Machine to Machine (M2M) and/or Internet of Things (IoT) may be an Internet paradigm that may be used to remotely configure and control a very large amount of electronic equipment (e.g., M2M and/or IoT units or devices) and may open up additional possibilities with respect to services such as automotive, industry control, traffic management and building automation, may reduce cost for maintenance, surveillance, production, transport and communications, and/or the like. Such M2M and/or IoT devices or units may be susceptible to attacks (e.g., remotely and/or by an actual attacker in person such as via theft). Typically, to help protect a computer or typical mobile device from being compromised (e.g., from false use), a user may be prompted with questions and/or to provide a hardware security token. Unfortunately, such techniques that may be used to help protect a computer or mobile device may not be suitable for M2M and/or IoT devices or units as such M2M and/or IoT devices or units may not be operated directly by a user to answer the questions and/or to provide a physical presence of a hardware security token.
Systems, methods, and/or techniques may be disclosed for helping prevent credentials from being compromised during an attack or theft of Internet of Things (IoT) devices. Secure communications between IoT devices and a device management server may be managed (e.g., in case of an attack or theft). A group master key KG may be received at a local key generation unit or a particular IoT attached to a local area network. A first session group key may be generated using the received group master key KG and a sequence number (n) at the local key generation unit or the particular IoT. The first session group key may be sent from the local key generation unit to each of a plurality of IoT devices via the local area network.
An Internet of Things (IoT) device may include a memory and a processor. The processor may be configured to receive a pre-shared key unique to the IoT device and receive a first session group key from a device associated with a same local network as the IoT device. The first session group key may be valid for a time interval. An encrypted message may be sent to a device management server (DMS) to establish a secure channel with the DMS. The encrypted message may include an identifier comprising an indication of a first sequence number associated with the first session group key. The encrypted message may be encrypted as a function of the first session group key and the pre-shared key.
An Internet of Things (IoT) device may include a memory and a processor. The processor may be configured to receive a pre-shared key that is unique to the IoT device and receive a first session group key from a device in a same local area network as the IoT device. The first session group key may be valid for a time interval. The processor may be configured to attempt to establish a secure communication session with a device management server (DMS). Attempting to establish the secure communication session may include sending a message to the DMS using the pre-shared key and the first session group key. If the message is sent to the DMS during the time interval, the processor may receive a communication from the DMS that indicates that a secure communication session has been established with the DMS. If the first message is sent to the DMS outside the time interval, the processor may fail to establish the secure communication session.
A device may include a memory and a processor. The processor may be configured to receive a group master key and generate a first session group key based on the group master key and a sequence number. The first session group key may be valid for a first time period. The processor may be configured to send the first session group key to an Internet of Things (IoT) device via a local network. A local key may be generated as a function of the session group key and a secret associated with the IoT device. The local key may be used to establish a secure communication between the IoT device and a device management server. The sequence number may be updated. The processor may be configured to generate a second session group key based on the group master key and the updated sequence number. The second session group key may be valid for a second time period. The second session group key may be sent to the IoT device via the local network.
Secure communications may be managed among a plurality of Internet of Things (IoT) devices and a device management server by determining, at a first IoT device of the plurality of IoT devices, a first session group key calculation share as a function of a secret associated with the first IoT device and an index. The first IoT device may receive respective second session group key calculation shares from a subset of the plurality of IoT devices. The first IoT device may determine a session group key as a function of the first session group key calculation share and the second group key calculation shares. A symmetric key may be generated as a function of the session group key and the secret associated with the first IoT device. The symmetric key may be used to establish a secure communication between the first IoT device and the device management server.
The summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. The claimed subject matter is not limited to the examples herein that may solve one or more disadvantages noted in any part of this disclosure.
A more detailed understanding of the embodiments disclosed herein may be had from the following description, given by way of example in conjunction with the accompanying drawings.
A detailed description of illustrative embodiments may now be described with reference to the various Figures. Although this description provides a detailed example of possible implementations, it should be noted that the details are intended to be exemplary and in no way limit the scope of the examples described herein.
As described herein, Machine to Machine (M2M) or Internet-of-Things (IoT) systems may be starting to become more widely deployed.
As shown in
In examples herein (e.g., as shown), the management client devices 212a, 212b and/or the DMS 208 may further be connected to the Internet 205 to control and/or manage the IoT units 202a-f For example, as shown in
An end-to-end security channel 214a may be established (e.g., through the network of the organization, the Internet, the WLAN, the LAN, a cellular network, and/or the like) between the DMS 208 and an IoT unit such as the IoT unit 202a as shown in
The IoT units may further be subject to attacks on the devices themselves such as via theft of the devices or hacking of the devices (e.g., as well as the communication with the back-end system or server such as the DMS and/or management client or devices). To help prevent such attacks (e.g., false use) of a device such as a personal computer (PC), a legitimate user may have or possess a token such as a special hardware token. In such an example, when this hardware token may be physically close to the PC (e.g., the token may either be directly connected to the PC through a hardware interface or through a short range wireless link between the token and the PC), the PC may be operational (e.g., fully operational). The PC may periodically issue challenges to the hardware token that may be operated by an end user. The end user may enter an authentication code into the hardware token, for example, to respond to challenges from the PC. The PC may be provided or kept in an operational state, e.g., if the hardware token may be present and the periodic challenges may be correctly answered. Otherwise, access to the PC from or by the end user may be denied. This may help prevent a user who does not possess the hardware token from using the PC. If the hardware token may be stolen from or lost by the legitimate end user, the PC may not be operational.
A computer may be secured based on a local presence of a security token connected to a computer over a wireless link. Application memory on the PC or computer may be protected from attacks. For example, one or more selected application memory sections on the PC or computer may be encrypted if or when a legitimate user may leave the computer (e.g., the token may not be close to the computer anymore) and may again decrypted when the user and the token may arrive again. The encryption process may be performed or done with the help of a key generation in the token using or based on a master key in the wireless token. PC or computer memory may be protected from attacks when the user may not be present (e.g., physically close) with the PC.
The examples, for example, described above may connect the functionality of a device (e.g., a PC or computer) to the physical presence of a hardware security token. A hardware security token may be used or provided in the example of
The example above (e.g., in
The additional and/or alternative example similar to
In an IoT system, communication between IoT devices may include sensitive data and/or IoT devices may use credentials to communicate with a management server (e.g., the DMS) for such data. Unfortunately, theft of an IoT device may provide access to the credential such that spoofing or eavesdropping of such data may occur.
Systems, methods, and/or devices disclosed herein may provide the end-to-end security channel credentials to the IoT units using a local network key that may be generated and distributed to IoT units via a local network connection (e.g., via only a local network connection and not via the Internet). This may help prevent access to such credentials upon theft or the theft of IoT device credentials (e.g., without use of a locking mechanism or the use of a hardware token that may have to be close to each of the IoT devices). In such systems, methods, and/or devices, a secure device channel may be established or created with IoT units based on a combination of unit unique credentials and locally generated or distributed credentials. The locally generated credentials may be changed over time preventing the secure channel set up, for example, if the unit may be removed from its local network. This may prevent the IoT device from authenticating properly when stolen or removed from its legitimate network location. If the IoT device may be removed from its legitimate network location, the IoT device may not be able to receive locally generated credentials when they are changed. When the IoT device may attempt to communicate with the DMS, the DMS may recognize that the credentials of the IoT device are invalid and may decline to communicate with the IoT device, e.g., may ignore or disregard a message from the IoT device.
IoT units (e.g., or IoT devices as used herein) and a DMS may set up secure communication channels using pre-shared symmetric keys to provide security credentials for IoT devices. Such a channel establishment may be available for and/or may include Transport Layer Security (TLS)/Datagram TLS, TLS/DTLS, and/or an IP security protocol, IPsec, for example. A key ID may be used such that another peer, e.g., an IoT and/or a DMS (peers) for which a secure channel may be established therebetween using TLS, IPsec, and/or the like for them to determine and/or find a shared key for such a channel to be set up) may map the symmetric key to use for securing the connection. The key ID for an IoT unit may be or may be denoted by ID (e.g., that may include keys and/or the like as described herein and where the IDu may be a unit unique part of the ID). Such an ID may be an identifier for the keys (e.g., K1, K2, Kn, and/or the like) in
Such a local group key may not be stored on the IoT units, but instead may be used to (e.g., with some regularity) create and distribute, using local distribution (e.g., as described herein in examples), the local session group key, KSGseq, that may be calculated using the shared local group key, KG. These session group keys may be recorded by the IoT units (e.g., 202d-2020 in a local group (e.g., group G) and used together with the IoT secret (e.g., K1, K2, and Kn) to protect the end-to-end security channel (e.g., 214b) with the DMS (e.g., 208).
IoT units may use one or more of the following for obtaining keys and setting up secure channels with the DMS. The IoT units described herein (e.g., such as those in group G or 202d-f) may use a suitable pre-shared key protocol to set up secure channels with the DMS (e.g., 208) and a key identifier associated therewith or generated thereby may be based on at least one or more of the following parameters: IDU, IDG, seq. One or more session group keys, KSGseq, may be (e.g., with some regularity) generated or calculated using a sequence number, seq and a group key, KG and may be distributed using a local distribution procedure, method, mechanism, or technique (such as local wired broadcast/multicast, local wireless broadcast/multicast, and/or the like) to the IoT units in a group (e.g., 202d-202f in group G of
The secure channels between the IoT units in the group and the DMS may be protected with a symmetric key calculated using the combination of an IoT individual secret and the session group key, KSGseq. The session group key KSGseq, may be calculated and locally distributed among the IoT units in the group using one or more of the following examples (e.g., as illustrated in
IoT unit credentials may be protected from being misused or stolen by using a combination of a unit unique secret symmetric key and a local session group key, which may be regularly updated and distributed in the local network and where both these keys may be used for setting up secure connections (e.g., the channels) between the IoT unit and the back-end management system (e.g., the DMS).
The examples herein may target the weakness of current IoT systems that may use symmetric and public-private key pairs for the protection of the communication channel with the back-end system with respect to the risk that the IoT unit keys might be stolen or lost as the IoT units often may not be suitably physically protected and there may be a lack of protection for the stored keys/credentials. The examples herein may disclose that the symmetric key that may be used to set up secure channels with the back-end system may be a combination of a device unique key and a local session group key. It may be able to securely authenticate itself and set up security channels with the back-end system, e.g., if the IoT device may have access to both keys. An IoT unit that may be removed from the local network may no longer have access to the local session group key, e.g., after an amount of time, such as a short duration. An attacker who has stolen the device may be not be able to fool the back-end system as the attacker may not have access to the needed local session group key, e.g., unless the attacker may also simultaneously attack the local network to obtain the local session group key as well. Such an attack may be easier for the owner of the IoT system to detect as that may use continuously local presence by the attacker at the local network. As the local session group key by itself may not be enough for setting up secure session, an IoT unit on the same local network may not be able to impersonate another IoT unit unless the unit may be explicitly attacked and the unique secret of the unit may be obtained.
Use of a unique combination of a local key and a unit specific key for secure channel establishments with a back-end system, may help protect credentials on the IoT device that may otherwise be rather weak. An IoT unit may be protected from attacks without the use of special purpose hardware or a special cover package. A high level of security may be obtained with standard hardware and software for the IoT unit, allowing usage of off-the-shelf technology for the IoT unit which gives a very attractive production cost.
Example methods may be provided as described herein to implement the local group key and session group key. For the examples herein, one or more of the following (e.g., notations) may be used and/or defined. A local group of IoT units on a LAN may be defined or denoted by G, and/or one particular such IoT unit in this set by UiϵG. The key holding and key generation unit G may be denoted or defined by R. The group master key that may be shared between R and the DMS may be denoted or defined by KG. A session group key index by l=0, 1, 2, . . . , r and a session group key for index l in the group G by KSGl. The number of units in G may be denoted by n=|G|. For each of the IoT units in the group (e.g., ∀UiϵG), Ki may be denoted as a shared secret key shared between unit Ui and the DMS. IDU
To provide a local key and/or generate a session key as described herein, an IoT administrator may invoke or initiate a suitable process (e.g., such as directly physical transfer/configuration and/or through a protected communication process between the DMS and R) to generate and install a group master key KG that may be stored at the DMS and at R. The corresponding group key ID, IDG, value may also be stored at the DMS. The index l may be set to 0 and may be stored both at R and at the DMS. The IoT administrator may use a suitable process (e.g., such as directly physical transfer/configuration and/or through a protected communication process between the DMS and R) to securely generate and install individual symmetric keys for IoT units in G, i.e. ∀UiϵG a key Ki may be generated and stored in the DMS and with as good protection as possible at the unit Ui and a unique ID, value for Ui, IDU
During operation, keys that may be used to set up and protect secure channels between the IoT units and the DMS may be generated and secure channels may be established between the IoT units and the DMS. Protecting communication may be shown in
The DMS may accept or receive communications from the IoT devices using the first session group key during a determined time interval associated with the sequence number (n) used in generation of the first session group key. The first session group key may be sent by sending an indication of the sequence number used in generation of the first session group key. As shown and described herein, communication from the IoT device to the DMS may comprise an ID comprising an indication of the sequence number used in the generation of the first session group key. At the local key generation unit or the particular IoT, using the group master key KG, a second session group key (e.g., wherein generation may use a sequence number (n+1)) may be generated at 810. The second session group key may be sent from the local key generation unit to each of a plurality of IoT devices (e.g., except the particular IoT that may generate such a group key) at 812.
A message encrypted using the first local session group key may be sent from a first compromised IoT device of the plurality of IoT devices to a DMS. The DMS may receive the message from the first compromised IoT device at 814 and may determine at 816 whether the first session group key may be valid. The message may be disregarded (e.g., by the DMS) from the first compromised IoT device, e.g., responsive to a determination that the first session group key may no longer be valid. One or more windows may be provided and/or used as described herein.
One or more examples herein may use symmetric keys where such keys may have or use good security practice and/or may be renewed or updated with some regularity. This may apply both to the shared group key and the individual unit keys. A group key may be updated. A secure channel (such as a PSK TLS channel) may be established between the DMS and the key unit using the already shared group ID, IDG, and group key, KG. Once this channel may be established, the DMS may send an updated group key to the unit. A unit key may be updated. Examples herein may describe how to create secure channels between arbitrary IoT units and the DMS. Such channels may be used for secure management routines on the IoT unit. This channel may be used for sending updated credential information from the DMS to the IoT unit.
IoTs may be secured, e.g., if they may be stolen or compromised. IoT unit-based session group keys distribution may be provided and/or used. No special session group key distribution unit may be present in the LAN, but a special IoT unit in the network may take this role instead. This IoT unit may have support to protect keys and key generation through special purpose hardware or through special physical protection making it harder to attack than the other IoT units in the network. The principle may be illustrated in
A group based joint calculation of session group keys may be provided and/or used. Session group keys may not be locally broadcasted by a particular unit in the LAN responsible for this, but instead jointly calculated as illustrated in
There may be different options for how the units may use a joint function to calculate session group keys. Without loss of generality, a particular session group key calculation option may be based on simple summation of group key shares. A set up phase may be performed. The set up phase may be the same or similar to other examples described herein except that the DMS may not distribute any group key.
The IoT units may perform actions as follows (e.g., may include the actions in flow 900 but may differ as follows). The IoT units in the group G may synchronize their group key index values l. 1004 and 1006 in the flow 1000 may be replaced with the following. Ui may use a suitable PRF to calculate an individual group key contribution share, MKi=PRF(l,Ki). Ui may broadcast {i, MKi} in the local group G. For a subgroup B (including the unit Ui itself) of G of size t=|B|, Ui may collect (from broadcast of the other units) t−l additional local share values and the corresponding share indices, ∀vϵB−Ui, and may calculate D=Σj=1t MKvj (e.g., that may be calculated over a suitable finite field). Ui may calculate the session group key as KSGl=PRF(D,l). Different IoT units may use different session group keys, but the scheme may work anyway as the units may also record information of the set B that may be used by the particular IoT units to calculate the session group key. 1012 of flow 1000 may be replaced with the following. If a secure session may be about to be established with the DMS, for example, Ui may use the following parameters as identifiers in the secure channel set up: {IDU
The DMS may perform one or more of the following (e.g., may include the actions in flow 1100 but may differ as follows). 1106 of the flow 1100 may be replaced by the following. If a secure channel establishment request may be received from ∃UiϵG, the following may apply and/or may be performed. The DMS may use the received unit ID, IDU
The mobile casino company may arrive at a site and may install the mobile casino system at this site. One or more of the following may be performed. A local WLAN system 1210 may be configured on the site. Each of the casino units may have WLAN capability and may be configured with strong WLAN standard WiFi Protected Access (WPA2) communication keys that may be used for the communication in the WLAN. The key unit 1212 may be installed in the WLAN sharing a group key, KG, with the central casino banking and management system. The key unit 1212 may generate and locally distribute session group keys. The keys that may be used for secure remote communication with the units in the mobile casino system may be stored and managed by a key server 1208, which may be located at the central casino banking and management system. This key server 1208 may store this group key. The game units may be installed in the local site and each of these game units may have WLAN capabilities and that they may be pre-configured with individual secrets, K0, K1, K, . . . , Kn. These secrets may also be stored in the key server 1208 at the casino home network.
One or more of the following may be performed or applied, for example, when the mobile casino may be in operation. The key unit 1212 may with some regularity broadcast session group keys, KSGl, to each of the game units 1202a, 1202b, 1202c, 1202d, 1202e in the WLAN. These keys may be protected under the local WPA communication protection keys. The game units 1202a, 1202b, 1202c, 1202d, 1202e may be in operation and may report gaming results to the home banking system. This may include information such credit card information, game results and money transfer request depending on the game outcomes. Communication with the casino bank system 1206 may be protected with pre-share key TLS links. For one particular game unit, Ui, the keys that may be used to protect these link may be the combination of the individual unit key, Ki, and the session group key, KSGl according to the examples described herein. The home banking system may connect to the key server 1208 in the home network to obtain the key information for secure communication with the game unit.
According to the example of
The examples herein may be applicable to a broad set of IoT use cases covering many different business segments and application areas.
As shown in
The communications systems 100 may also include a base station 114a and a base station 114b. Each of the base stations 114a, 114b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102a, 102b, 102c, and/or 102d to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 110, and/or the networks 112. By way of example, the base stations 114a and/or 114b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 114a, 114b are each depicted as a single element, it will be appreciated that the base stations 114a, 114b may include any number of interconnected base stations and/or network elements.
The base station 114a may be part of the RAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. The base station 114a and/or the base station 114b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with the base station 114a may be divided into three sectors. The base station 114a may include three transceivers, i.e., one for each sector of the cell. The base station 114a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
The base stations 114a and/or 114b may communicate with one or more of the WTRUs 102a, 102b, 102c, and/or 102d over an air interface 115/116/117, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). The air interface 115/116/117 may be established using any suitable radio access technology (RAT).
More specifically, as noted above, the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, the base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, and/or 102c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 115/116/117 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
The base station 114a and the WTRUs 102a, 102b, and/or 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115/116/117 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A).
The base station 114a and the WTRUs 102a, 102b, and/or 102c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1×, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
The base station 114b in
The RAN 103/104/105 may be in communication with the core network 106/107/109, which may be any type of network configured to provide voice, data, applications, and/or voice over Internet protocol (VoIP) services to one or more of the WTRUs 102a, 102b, 102c, and/or 102d. For example, the core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown in
The core network 106/107/109 may also serve as a gateway for the WTRUs 102a, 102b, 102c, and/or 102d to access the PSTN 108, the Internet 110, and/or other networks 112. The PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). The Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the Internet protocol (IP) in the TCP/IP Internet protocol suite. The networks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, the networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 103/104/105 or a different RAT.
Some or all of the WTRUs 102a, 102b, 102c, and/or 102d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102a, 102b, 102c, and/or 102d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the WTRU 102c shown in
The processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. The processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment. The processor 118 may be coupled to the transceiver 120, which may be coupled to the transmit/receive element 122. While
The transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114a) over the air interface 115/116/117. The transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals. The transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. The transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
Although the transmit/receive element 122 is depicted in
The transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122. As noted above, the WTRU 102 may have multi-mode capabilities. Thus, the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
The processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). The processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128. The processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132. The non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. The processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102, such as on a server or a home computer (not shown).
The processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in the WTRU 102. The power source 134 may be any suitable device for powering the WTRU 102. For example, the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
The processor 118 may also be coupled to the GPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102. In addition to, or in lieu of, the information from the GPS chipset 136, the WTRU 102 may receive location information over the air interface 115/116/117 from a base station (e.g., base stations 114a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
The processor 118 may further be coupled to other peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. The peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
As shown in
The core network 106 shown in
The RNC 142a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an IuCS interface. The MSC 146 may be connected to the MGW 144. The MSC 146 and the MGW 144 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices.
The RNC 142a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface. The SGSN 148 may be connected to the GGSN 150. The SGSN 148 and the GGSN 150 may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between and the WTRUs 102a, 102b, and/or 102c and IP-enabled devices.
As noted above, the core network 106 may also be connected to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
The RAN 104 may include eNode-Bs 160a, 160b, and/or 160c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode-Bs 160a, 160b, and/or 160c may each include one or more transceivers for communicating with the WTRUs 102a, 102b, and/or 102c over the air interface 116. The eNode-Bs 160a, 160b, and/or 160c may implement MIMO technology. Thus, the eNode-B 160a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
Each of the eNode-Bs 160a, 160b, and/or 160c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in
The core network 107 shown in
The MME 162 may be connected to each of the eNode-Bs 160a, 160b, and/or 160c in the RAN 104 via an S1 interface and may serve as a control node. For example, the MME 162 may be responsible for authenticating users of the WTRUs 102a, 102b, and/or 102c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102a, 102b, and/or 102c, and the like. The MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
The serving gateway 164 may be connected to each of the eNode-Bs 160a, 160b, and/or 160c in the RAN 104 via the S1 interface. The serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102a, 102b, and/or 102c. The serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102a, 102b, and/or 102c, managing and storing contexts of the WTRUs 102a, 102b, and/or 102c, and the like.
The serving gateway 164 may also be connected to the PDN gateway 166, which may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and IP-enabled devices.
The core network 107 may facilitate communications with other networks. For example, the core network 107 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices. For example, the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108. The core network 107 may provide the WTRUs 102a, 102b, and/or 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
As shown in
The air interface 117 between the WTRUs 102a, 102b, and/or 102c and the RAN 105 may be defined as an R1 reference point that implements the IEEE 802.16 specification. Each of the WTRUs 102a, 102b, and/or 102c may establish a logical interface (not shown) with the core network 109. The logical interface between the WTRUs 102a, 102b, and/or 102c and the core network 109 may be defined as an R2 reference point, which may be used for authentication, authorization, IP host configuration management, and/or mobility management.
The communication link between each of the base stations 180a, 180b, and/or 180c may be defined as an R8 reference point that includes protocols for facilitating WTRU handovers and the transfer of data between base stations. The communication link between the base stations 180a, 180b, and/or 180c and the ASN gateway 182 may be defined as an R6 reference point. The R6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of the WTRUs 102a, 102b, and/or 102c.
As shown in
The MIP-HA may be responsible for IP address management, and may enable the WTRUs 102a, 102b, and/or 102c to roam between different ASNs and/or different core networks. The MIP-HA 184 may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and IP-enabled devices. The AAA server 186 may be responsible for user authentication and for supporting user services. The gateway 188 may facilitate interworking with other networks. For example, the gateway 188 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices. The gateway 188 may provide the WTRUs 102a, 102b, and/or 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
Although not shown in
Although the terms device, M2M, unit, IoT, UE, and/or WTRU may be used herein, it may and should be understood that the use of such terms may be used interchangeably and, as such, may not be distinguishable.
Although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. The methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer-readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
This application claims the benefit of the U.S. Provisional Application No. 62/152,364 filed Apr. 24, 2015, which is hereby incorporated by reference herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2016/028858 | 4/22/2016 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62152364 | Apr 2015 | US |