Abstract:
A method and apparatus is capable of encrypting short data in a wireless communication system When a terminal generates a short data burst in idle mode, the apparatus generates a Traffic Encryption Key (TEK) using a Cipher-based Message Authentication Code (CMAC)-TEK prekey derived from an Authorization Key (AK) related to Security Association (SA) between the terminal and a Base Station (BS). A nonce is constructed with a Packet Number (PN) identical to an uplink CMAC PN (CMAC-PN_U) transmitted together with a Ranging Request (RNG-REQ) message carrying the short data burst The short data burst is encrypted using the TEK and the nonce.
Abstract:
The present invention pertains to a group key, and relates to a group key management method of a key distribution center, comprising the steps of: receiving a key request from a mobile device; generating a private key for the mobile device when leaving time information is included in the key request; generating a public key and a verification key for the mobile device; transmitting at least one key, including the generated key, to the mobile device; verifying whether or not a counterpart belongs to the same group as a leaving time of the counterpart, a public key of the counterpart, and a verification key of the counterpart; comparing the versions of group keys when the counterpart belongs to the same group, and allowing a device having a group key of a latest version to encrypt the group key of the latest version with a session key and to transmit the encrypted group key to a counterpart device; and allowing the counterpart device, which has received the group key, to decrypt the group key and to perform an update. The use of a group key enables a communication cost required for data transmission to be reduced, and, when a group key is updated, even mobile devices, which have not received the group key from a base station, can later receive the group key from the base station or another mobile device which belongs to the same group.
Abstract:
A method and an apparatus of requiring uplink resources for transmitting a ranging request message in a communication system are provided. The method includes allocating an uplink bandwidth from a base station, and fragmentizing a Ranging Request (RNG-REQ) message into plural fragmented RNG-REQ messages, when the allocated bandwidth does not accommodate an entire RNG-REQ message, requesting an additional uplink bandwidth by transmitting one fragmented RNG-REQ message, and allocating an requested additional uplink bandwidth from the base station and transmitting a next one fragmented RNG-REQ message.
Abstract:
A method and apparatus for network reentry of a Mobile Station (MS) in a wireless communication system are provided. The method includes receiving allocation of a context search identifier from a network while a network entry procedure is performed, and transmitting a ranging request message including the allocated context search identifier to a Base Station (BS) when a network reentry event occurs.
Abstract:
An apparatus is capable of supporting an intra-BS handover of a Mobile Station (MS) that can distinguish a Relay Station (RS) and a Base Station (BS) in a multi-hop relay broadband wireless communication system. A handover of an MS in a multi-hop relay wireless communication system includes receiving a neighbor advertisement message. When a handover command message that initiates a handover to a target node is received, information on a target node is acquired, and an upper BS of the target node is identified. When the identified upper BS of the target node is the same as an upper BS of the serving node, control information that has been previously used in a serving node is used in the target node, and communication with the target node is performed.
Abstract:
An apparatus and method for generating a Media Access Control (MAC) Protocol Data Unit (MPDU) in a wireless communication system are provided. The method includes reconstructing at least one MAC Service Data Unit (MSDU) according to scheduling information of the MAC layer and generating at least one MPDU data portion, adding control information to each MPDU data portion and generating at least one MPDU payload, adding a General MAC Header (GMH) to each MPDU payload and generating at least one MPDU, and transmitting the MPDU to a receive end. The control information includes at least one piece of MSDU information constituting each MPDU data portion. The GMH includes length information on the MPDU and Connection IDentifier (CID) information.
Abstract:
A communication method in a wireless communication system supporting device-to-device (D2D) communication is provided. The communication method includes transmitting a first message including information for identifying a relay to discover a relay user equipment (UE) that performs a relay function in the D2D communication, and receiving a second message including information about the relay UE that performs the relay function, from the relay UE that has received the first message, the second message being transmitted in response to the first message.
Abstract:
The present invention relates to a method for controlling a session keep-alive by a user equipment in a mobile communication system, comprising the steps of: setting request information of a session lifetime for a new application and transmitting the set request information to a network if the new application starts; and acquiring the session lifetime from the network and adjusting a message transmission period of the user equipment to keep-alive the session by using the session lifetime.
Abstract:
A method and a Mobile Station (MS), for use in a wireless communication network comprising a plurality of Base Stations (BSs) capable of communicating with a plurality of MSs, wherein at least some of the BSs are Femtocell BSs (FBSs) and at least some of the BSs are Macrocell BSs (MBSs), for mitigating interference are provided. The method includes detecting, by an MS, an interfering Closed Subscriber Group (CSG) FBS that the MS is not authorized to access, and transmitting, by the MS, a request for mitigation of interference.
Abstract:
A wireless communication system includes a system and method for encryption of multicast data between a subscriber station and a base station that communicate a multicast service in a Machine-To-Machine (M2M) communication system. An M2M service controller manages the multicast service manages information for encrypting the multicast data and provides the information to the subscriber station and the base station.