The present disclosure relates to wireless telecommunications apparatuses and methods.
The “background” description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description which may not otherwise qualify as prior art at the time of filing, are neither expressly or impliedly admitted as prior art against the present invention.
Future wireless communications networks will be expected routinely and efficiently to support communications with an ever-increasing range of devices associated with a wider range of data traffic profiles and types than existing systems are optimised to support. For example, it is expected future wireless communications networks will be expected efficiently to support communications with devices including reduced complexity devices, machine type communication (MTC) devices, high resolution video displays, virtual reality headsets and so on. Some of these different types of devices may be deployed in very large numbers, for example low complexity devices for supporting the “The Internet of Things” (IoT), and may typically be associated with the transmissions of relatively small amounts of data with relatively high latency tolerance. Other types of device, for example supporting high-definition video streaming, may be associated with transmissions of relatively large amounts of data with relatively low latency tolerance.
In view of an increasing demand for different device types, such as IoT, there is expected to be a desire for future wireless communications networks, for example those which may be referred to as 5G or new radio (NR) systems/new radio access technology (RAT) systems (as provided via the 3rd Generation Partnership Project, 3GPP, for example), as well as future iterations/releases of existing systems, to efficiently support connectivity over a wide range of environments and for a wide range of devices associated with different applications and different characteristic data traffic profiles and requirements. For example, in order to improve a coverage for communications devices (user equipment etc.) wireless communication networks may include infrastructure equipment mounted on or forming part of satellites which are able to provide coverage for wireless communications by transmitting and receiving radio signals to and from communications devices located on the earth. Such satellites may be geostationary or in low earth orbit or medium earth orbit as will be explained in more detail below. Communications networks which include infrastructure equipment mounted on or forming part of satellites are known as Non-Terrestrial Networks (NTNs). Such NTNs can be configured to include a complete range of services which would otherwise be provided by a terrestrial wireless communications network. However, some services such as location-based services can present new challenges.
The present technology is defined by the claims.
The following detailed description is exemplary, but not restrictive, of the present technology. The described embodiments, together with further advantages, will be best understood by reference to the following detailed description taken in conjunction with the accompanying drawings.
A more complete appreciation of the disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings wherein like reference numerals designate identical or corresponding parts throughout the several views, and wherein:
An example configuration of a wireless communications network which uses some of the terminology proposed for and used in NR and 5G is shown in
As will be appreciated by those acquainted with the wireless communications network according to a 5G standard as shown in
The TRPs 10 of
In terms of broad top-level functionality, the term network infrastructure equipment/access node may be used to encompass these elements and more conventional base station type elements of wireless telecommunications systems. Depending on the application at hand, the responsibility for scheduling transmissions which are scheduled on the radio interface between the respective distributed units and the communications devices may lie with the controlling node/central unit and/or the distributed units/TRPs. A communications device 14 is represented in
It will further be appreciated that
The transmitters 30, 49 and the receivers 32, 48 (as well as other transmitters, receivers and transceivers described in relation to examples and embodiments of the present disclosure) are implemented using appropriate circuitry and may include radio frequency filters and amplifiers as well as signal processing components and devices in order to transmit and receive radio signals in accordance for example with the relevant 5G/NR standard(s). The controllers 34, 44 (as well as other controllers described in relation to examples and embodiments of the present disclosure) may be, for example, a microprocessor, a central processing unit (CPU), or a dedicated chipset, etc., configured to carry out instructions which are stored on a computer readable medium (optionally, a non-transitory computer readable medium), such as a non-volatile memory. The processing steps described herein may be carried out by, for example, a microprocessor in conjunction with a random access memory, operating according to instructions stored on a computer readable medium (optionally, a non-transitory computer readable medium). The transmitters, the receivers and the controllers are schematically shown in
As shown in
The interface 46 between the DU 42 and the CU 40 is known as the F1 interface which can be a physical or a logical interface. The F1 interface 46 between CU and DU may operate in accordance with specifications 3GPP TS 38.470 and 3GPP TS 38.473, for example, and may be formed from a fibre optic or other wired or wireless high bandwidth connection. In one example the connection 16 from the TRP 10 to the DU 42 is via fibre optic. The connection between a TRP 10 and the core network 20 can be generally referred to as a backhaul, which comprises the interface 16 from the network interface 50 of the TRP10 to the DU 42 and the F1 interface 46 from the DU 42 to the CU 40.
An NTN aerial vehicle (such as a satellite or aerial platform) may allow a connection of a communications device and a ground station (which may be referred to herein as an NTN gateway) [1]. In the present disclosure, the terms NTN aerial vehicle and NTN vehicle are used to refer to a space vehicle, aerial platform, satellite, or any other entity which moves relative to a communications device and is configured to communicate with a communications device. In particular, an NTN aerial vehicle may be in some embodiments a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a high altitude platform system (HAPS), a balloon or a drone for example.
As a result of the wide service coverage capabilities and reduced vulnerability of space/airborne vehicles to physical attacks and natural disasters, Non-Terrestrial Networks are expected to:
The benefits relate to either Non-Terrestrial Networks (NTNs) operating alone or to integrated terrestrial and Non-Terrestrial networks. They will impact at least coverage, user bandwidth, system capacity, service reliability or service availability, energy consumption and connection density. A role for NTN components in the 5G system is expected for at least the following verticals: Transport, Public Safety, Media and Entertainment, eHealth, Energy, Agriculture,
Finance and Automotive. It should also be noted that the same NTN benefits apply to 4G and/or LTE technologies and that while NR is sometimes referred to in the present disclosure, the teachings and techniques presented herein are equally applicable to 4G and/or LTE.
The NTN 300 comprises a core network part 302 (which may be a 4G core network or a 5G core network) in communicative connection with a radio network part 301. The radio network part 301 comprises a base station 332 connected to a ground station (or NTN gateway) 330, which may be formed as separate physical components and connected as in
The NTN 300 comprises an NTN aerial vehicle 310 which includes communications circuitry 334 for communicating with the communications device 306 and radio network part 301 via wireless communications links 314, 312.
The communications device 306 is located within a coverage area (or cell) 308 provided by the NTN 300. In the example shown in
The spot beam may be an “earth fixed beam” which covers a geographic area on a surface of the earth for a pre-defined period of time. Alternatively, the spot beam may be an “earth moving beam” which covers a constantly changing geographic area on the surface of the earth. In an example, the communications device 306 may determine, based on certain decision criteria, to switch from being served by an NTN aerial vehicle 310 that implements an “earth fixed beam” to an NTN aerial vehicle 310 that implements an “earth moving beam”, or may determine, based on similar criteria, to switch from being served by an NTN aerial vehicle 310 implementing an “earth fixed beam” to a “earth moving beam” provided by the same NTN aerial vehicle 310. The communications device 306 is able to determine these changes in both directions, that is, it is able to determine to switch from a fixed beam to a moving beam, and vice versa, and to switch between NTN aerial vehicles 310 that connect the communications device 306 to the NTN 300.
In
The extent to which the communications circuitry 334 processes the received signals depends on the processing capability of the communications circuitry 334 as explained in more detail with reference to
As will be appreciated, the mobility of the coverage area 308 in NTNs can create technical challenges which may not occur in conventional terrestrial networks. For example, where the NTN aerial vehicle 310 is a LEO satellite, the NTN aerial vehicle 310 may complete an orbit of the Earth in around 90 minutes. In this case coverage area 308 generated by the NTN aerial vehicle 310 moves very rapidly with respect to a fixed observation point on the surface of the Earth (for example, a LEO may move at 7.56 km/s).
An example deployment of a 5G wireless communications network which may be used to improve coverage in some situations is a NR Non-Terrestrial Network (NTN), in which multiple satellites in orbit are used for LEO/MEO deployment with a transparent mode of operation. In transparent mode, the satellite functions as a “bent pipe” carrying RF signals, whilst the rest of the gNB functionality resides on the earth via terrestrial infrastructure equipment connected via a ground station or an NTN gateway (as exemplified in
An example of this illustrated in
As will be appreciated from the following description, example embodiments can apply to both an NTN-based gNB formed from the combination of a TRP satellite 626, DU satellite 624 and earth-based CU 620 or an NTN vehicle carrying a complete gNB 602.
The gNB on board the NTN vehicle 602 may establish a beam 651 (e.g. via transmitter 30 and/or receiver 32) which covers and provides a wireless access interface for communications devices such as UE 14 in a cell 308 on the surface of the earth 600. It will be appreciated that, as the cell 308 is depicted in the same location on the surface of the earth 600 at successive instances of the flightpath of the satellite with gNB functionality 602, this example corresponds to an earth fixed beam example, as described above. This is not intended to limit the present disclosure to apply only to the earth fixed beams, but to include the earth moving beams also described above, with the necessary amendments made to the implementation of the enclosed details, as the skilled person would be able to apply them.
Need for verification of UE location
Example embodiments provide an improvement in verifying a location of a communications device (UE) in order to provide location-based services to the UE. The location-based services comprise, for example, determining a location of the UE by the network in order for the network to provide services specific to the UE's location. Likewise, an application programme running on the UE may provide certain services, having either determined the location of the UE or having been provided with a determined location of the UE. As will be appreciated, such location-based services depend on an accurate determination of a location of the UE. However, a technical problem is to improve a determination or verification of the location of a UE which is being served by an NTN.
In an example, a network operator is required to cross check a UE location reported by the UE in order to fulfil certain regulatory requirements (e.g. lawful intercept, emergency call, public warning system or the like). As such, a network is required to verify a UE's location to check that the UE's reported location information is accurate (e.g. by estimating the UE's location at the network side). Furthermore, it was identified within, for example, [3], that, to support regulated services and features such as public warning systems, charging and billing, emergency calls, lawful intercept, data retention policy in cross-border scenarios and international regions, and network access, 3GPP networks should have the capability to locate each UE in a reliable manner and determine a policy that applies to that UE's operation depending on its location. It is also suggested that a position determined and generated by the UE through, for example, its global navigation satellite system (GNSS) capability cannot necessarily be trusted by the network operator.
It is also stated in [3] that accuracy requirements for the UE location vary by application, for instance:
It should be noted that the accuracy in the above table for the lawful intercept, public warning system, and charging and tariff notifications, that is 2 km, is equivalent to the accuracy obtainable in a terrestrial network using positioning through Cell ID, and that the applications may come with other requirements besides location accuracy. For example, the emergency call application may require a latency to be lower than for other applications. The latency requirement may be such that the setting up of the emergency call should not be delayed by location requirements [3]. It should also be noted that the accuracy requirement of the emergency call procedure, that is, 50 m, may not in some circumstances be achieved. Likewise, the latency requirement that the setting up of the emergency call be not delayed may not always be achieved. More information can be found in references [2], [3], [4], [5], and [6], which contain further details on the need for network verification of the UE location.
According to [8], emergency calls (e.g. E-911/E-912) may not form part of the requirements for network verification of UE location.
Note that the accuracy requirement applies to the UE location report (i.e. the claimed location of the UE) and does not necessarily apply to the verification of the UE location by the network. For example, the UE location can be verified with a lower accuracy than the accuracy of the UE location report itself. For instance, in the case of an emergency call, the UE may report a location of the emergency (e.g. the GNSS location of a crime scene). The location verification by the network may then verify that the UE is located in a certain town in a certain country, but does not verify the UE location to the precision of GNSS location, for example. The verification information is nonetheless sufficiently precise to ensure the emergency call is routed to the appropriate emergency control room and the appropriate emergency responder is sent (e.g. to help ensure emergency services belonging to one region respond to a reported incident in that region rather than, say, the emergency services belonging to a neighbouring region).
One positioning technique used in LTE and NR (and considered for IoT (i.e. eNB-IoT and fe-MTC (further enhanced-MTC)) is Observed Time Difference of Arrival (OTDOA). This is a technique in which a location of a UE is determined from measurements of a time for signals to propagate between the UE and a plurality of gNBs (gNodeBs)/eNBs (eNodeBs), from which the location of the UE can be determined by triangulation. This is shown graphically in
A basic operation of calculating time of arrival (TOA) from each eNodeB can be described as follows:
In
Accuracy of the UE 710 position is dependent upon an accuracy of the RSTD measurements. For example, in
For greater accuracy, corresponding measurements may be taken of a time difference of arrival of further signals from additional base stations not represented here. It will be appreciated that the signals transmitted by the base stations (eNBs 701, 702, 703) may or may not be simultaneous; if not simultaneous then an offset of the base stations transmission times, or alternatively times of individual transmissions according to some shared time keeping system, may be provided to the UE to assist its calculation of the UE location.
A time of arrival can be estimated using a known signal, i.e. Reference Signals (RSs) such as a Cell-specific Reference Signal, CRS, Primary Synchronization Signal, PSS, or Secondary Synchronization Signal, SSS. However, these RSs experience inter-cell interferences and hence, in 3GPP Release 9, Positioning Reference Signals (PRS) are introduced.
Specifically,
Furthermore,
The PRS is transmitted over NPRS={1, 2, 4, 6} consecutive subframes with a period of TPRS={160, 320, 640, 1280} subframes. The NPRS consecutive subframes of PRS transmission is known as a Positioning Occasion. An example of the Positioning Occasion and the period TPRS are shown in
For the sake of completeness, further information will now be given about a process of a UE determining its location through an uplink time difference of arrival method, which, as described later, may be adapted to be implemented in accordance with several embodiments of the present disclosure.
3GPP NR also supports UTDOA (Uplink Time Difference of Arrival) and other positioning methods, as described in [4].
In Uplink Time Difference of Arrival (UTDOA), a communications device transmits an uplink signal such as a Sounding Reference Signal (SRS) that is received by multiple infrastructure equipment. The SRS (uplink pilot) transmitted from the UE may arrive at different ones of the infrastructure equipment at different times. The infrastructure equipment (which may be synchronised to each other, for example using a time derived from a GPS receiver) determine these times of arrival and may send these times of arrival to a location server. The location server calculates a location of the communications device based on multilateration.
It is well known in the art that a UE can determine its location by using a Global Navigation Satellite System (GNSS) such as GPS, GLONASS, or another suitable system. These systems, in a simplified way, work on a basis of triangulation of the device with respect to a plurality of satellites (typically four satellites are required) to determine a location of a receiving device such as the UE. However, it is desirable that a network should have some way of determining the location of the UE independent of the UE reporting its position. If there are errors in the calculation of a UE's location, the difference between a UE's calculated location and its actual position may increase over time, causing substantial errors and leading to significant problems.
As mentioned below, it may also be desirable to verify a UE's reported location in order to help prevent UE location spoofing.
A recent discussion [7] identified various candidate NTN positioning methods for a determination of a UE location in an NTN network. These methods include:
In [4] it is observed that several terrestrial positioning techniques could be adapted to support verification of UE location using a single or multiple satellites. There are also a number of other techniques used to determine locations of UEs in terrestrial networks, such as sensors, WLAN, Bluetooth, Enhanced Cell ID (E-CID), the first three being dependent on external systems/sensors and network assistance, and E-CID being a legacy E-UTRA (Evolved UMTS (Universal Mobile Telecommunications System) Terrestrial Radio Access) positioning method. Several of these are being adapted for use in future NR standards.
Current 3GPP specifications define functionality for identifying an absolute location of a UE which is configured to operate in accordance with those specifications, and in communications with a wireless communications network operating according to those specifications. RTT uses measurements of a round-trip time of signals between the UE and multiple infrastructure equipment to determine a distance between the UE and each of the multiple infrastructure equipment, from which a location corresponding to the UE can be derived.
The above techniques, as well as OTDOA and UTDOA, rely on a measurement (of a signal strength and/or of a relative time of arrival) of signals transmitted by the UE and received at infrastructure equipment of the wireless communications network or of signals transmitted by infrastructure equipment and received at the UE.
Further details of 3GPP positioning methods are provided in [9], for example.
A UE may determine its location via various RAT-independent means, such as GNSS (as discussed above). These location methods are known as being accurate. The role of network verification of UE location is thus not to compete with traditional positioning methods, such as GNSS, but to verify a location of the UE reported by the UE to the network.
GNSS techniques such as GPS require four measurements in order to determine the {latitude, longitude, altitude} of a UE. Determining a GPS location requires the following steps:
In contrast, for UE location verification, it may not be necessary to determine an altitude of the UE. In this case, {latitude, longitude} can be determined with three measurements. UE location verification hence requires fewer measurements than position determination, and, as previously mentioned, may not need to be determined to the same level of precision as a UE location determined by the UE itself (e.g. via GNSS). In NTN systems, at any one time, the UE may only be able to see a single (or limited number of) satellites. This makes it difficult to perform traditional OTDOA or UTDOA positioning methods for the purposes of UE location verification. A RAT-dependent UE-location verification method that can operate with a single satellite is hence desirable. It is also desirable that the UE location verification method works for a variety of UE speeds, for example, up to 500 km/hour. Some examples UE location verification methods based on a single satellite are described below.
A Low Earth Orbit (LEO) satellite traverses the sky rapidly. For example, when in a 600 km altitude orbit, a LEO satellite moves at 7.56 km/second. Therefore, if positioning reference signals with reference to a same satellite are measured at different times, resulting reference signal measurements will be taken with the same satellite at different positions in the sky.
For simplicity, it is considered that the UE is on the surface of the earth 1005, which is modelled as a flat plane, and that any motion of the UE is negligible relative to the movement of the satellite over a given time period. The movement and distances shown are also represented as linear. In reality, the satellite will move in an arc and the Earth's surface will be an arc. However, the principles of the present technique can be demonstrated with sufficient accuracy using the simplified linear representation of
By approximating the speed of light as 3×108 m/s, a time of flight for a signal from the satellite to the UE, corresponding to a transmission distance of 619 km, 600 km, and 619 km respectively, at the various times can be calculated to be:
At position A, the satellite 1001 transmits a first DL reference signal to the UE 1010 and a delay 1121 is 2.063 ms as shown above. After a wait time 1122a of 20 seconds, by which time the satellite has moved to position B, the satellite transmits a second DL reference signal to the UE 1010. Position B is closer to the UE 1010 than position A (by 19 km) and thus the propagation delay 1123 is lower at 2.000 ms. After another wait time 1124a of 20 seconds, by which time the satellite has moved to position C, the satellite transmits a third DL reference signal to the UE 1010. Position C, like position A, is further from the UE 1010 than position B (by 19 km) and thus the propagation delay 1125 is again higher at 2.063 ms.
Based on reception times of these signals, the UE reports, to the network (e.g. via the satellite 1001 or via a terrestrial TRP 10) the following interarrival times 1122b, 1124b of the first and second DL reference signals (denoted AB) and the second and third DL reference signals (denoted BC):
The exact form of signaling used may be different. For example, the UE can signal a difference (delta) of the interarrival times from an inter-transmit time of 20 seconds. That is, the UE can report times of {AB: −0.063 ms, BC: +0.063 ms}, for example.
The network can calculate a location of the UE based on a known position of the satellite at the different transmit times of the DL reference signals, that is, at positions A, B, and C, and the time difference of arrival of the DL reference signals, wherein a relevant TDOA in the example shown in
Examples of the DL reference signals (also referred to as DL positioning signals or DL positioning reference signals) may include:
This positioning method may be used with more than one satellite, provided the network knows a timing of the DL reference signals of each satellite and location of each satellite.
UL TDOA techniques (or round trip time, RTT, measurements techniques) can also be used, wherein a UE transmits some UL reference signals (also referred to as UL positioning signals or UL positioning reference signals), such as a Sounding Reference Signal, SRS, on an UL channel, such as a Physical Random Access Channel, PRACH, and a network measures a time of arrival of these UL reference signals at a satellite. RTT techniques offer improved resilience to an issue of clock drift at the UE, since time difference of arrival of the UL reference signals can be measured even when a UE's clock is synchronized to DL frame timing.
An example of an operation of UE location verification using UL reference signals and RTT techniques is shown in
In
As discussed, it may be desirable for the network to be able to verify the location of a UE reported by that UE. This is because a UE may report its location incorrectly. This may be referred to as spoofing and may be carried out for fraudulent reasons, for example. For instance, a UE may be made to spoof its location to fraudulently obtain services only available in certain locations (e.g. certain countries) when the UE is not actually in such a location. A suitable verification function which is able to corroborate the UE location reported by the UE is therefore desirable.
A UE may spoof its location in the scenarios described above by providing modified location verification information (verification information) to the network. For example, if the UE is actually in location X and fraudulently reports that it is in location Y, the UE can adjust the verification information provided to the network such that it appears to be at location Y. This is exemplified in
For example, for the scenarios of
For example, for the scenario of
In another example, for the scenario of
It is noted that, in terms of actual communication (as opposed to generating spoofed verification information), the UE applies a UE-specific timing advance and frequency compensation (to deal with Doppler shift) based on its actual location X rather than its spoofed location Y.
There are hence potentially cases like the examples above in which a UE is able to provide incorrect measurements or signals for the location verification procedure in order to spoof its location. It is hence desirable to address this problem.
In examples of the present technique, ephemeris information transmitted to UEs in system information is incomplete. The incompleteness of the ephemeris information means that the UE is unable to make an accurate determination of satellite location. As the UE does not know the satellite location precisely, it is unable to spoof measurements that are used for location verification. For example, referring again to
In an example, the broadcast ephemeris information of the satellite is incomplete through being imprecise and/or inaccurate. That is, only a portion of the correct ephemeris information is provided. The remaining portion of the broadcast ephemeris information is either not broadcast (so the broadcast ephemeris information is imprecise, that is, not sufficiently precise for the satellite's location to be determined by the UE to enable the UE to spoof its location) or the remaining portion is broadcast with deliberate inaccuracies (so the broadcast ephemeris information is inaccurate, that is, not sufficiently accurate for the satellite's location to be determined by the UE to enable the UE to spoof its location). In either case, the UE cannot determine the satellite location with sufficient accuracy to enable it to calculate false verification information (e.g. the verification information associated with position Y when the UE is actually located at position X). Imprecise ephemeris information comprises, for example, a smaller number of bits than is necessary to signal the satellite location. Inaccurate ephemeris information comprises, for example, the necessary number of bits to signal the satellite location but with a portion of those bits (e.g. the highest precision/least significant bit(s) (LSBs) and/or a portion of those indicating the epoch time) randomly changed to falsify the true location of the satellite.
Once the UE location has been verified during an initial access phase based on the incomplete broadcast ephemeris information, the UE is provided with complete ephemeris information via dedicated signalling. The complete ephemeris information is the original ephemeris information (that is, without modification to make it inaccurate or imprecise) which enables the UE to accurately determine the satellite location. This is distinguished from the incomplete ephemeris information which is initially broadcast, the broadcast ephemeris information being incomplete in that it comprises only a portion of the original ephemeris information. The remaining portion has either been removed or replaced with inaccurate information.
Thus, for example, when the ephemeris information is incomplete, a UE cannot falsely adjust the reported DL (downlink) propagation delay (e.g. in the scenario of
Note that the reported DL propagation delay and UL signal timing are both examples of verification information associated with the UE. Verification information in the form of the reported DL propagation delay may be comprised in a signal transmitted to the network by the UE. Verification information in the form of the timing of UL signals is implicit in the transmission and/or reception times of the UL signals transmitted to the satellite by the UE. In any case, the verification information is indicative of the distance between the UE and satellite based on the propagation time of DL and/or UL signal(s) transmitted between the UE and satellite.
The network, however, does know the accurate satellite location and the reported UE location. The network can thus verify that the verification information associated with the UE (e.g. the reported propagation delay or UL signal timing) is consistent with the UE's reported location. Since the verification information at, for example, location Y, cannot be spoofed by a UE not actually at location Y (due to the incomplete broadcast ephemeris information of the satellite), this enables a more reliable verification of the UE's reported location by the network.
In an example, information transmitted by the UE which is used for UE location verification by the network (e.g. reported propagation delay and reported UE location) is transmitted by dedicated RRC (radio resource control) signalling. This helps preserve the security/reported privacy of this information. If the verification information associated with the UE and the reported UE location are consistent (indicating the UE is truthfully reporting its location), the UE is provided with the complete ephemeris information. On the other hand, if the verification information associated with the UE and the reported UE location are not consistent (indicating the UE may be falsely reporting its location), the network may drop the RRC connection.
At step 1411, the network broadcasts incomplete ephemeris information. For example, the incomplete ephemeris information is sufficient to enable transmission of signalling messages between the UE and satellite but not sufficient to enable accurate satellite positioning.
At step 1412, the network signals the configuration of the DL positioning signals to be used for network verification of UE location. This signalling is carried in system information, for example.
At step 1413, the network signals an indication that location verification information has to be included in the RRC Setup Request message. This signalling is carried in system information, for example.
In an example, the indication of step 1413 may be transmitted in another step of the initial access procedure. For example, an indication that location verification is required may be transmitted in Msg2 (a Random Access Response (RAR) message). Furthermore, the configuration of the DL positioning signals at step 1412 may be signalled differently, for example in Msg2 of the initial access procedure (the DL positioning signals themselves are therefore transmitted after Msg2 or Msg4, respectively, in these cases).
In an example, a single system information block may carry all of (1) the incomplete ephemeris information, (2) the configuration of the DL positioning signals and (3) the indication that location verification information has to be included in the RRC Setup Request message.
At step 1414, the network sends DL positioning reference signals (e.g. as exemplified in
At step 1415, the UE determines the verification information. For example, the UE measures the time of arrival of the DL positioning reference signals and uses this to determine the interarrival times between successive DL positioning reference signals (e.g. AB: 19.999937 seconds/−0.063 ms, BC: 20.000063 seconds/+0.063 ms in
At step 1416, as part of the UE initial access procedure, the UE signals its position and the verification information. These pieces of information are signalled, for example, in an RRC Setup Request message that is sent as Msg3 of the initial access procedure. The UE location is determined by the UE from a global navigation satellite system (GNSS) measurement, for example, and is the location that is to be verified with the verification information.
At step 1417, the network checks that the UE position report is consistent with the verification information. Since the UE does not yet have the complete ephemeris information, the UE cannot know the correct verification information to send unless it is genuinely located at its reported position.
If the reported UE position and the verification information are consistent, the network signals the complete ephemeris information (or, at least, the portion of the complete ephemeris information not previously broadcast) to the UE at step 1418. The complete ephemeris information is sent to the UE using dedicated RRC signalling, such as in an RRC message such as RRC Setup. In an example, the complete ephemeris information is sent once a secure connection between the UE and network has been established. This enables, for example, the complete ephemeris information to be ciphered and only decodable by the specific UE for which the RRC connection has been established, thereby preventing other UEs from decoding the complete ephemeris information.
At step 1419, once the UE has the complete ephemeris information, the UE and network commence the main data transfer.
At step 1420, the network broadcasts the incomplete ephemeris information. Again, for example, the incomplete ephemeris information is sufficient to enable transmission of signalling messages between the UE and satellite but not sufficient to enable accurate satellite positioning.
At step 1421, the network signals the configuration of the UL signals that are to be used for network UE location verification. This signalling may be carried in system information (as shown), for example, but may also be transmitted later in the message sequence, such as within the RAR of step 1423. Transmitting the UL signal configuration in system information rather than within the RAR means the size of the RAR message can be reduced (for example, this allows the RAR to indicate an index of an UL signal that the UE should transmit rather than the whole configuration of the UL signal).
At step 1422, the UE starts the initial access procedure by transmitting a PRACH (physical random access channel) preamble.
In an example, a single system information block may carry (1) the incomplete ephemeris information and (2) the configuration of the UL positioning signals.
At step 1423, the network sends a RAR message to the UE in response to receiving the PRACH preamble. When the UL signals are configured in step 1421 using system information, for example, the RAR message indicates which of these previously configured UL signals the UE should transmit. The RAR may also indicate the resources (for example time and frequency resources) assigned for the transmission of the UL signals (e.g. if these are not indicated at step 1421).
The assigned resources for the UL signal transmission may be located over a sufficient period of time in order to allow the satellite to move a sufficient distance between times at which the UL signals are transmitted. This allows for accurate multilateration of UE location. For example, the UE may be assigned resources to transmit UL signals at time 0 seconds, 20 seconds and 40 seconds (as exemplified in the scenario of
At step 1424, the UE transmits the UL signals that were previously configured and assigned.
At step 1425, the network determines verification information based on the transmitted UL signals. As exemplified in
At step 1426, the UE transmits Msg3 of the initial access procedure. This message may contain an RRC Setup Request indicating the UE location (e.g. a UE position report). Again, the UE location is determined by the UE from a GNSS measurement, for example, and is the location that is to be verified with the verification information.
Note, in another example, step 1426 may occur before steps 1424 and 1425.
At step 1427, the network checks for consistency between the UE position report (received at step 1426) and the verification information that was determined from the UL signal timing (at step 1425).
If the reported UE position and the verification information are consistent, the network signals the complete ephemeris information (or, at least, the portion of the complete ephemeris information not previously broadcast) to the UE at step 1428. The complete ephemeris information is sent to the UE using dedicated RRC signalling, such as in an RRC message such as RRC Setup. In an example, the complete ephemeris information is sent once a secure connection between the UE and network has been established. This enables, for example, the complete ephemeris information to be ciphered and only decodable by the specific UE for which the RRC connection has been established, thereby preventing other UEs from decoding the complete ephemeris information.
At step 1429, once the UE has the complete ephemeris information, the UE and network commence the main data transfer.
There are various forms the incomplete and complete ephemeris information may take.
In an example, the precision of the broadcast incomplete ephemeris information is limited. For example, the incomplete ephemeris information may comprise only a predetermined number of the most significant bits of the ephemeris information (that is, the most significant bit, second most significant bit, third most significant bit and so on, up to and including the predetermined number of most significant bits). The complete ephemeris information transmitted by dedicated signalling then comprises the remaining, least significant bits of the ephemeris information. The ephemeris information consists of multiple parameters, where the parameters depend on the format of the ephemeris information. The ephemeris information can be made incomplete by making one or more of these parameters incomplete. For example, the ephemeris information could include “X, Y, Z” position coordinates of the satellite as parameters and the ephemeris information could be made incomplete by only including the most significant bits (MSBs) of the position coordinates of the “X” axis while providing complete ephemeris information for the “Y” and “Z” position coordinates.
In another example, the epoch time indicated by the broadcast incomplete ephemeris information is incomplete. For example, the epoch time may be incomplete such that the UE can determine the orbital trajectory of the satellite but cannot determine where the satellite is on that trajectory. The complete ephemeris information transmitted by dedicated signalling then provides the complete epoch time (or, at least, the missing portion of the epoch time broadcast within the incomplete ephemeris information).
In another example, an error term is added to the ephemeris information to make it incomplete before it is broadcast as incomplete ephemeris information. Addition of the error term changes a portion of the ephemeris information to make it erroneous, meaning only the remaining portion of the ephemeris information is correct. The broadcast ephemeris information is therefore incomplete, since only a portion of the broadcast ephemeris information is actually correct. In an example, a random (or pseudo-random) error term known only to the network is added to the ephemeris information to be broadcast. The broadcast incomplete ephemeris information is then subsequently overwritten by the complete ephemeris information transmitted by dedicated signalling (which does not include the error term).
In another example, a portion of the broadcast ephemeris information is ciphered. For example, a portion of the bits representing the broadcast ephemeris information are ciphered or scrambled. While the UE is accessing the system (e.g. performing an initial access procedure), the UE does not know the deciphering key or scrambling sequence. It therefore cannot access the complete ephemeris information (rather, it can access only the non-ciphered or non-scrambled portion). Once the UE has verified its location during the initial access procedure, however, dedicated signalling (e.g. in Msg4) provides the deciphering key (to decipher the ciphered portion) or scrambling sequence (to descramble the scrambled portion), thereby allowing the UE to decode the complete ephemeris information.
It may be desirable for a UE in RRC connected mode to continually read broadcast ephemeris information (e.g. broadcast as system information) in order to maintain time and frequency synchronization with the network. If the broadcast ephemeris information is incomplete, an alternative is to provide the UE with updated ephemeris information via dedicated signalling. However, this may increase signalling overhead. The current example helps address this scenario by allowing a deciphering key or scrambling sequence to be provided by dedicated signalling after UE location verification. The UE can then obtain the complete ephemeris information from subsequently broadcast incomplete ephemeris information by completing the necessary decipher or descramble operation. This reduces signalling overhead, since the deciphering key or scrambling sequence needs to be transmitted only once by dedicated signalling and the UE is then able to obtain the latest complete ephemeris information via the broadcast ephemeris information. At the same time, a UE whose location has not been verified is unable to obtain the complete ephemeris information from the broadcast ephemeris information, since that UE does not have the deciphering key or scrambling sequence needed to decipher or descramble the relevant portion of the broadcast ephemeris information. The integrity of the system is therefore maintained while signalling overhead is reduced.
In an example, separate physical communication resources (e.g. time and/or frequency resources) are used when a UE uses broadcast incomplete ephemeris information. The use of incomplete ephemeris information will lead to the signals and channels used for communication between the UE and the network being incorrectly formed. For example, the UE-specific timing advance applied by the UE may be inaccurate or the frequency compensation applied may be incorrect. Thus, while the UE is operating based on incomplete ephemeris information, separate physical communication resources are used. For example, the separate physical communication resources are separated in time and/or frequency from physical communication resources used by UEs with access to complete ephemeris information such that errors in UE-specific timing advance and/or frequency compensation do not cause interference on signals transmitted between the UEs with access to complete ephemeris information and the network.
For instance, separate PUSCH resources in the time domain may be used. This alleviates the problem of PUSCH resources that have been inaccurately timing advanced or frequency compensated due to incomplete ephemeris information causing interference to accurately timing advanced and frequency compensated PUSCH resources. This principle may also be applied to other channels (such as PRACH).
In another example, a higher subcarrier spacing is applied to PUSCH resources used for transmission by UEs with only incomplete ephemeris information (compared to transmission by UEs with complete ephemeris information). This increases tolerance to frequency offsets and ICI (inter subcarrier interference). This principle may also be applied to other channels (such as PRACH).
In an example, in the scenario exemplified in
When the DL positioning reference signals are jittered, if a UE has complete ephemeris information, it may still apply a known timing offset to the verification information it provides to the network in order to indicate to the network it is in a different location to its actual location (e.g. by applying a timing offset associated with location Y when it is actually at location X in
In the above examples, the UE location verification procedure occurs during the initial access procedure. By performing the location verification at this early stage, an RRC connection is only set up in the first place if the UE's location is verified. However, location verification may happen at other times.
In an example, the UE is provided with an RRC connection at initial access without UE location verification. This RRC connection may be referred to as a probationary RRC connection. In order for the RRC connection to be continued, the UE's location must be verified within a certain time period. For example, for the scenario exemplified in
In an example, during the probationary RRC connection, a data amount cap or data rate cap is applied. This cap limits UE functionality until the UE location is verified.
In an example, the UE is scheduled in separate physical communication resources (e.g. time and/or frequency resources) during the probationary RRC connection. As explained above, these separate physical communication resources are designated for use by UEs which have not yet received the complete ephemeris information. For example, the UE may be scheduled in separate PUSCH resources, as previously discussed. As previously discussed, this helps alleviate performance degradation (e.g. interference) associated with UEs operating based on incomplete ephemeris information. The available separate physical communication resources may be limited, thereby limiting the data rate available to UEs that have an unverified location.
In an example, the UE connection is constrained during the probationary RRC connection. The UE connection may be constrained in various ways until the UE location is verified.
For instance, the UE may have no internet connection during the probationary RRC connection. For example, the UE may only be allowed to access the operator's intranet or use other non-internet connections.
As another example, a different internet connection charging scheme may be applied for the UE during the probationary RRC connection. For example, an operator may apply a discounted tariff for operation within one country (e.g. the “home” country) and a standard tariff for operation internationally. The standard tariff is applied for the UE until the UE location is verified. If the UE location is verified as being in the “home” country, the discounted tariff is then applied.
As another example, different internet content may be available to the UE during the probationary RRC connection. For instance, the UE location may need to be verified to determine whether the UE is allowed to access internet content that is acceptable in jurisdiction A or that is acceptable in jurisdiction B (e.g. depending on copyright permissions of the content). A so-called safe internet connection may therefore be established during the probationary RRC connection which allows the UE to access only the subset of internet content that is acceptable in both jurisdiction A and jurisdiction B. Once the UE's location has been verified, the UE is able to access the full set of internet content that is allowed in the jurisdiction in which the UE is located.
In an example, a UE that previously failed location verification is not assigned a probationary RRC connection. In this case, the UE is considered a suspect UE and is not assigned a probationary RRC connection. Rather, the UE location verification information which verifies the UE's reported location must be ascertained prior to the UE accessing the network. This may entail a delay (for example, a delay of up to 40 seconds for the scenario exemplified in
In an example, a UE is given a temporary RRC connection in order to receive information to allow location verification. If the UE does not provide location verification information during the initial access stage, it is provided with the temporary RRC connection. During the temporary RRC connection, the UE is signalled the information required for location verification. For instance, in the scenario exemplified in
The examples above relate, for example, to the transition between RRC idle mode and RRC connected mode. In RRC Connected mode, the UE may need to continually re-read the ephemeris information as it is updated. There may also be multiple handovers between satellites during the time of the connection. These events provide opportunities to re-verify the UE location.
In one example, generation of verification information is required after the UE re-reads the broadcast ephemeris information. Since the broadcast ephemeris information is incomplete, the network may verify the UE location when the UE re-reads the broadcast ephemeris information and provide the complete ephemeris information only when the UE's location is verified. If the network does not require re-verification of the UE location when the UE re-reads the broadcast ephemeris information (or at least does not require re-verification every time the UE re-reads the broadcast ephemeris information), it can signal the information required to derive the complete ephemeris information (for example, the deciphering key or scrambling sequence if a portion of the broadcast ephemeris information is ciphered or scrambled or the missing least significant bits of the broadcast ephemeris information) to the UE using dedicated signalling.
In another example, the UE may request the information to derive the complete ephemeris information (e.g. deciphering key, scrambling sequence or missing least significant bits) prior to re-reading the broadcast ephemeris information. The network can then respond, for example, with the requested information (e.g. if the network does not require the UE location to be re-verified), no information (e.g. if the network does require the UE location to be re-verified) or knowingly false or imprecise information (e.g. if the network does require the UE location to be re-verified).
UE location verification may be required after the UE reads broadcast incomplete ephemeris information from a new satellite in RRC Connected mode. When there is a handover between satellites, the UE is required to read the ephemeris information that is broadcast via that new satellite. In an example, the UE location needs to be verified when such a handover occurs. Since the UE does not know the complete ephemeris information of the new satellite, it is unable to spoof the correct location verification information. If the network does not require UE location verification following handover, it may, for example, signal the complete ephemeris information (or the information to derive the complete ephemeris information (e.g. deciphering key, scrambling sequence or missing least significant bits)) to the UE via dedicated signalling before handover.
The method starts at step 1601.
At step 1602, the wireless telecommunications apparatus is controlled (e.g. by controller 44) to receive (e.g. via receiver 48) first information associated with a satellite (e.g. satellite 1001, 1301) of the non-terrestrial wireless telecommunications network, the first information comprising incomplete ephemeris information of the satellite. The first information is received from the network, for example via a satellite (e.g. satellite 1001, 1301) or from a terrestrial node of the network acting as a TRP.
At step 1603, the wireless telecommunications apparatus is controlled (e.g. by controller 44) to transmit (e.g. via transmitter 49) a signal usable by a second wireless telecommunications apparatus to verify a location of the wireless telecommunications apparatus relative to the satellite. For example, the transmitted signal may indicate an interarrival time of DL positioning reference signals (as exemplified in
At step 1604, the wireless telecommunications apparatus is controlled (e.g. by controller 44) to receive (e.g. via receiver 48) second information associated with the satellite, the second information being usable by the wireless telecommunications apparatus to determine complete ephemeris information of the satellite. The second information is received from the network, for example from a satellite (e.g. satellite 1001, 1301) or from a terrestrial node of the network acting as a TRP.
The method ends at step 1605.
The method starts at step 1701.
At step 1702, the wireless telecommunications apparatus is controlled (e.g. by controller 34) to transmit (e.g. via transmitter 30), to a second wireless telecommunications apparatus (e.g. UE 1010, 1310), first information associated with a satellite (e.g. satellite 1001, 1301) of the non-terrestrial wireless telecommunications network, the first information comprising incomplete ephemeris information of the satellite.
At step 1703, the wireless telecommunications apparatus is controlled (e.g. by controller 34) to receive (e.g. via receiver 32) a signal usable by the wireless telecommunications apparatus to verify a location of the second wireless telecommunications apparatus relative to the satellite. For example, the received signal may indicate an interarrival time of DL positioning reference signals (as exemplified in
At step 1704, the wireless telecommunications apparatus is controlled (e.g. by controller 34) to verify the location of the second wireless telecommunications apparatus relative to the satellite using the received signal.
At step 1705, if the location of the second wireless telecommunications apparatus relative to the satellite is verified, the wireless telecommunications apparatus is controlled (e.g. by controller 34) to transmit (e.g. via transmitter 30), to the second wireless telecommunications apparatus, second information associated with the satellite, the second information being usable by the wireless telecommunications apparatus to determine complete ephemeris information of the satellite.
The method ends at step 1706.
Embodiment(s) of the present technique are defined by the following numbered clauses:
Numerous modifications and variations of the present disclosure are possible in light of the above teachings. It is therefore to be understood that, within the scope of the claims, the disclosure may be practiced otherwise than as specifically described herein.
In so far as embodiments of the disclosure have been described as being implemented, at least in part, by one or more software-controlled information processing apparatuses, it will be appreciated that a machine-readable medium (in particular, a non-transitory machine-readable medium) carrying such software, such as an optical disk, a magnetic disk, semiconductor memory or the like, is also considered to represent an embodiment of the present disclosure. In particular, the present disclosure should be understood to include a non-transitory storage medium comprising code components which cause a computer to perform any of the disclosed method(s).
It will be appreciated that the above description for clarity has described embodiments with reference to different functional units, circuitry and/or processors. However, it will be apparent that any suitable distribution of functionality between different functional units, circuitry and/or processors may be used without detracting from the embodiments.
Described embodiments may be implemented in any suitable form including hardware, software, firmware or any combination of these. Described embodiments may optionally be implemented at least partly as computer software running on one or more computer processors (e.g. data processors and/or digital signal processors). The elements and components of any embodiment may be physically, functionally and logically implemented in any suitable way. Indeed, the functionality may be implemented in a single unit, in a plurality of units or as part of other functional units. As such, the disclosed embodiments may be implemented in a single unit or may be physically and functionally distributed between different units, circuitry and/or processors.
Although the present disclosure has been described in connection with some embodiments, it is not intended to be limited to these embodiments. Additionally, although a feature may appear to be described in connection with particular embodiments, one skilled in the art would recognize that various features of the described embodiments may be combined in any manner suitable to implement the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
22174953.4 | May 2022 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2023/057463 | 3/23/2023 | WO |