This patent application claims priority to Greek patent application No. 20220100145, filed on Feb. 17, 2022, entitled “SECURING COMMUNICATIONS USING SECURITY KEYS BASED AT LEAST IN PART ON PHYSICAL LAYER PARAMETERS.” The disclosure of the prior application is considered part of and is incorporated by reference in this patent application.
Aspects of the present disclosure generally relate to wireless communication and to techniques and apparatuses for securing communications using security keys based at least in part on physical layer parameters.
Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. Typical wireless communication systems may employ multiple-access technologies capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power, or the like). Examples of such multiple-access technologies include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, single-carrier frequency division multiple access (SC-FDMA) systems, time division synchronous code division multiple access (TD-SCDMA) systems, and Long Term Evolution (LTE). LTE/LTE-Advanced is a set of enhancements to the Universal Mobile Telecommunications System (UMTS) mobile standard promulgated by the Third Generation Partnership Project (3GPP).
A wireless network may include one or more base stations that support communication for a user equipment (UE) or multiple UEs. A UE may communicate with a base station via downlink communications and uplink communications. “Downlink” (or “DL”) refers to a communication link from the base station to the UE, and “uplink” (or “UL”) refers to a communication link from the UE to the base station.
The above multiple access technologies have been adopted in various telecommunication standards to provide a common protocol that enables different UEs to communicate on a municipal, national, regional, and/or global level. New Radio (NR), which may be referred to as 5G, is a set of enhancements to the LTE mobile standard promulgated by the 3GPP. NR is designed to better support mobile broadband internet access by improving spectral efficiency, lowering costs, improving services, making use of new spectrum, and better integrating with other open standards using orthogonal frequency division multiplexing (OFDM) with a cyclic prefix (CP) (CP-OFDM) on the downlink, using CP-OFDM and/or single-carrier frequency division multiplexing (SC-FDM) (also known as discrete Fourier transform spread OFDM (DFT-s-OFDM)) on the uplink, as well as supporting beamforming, multiple-input multiple-output (MIMO) antenna technology, and carrier aggregation. As the demand for mobile broadband access continues to increase, further improvements in LTE, NR, and other radio access technologies remain useful.
Some aspects described herein relate to a method of wireless communication performed at a first network node. The method may include receiving at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. The method may include decrypting the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and wherein the second security key is based at least in part on a second set of physical layer parameter values.
Some aspects described herein relate to a method of wireless communication performed at a second network node. The method may include transmitting a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys. The method may include transmitting a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys.
Some aspects described herein relate to a first network node for wireless communication. The first network node may include a memory and one or more processors coupled to the memory. The one or more processors may be configured to receive at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. The one or more processors may be configured to decrypt the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and wherein the second security key is based at least in part on a second set of physical layer parameter values.
Some aspects described herein relate to a first network node for wireless communication. The first network node may include a memory and one or more processors coupled to the memory. The one or more processors may be configured to transmit a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys. The one or more processors may be configured to transmit a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys.
Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by a first network node. The set of instructions, when executed by one or more processors of the first network node, may cause the first network node to receive at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. The set of instructions, when executed by one or more processors of the first network node, may cause the first network node to decrypt the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and wherein the second security key is based at least in part on a second set of physical layer parameter values.
Some aspects described herein relate to a non-transitory computer-readable medium that stores a set of instructions for wireless communication by a first network node. The set of instructions, when executed by one or more processors of the first network node, may cause the first network node to transmit a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys. The set of instructions, when executed by one or more processors of the first network node, may cause the first network node to transmit a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys.
Some aspects described herein relate to an apparatus for wireless communication. The apparatus may include means for receiving at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. The apparatus may include means for decrypting the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and wherein the second security key is based at least in part on a second set of physical layer parameter values.
Some aspects described herein relate to an apparatus for wireless communication. The apparatus may include means for transmitting a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys. The apparatus may include means for transmitting a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys.
Aspects generally include a method, apparatus, system, computer program product, non-transitory computer-readable medium, user equipment, base station, wireless communication device, and/or processing system as substantially described herein with reference to and as illustrated by the drawings, specification, and appendix.
The foregoing has outlined rather broadly the features and technical advantages of examples according to the disclosure in order that the detailed description that follows may be better understood. Additional features and advantages will be described hereinafter. The conception and specific examples disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. Such equivalent constructions do not depart from the scope of the appended claims. Characteristics of the concepts disclosed herein, both their organization and method of operation, together with associated advantages, will be better understood from the following description when considered in connection with the accompanying figures. Each of the figures is provided for the purposes of illustration and description, and not as a definition of the limits of the claims.
While aspects are described in the present disclosure by illustration to some examples, those skilled in the art will understand that such aspects may be implemented in many different arrangements and scenarios. Techniques described herein may be implemented using different platform types, devices, systems, shapes, sizes, and/or packaging arrangements. For example, some aspects may be implemented via integrated chip embodiments or other non-module-component based devices (e.g., end-user devices, vehicles, communication devices, computing devices, industrial equipment, retail/purchasing devices, medical devices, and/or artificial intelligence devices). Aspects may be implemented in chip-level components, modular components, non-modular components, non-chip-level components, device-level components, and/or system-level components. Devices incorporating described aspects and features may include additional components and features for implementation and practice of claimed and described aspects. For example, transmission and reception of wireless signals may include one or more components for analog and digital purposes (e.g., hardware components including antennas, radio frequency (RF) chains, power amplifiers, modulators, buffers, processors, interleavers, adders, and/or summers). It is intended that aspects described herein may be practiced in a wide variety of devices, components, systems, distributed arrangements, and/or end-user devices of varying size, shape, and constitution.
So that the above-recited features of the present disclosure can be understood in detail, a more particular description, briefly summarized above, may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this disclosure and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects. The same reference numbers in different drawings may identify the same or similar elements.
Various aspects of the disclosure are described more fully hereinafter with reference to the accompanying drawings. This disclosure may, however, be embodied in many different forms and should not be construed as limited to any specific structure or function presented throughout this disclosure. Rather, these aspects are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. One skilled in the art should appreciate that the scope of the disclosure is intended to cover any aspect of the disclosure disclosed herein, whether implemented independently of or combined with any other aspect of the disclosure. For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth herein. In addition, the scope of the disclosure is intended to cover such an apparatus or method which is practiced using other structure, functionality, or structure and functionality in addition to or other than the various aspects of the disclosure set forth herein. It should be understood that any aspect of the disclosure disclosed herein may be embodied by one or more elements of a claim.
Aspects and examples generally include a method, apparatus, network node, system, computer program product, non-transitory computer-readable medium, user equipment, base station, wireless communication device, and/or processing system as described or substantially described herein with reference to and as illustrated by the drawings and specification.
This disclosure may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. Such equivalent constructions do not depart from the scope of the appended claims. Characteristics of the concepts disclosed herein, both their organization and method of operation, together with associated advantages, are better understood from the following description when considered in connection with the accompanying figures. Each of the figures is provided for the purposes of illustration and description, and not as a definition of the limits of the claims.
While aspects are described in the present disclosure by illustration to some examples, such aspects may be implemented in many different arrangements and scenarios. Techniques described herein may be implemented using different platform types, devices, systems, shapes, sizes, and/or packaging arrangements. For example, some aspects may be implemented via integrated chip embodiments or other non-module-component-based devices (e.g., end-user devices, vehicles, communication devices, computing devices, industrial equipment, retail/purchasing devices, medical devices, and/or artificial intelligence devices). Aspects may be implemented in chip-level components, modular components, non-modular components, non-chip-level components, device-level components, and/or system-level components. Devices incorporating described aspects and features may include additional components and features for implementation and practice of claimed and described aspects. For example, transmission and reception of wireless signals may include one or more components for analog and digital purposes (e.g., hardware components including antennas, radio frequency (RF) chains, power amplifiers, modulators, buffers, processors, interleavers, adders, and/or summers). Aspects described herein may be practiced in a wide variety of devices, components, systems, distributed arrangements, and/or end-user devices of varying size, shape, and constitution.
Several aspects of telecommunication systems will now be presented with reference to various apparatuses and techniques. These apparatuses and techniques will be described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, components, circuits, steps, processes, algorithms, or the like (collectively referred to as “elements”). These elements may be implemented using hardware, software, or combinations thereof. Whether such elements are implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
While aspects may be described herein using terminology commonly associated with a 5G or New Radio (NR) radio access technology (RAT), aspects of the present disclosure can be applied to other RATs, such as a 3G RAT, a 4G RAT, and/or a RAT subsequent to 5G (e.g., 6G).
A base station 110 may provide communication coverage for a macro cell, a pico cell, a femto cell, and/or another type of cell. A macro cell may cover a relatively large geographic area (e.g., several kilometers in radius) and may allow unrestricted access by UEs 120 with service subscriptions. A pico cell may cover a relatively small geographic area and may allow unrestricted access by UEs 120 with service subscription. A femto cell may cover a relatively small geographic area (e.g., a home) and may allow restricted access by UEs 120 having association with the femto cell (e.g., UEs 120 in a closed subscriber group (CSG)). A base station 110 for a macro cell may be referred to as a macro base station. A base station 110 for a pico cell may be referred to as a pico base station. A base station 110 for a femto cell may be referred to as a femto base station or an in-home base station. In the example shown in
In some examples, a cell may not necessarily be stationary, and the geographic area of the cell may move according to the location of a base station 110 that is mobile (e.g., a mobile base station). In some examples, the base stations 110 may be interconnected to one another and/or to one or more other base stations 110 or network nodes (not shown) in the wireless network 100 through various types of backhaul interfaces, such as a direct physical connection or a virtual network, using any suitable transport network.
The wireless network 100 may include one or more relay stations. A relay station is an entity that can receive a transmission of data from an upstream station (e.g., a base station 110 or a UE 120) and send a transmission of the data to a downstream station (e.g., a UE 120 or a base station 110). A relay station may be a UE 120 that can relay transmissions for other UEs 120. In the example shown in
The wireless network 100 may be a heterogeneous network that includes base stations 110 of different types, such as macro base stations, pico base stations, femto base stations, relay base stations, or the like. These different types of base stations 110 may have different transmit power levels, different coverage areas, and/or different impacts on interference in the wireless network 100. For example, macro base stations may have a high transmit power level (e.g., 5 to 40 watts) whereas pico base stations, femto base stations, and relay base stations may have lower transmit power levels (e.g., 0.1 to 2 watts).
A network controller 130 may couple to or communicate with a set of base stations 110 and may provide coordination and control for these base stations 110. The network controller 130 may communicate with the base stations 110 via a backhaul communication link. The base stations 110 may communicate with one another directly or indirectly via a wireless or wireline backhaul communication link. For example, in some aspects, the wireless network 100 may be, include, or be included in a wireless backhaul network, sometimes referred to as an integrated access and backhaul (IAB) network. In an IAB network, at least one base station (e.g., base station 110) may be an anchor base station that communicates with a core network via a wired backhaul link, such as a fiber connection. An anchor base station may also be referred to as an IAB donor (or IAB-donor), a central entity, a central unit, and/or the like. An IAB network may include one or more non-anchor base stations, sometimes referred to as relay base stations or IAB nodes (or IAB-nodes). The non-anchor base station may communicate directly with or indirectly with (e.g., via one or more non-anchor base stations) the anchor base station via one or more backhaul links to form a backhaul path to the core network for carrying backhaul traffic. Backhaul links may be wireless links. Anchor base station(s) and/or non-anchor base station(s) may communicate with one or more UEs (e.g., UE 120) via access links, which may be wireless links for carrying access traffic.
In some aspects, a radio access network that includes an IAB network may utilize millimeter wave technology and/or directional communications (e.g., beamforming, precoding and/or the like) for communications between base stations and/or UEs (e.g., between two base stations, between two UEs, and/or between a base station and a UE). For example, wireless backhaul links between base stations may use millimeter waves to carry information and/or may be directed toward a target base station using beamforming, precoding, and/or the like. Similarly, wireless access links between a UE and a base station may use millimeter waves and/or may be directed toward a target wireless node (e.g., a UE and/or a base station). In this way, inter-link interference may be reduced.
An IAB network may include an IAB donor that connects to a core network via a wired connection (e.g., a wireline backhaul). For example, an Ng interface of an IAB donor may terminate at a core network. Additionally, or alternatively, an IAB donor may connect to one or more devices of the core network that provide a core access and mobility management function (AMF). In some aspects, an IAB donor may include a base station 110, such as an anchor base station. An IAB donor may include a central unit (CU), which may perform access node controller (ANC) functions and/or AMF functions. The CU may configure a distributed unit (DU) of the IAB donor and/or may configure one or more IAB nodes (e.g., a mobile termination (MT) function and/or a DU function of an IAB node) that connect to the core network via the IAB donor. Thus, a CU of an IAB donor may control and/or configure the entire IAB network (or a portion thereof) that connects to the core network via the IAB donor, such as by using control messages and/or configuration messages (e.g., a radio resource control (RRC) configuration message or an F1 application protocol (FIAP) message).
The MT functions of an IAB node (e.g., a child node) may be controlled and/or scheduled by another IAB node (e.g., a parent node of the child node) and/or by an IAB donor. The DU functions of an IAB node (e.g., a parent node) may control and/or schedule other IAB nodes (e.g., child nodes of the parent node) and/or UEs 120. Thus, a DU may be referred to as a scheduling node or a scheduling component, and an MT may be referred to as a scheduled node or a scheduled component. In some aspects, an IAB donor may include DU functions and not MT functions. That is, an IAB donor may configure, control, and/or schedule communications of IAB nodes and/or UEs 120. A UE 120 may include only MT functions, and not DU functions. That is, communications of a UE 120 may be controlled and/or scheduled by an IAB donor and/or an IAB node (e.g., a parent node of the UE 120).
When a first node controls and/or schedules communications for a second node (e.g., when the first node provides DU functions for the second node's MT functions), the first node may be referred to as a parent node of the second node, and the second node may be referred to as a child node of the first node. A child node of the second node may be referred to as a grandchild node of the first node. Thus, a DU function of a parent node may control and/or schedule communications for child nodes of the parent node. A parent node may be an IAB donor or an IAB node, and a child node may be an IAB node or a UE 120. Communications of an MT function of a child node may be controlled and/or scheduled by a parent node of the child node.
A link between a UE 120 and an IAB donor, or between a UE 120 and an IAB node, may be referred to as an access link. An access link may be a wireless access link that provides a UE 120 with radio access to a core network via an IAB donor, and optionally via one or more IAB nodes. Thus, the network 100 may be referred to as a multi-hop network or a wireless multi-hop network.
A link between an IAB donor and an IAB node or between two IAB nodes may be referred to as a backhaul link. A backhaul link may be a wireless backhaul link that provides an IAB node with radio access to a core network via an IAB donor, and optionally via one or more other IAB nodes. In an IAB network, network resources for wireless communications (e.g., time resources, frequency resources, and/or spatial resources) may be shared between access links and backhaul links. In some aspects, a backhaul link may be a primary backhaul link or a secondary backhaul link (e.g., a backup backhaul link). In some aspects, a secondary backhaul link may be used if a primary backhaul link fails, becomes congested, and/or becomes overloaded, among other examples.
The UEs 120 may be dispersed throughout the wireless network 100, and each UE 120 may be stationary or mobile. A UE 120 may include, for example, an access terminal, a terminal, a mobile station, and/or a subscriber unit. A UE 120 may be a cellular phone (e.g., a smart phone), a personal digital assistant (PDA), a wireless modem, a wireless communication device, a handheld device, a laptop computer, a cordless phone, a wireless local loop (WLL) station, a tablet, a camera, a gaming device, a netbook, a smartbook, an ultrabook, a medical device, a biometric device, a wearable device (e.g., a smart watch, smart clothing, smart glasses, a smart wristband, smart jewelry (e.g., a smart ring or a smart bracelet)), an entertainment device (e.g., a music device, a video device, and/or a satellite radio), a vehicular component or sensor, a smart meter/sensor, industrial manufacturing equipment, a global positioning system device, and/or any other suitable device that is configured to communicate via a wireless medium.
Some UEs 120 may be considered machine-type communication (MTC) or evolved or enhanced machine-type communication (cMTC) UEs. An MTC UE and/or an eMTC UE may include, for example, a robot, a drone, a remote device, a sensor, a meter, a monitor, and/or a location tag, that may communicate with a base station, another device (e.g., a remote device), or some other entity. Some UEs 120 may be considered Internet-of-Things (IoT) devices, and/or may be implemented as NB-IoT (narrow band IoT) devices. Some UEs 120 may be considered a Customer Premises Equipment. A UE 120 may be included inside a housing that houses components of the UE 120, such as processor components and/or memory components. In some examples, the processor components and the memory components may be coupled together. For example, the processor components (e.g., one or more processors) and the memory components (e.g., a memory) may be operatively coupled, communicatively coupled, electronically coupled, and/or electrically coupled.
In general, any number of wireless networks 100 may be deployed in a given geographic area. Each wireless network 100 may support a particular RAT and may operate on one or more frequencies. A RAT may be referred to as a radio technology, an air interface, or the like. A frequency may be referred to as a carrier, a frequency channel, or the like. Each frequency may support a single RAT in a given geographic area in order to avoid interference between wireless networks of different RATs. In some cases, NR or 5G RAT networks may be deployed.
In some examples, two or more UEs 120 (e.g., shown as UE 120a and UE 120e) may communicate directly using one or more sidelink channels (e.g., without using a base station 110 as an intermediary to communicate with one another). For example, the UEs 120 may communicate using peer-to-peer (P2P) communications, device-to-device (D2D) communications, a vehicle-to-everything (V2X) protocol (e.g., which may include a vehicle-to-vehicle (V2V) protocol, a vehicle-to-infrastructure (V2I) protocol, or a vehicle-to-pedestrian (V2P) protocol), and/or a mesh network. In such examples, a UE 120 may perform scheduling operations, resource selection operations, and/or other operations described elsewhere herein as being performed by the base station 110.
Devices of the wireless network 100 may communicate using the electromagnetic spectrum, which may be subdivided by frequency or wavelength into various classes, bands, channels, or the like. For example, devices of the wireless network 100 may communicate using one or more operating bands. In 5G NR, two initial operating bands have been identified as frequency range designations FRI (410 MHz-7.125 GHz) and FR2 (24.25 GHz-52.6 GHz). It should be understood that although a portion of FR1 is greater than 6 GHZ, FRI is often referred to (interchangeably) as a “Sub-6 GHz” band in various documents and articles. A similar nomenclature issue sometimes occurs with regard to FR2, which is often referred to (interchangeably) as a “millimeter wave” band in documents and articles, despite being different from the extremely high frequency (EHF) band (30 GHz-300 GHz) which is identified by the International Telecommunications Union (ITU) as a “millimeter wave” band.
The frequencies between FR1 and FR2 are often referred to as mid-band frequencies. Recent 5G NR studies have identified an operating band for these mid-band frequencies as frequency range designation FR3 (7.125 GHZ-24.25 GHZ). Frequency bands falling within FR3 may inherit FR1 characteristics and/or FR2 characteristics, and thus may effectively extend features of FR1 and/or FR2 into mid-band frequencies. In addition, higher frequency bands are currently being explored to extend 5G NR operation beyond 52.6 GHz. For example, three higher operating bands have been identified as frequency range designations FR4a or FR4-1 (52.6 GHz-71 GHz). FR4 (52.6 GHz-114.25 GHz), and FR5 (114.25 GHz-300 GHz). Each of these higher frequency bands falls within the EHF band.
With the above examples in mind, unless specifically stated otherwise, it should be understood that the term “sub-6 GHz” or the like, if used herein, may broadly represent frequencies that may be less than 6 GHz, may be within FR1, or may include mid-band frequencies. Further, unless specifically stated otherwise, it should be understood that the term “millimeter wave” or the like, if used herein, may broadly represent frequencies that may include mid-band frequencies, may be within FR2. FR4. FR4-a or FR4-1, and/or FR5, or may be within the EHF band. It is contemplated that the frequencies included in these operating bands (e.g., FR1, FR2, FR3, FR4, FR4-a, FR4-1, and/or FR5) may be modified, and techniques described herein are applicable to those modified frequency ranges.
As described herein, a network node, which may be referred to as a “node.” a “network node.” or a “wireless node.” may be a base station (e.g., base station 110), a UE (e.g., UE 120), a relay device, a network controller, an apparatus, a device, a computing system, one or more components of any of these, and/or another processing entity configured to perform one or more aspects of the techniques described herein. For example, a network node may be a UE. As another example, a network node may be a base station. A network node may be an aggregated base station and/or one or more components of a disaggregated base station. As an example, a first network node may be configured to communicate with a second network node or a third network node. The adjectives “first,” “second,” “third,” and so on are used for contextual distinction between two or more of the modified noun in connection with a discussion and are not meant to be absolute modifiers that apply only to a certain respective node throughout the entire document. For example, a network node may be referred to as a “first network node” in connection with one discussion and may be referred to as a “second network node” in connection with another discussion, or vice versa. Reference to a UE, base station, apparatus, device, computing system, or the like may include disclosure of the UE, base station, apparatus, device, computing system, or the like being a network node. For example, disclosure that a UE is configured to receive information from a base station also discloses that a first network node is configured to receive information from a second network node. Consistent with this disclosure, once a specific example is broadened in accordance with this disclosure (e.g., a UE is configured to receive information from a base station also discloses that a first network node is configured to receive information from a second network node), the broader example of the narrower example may be interpreted in the reverse, but in a broad open-ended way. In the example above where a UE being configured to receive information from a base station also discloses a first network node being configured to receive information from a second network node, “first network node” may refer to a first UE, a first base station, a first apparatus, a first device, a first computing system, a first one or more components, a first processing entity, or the like configured to receive the information from the second network; and “second network node” may refer to a second UE, a second base station, a second apparatus, a second device, a second computing system, a second one or more components, a second processing entity, or the like.
In some aspects, the first network node may include a communication manager 140 or a communication manager 150. As described in more detail elsewhere herein, the communication manager 140 or 150 may receive at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and a second set of the plurality of communications is secured by a second security key of the plurality of security keys; and decrypt the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and the second security key is based at least in part on a second set of physical layer parameter values.
As described in more detail elsewhere herein, the communication manager 140 or 150 may transmit a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys; and transmit a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. Additionally, or alternatively, the communication manager 140 or 150 may perform one or more other operations described herein.
As indicated above,
At the base station 110, a transmit processor 220 may receive data, from a data source 212, intended for the UE 120 (or a set of UEs 120). The transmit processor 220 may select one or more modulation and coding schemes (MCSs) for the UE 120 based at least in part on one or more channel quality indicators (CQIs) received from that UE 120. The base station 110 may process (e.g., encode and modulate) the data for the UE 120 based at least in part on the MCS(s) selected for the UE 120 and may provide data symbols for the UE 120. The transmit processor 220 may process system information (e.g., for semi-static resource partitioning information (SRPI)) and control information (e.g., CQI requests, grants, and/or upper layer signaling) and provide overhead symbols and control symbols. The transmit processor 220 may generate reference symbols for reference signals (e.g., a cell-specific reference signal (CRS) or a demodulation reference signal (DMRS)) and synchronization signals (e.g., a primary synchronization signal (PSS) or a secondary synchronization signal (SSS)). A transmit (TX) multiple-input multiple-output (MIMO) processor 230 may perform spatial processing (e.g., precoding) on the data symbols, the control symbols, the overhead symbols, and/or the reference symbols, if applicable, and may provide a set of output symbol streams (e.g., T output symbol streams) to a corresponding set of modems 232 (e.g., T modems), shown as modems 232a through 232t. For example, each output symbol stream may be provided to a modulator component (shown as MOD) of a modem 232. Each modem 232 may use a respective modulator component to process a respective output symbol stream (e.g., for OFDM) to obtain an output sample stream. Each modem 232 may further use a respective modulator component to process (e.g., convert to analog, amplify, filter, and/or upconvert) the output sample stream to obtain a downlink signal. The modems 232a through 232t may transmit a set of downlink signals (e.g., T downlink signals) via a corresponding set of antennas 234 (e.g., T antennas), shown as antennas 234a through 234t.
In some aspects, the term “base station” (e.g., the base station 110), “network entity.” or “network node” may refer to an aggregated base station, a disaggregated base station, an IAB node, a relay node, and/or one or more components thereof. For example, in some aspects, “base station,” “network entity,” or “network node” may refer to a CU, a DU, a radio unit (RU), a Near-Real Time (Near-RT) RAN Intelligent Controller (RIC), or a Non-Real Time (Non-RT) RIC, or a combination thereof. In some aspects, the term “base station,” “network entity,” or “network node” may refer to one device configured to perform one or more functions, such as those described herein in connection with the base station 110. In some aspects, the term “base station,” “network entity,” or “network node” may refer to a plurality of devices configured to perform the one or more functions. For example, in some distributed systems, each of a number of different devices (which may be located in the same geographic location or in different geographic locations) may be configured to perform at least a portion of a function, or to duplicate performance of at least a portion of the function, and the term “base station,” “network entity,” or “network node” may refer to any one or more of those different devices. In some aspects, the term “base station,” “network entity,” or “network node” may refer to one or more virtual base stations and/or one or more virtual base station functions. For example, in some aspects, two or more base station functions may be instantiated on a single device. In some aspects, the term “base station,” “network entity,” or “network node” may refer to one of the base station functions and not another. In this way, a single device may include more than one base station.
At the UE 120, a set of antennas 252 (shown as antennas 252a through 252r) may receive the downlink signals from the base station 110 and/or other base stations 110 and may provide a set of received signals (e.g., R received signals) to a set of modems 254 (e.g., R modems), shown as modems 254a through 254r. For example, each received signal may be provided to a demodulator component (shown as DEMOD) of a modem 254. Each modem 254 may use a respective demodulator component to condition (e.g., filter, amplify, downconvert, and/or digitize) a received signal to obtain input samples. Each modem 254 may use a demodulator component to further process the input samples (e.g., for OFDM) to obtain received symbols. A MIMO detector 256 may obtain received symbols from the modems 254, may perform MIMO detection on the received symbols if applicable, and may provide detected symbols. A receive processor 258 may process (e.g., demodulate and decode) the detected symbols, may provide decoded data for the UE 120 to a data sink 260, and may provide decoded control information and system information to a controller/processor 280. The term “controller/processor” may refer to one or more controllers, one or more processors, or a combination thereof. A channel processor may determine a reference signal received power (RSRP) parameter, a received signal strength indicator (RSSI) parameter, a reference signal received quality (RSRQ) parameter, and/or a CQI parameter, among other examples. In some examples, one or more components of the UE 120 may be included in a housing 284.
The network controller 130 may include a communication unit 294, a controller/processor 290, and a memory 292. The network controller 130 may include, for example, one or more devices in a core network. The network controller 130 may communicate with the base station 110 via the communication unit 294.
One or more antennas (e.g., antennas 234a through 234t and/or antennas 252a through 252r) may include, or may be included within, one or more antenna panels, one or more antenna groups, one or more sets of antenna elements, and/or one or more antenna arrays, among other examples. An antenna panel, an antenna group, a set of antenna elements, and/or an antenna array may include one or more antenna elements (within a single housing or multiple housings), a set of coplanar antenna elements, a set of non-coplanar antenna elements, and/or one or more antenna elements coupled to one or more transmission and/or reception components, such as one or more components of
Each of the antenna elements may include one or more sub-elements for radiating or receiving radio frequency signals. For example, a single antenna element may include a first sub-element cross-polarized with a second sub-element that can be used to independently transmit cross-polarized signals. The antenna elements may include patch antennas, dipole antennas, or other types of antennas arranged in a linear pattern, a two-dimensional pattern, or another pattern. A spacing between antenna elements may be such that signals with a desired wavelength transmitted separately by the antenna elements may interact or interfere (e.g., to form a desired beam). For example, given an expected range of wavelengths or frequencies, the spacing may provide a quarter wavelength, half wavelength, or other fraction of a wavelength of spacing between neighboring antenna elements to allow for interaction or interference of signals transmitted by the separate antenna elements within that expected range.
Antenna elements and/or sub-elements may be used to generate beams. “Beam” may refer to a directional transmission such as a wireless signal that is transmitted in a direction of a receiving device. A beam may include a directional signal, a direction associated with a signal, a set of directional resources associated with a signal (e.g., angle of arrival, horizontal direction, vertical direction), and/or a set of parameters that indicate one or more aspects of a directional signal, a direction associated with a signal, and/or a set of directional resources associated with a signal.
As indicated above, antenna elements and/or sub-elements may be used to generate beams. For example, antenna elements may be individually selected or deselected for transmission of a signal (or signals) by controlling an amplitude of one or more corresponding amplifiers. Beamforming includes generation of a beam using multiple signals on different antenna elements, where one or more, or all, of the multiple signals are shifted in phase relative to each other. The formed beam may carry physical or higher layer reference signals or information. As each signal of the multiple signals is radiated from a respective antenna element, the radiated signals interact, interfere (constructive and destructive interference), and amplify each other to form a resulting beam. The shape (such as the amplitude, width, and/or presence of side lobes) and the direction (such as an angle of the beam relative to a surface of an antenna array) can be dynamically controlled by modifying the phase shifts or phase offsets of the multiple signals relative to each other.
Beamforming may be used for communications between a UE and a base station, such as for millimeter wave communications and/or the like. In such a case, the base station may provide the UE with a configuration of transmission configuration indicator (TCI) states that respectively indicate beams that may be used by the UE, such as for receiving a physical downlink shared channel (PDSCH). The base station may indicate an activated TCI state to the UE, which the UE may use to select a beam for receiving the PDSCH.
A beam indication may be, or include, a TCI state information element, a beam identifier (ID), spatial relation information, a TCI state ID, a closed loop index, a panel ID, a TRP ID, and/or a sounding reference signal (SRS) set ID, among other examples. A TCI state information element (referred to as a TCI state herein) may indicate information associated with a beam such as a downlink beam. For example, the TCI state information element may indicate a TCI state identification (e.g., a tci-StateID), a quasi-co-location (QCL) type (e.g., a qcl-Type1, qcl-Type2, qcl-TypeA, qcl-TypeB, qcl-TypeC, qel-TypeD, and/or the like), a cell identification (e.g., a ServCellIndex), a bandwidth part identification (bwp-Id), a reference signal identification such as a CSI-RS (e.g., an NZP-CSI-RS-ResourceId, an SSB-Index, and/or the like), and/or the like. Spatial relation information may similarly indicate information associated with an uplink beam.
The beam indication may be a joint or separate downlink (DL)/uplink (UL) beam indication in a unified TCI framework. In some cases, the network may support layer 1 (L1)-based beam indication using at least UE-specific (unicast) downlink control information (DCI) to indicate joint or separate DL/UL beam indications from active TCI states. In some cases, existing DCI formats 1_1 and/or 1_2 may be reused for beam indication. The network may include a support mechanism for a UE to acknowledge successful decoding of a beam indication. For example, the acknowledgment/negative acknowledgment (ACK/NACK) of the PDSCH scheduled by the DCI carrying the beam indication may be also used as an ACK for the DCI.
Beam indications may be provided for carrier aggregation (CA) scenarios. In a unified TCI framework, information the network may support common TCI state ID update and activation to provide common QCL and/or common UL transmission spatial filter or filters across a set of configured component carriers (CCs). This type of beam indication may apply to intra-band CA, as well as to joint DL/UL and separate DL/UL beam indications. The common TCI state ID may imply that one reference signal (RS) determined according to the TCI state(s) indicated by a common TCI state ID is used to provide QCL Type-D indication and to determine UL transmission spatial filters across the set of configured CCs.
On the uplink, at the UE 120, a transmit processor 264 may receive and process data from a data source 262 and control information (e.g., for reports that include RSRP, RSSI, RSRQ, and/or CQI) from the controller/processor 280. The transmit processor 264 may generate reference symbols for one or more reference signals. The symbols from the transmit processor 264 may be precoded by a TX MIMO processor 266 if applicable, further processed by the modems 254 (e.g., for DFT-s-OFDM or CP-OFDM), and transmitted to the base station 110. In some examples, the modem 254 of the UE 120 may include a modulator and a demodulator. In some examples, the UE 120 includes a transceiver. The transceiver may include any combination of the antenna(s) 252, the modem(s) 254, the MIMO detector 256, the receive processor 258, the transmit processor 264, and/or the TX MIMO processor 266. The transceiver may be used by a processor (e.g., the controller/processor 280) and the memory 282 to perform aspects of any of the methods described herein (e.g., with reference to
At the base station 110, the uplink signals from UE 120 and/or other UEs may be received by the antennas 234, processed by the modem 232 (e.g., a demodulator component, shown as DEMOD, of the modem 232), detected by a MIMO detector 236 if applicable, and further processed by a receive processor 238 to obtain decoded data and control information sent by the UE 120. The receive processor 238 may provide the decoded data to a data sink 239 and provide the decoded control information to the controller/processor 240. The base station 110 may include a communication unit 244 and may communicate with the network controller 130 via the communication unit 244. The base station 110 may include a scheduler 246 to schedule one or more UEs 120 for downlink and/or uplink communications. In some examples, the modem 232 of the base station 110 may include a modulator and a demodulator. In some examples, the base station 110 includes a transceiver. The transceiver may include any combination of the antenna(s) 234, the modem(s) 232, the MIMO detector 236, the receive processor 238, the transmit processor 220, and/or the TX MIMO processor 230. The transceiver may be used by a processor (e.g., the controller/processor 240) and the memory 242 to perform aspects of any of the methods described herein (e.g., with reference to
The controller/processor 240 of the base station 110, the controller/processor 280 of the UE 120, and/or any other component(s) of
In some aspects, the first network node includes means for receiving at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and a second set of the plurality of communications is secured by a second security key of the plurality of security keys (e.g., using antenna 234 or 252, modem 232 or 254, MIMO detector 236 or 256, receive processor 238 or 258, controller/processor 240 or 280, memory 242 or 282, or the like); and/or means for decrypting the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and the second security key is based at least in part on a second set of physical layer parameter values (e.g., using antenna 234 or 252, modem 232 or 254, MIMO detector 236 or 256, receive processor 238 or 258, controller/processor 240 or 280, memory 242 or 282, or the like).
In some aspects, the first network node includes means for transmitting a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys (e.g., using controller/processor 240 or 280, transmit processor 220 or 264, TX MIMO processor 230 or 266, modem 232 or 254, antenna 234 or 252, memory 242 or 282, or the like); and/or means for transmitting a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys (e.g., using controller/processor 240 or 280, transmit processor 220 or 264, TX MIMO processor 230 or 266, modem 232 or 254, antenna 234 or 252, memory 242 or 282, or the like). In some aspects, the means for the first network node to perform operations described herein may include, for example, one or more of communication manager 150, transmit processor 220, TX MIMO processor 230, modem 232, antenna 234, MIMO detector 236, receive processor 238, controller/processor 240, memory 242, or scheduler 246. In some aspects, the means for the first network node to perform operations described herein may include, for example, one or more of communication manager 140, antenna 252, modem 254, MIMO detector 256, receive processor 258, transmit processor 264, TX MIMO processor 266, controller/processor 280, or memory 282.
While blocks in
As indicated above,
The network node 305 and the network node 310 can communicate using a network 315 that employs a protocol stack, as represented in the grid 320. For example, the protocol stack can include a set of layers, referred to as Layer 1 (shown as “L1”), Layer 2 (shown as “L2”), and Layer 3 (shown as “L3”). L1 can refer to a physical layer (often referred to as a “PHY” or a “PHY layer”). L2 can include protocol layers associated with control and protocol layers associated with a packet header. The L2 layers can include medium access control (MAC) layers, radio link control (RLC) layers, packet data convergence protocol (PDCP) layers, and service data adaptation protocol (SDAP) layers. L3 can include an RRC layer and a user plane (UP) layer.
Generally, a first layer is referred to as higher than a second layer if the first layer is further from the PHY layer than the second layer. For example, the Layer 1 can be referred to as a lowest layer, and the Layer 2 can be referred to as higher than the Layer 1 and lower than the Layer 3. An application (APP) layer, not shown in
The RRC layer (shown as “L3 RRC”) can handle communications related to configuring and operating a network node 305 (e.g., a UE 120). For example, as shown, during an idle state or an inactive state of the network node 305, the RRC layer can handle, among other possible functions, system information broadcast and paging. Within a transition mode (e.g., a transition from an idle mode to a connected mode), the RRC layer can be used to provide a common control channel (CCCH), and within a connected mode, the RRC layer can be used to provide a dedicated control channel (DCCH). The UP aspects of the Layer 3 (shown as “L3 UP data”) can be used, in a connected mode, to provide a dedicated traffic channel (DTCH).
Control aspects of the Layer 2 (shown as “L2 control”) can be used, in a transition mode, to facilitate transmitting and receiving MAC control elements (MAC CEs) and, in a connected mode, to control PDCP protocol data unit (PDU) routing. The header aspects of the Layer 2 (shown as “L2 header”) can be used, in a transition mode, to facilitate MAC operations and, in a connected mode, to facilitate PDCP operations, RLC operations, and MAC operations.
The Layer 1 (shown as “L1 PHY”) can be used, in an idle mode or an inactive mode, to facilitate transmission of DCI and paging messages. In a transition mode, the Layer I can be used for DCI transmission to facilitate initial access to an access network. In a connected mode, the Layer I can be used to facilitate transmitting and receiving DCI and physical uplink control channel (PUCCH) communications.
Secure communications are important in wireless communications such as those depicted in
In some cases, for example, the attacker node 325 can use information obtained from eavesdropping to pose as the network node 305 and/or the network node 310, interrupting the flow of legitimate communications. As shown for example, an attacker node 325 posing as an access network node can cause the set 340 of functions in the first two columns of the grid 320 to be rendered out of service. An attacker node 325 posing as an access network node also can degrade throughput with respect to the set 345 of functions associated with Layer 2 and Layer 1 in connected mode. Physical layer attacks of control information can cause communication disruptions, consumption of useful communication resources, transmission delays and/or other negative impacts to network performance.
Some aspects of the techniques and apparatuses described herein provide for securing communications using security keys based at least in part on physical layer parameters. For example, in some aspects, communications associated with the physical layer may be secured using a security key that is based at least in part on a set of physical layer parameter values. In some aspects, a security key may be used to secure a channel and/or a reference signal. For example, in some aspects, each channel of a plurality of channels may be secured by a different security key of a plurality of security keys. Similarly, in some aspects, each reference signal of a plurality of reference signals may be secured by a different security key of a plurality of security keys. In this way, physical layer communications may be secured using security keys that are based on characteristics of the physical channels themselves. Because a physical channel between the network node 305 and the network node 310 will be different than a physical channel between the attacker node 325 and either of the network node 305 and/or the network node 310, some aspects described herein may facilitate protecting communications from attack. As a result, some aspects may reduce communication disruptions, consumption of resources, and/or transmission delays, thereby having a positive impact on network performance.
As indicated above,
As shown by reference number 415, the transmitter network node 410 may transmit, and the receiver network node 405 may receive, a configuration. In some aspects, the configuration may include a number of key configurations. For example, in some aspects, the configuration may include a first key configuration and a second key configuration. The first key configuration may include a first set of key configuration parameters, and the second key configuration may include a second set of key configuration parameters. In this way, for example, different security keys may be generated and used with different channels and/or reference signals, among other examples. In some aspects, the first set of key configuration parameters may indicate a first security key refresh time, and the second set of key configuration parameters may indicate a second security key refresh time. A security key refresh time may represent a time during which a security key is valid, so that, at the end of the time period, the security key is refreshed (e.g., re-generated using updated configuration parameters). Each security key may have a different refresh time.
In some aspects, a key configuration may include a key derivation function (KDF). For example, in some aspects, the KDF may be based on a hash-based message authentication code (HMAC)-secure hash algorithm (SHA)-256 (HMAC-SHA-256). In some aspects, the KDF may include any number of other types of functions that may be configured to generate a security key based at least in part on one or more physical layer parameter values as input. In some aspects, the first set of key configuration parameters may indicate a first set of KDF inputs corresponding to the first KDF, and the second set of key configuration parameters may indicate a second set of KDF inputs corresponding to the second KDF. The second set of KDF inputs may be different than the first set of KDF inputs, thereby facilitating generation of two different keys.
In some aspects, a set of physical layer parameter values that may be used as inputs to a KDF may indicate a component carrier index, a bandwidth part value, a resource pool index associated with a resource pool configured for sidelink operations, a resource pool parameter value associated with the resource pool, a time division duplexing (TDD) pattern parameter value, a frame index, a slot index, a sub-slot index, a slot offset, a reference signal configuration, a periodic signaling parameter value associated with a periodic signal configuration, a resource element frequency index, and/or a resource element time index, among other examples. In some aspects, for example, the resource pool parameter value may indicate a power control parameter value, a channel busy ratio, a subcarrier spacing, a number of configured shared channel symbols, a number of configured subchannels, a configured subchannel size, and/or a starting subchannel, among other examples. In some aspects, the TDD pattern parameter value may indicate a TDD pattern index, a number of configured downlink symbols, a number of configured uplink symbols, and/or a number of configured flexible symbols, among other examples.
In some aspects, the periodic signaling parameter value may indicate a semi-persistent scheduling (SPS) index, a configured grant (CG) index, an SPS periodicity, a CG periodicity, a security key seed associated with the periodic signal configuration, and/or an occasion index corresponding to an occasion occurring after a periodic signaling activation time, among other examples. The periodic signaling activation time may correspond to a DCI activation type. In some aspects, the periodic signaling activation time may correspond to an RRC activation type.
In some aspects, the configuration may include a reference signal configuration (e.g., in aspects in which security keys are assigned to specified reference signals). For example, the reference signal configuration may correspond to a demodulation reference signal, a sounding reference signal, and/or a channel state information reference signal, among other examples.
In some aspects, the configuration may include a security key pattern configuration that indicates one or more bundle patterns. For example, for securing two different channels and/or reference signals with two different keys, security key pattern configuration may indicate a first bundle pattern and a second bundle pattern. A bundle pattern may refer to a pattern of grouped (“bundled”) resources within a set of resources. The resources may include time domain resources and/or frequency domain resources. For example, as shown in
The security key patterns may be configured (e.g., using RRC messages and/or MAC CEs, preconfigured (loaded onto network devices at a manufacturing phase)), and/or defined in a wireless communication standard. In some aspects, a bundle index associated with a bundle to be secured using a security key may be used as an input to the corresponding KDF. In some aspects, the configuration may include a bundle configuration that indicates a set of bundle patterns for access link communications. In some aspects, the bundle configuration may indicate a set of bundles associated with a sidelink resource pool.
As shown by reference number 425, the transmitter network node 410 may transmit, and the receiver network node 405 may receive, at least one communication of a plurality of communications. The at least one communication may be associated with at least one physical layer channel. A first set of the plurality of communications may include the at least one communication and may be secured by a first security key of a plurality of security keys, and a second set of the plurality of communications may be secured by a second security key of the plurality of security keys. In some aspects, the first set of communications may correspond to a first resource element bundle (e.g., corresponding to a first bundle pattern) and the second set of communications may correspond to a second resource element bundle (e.g., corresponding to a second bundle pattern).
In some aspects, the first set of communications may correspond to a first priority level and the second set of communications may correspond to a second priority level. A first security key refresh time associated with the first set of communications may be shorter than a second security key refresh time associated with the second set of communications. For example, the first priority level may be higher than the second priority level and, therefore, the associated set of communications may include communications that should be more secure than the second set of communications. By associating higher priority communications with shorter security key refresh times, corresponding security keys may be changed more often, making attacks on these communications more difficult. The priority level may relate, for example, to quality of service (QOS) and/or security application requirements, among other examples.
As shown by reference number 430, the receiver network node 405 may decrypt the at least one communication. For example, the receiver network node 405 may decrypt the at least one communication based at least in part on the first security key. In some aspects, as explained above, the first security key may be based at least in part on a first set of physical layer parameter values. In some aspects, for example, the receiver network node 405 may determine an activated bundle pattern of a first bundle pattern and a second bundle pattern. In some aspects, for example, the receiver network node 405 may receive an indication of the activated bundle pattern. The transmitter network node 410 may transmit the indication of the activated bundle pattern using an indication signal. The indication signal may include a layer 3 signal, a layer 2 signal, or a layer 1 signal.
In some aspects, the first security key may include a first subset of security key bits of a set of security key bits corresponding to a security key stream based at least in part on a KDF. A second security key may include a second subset of security key bits of the set of security key bits. For example, as shown, the receiver network node 405 may generate a stream 435 of security key bits. The receiver network node 405 may map the security key bits of the stream 435 to REs based at least in part on a corresponding data modulation order quadrature amplitude modulation (QAM) (e.g., a current modulation and coding scheme). As shown, for example, if the communication channel is configured with 16 QAM, then the first four security key bits 440 will be mapped to a first RE 445, the next four security key bits 450 will be mapped to a next RE 455, and so on.
In some aspects, the at least one communication may include a QAM signal, and the first subset of security key bits may be appended to the QAM signal. In some aspects, the at least one communication may include a QAM signal, and the QAM signal may be phase shift rotated based at least in part on the first subset of security key bits. In some aspects, the at least one communication may include a network coded QAM signal representing an exclusive-OR (XOR) of the first subset of security key bits with a set of data bits.
In some aspects, decrypting the at least one communication may include mapping the set of security key bits of the security key stream to a plurality of communications of the at least one communication, refreshing the KDF to determine an updated security key stream, and applying a subset of security key bits of a set of security key bits corresponding to the updated security key stream to an additional communication of the at least one communication. In some aspects, one or more mapping rules may determine the mapping of security key bits. The mapping rule may be configured using a mapping configuration and/or defined in a wireless communication standard.
As indicated above,
As shown in
As further shown in
Process 500 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
In some aspects, the first set of physical layer parameter values indicates a component carrier index, a bandwidth part value, a resource pool index associated with a resource pool configured for sidelink operations, a resource pool parameter value associated with the resource pool, a TDD pattern parameter value, a frame index, a slot index, a sub-slot index, a slot offset, a reference signal configuration, a periodic signaling parameter value associated with a periodic signal configuration, a resource element frequency index, a resource element time index, or any combination thereof. In some aspects, the resource pool parameter value indicates at least one of a power control parameter value, a channel busy ratio, a subcarrier spacing, a number of configured shared channel symbols, a number of configured subchannels, a configured subchannel size, or a starting subchannel. In some aspects, the TDD pattern parameter value indicates at least one of a TDD pattern index, a number of configured downlink symbols, a number of configured uplink symbols, or a number of configured flexible symbols.
In some aspects, the reference signal configuration corresponds to at least one of a demodulation reference signal, a sounding reference signal, or a channel state information reference signal. In some aspects, the periodic signaling parameter value indicates at least one of an SPS index, a CG index, an SPS periodicity, a CG periodicity, a security key seed associated with the periodic signal configuration, or an occasion index corresponding to an occasion occurring after a periodic signaling activation time. In some aspects, the periodic signaling activation time corresponds to a DCI activation type. In some aspects, the periodic signaling activation time corresponds to an RRC activation type.
In some aspects, the first security key is based at least in part on a first key configuration having a first set of key configuration parameters, and the second security key is based at least in part on a second key configuration having a second set of key configuration parameters. In some aspects, the first key configuration includes a first KDF, the first set of key configuration parameters indicating a first set of KDF inputs corresponding to the first KDF, and the second key configuration includes a second KDF, the second set of key configuration parameters indicating a second set of KDF inputs corresponding to the second KDF. In some aspects, the first set of KDF inputs is different than the second set of KDF inputs. In some aspects, the first set of key configuration parameters indicates a first security key refresh time and the second set of key configuration parameters indicates a second security key refresh time.
In some aspects, the first set of communications corresponds to a first priority level and the second set of communications corresponds to a second priority level, and the first security key refresh time is shorter than the second security key refresh time based at least in part on the first priority level being higher than the second priority level. In some aspects, the first set of communications corresponds to a first resource element bundle associated with the first security key and the second set of communications corresponds to a second resource element bundle associated with the second security key. In some aspects, the first resource element bundle corresponds to a first set of allocated resources and the second resource element bundle corresponds to a second set of allocated resources.
In some aspects, the first set of allocated resources comprises at least one of a first allocated time resource or a first allocated frequency resource, and the second set of allocated resources comprises at least one of a second allocated time resource or a second allocated frequency resource. In some aspects, the first resource element bundle corresponds to a first bundle pattern and the second resource element corresponds to a second bundle pattern. In some aspects, process 500 includes receiving a security key pattern configuration that indicates the first bundle pattern and the second bundle pattern. In some aspects, receiving the security key pattern configuration comprises receiving at least one of a radio resource control message that includes the security key pattern configuration or receiving a medium access control control element that includes the security key pattern configuration. In some aspects, a wireless communication standard indicates the first bundle pattern and the second bundle pattern.
In some aspects, the first bundle pattern and the second bundle pattern are associated with a sidelink resource pool. In some aspects, process 500 includes determining an activated bundle pattern of the first bundle pattern and the second bundle pattern. In some aspects, determining the activated bundle pattern comprises receiving an indication of the activated bundle pattern. In some aspects, receiving, from a second network node, the indication of the activated bundle pattern comprises receiving an indication signal, the indication signal comprising a layer 3 signal, a layer 2 signal, or a layer 1 signal.
In some aspects, process 500 includes receiving a bundle configuration that indicates a set of bundle patterns for access link communications, wherein the set of bundle patterns includes the first bundle pattern and the second bundle pattern. In some aspects, process 500 includes receiving an indication that indicates that the first bundle pattern is an activated bundle pattern. In some aspects, the second network node is a base station. In some aspects, a first bundle index corresponds to the first resource element bundle and a second bundle index corresponds to the second resource element bundle.
In some aspects, the first security key is based at least in part on a first key configuration having a first set of key configuration parameters, and the second security key is based at least in part on a second key configuration having a second set of key configuration parameters, wherein the first key configuration includes a first KDF, wherein a first set of KDF inputs corresponding to the first KDF comprises the first bundle index, and the second key configuration includes a second KDF, wherein a second set of KDF inputs corresponding to the second KDF comprises the second bundle index. In some aspects, the first security key comprises a first subset of security key bits of a set of security key bits corresponding to a security key stream based at least in part on a KDF, and the second security key comprises a second subset of security key bits of the set of security key bits. In some aspects, a number of security key bits in the first subset of security key bits is based at least in part on a modulation order. In some aspects, the first subset of security key bits is mapped to a first resource element of a plurality of resource elements, and the second subset of security key bits is mapped to a second resource element of the plurality of resource elements.
In some aspects, the at least one communication comprises a QAM signal, wherein the first subset of security key bits is appended to the QAM signal. In some aspects, the at least one communication comprises a QAM signal, and the QAM signal is phase shift rotated based at least in part on the first subset of security key bits. In some aspects, the at least one communication comprises a network coded QAM signal representing an XOR of the first subset of security key bits with a set of data bits.
In some aspects, decrypting the at least one communication comprises mapping the set of security key bits of the security key stream to a plurality of communications of the at least one communication, and mapping the set of security key bits comprises applying the first subset of security key bits to a first communication of the at least one communication, applying the second subset of security key bits to a second communication of the at least one communication, refreshing the KDF to determine an updated security key stream, and applying a subset of security key bits of a set of security key bits corresponding to the updated security key stream to a third communication of the at least one communication. In some aspects, mapping the set of security key bits comprises mapping the set of security key bits based at least in part on a mapping rule. In some aspects, process 500 includes receiving a mapping configuration that indicates the mapping rule.
Although
As shown in
As further shown in
Process 600 may include additional aspects, such as any single aspect or any combination of aspects described below and/or in connection with one or more other processes described elsewhere herein.
In some aspects, the first set of physical layer parameter values indicates a component carrier index, a bandwidth part value, a resource pool index associated with a resource pool configured for sidelink operations, a resource pool parameter value associated with the resource pool, a TDD pattern parameter value, a frame index, a slot index, a sub-slot index, a slot offset, a reference signal configuration, a periodic signaling parameter value associated with a periodic signal configuration, a resource element frequency index, a resource element time index, or any combination thereof. In some aspects, the resource pool parameter value indicates at least one of a power control parameter value, a channel busy ratio, a subcarrier spacing, a number of configured shared channel symbols, a number of configured subchannels, a configured subchannel size, or a starting subchannel. In some aspects, the TDD pattern parameter value indicates at least one of a TDD pattern index, a number of configured downlink symbols, a number of configured uplink symbols, or a number of configured flexible symbols. In some aspects, the reference signal configuration corresponds to at least one of a demodulation reference signal, a sounding reference signal, or a channel state information reference signal. In some aspects, the periodic signaling parameter value indicates at least one of an SPS index, a CG index, an SPS periodicity, a CG periodicity, a security key seed associated with the periodic signal configuration, or an occasion index corresponding to an occasion occurring after a periodic signaling activation time. In some aspects, the periodic signaling activation time corresponds to a DCI activation type. In some aspects, the periodic signaling activation time corresponds to an RRC activation type.
In some aspects, the first security key is based at least in part on a first key configuration having a first set of key configuration parameters, and the second security key is based at least in part on a second key configuration having a second set of key configuration parameters. In some aspects, the first key configuration includes a first KDF, the first set of key configuration parameters indicating a first set of KDF inputs corresponding to the first KDF, and the second key configuration includes a second KDF, the second set of key configuration parameters indicating a second set of KDF inputs corresponding to the second KDF. In some aspects, the first set of KDF inputs is different than the second set of KDF inputs. In some aspects, the first set of key configuration parameters indicates a first security key refresh time and the second set of key configuration parameters indicates a second security key refresh time. In some aspects, the first set of communications corresponds to a first priority level and the second set of communications corresponds to a second priority level, and the first security key refresh time is shorter than the second security key refresh time based at least in part on the first priority level being higher than the second priority level.
In some aspects, the first set of communications corresponds to a first resource element bundle associated with the first security key and the second set of communications corresponds to a second resource element bundle associated with the second security key. In some aspects, the first resource element bundle corresponds to a first set of allocated resources and the second resource element bundle corresponds to a second set of allocated resources. In some aspects, the first set of allocated resources comprises at least one of a first allocated time resource or a first allocated frequency resource, and the second set of allocated resources comprises at least one of a second allocated time resource or a second allocated frequency resource. In some aspects, the first resource element bundle corresponds to a first bundle pattern and the second resource element bundle corresponds to a second bundle pattern.
In some aspects, process 600 includes transmitting a security key pattern configuration that indicates the first bundle pattern and the second bundle pattern. In some aspects, transmitting the security key pattern configuration comprises transmitting at least one of an RRC message that includes the security key pattern configuration or transmitting a MAC CE that includes the security key pattern configuration. In some aspects, a wireless communication standard indicates the first bundle pattern and the second bundle pattern.
In some aspects, the first bundle pattern and the second bundle pattern are associated with a sidelink resource pool. In some aspects, process 600 includes determining an activated bundle pattern of the first bundle pattern and the second bundle pattern. In some aspects, process 600 includes transmitting an indication of the activated bundle pattern. In some aspects, transmitting the indication of the activated bundle pattern comprises transmitting an indication signal, the indication signal comprising a layer 3 signal, a layer 2 signal, or a layer 1 signal.
In some aspects, process 600 includes transmitting a bundle configuration that indicates a set of bundle patterns for access link communications, wherein the set of bundle patterns includes the first bundle pattern and the second bundle pattern. In some aspects, process 600 includes transmitting an indication that indicates that the first bundle pattern is an activated bundle pattern. In some aspects, the first network node is a base station. In some aspects, a first bundle index corresponds to the first resource element bundle and a second bundle index corresponds to the second resource element bundle. In some aspects, the first security key is based at least in part on a first key configuration having a first set of key configuration parameters, and the second security key is based at least in part on a second key configuration having a second set of key configuration parameters, wherein the first key configuration includes a first KDF, wherein a first set of KDF inputs corresponding to the first KDF comprises the first bundle index, and the second key configuration includes a second KDF, wherein a second set of KDF inputs corresponding to the second KDF comprises the second bundle index.
In some aspects, the first security key comprises a first subset of security key bits of a set of security key bits corresponding to a security key stream based at least in part on a KDF, and the second security key comprises a second subset of security key bits of the set of security key bits. In some aspects, a number of security key bits in the first subset of security key bits is based at least in part on a modulation order. In some aspects, the first subset of security key bits is mapped to a first resource element of a plurality of resource elements, and the second subset of security key bits is mapped to a second resource element of the plurality of resource elements. In some aspects, the at least one communication comprises a QAM signal, wherein the first subset of security key bits is appended to the QAM signal. In some aspects, the at least one communication comprises a QAM signal, and the QAM signal is phase shift rotated based at least in part on the first subset of security key bits. In some aspects, the at least one communication comprises a network coded QAM signal representing an XOR of the first subset of security key bits with a set of data bits.
In some aspects, process 600 includes encrypting the at least one communication, wherein encrypting the at least one communication comprises mapping the set of security key bits of the security key stream to a plurality of communications of the at least one communication, and mapping the set of security key bits comprises applying the first subset of security key bits to a first communication of the at least one communication, applying the second subset of security key bits to a second communication of the at least one communication, refreshing the KDF to determine an updated security key stream, and applying a subset of security key bits of a set of security key bits corresponding to the updated security key stream to a third communication of the at least one communication. In some aspects, mapping the set of security key bits comprises mapping the set of security key bits based at least in part on a mapping rule. In some aspects, process 600 includes transmitting a mapping configuration that indicates the mapping rule.
Although
In some aspects, the apparatus 700 may be configured to perform one or more operations described herein in connection with
The reception component 702 may receive communications, such as reference signals, control information, data communications, or a combination thereof, from the apparatus 706. The reception component 702 may provide received communications to one or more other components of the apparatus 700. In some aspects, the reception component 702 may perform signal processing on the received communications (such as filtering, amplification, demodulation, analog-to-digital conversion, demultiplexing, deinterleaving, de-mapping, equalization, interference cancellation, or decoding, among other examples), and may provide the processed signals to the one or more other components of the apparatus 700. In some aspects, the reception component 702 may include one or more antennas, a modem, a demodulator, a MIMO detector, a receive processor, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with
The transmission component 704 may transmit communications, such as reference signals, control information, data communications, or a combination thereof, to the apparatus 706. In some aspects, one or more other components of the apparatus 700 may generate communications and may provide the generated communications to the transmission component 704 for transmission to the apparatus 706. In some aspects, the transmission component 704 may perform signal processing on the generated communications (such as filtering, amplification, modulation, digital-to-analog conversion, multiplexing, interleaving, mapping, or encoding, among other examples), and may transmit the processed signals to the apparatus 706. In some aspects, the transmission component 704 may include one or more antennas, a modem, a modulator, a transmit MIMO processor, a transmit processor, a controller/processor, a memory, or a combination thereof, of the UE and/or the base station described in connection with
The reception component 702 may receive at least one communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys, and wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys. The communication manager 708 and/or the reception component 702 may decrypt the at least one communication based at least in part on the first security key, wherein the first security key is based at least in part on a first set of physical layer parameter values, and wherein the second security key is based at least in part on a second set of physical layer parameter values.
In some aspects, the communication manager 708 may be, be similar to, include, or be included in the communication manager 140 and/or the communication manager 150 depicted in
The reception component 702 may receive a security key pattern configuration that indicates the first bundle pattern and the second bundle pattern. The communication manager 708 may determine an activated bundle pattern of the first bundle pattern and the second bundle pattern. The reception component 702 may receive a bundle configuration that indicates a set of bundle patterns for access link communications, wherein the set of bundle patterns includes the first bundle pattern and the second bundle pattern. The reception component 702 may receive an indication that indicates that the first bundle pattern is an activated bundle pattern. The reception component 702 may receive a mapping configuration that indicates the mapping rule.
The transmission component 704 may transmit a first communication of a plurality of communications associated with at least one physical layer channel, wherein a first set of the plurality of communications includes the at least one communication and is secured by a first security key of a plurality of security keys. The transmission component 704 may transmit a second communication of the plurality of communications, wherein a second set of the plurality of communications is secured by a second security key of the plurality of security keys.
The transmission component 704 may transmit a security key pattern configuration that indicates the first bundle pattern and the second bundle pattern. The communication manager 708 may determine an activated bundle pattern of the first bundle pattern and the second bundle pattern. The transmission component 704 may transmit an indication of the activated bundle pattern. The transmission component 704 may transmit a bundle configuration that indicates a set of bundle patterns for access link communications, wherein the set of bundle patterns includes the first bundle pattern and the second bundle pattern. The transmission component 704 may transmit an indication that indicates that the first bundle pattern is an activated bundle pattern.
The communication manager 708 and/or the transmission component 704 may encrypt the at least one communication, wherein encrypting the at least one communication comprises mapping the set of security key bits of the security key stream to a plurality of communications of the at least one communication, and wherein mapping the set of security key bits comprises applying the first subset of security key bits to a first communication of the at least one communication: applying the second subset of security key bits to a second communication of the at least one communication: refreshing the KDF to determine an updated security key stream; and applying a subset of security key bits of a set of security key bits corresponding to the updated security key stream to a third communication of the at least one communication. The transmission component 704 may transmit a mapping configuration that indicates the mapping rule.
The number and arrangement of components shown in
The following provides an overview of some Aspects of the present disclosure:
The foregoing disclosure provides illustration and description but is not intended to be exhaustive or to limit the aspects to the precise forms disclosed. Modifications and variations may be made in light of the above disclosure or may be acquired from practice of the aspects.
Further disclosure is included in the appendix. The appendix is provided as an example only and is to be considered part of the specification. A definition, illustration, or other description in the appendix does not supersede or override similar information included in the detailed description or figures. Furthermore, a definition, illustration, or other description in the detailed description or figures does not supersede or override similar information included in the appendix. Furthermore, the appendix is not intended to limit the disclosure of possible aspects.
As used herein, the term “component” is intended to be broadly construed as hardware and/or a combination of hardware and software. “Software” shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, and/or functions, among other examples, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. As used herein, a “processor” is implemented in hardware and/or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware and/or a combination of hardware and software. The actual specialized control hardware or software code used to implement these systems and/or methods is not limiting of the aspects. Thus, the operation and behavior of the systems and/or methods are described herein without reference to specific software code, since those skilled in the art will understand that software and hardware can be designed to implement the systems and/or methods based, at least in part, on the description herein.
As used herein, “satisfying a threshold” may, depending on the context, refer to a value being greater than the threshold, greater than or equal to the threshold, less than the threshold, less than or equal to the threshold, equal to the threshold, not equal to the threshold, or the like.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of various aspects. Many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. The disclosure of various aspects includes each dependent claim in combination with every other claim in the claim set. As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a+b, a+c, b+c, and a+b+c, as well as any combination with multiples of the same element (e.g., a+a, a+a+a, a+a+b, a +a+c, a+b+b, a+c+c, b+b, b+b+b, b+b+c, c+c, and c+c+c, or any other ordering of a, b, and c).
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items and may be used interchangeably with “one or more.” Further, as used herein, the article “the” is intended to include one or more items referenced in connection with the article “the” and may be used interchangeably with “the one or more.” Furthermore, as used herein, the terms “set” and “group” are intended to include one or more items and may be used interchangeably with “one or more.” Where only one item is intended, the phrase “only one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms that do not limit an element that they modify (e.g., an element “having” A may also have B). Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or,” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of”).
Number | Date | Country | Kind |
---|---|---|---|
20220100145 | Feb 2022 | GR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2023/062504 | 2/13/2023 | WO |