摘要:
The present disclosure provides systems for updating firmware of a CIoT device. The CIoT device activates, based on one or more activation commands received by the first receiver and the second receiver. The CIoT device connects by the second receiver and the second transmitter, to a device. The CIoT device receives, by the second receiver, from the device, a firmware upgrade file. A CIoT device deactivates the second receiver.
摘要:
Some demonstrative embodiments include devices, systems and/or methods of communicating between a cellular manager and a User Equipment (UE) via a Wireless Local Area network (WLAN) node. For example, an Evolved Node B (eNB) may be configured to communicate with a User Equipment (UE) traffic of at least one Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (E-UTRAN) Radio Access Bearer (E-RAB); to participate in establishment of an IP tunnel with the UE via a Wireless Local Area Network (WLAN) node; to encapsulate an IP payload comprising downlink traffic of the E-RAB in an IP tunneling packet; and to send the IP tunneling packet to the UE via the IP tunnel.
摘要:
This document discusses, among other things, a Cellular Internet-of-Things (CIoT) network architecture to enable communication between an apparatus of a CIoT User Equipment (UE) and a network through a CIoT enhanced Node B (eNB) according to a lightweight Non-Access Stratum (NAS) protocol. An apparatus of a CIoT eNB can process data for communication between the CIoT UE and the network. The lightweight NAS protocol supports a reduced set of NAS messages for communication between, for example, the CIoT UE and the CIoT eNB, such as using a modified NAS message, or one or more new messages.
摘要:
A cellular IoT (CIoT) device can comprise a coverage and/or processing constrained device e.g., devices operating primarily MTC or M2M (e.g., sensor devices, controller devices, etc.). These devices can have limited or no user interface, and can be used for machines or devices with little mobility. CIoT devices can be deployed in usage scenarios such as home automation (e.g., security, appliances, energy packages, etc.), industry automation, and smart cities with low-power devices (e.g., devices having a battery life of several years), and can be easily installed and operated in challenging coverage conditions, such as lower or basement levels of buildings. CIoT devices can be provisioned to connect to a cellular carrier network and an associated CSP. The CSP can execute end2end solutions (e.g., service portal, service sign-up, etc.) while the cellular carrier can provide the bulk data pipe to the CSP.
摘要:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing using a PC5 protocol (such as PC5 Signaling Protocol). The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version.
摘要:
Device to device (D2D) communication can be performed with packet data convergence protocol (PDCP) based encapsulation without internet protocol (IP) addressing. The non-IP D2D PDCP-encapsulated communication can further include two forms of secure data transfer. A first non-IP D2D PDCP-encapsulated communication can be a negotiated non-IP D2D PDCP-encapsulated communication. A second non-IP D2D PDCP-encapsulated communication can be a non-negotiated non-IP D2D communication. The non-negotiated non-IP D2D PDCP-encapsulated communication can include a common key management server (KMS) version and a distributed KMS version. The encapsulated communication can be used with various protocols, including a PC5 protocol (such as the PC5 Signaling Protocol) and wireless access in vehicular environments (WAVE) protocols.
摘要:
This disclosure describes systems, methods, and apparatus related to receiving, at an access point and from a wireless communication station, a media access control (MAC) address of the wireless communication station; assigning, at the access point, a prefix to the MAC address of the wireless communication station; receiving, at the access point and from the wireless communication station, a frame comprising the prefix and a random MAC address; replacing, at the access point and using the prefix, the random MAC address in the frame with the MAC address of the wireless communication station, thereby resulting in a processed frame; and transmitting, at the access point and to a destination device, the processed frame.
摘要:
System and techniques for secure direct discovery UEs are described herein. A UE may initiate ProSe D2D discovery and create a discovery request that includes an asserted identity in clear text and a message integrity code. The discovery request may then be transmitted in a D2D discovery channel.
摘要:
Generally discussed herein are systems, apparatuses, and methods that can provide a key authentication and identity verification in a D2D communication regime. A method can include providing a first public key of a first D2D device to a second D2D device and receiving a second public key of the second D2D device, providing a connection request packet to the second D2D device including a first attested key and a third public key, the first attested key including the first public key signed using a private key of a public key attestation service (PAS), receiving a connection accept packet from the second D2D device including a second attested public key, and a fourth public key, the second attested public key including the second public key signed using the private key of the PAS, and verifying the identity of the second D2D device using the received keys.
摘要:
A user equipment (UE) is configured to send a direct communication request to a peer UE, wherein the direct communication request comprises a signature authenticating an identity of the UE. The UE is configured to process a direct communication response from the peer UE to authenticate an identity of the peer UE, wherein the direct communication response comprises a signature authenticating the identity of the peer UE. In response to processing the direct communication response from the peer UE to authenticate the identity of the peer UE, the UE is configured to engage in direct communication with the peer UE.