination address, or any combination thereof in the frame body.
Abstract:
A device establishes flows associated with one or more applications using control plane signaling. A gateway device obtains a request for a network token during the control plane signaling. The gateway device derives the network token and sends it to the device and/or an access node during the control plane signaling. The device and/or access node obtain the network token, where the network token is associated with a first flow of the one or more flows, a first application of the one or more applications, and provisioned to the device or access node via the control plane signaling. The network token may be included in a packet sent in the user plane from the device. The network token may be verified at the access node and/or the gateway device using a cryptographic function and sent to its destination based on the results of the verification.
Abstract:
A particular method includes sending, from a first device to a second device of a data link group, a path request encrypted using a group key of the data link group. The method further includes receiving, at the first device from the second device, a path reply that is responsive to the path request. The method includes selecting the second device for association based on the path reply and associating, by the first device, with the second device.
Abstract:
Methods, devices, and systems are described to enable generating and securely distributing a common network key in a wireless network. For example, instead of each station of the wireless network generating a station-specific group network key, a particular station may generate and securely transmit a common network key to be used by multiple stations in the wireless network to decrypt group messages from multiple stations in the wireless network.
Abstract:
Apparatus, methods, and computer-readable media for facilitating self-managed trust in Internet-of-Things networks are disclosed herein. An example method of trust management at a network manager includes enrolling a network endpoint with a network managed by the network manager. The example method also includes receiving trusted reference information for the network endpoint based on enrolling the network endpoint. Additionally, the example method includes performing verification of the network endpoint based on at least one of the trusted reference information or an attestation received from the network endpoint. Further, the example method includes enforcing policies to the network endpoint based on a result of the verification. Such trust management may improve privacy and security at the network, as well as reduce latency in responding to trust incidents.
Abstract:
Methods, systems, and devices for wireless communications are described. A target user equipment (UE) may receive an indication of a session key from an initiator UE in a sidelink communications system, from a network entity (e.g., a base station), or the like. In some cases, the target UE may also receive an indication of a nonce in a message of a PRS procedure. The target UE may select a positioning reference signal (PRS) sequence for the PRS procedure using the session key and optionally the nonce, such as by using a defined function at the target UE with the session key and the nonce as an input. Once the target UE selects the PRS sequence, the target UE may encode the PRS sequence and may transmit the PRS sequence to the initiator UE.
Abstract:
Techniques and apparatus for protecting sequence numbers used in authentication procedures are described. One technique includes receiving, from a network, an authentication request comprising at least a random challenge. After receipt of the authentication request, a synchronization parameter is generated based at least in part on a key shared by the network and the UE, the random challenge, and a first message authentication code (MAC). The synchronization parameter and the first MAC are transmitted to the network in response to the authentication request.
Abstract:
The present disclosure provides techniques that may be applied, for example, in a multi-slice network for maintaining privacy when attempting to access the network. An exemplary method generally includes transmitting a registration request message to a serving network to register with the serving network; receiving a first confirmation message indicating a secure connection with the serving network has been established; transmitting, after receiving the first confirmation message, a secure message to the serving network comprising an indication of at least one configured network slice that the UE wants to communicate over, wherein the at least one configured network slice is associated with a privacy flag that is set; and receiving a second confirmation message from the serving network indicating that the UE is permitted to communicate over the at least one configured network slice.
Abstract:
Methods, systems, and devices for wireless communications are described. A first node of a wireless communications network may determine a service type of the first node. The first node may transmit, to a second node during a random access procedure, an indication of the service type of the first node. The first node may then establish a connection with a unit of the second node that is for serving nodes of the wireless network associated with the service type. The connection may be established based on transmitting the indication of the service type.