WO2021125403A1 - Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil - Google Patents

Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil Download PDF

Info

Publication number
WO2021125403A1
WO2021125403A1 PCT/KR2019/018183 KR2019018183W WO2021125403A1 WO 2021125403 A1 WO2021125403 A1 WO 2021125403A1 KR 2019018183 W KR2019018183 W KR 2019018183W WO 2021125403 A1 WO2021125403 A1 WO 2021125403A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
communication
certificate
server
information
Prior art date
Application number
PCT/KR2019/018183
Other languages
English (en)
Korean (ko)
Inventor
김준웅
Original Assignee
엘지전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 엘지전자 주식회사 filed Critical 엘지전자 주식회사
Priority to PCT/KR2019/018183 priority Critical patent/WO2021125403A1/fr
Publication of WO2021125403A1 publication Critical patent/WO2021125403A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Definitions

  • This specification is a method for protecting V2X communication using a server in a wireless communication system.
  • a wireless communication system is a multiple access system that can support communication with multiple users by sharing available system resources (bandwidth, transmission power, etc.).
  • Examples of the multiple access system include a code division multiple access (CDMA) system, a frequency division multiple access (FDMA) system, a time division multiple access (TDMA) system, an orthogonal frequency division multiple access (OFDMA) system, and a single carrier frequency (SC-FDMA) system.
  • CDMA code division multiple access
  • FDMA frequency division multiple access
  • TDMA time division multiple access
  • OFDMA orthogonal frequency division multiple access
  • SC-FDMA single carrier frequency
  • M2M machine-to-machine
  • Various devices and technologies such as smartphones and tablet PCs, which require machine-to-machine (M2M) communication and high data transfer rates, are emerging and disseminated. Accordingly, the amount of data required to be processed in a cellular network is increasing very rapidly.
  • carrier aggregation technology, cognitive radio technology, etc. to efficiently use more frequency bands, increase the data capacity transmitted within a limited frequency.
  • an automobile may be classified into an internal combustion engine automobile, an external combustion engine automobile, a gas turbine automobile, an electric vehicle, or the like, depending on the type of the prime mover used. .
  • Autonomous vehicle refers to a vehicle that can drive itself without driver or passenger manipulation
  • Automated Vehicle & Highway Systems is a system that monitors and controls such autonomous vehicles so that they can operate on their own.
  • An object of the present specification is to propose a protection method for the signaling procedure of the 3GPP Layer in direct communication through PC5 between terminals.
  • the technical problems to be achieved by the present specification propose a method of using an application server to protect the signaling procedure of the 3GPP Layer in direct communication through PC5 between terminals.
  • An aspect of the present specification in a method for a UE (User Equipment) in a wireless communication system to protect V2X (Vehicle-to-Everything) communication using a server, to protect the V2X communication with the server transmitting a key request message for requesting generation of a security key; receiving an identifier generated in a core network for authenticating the terminal from the server; transmitting a certificate request message including the identifier to request a certificate (certificate) associated with the identifier for the V2X communication to the core network; and receiving the certificate and a private key as a response to the certificate request message from the core network based on verification of the identifier through the core network.
  • a UE User Equipment
  • V2X Vehicle-to-Everything
  • the certificate may be for determining whether the terminal is allowed in relation to the V2X communication through mutual authentication with another terminal.
  • the key request message may include subscriber information related to the user of the terminal available in the core network and the server.
  • the certificate may include information on a period during which the certificate is valid, set by a service provider related to the server.
  • transmitting the certificate to another terminal; receiving, from the other terminal, a certificate of the other terminal; and transmitting, to the other terminal, a security key for direct communication with the other terminal based on the verification of the certificate of the other terminal. may further include.
  • the terminal may establish a unicast link with the other terminal through a security key for direct communication with the other terminal.
  • V2X Vehicle-to-Everything
  • UE User Equipment
  • Generating a certificate (certificate) and a first identifier related to the certificate for the V2X communication when the terminal is a terminal allowed in relation to the V2X communication based on the information of the terminal; and transmitting the first identifier to the server. may include.
  • receiving a certificate request message for requesting the certificate including the second identifier associated with the terminal from the terminal; and when the second identifier is valid based on the first identifier, transmitting the certificate and the private key to the terminal as a response to the certificate request message. may further include.
  • the certificate may include information on the period during which the certificate is valid, set by the provider of the service related to the V2X communication received from the server.
  • the information of the terminal may include subscriber information related to the user of the terminal, which can be used in the core network and the server.
  • the information of the terminal may further include the secret key generated by the server in relation to the terminal.
  • the secret key may be encrypted using a secret key related to a certificate of the terminal preset by the server based on a plurality of terminals.
  • a terminal for protecting V2X (Vehicle-to-Everything) communication using a server in a wireless communication system, comprising: a transceiver; Memory; and a processor for controlling the transceiver and the memory, wherein the transceiver transmits a key request message for requesting generation of a security key for protecting the V2X communication to the server, and from the server Receives an identifier generated in the core network for authenticating the terminal, and transmits a certificate request message including the identifier to request a certificate (certificate) associated with the identifier for the V2X communication to the core network, Based on the verification of the identifier through the core network, the certificate and the private key may be received from the core network as a response to the certificate request message.
  • UE User Equipment
  • a security key for protecting the V2X communication
  • the identifier may be related to the generated certificate (certificate) for the V2X communication when the terminal is a terminal allowed in relation to the V2X communication through the core network.
  • the certificate may be for determining whether the terminal is allowed in relation to the V2X communication through mutual authentication with another terminal.
  • the information of the terminal may include subscriber information related to the user of the terminal, which can be used in the core network and the server.
  • the signed secret key may be encrypted with a secret key related to a preset certificate of the terminal based on a plurality of terminals.
  • an application server may be used for protection regarding the signaling procedure of the 3GPP Layer in direct communication through PC5 between terminals.
  • FIG 1 shows an AI device according to an embodiment of the present specification.
  • FIG 2 shows an AI server according to an embodiment of the present specification.
  • FIG 3 shows an AI system according to an embodiment of the present specification.
  • EPS Evolved Packet System
  • EPC Evolved Packet Core
  • E-UTRAN evolved universal terrestrial radio access network
  • FIG. 6 is a diagram illustrating an architecture of a general NR-RAN.
  • 11 is an example of a provisioned AF-based service parameter to which this specification is applied.
  • FIG. 14 is a diagram illustrating a procedure for a broadcast mode of V2X communication using PC5.
  • 15 is a diagram illustrating a procedure for a groupcast mode of V2X communication using PC5.
  • 16 is a diagram illustrating a procedure for a unicast mode of V2X communication using PC5.
  • FIG. 17 illustrates a link identifier update procedure for a unicast link to which this specification can be applied.
  • 20 is an exemplary diagram showing the structure of a radio interface protocol (Radio Interface Protocol) in the control plane between the UE and the eNodeB.
  • Radio Interface Protocol Radio Interface Protocol
  • 21 is an example of the configuration of the 3GPP V2X Layer and Application Layer (or ITS Layer) to which this specification can be applied.
  • 25 is an embodiment of a server to which this specification can be applied.
  • 26 shows a wireless communication device according to an embodiment of the present specification.
  • FIG. 27 illustrates a block diagram of a network node according to an embodiment of the present specification.
  • FIG. 28 illustrates a block diagram of a communication device according to an embodiment of the present specification.
  • Embodiments of the present specification may be supported by standard documents disclosed in at least one of the wireless access systems IEEE 802.xx system, 3GPP system, 3GPP LTE system, and 3GPP2 system. That is, obvious steps or parts not described in the embodiments of the present specification may be described with reference to the above documents.
  • 3GPP TS 36.211, 3GPP TS 36.213, 3GPP TS 36.321, 3GPP TS 36.322, 3GPP TS 36.323, 3GPP TS 36.331, 3GPP TS 23.203, 3GPP TS 23.401, 3GPP TS 24.228, 3GPP TS 23.228, 3GPP TS 23.228 , 3GPP TS 23.218, 3GPP TS 22.011, 3GPP TS 36.413 may be incorporated by one or more of the standard documents.
  • the base station has a meaning as a terminal node of a network that directly communicates with the terminal.
  • a specific operation described as being performed by the base station in this document may be performed by an upper node of the base station in some cases. That is, it is obvious that various operations performed for communication with the terminal in a network including a plurality of network nodes including the base station may be performed by the base station or other network nodes other than the base station.
  • BS Base Station
  • BS Base Station
  • BS Base Station
  • eNB evolved-NodeB
  • BTS base transceiver system
  • AP Access Point
  • gNB General NB
  • 'terminal' may be fixed or have mobility, UE (User Equipment), MS (Mobile Station), UT (user terminal), MSS (Mobile Subscriber Station), SS (Subscriber Station), AMS ( Advanced Mobile Station), a wireless terminal (WT), a machine-type communication (MTC) device, a machine-to-machine (M2M) device, a device-to-device (D2D) device, and the like.
  • UE User Equipment
  • MS Mobile Station
  • UT user terminal
  • MSS Mobile Subscriber Station
  • SS Subscriber Station
  • AMS Advanced Mobile Station
  • WT wireless terminal
  • MTC machine-type communication
  • M2M machine-to-machine
  • D2D device-to-device
  • downlink means communication from a base station to a terminal
  • uplink means communication from a terminal to a base station.
  • the transmitter may be a part of the base station, and the receiver may be a part of the terminal.
  • the transmitter may be a part of the terminal, and the receiver may be a part of the base station.
  • 3GPP LTE/LTE-A/NR New Radio
  • the three main requirements areas for 5G are (1) Enhanced Mobile Broadband (eMBB) area, (2) Massive Machine Type Communication (mMTC) area and (3) Ultra-reliable and It includes an Ultra-reliable and Low Latency Communications (URLLC) area.
  • eMBB Enhanced Mobile Broadband
  • mMTC Massive Machine Type Communication
  • URLLC Ultra-reliable and Low Latency Communications
  • KPI key performance indicator
  • eMBB goes far beyond basic mobile internet access, covering rich interactive work, media and entertainment applications in the cloud or augmented reality.
  • Data is one of the key drivers of 5G, and for the first time in the 5G era, we may not see dedicated voice services.
  • voice is simply expected to be processed as an application using the data connection provided by the communication system.
  • the main causes for increased traffic volume are an increase in content size and an increase in the number of applications requiring high data rates.
  • Streaming services audio and video
  • interactive video and mobile Internet connections will become more widely used as more devices are connected to the Internet. Many of these applications require always-on connectivity to push real-time information and notifications to users.
  • Cloud storage and applications are rapidly increasing in mobile communication platforms, which can be applied to both work and entertainment.
  • cloud storage is a special use case that drives the growth of uplink data rates.
  • 5G is also used for remote work in the cloud, requiring much lower end-to-end latency to maintain a good user experience when tactile interfaces are used.
  • Entertainment For example, cloud gaming and video streaming are other key factors that increase the demand for mobile broadband capabilities. Entertainment is essential on smartphones and tablets anywhere, including in high-mobility environments such as trains, cars and airplanes.
  • Another use example is augmented reality for entertainment and information retrieval.
  • augmented reality requires very low latency and instantaneous amount of data.
  • URLLC includes new services that will transform the industry through ultra-reliable/low-latency links that allow for remote control of critical infrastructure and self-driving vehicles, such as self-driving vehicles. This level of reliability and latency is essential for smart grid control, industrial automation, robotics, and drone control and coordination.
  • 5G could complement fiber-to-the-home (FTTH) and cable-based broadband (or DOCSIS) as a means of delivering streams rated at hundreds of megabits per second to gigabits per second. This high speed is required to deliver TVs in resolutions of 4K and higher (6K, 8K and higher), as well as virtual and augmented reality.
  • Virtual Reality (VR) and Augmented Reality (AR) applications almost include immersive sporting events. Certain applications may require special network settings. For VR games, for example, game companies may need to integrate core servers with network operators' edge network servers to minimize latency.
  • Automotive is expected to be an important new driving force for 5G, with many use cases for mobile communication to vehicles. For example, entertainment for passengers requires simultaneous high capacity and high mobility mobile broadband. The reason is that future users will continue to expect high-quality connections regardless of their location and speed.
  • Another use case in the automotive sector is augmented reality dashboards. It identifies objects in the dark and overlays information that tells the driver about the distance and movement of the object over what the driver is seeing through the front window.
  • wireless modules will allow for communication between vehicles, the exchange of information between the vehicle and the supporting infrastructure, and the exchange of information between the automobile and other connected devices (eg, devices carried by pedestrians).
  • Safety systems can help drivers reduce the risk of accidents by guiding alternative courses of action to help them drive safer.
  • the next step will be remote-controlled or self-driven vehicles.
  • This requires very reliable and very fast communication between different self-driving vehicles and between vehicles and infrastructure.
  • self-driving vehicles will perform all driving activities, allowing drivers to focus only on traffic anomalies that the vehicle itself cannot discern.
  • the technical requirements of self-driving vehicles demand ultra-low latency and ultra-fast reliability to increase traffic safety to levels that are unattainable by humans.
  • Smart cities and smart homes referred to as smart societies, will be embedded with high-density wireless sensor networks.
  • a distributed network of intelligent sensors will identify conditions for cost and energy-efficient maintenance of a city or house.
  • a similar setup can be performed for each household.
  • Temperature sensors, window and heating controllers, burglar alarms and appliances are all connected wirelessly. Many of these sensors are typically low data rates, low power and low cost. However, for example, real-time HD video may be required in certain types of devices for surveillance.
  • Smart grids use digital information and communication technologies to interconnect these sensors to collect information and act on it. This information can include supplier and consumer behavior, enabling smart grids to improve efficiency, reliability, economics, sustainability of production and distribution of fuels such as electricity in an automated manner.
  • the smart grid can also be viewed as another low-latency sensor network.
  • the health sector has many applications that can benefit from mobile communications.
  • the communication system may support telemedicine providing clinical care from a remote location. This can help reduce barriers to distance and improve access to consistently unavailable health care services in remote rural areas. It is also used to save lives in critical care and emergency situations.
  • a wireless sensor network based on mobile communication may provide remote monitoring and sensors for parameters such as heart rate and blood pressure.
  • Wireless and mobile communications are becoming increasingly important in industrial applications. Wiring is expensive to install and maintain. Thus, the tolerance for replacement of cables with reconfigurable wireless links is an attractive opportunity for many industries. However, achieving this requires that the wireless connection operate with cable-like delay, reliability and capacity, and that its management be simplified. Low latency and very low error probability are new requirements that need to be connected with 5G.
  • Logistics and freight tracking are important use cases for mobile communications that use location-based information systems to allow tracking of inventory and packages from anywhere.
  • Logistics and freight tracking use cases typically require low data rates but require wide range and reliable location information.
  • Machine learning refers to a field that defines various problems dealt with in the field of artificial intelligence and studies methodologies to solve them. do.
  • Machine learning is also defined as an algorithm that improves the performance of a certain task through constant experience.
  • An artificial neural network is a model used in machine learning, and may refer to an overall model having problem-solving ability, which is composed of artificial neurons (nodes) that form a network by combining synapses.
  • An artificial neural network may be defined by a connection pattern between neurons of different layers, a learning process that updates model parameters, and an activation function that generates an output value.
  • the artificial neural network may include an input layer, an output layer, and optionally one or more hidden layers. Each layer includes one or more neurons, and the artificial neural network may include neurons and synapses connecting neurons. In the artificial neural network, each neuron may output a function value of an activation function for input signals, weights, and biases input through synapses.
  • Model parameters refer to parameters determined through learning, and include the weight of synaptic connections and the bias of neurons.
  • the hyperparameter refers to a parameter that must be set before learning in a machine learning algorithm, and includes a learning rate, the number of iterations, a mini-batch size, an initialization function, and the like.
  • the purpose of learning the artificial neural network can be seen as determining the model parameters that minimize the loss function.
  • the loss function may be used as an index for determining optimal model parameters in the learning process of the artificial neural network.
  • Machine learning can be classified into supervised learning, unsupervised learning, and reinforcement learning according to a learning method.
  • Supervised learning refers to a method of training an artificial neural network in a state where a label for training data is given, and the label is the correct answer (or result value) that the artificial neural network should infer when the training data is input to the artificial neural network.
  • Unsupervised learning may refer to a method of training an artificial neural network in a state where no labels are given for training data.
  • Reinforcement learning can refer to a learning method in which an agent defined in an environment learns to select an action or sequence of actions that maximizes the cumulative reward in each state.
  • machine learning implemented as a deep neural network (DNN) including a plurality of hidden layers is also called deep learning (deep learning), and deep learning is a part of machine learning.
  • DNN deep neural network
  • deep learning deep learning
  • machine learning is used in a sense including deep learning.
  • a robot can mean a machine that automatically handles or operates a task given by its own capabilities.
  • a robot having a function of recognizing an environment and performing an operation by self-judgment may be called an intelligent robot.
  • Robots can be classified into industrial, medical, home, military, etc. depending on the purpose or field of use.
  • the robot may be provided with a driving unit including an actuator or a motor to perform various physical operations such as moving the robot joints.
  • the moving robot includes a wheel, a brake, a propeller, etc. in the driving unit, and can travel on the ground or fly in the air through the driving unit.
  • Autonomous driving refers to a technology that drives by itself, and an autonomous driving vehicle refers to a vehicle that runs without a user's manipulation or with a minimal user's manipulation.
  • autonomous driving includes technology for maintaining a driving lane, technology for automatically adjusting speed such as adaptive cruise control, technology for automatically driving along a predetermined route, technology for automatically setting a route when a destination is set, etc. All of these can be included.
  • the vehicle includes a vehicle having only an internal combustion engine, a hybrid vehicle having both an internal combustion engine and an electric motor, and an electric vehicle having only an electric motor, and may include not only automobiles, but also trains, motorcycles, and the like.
  • the autonomous vehicle may be viewed as a robot having an autonomous driving function.
  • the extended reality is a generic term for virtual reality (VR), augmented reality (AR), and mixed reality (MR).
  • VR technology provides only CG images of objects or backgrounds in the real world
  • AR technology provides virtual CG images on top of images of real objects
  • MR technology is a computer that mixes and combines virtual objects in the real world. graphic technology.
  • MR technology is similar to AR technology in that it shows both real and virtual objects. However, there is a difference in that in AR technology, a virtual object is used in a form that complements a real object, whereas in MR technology, a virtual object and a real object are used with equal characteristics.
  • HMD Head-Mount Display
  • HUD Head-Up Display
  • mobile phone tablet PC, laptop, desktop, TV, digital signage, etc.
  • FIG 1 shows an AI device 100 according to an embodiment of the present specification.
  • AI device 100 is TV, projector, mobile phone, smartphone, desktop computer, notebook computer, digital broadcasting terminal, PDA (personal digital assistants), PMP (portable multimedia player), navigation, tablet PC, wearable device, set-top box (STB) ), a DMB receiver, a radio, a washing machine, a refrigerator, a desktop computer, a digital signage, a robot, a vehicle, etc., may be implemented as a fixed device or a device allowing movement.
  • the terminal 100 includes a communication unit 110 , an input unit 120 , a learning processor 130 , a sensing unit 140 , an output unit 150 , a memory 170 and a processor 180 , and the like. may include
  • the communication unit 110 may transmit/receive data to and from external devices such as other AI devices 100a to 100e or the AI server 200 using wired/wireless communication technology.
  • the communication unit 110 may transmit/receive sensor information, a user input, a learning model, a control signal, and the like with external devices.
  • the communication technology used by the communication unit 110 includes GSM (Global System for Mobile communication), CDMA (Code Division Multi Access), LTE (Long Term Evolution), 5G, WLAN (Wireless LAN), Wi-Fi (Wireless-Fidelity) ), Bluetooth, RFID (Radio Frequency Identification), Infrared Data Association (IrDA), ZigBee, NFC (Near Field Communication), and the like.
  • GSM Global System for Mobile communication
  • CDMA Code Division Multi Access
  • LTE Long Term Evolution
  • 5G Fifth Generation
  • WLAN Wireless LAN
  • Wi-Fi Wireless-Fidelity
  • Bluetooth Bluetooth
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • ZigBee ZigBee
  • NFC Near Field Communication
  • the input unit 120 may acquire various types of data.
  • the input unit 120 may include a camera for inputting an image signal, a microphone for receiving an audio signal, a user input unit for receiving information from a user, and the like.
  • the camera or microphone may be treated as a sensor, and a signal obtained from the camera or microphone may be referred to as sensing data or sensor information.
  • the input unit 120 may acquire training data for model training, input data to be used when acquiring an output using the training model, and the like.
  • the input unit 120 may acquire raw input data, and in this case, the processor 180 or the learning processor 130 may extract an input feature as a preprocessing for the input data.
  • the learning processor 130 may train a model composed of an artificial neural network by using the training data.
  • the learned artificial neural network may be referred to as a learning model.
  • the learning model may be used to infer a result value with respect to new input data other than the training data, and the inferred value may be used as a basis for a decision to perform a certain operation.
  • the learning processor 130 may perform AI processing together with the learning processor 240 of the AI server 200 .
  • the learning processor 130 may include a memory integrated or implemented in the AI device 100 .
  • the learning processor 130 may be implemented using the memory 170 , an external memory directly coupled to the AI device 100 , or a memory maintained in an external device.
  • the sensing unit 140 may acquire at least one of internal information of the AI device 100 , information on the surrounding environment of the AI device 100 , and user information by using various sensors.
  • sensors included in the sensing unit 140 include a proximity sensor, an illuminance sensor, an acceleration sensor, a magnetic sensor, a gyro sensor, an inertial sensor, an RGB sensor, an IR sensor, a fingerprint recognition sensor, an ultrasonic sensor, an optical sensor, a microphone, and a lidar. , radar, etc.
  • the output unit 150 may generate an output related to visual, auditory or tactile sense.
  • the output unit 150 may include a display unit that outputs visual information, a speaker that outputs auditory information, and a haptic module that outputs tactile information.
  • the memory 170 may store data supporting various functions of the AI device 100 .
  • the memory 170 may store input data obtained from the input unit 120 , learning data, a learning model, a learning history, and the like.
  • the processor 180 may determine at least one execution permitted operation of the AI device 100 based on information determined or generated using a data analysis algorithm or a machine learning algorithm. In addition, the processor 180 may control the components of the AI device 100 to perform the determined operation.
  • the processor 180 may request, search, receive, or utilize the data of the learning processor 130 or the memory 170 , and an operation that is predicted or desirable among the at least one execution permitted operation. It is possible to control the components of the AI device 100 to execute.
  • the processor 180 may generate a control signal for controlling the corresponding external device and transmit the generated control signal to the corresponding external device.
  • the processor 180 may obtain intention information with respect to a user input and determine a user's requirement based on the obtained intention information.
  • the processor 180 uses at least one of a speech to text (STT) engine for converting a voice input into a character string or a natural language processing (NLP) engine for obtaining intention information of a natural language. Intention information corresponding to the input may be obtained.
  • STT speech to text
  • NLP natural language processing
  • At least one of the STT engine and the NLP engine may be configured as an artificial neural network, at least a part of which is learned according to a machine learning algorithm. And, at least one of the STT engine or the NLP engine is learned by the learning processor 130 , or learned by the learning processor 240 of the AI server 200 , or learned by distributed processing thereof. it could be
  • the processor 180 collects history information including the user's feedback on the operation contents or operation of the AI device 100 and stores it in the memory 170 or the learning processor 130, or the AI server 200 It can be transmitted to an external device.
  • the collected historical information may be used to update the learning model.
  • the processor 180 may control at least some of the components of the AI device 100 in order to drive an application program stored in the memory 170 . Furthermore, in order to drive the application program, the processor 180 may operate two or more of the components included in the AI device 100 in combination with each other.
  • FIG 2 shows an AI server 200 according to an embodiment of the present specification.
  • the AI server 200 may refer to a device that trains an artificial neural network using a machine learning algorithm or uses a learned artificial neural network.
  • the AI server 200 may be configured with a plurality of servers to perform distributed processing, and may be defined as a 5G network.
  • the AI server 200 may be included as a part of the AI device 100 to perform at least a part of AI processing together.
  • the AI server 200 may include a communication unit 210 , a memory 230 , a learning processor 240 , and a processor 260 .
  • the communication unit 210 may transmit/receive data to and from an external device such as the AI device 100 .
  • the memory 230 may include a model storage unit 231 .
  • the model storage unit 231 may store a model (or artificial neural network, 231a) being trained or learned through the learning processor 240 .
  • the learning processor 240 may train the artificial neural network 231a using the training data.
  • the learning model may be used while being mounted on the AI server 200 of the artificial neural network, or may be used while being mounted on an external device such as the AI device 100 .
  • the learning model may be implemented in hardware, software, or a combination of hardware and software.
  • one or more instructions constituting the learning model may be stored in the memory 230 .
  • the processor 260 may infer a result value with respect to new input data using the learning model, and may generate a response or a control command based on the inferred result value.
  • FIG 3 shows an AI system 1 according to an embodiment of the present specification.
  • the AI system 1 includes at least one of an AI server 200 , a robot 100a , an autonomous vehicle 100b , an XR device 100c , a smart phone 100d , or a home appliance 100e . It is connected to the cloud network 10 .
  • the robot 100a to which the AI technology is applied, the autonomous driving vehicle 100b, the XR device 100c, the smart phone 100d, or the home appliance 100e may be referred to as AI devices 100a to 100e.
  • the cloud network 10 may constitute a part of the cloud computing infrastructure or may refer to a network existing in the cloud computing infrastructure.
  • the cloud network 10 may be configured using a 3G network, a 4G or Long Term Evolution (LTE) network, or a 5G network.
  • LTE Long Term Evolution
  • each of the devices 100a to 100e and 200 constituting the AI system 1 may be connected to each other through the cloud network 10 .
  • each of the devices 100a to 100e and 200 may communicate with each other through the base station, but may also directly communicate with each other without passing through the base station.
  • the AI server 200 may include a server performing AI processing and a server performing an operation on big data.
  • the AI server 200 includes at least one or more of the AI devices constituting the AI system 1, such as a robot 100a, an autonomous vehicle 100b, an XR device 100c, a smartphone 100d, or a home appliance 100e. It is connected through the cloud network 10 and may help at least a part of AI processing of the connected AI devices 100a to 100e.
  • the AI server 200 may train the artificial neural network according to a machine learning algorithm on behalf of the AI devices 100a to 100e, and directly store the learning model or transmit it to the AI devices 100a to 100e.
  • the AI server 200 receives input data from the AI devices 100a to 100e, infers a result value with respect to the input data received using the learning model, and provides a response or control command based on the inferred result value. It can be generated and transmitted to the AI devices 100a to 100e.
  • the AI devices 100a to 100e may infer a result value with respect to input data using a direct learning model, and generate a response or a control command based on the inferred result value.
  • the AI devices 100a to 100e to which the above-described technology is applied will be described.
  • the AI devices 100a to 100e shown in FIG. 3 can be viewed as specific examples of the AI device 100 shown in FIG. 1 .
  • the robot 100a may be implemented as a guide robot, a transport robot, a cleaning robot, a wearable robot, an entertainment robot, a pet robot, an unmanned flying robot, etc. to which AI technology is applied.
  • the robot 100a may include a robot control module for controlling an operation, and the robot control module may mean a software module or a chip implemented as hardware.
  • the robot 100a obtains state information of the robot 100a by using sensor information obtained from various types of sensors, detects (recognizes) the surrounding environment and objects, generates map data, moves path and travels A plan may be determined, a response to a user interaction may be determined, or an action may be determined.
  • the robot 100a may use sensor information obtained from at least one sensor among LiDAR, radar, and camera to determine a movement path and a travel plan.
  • the robot 100a may perform the above-described operations using a learning model composed of at least one artificial neural network.
  • the robot 100a may recognize a surrounding environment and an object using a learning model, and may determine an operation using the recognized surrounding environment information or object information.
  • the learning model may be directly learned from the robot 100a or learned from an external device such as the AI server 200 .
  • the robot 100a may perform an operation by generating a result by using the direct learning model, but transmits sensor information to an external device such as the AI server 200 and receives the result generated accordingly to perform the operation You may.
  • the robot 100a determines a movement path and travel plan using at least one of map data, object information detected from sensor information, or object information obtained from an external device, and controls the driving unit to apply the determined movement path and travel plan. Accordingly, the robot 100a may be driven.
  • the map data may include object identification information for various objects disposed in a space in which the robot 100a moves.
  • the map data may include object identification information for fixed objects such as walls and doors, and objects that are allowed to move, such as flowerpots and desks.
  • the object identification information may include a name, a type, a distance, a location, and the like.
  • the robot 100a may perform an operation or drive by controlling the driving unit based on the user's control/interaction.
  • the robot 100a may acquire intention information of an interaction according to a user's motion or voice utterance, determine a response based on the acquired intention information, and perform the operation.
  • the autonomous driving vehicle 100b may be implemented as a mobile robot, a vehicle, an unmanned aerial vehicle, etc. by applying AI technology.
  • the autonomous driving vehicle 100b may include an autonomous driving control module for controlling an autonomous driving function, and the autonomous driving control module may mean a software module or a chip implemented as hardware.
  • the autonomous driving control module may be included as a component of the autonomous driving vehicle 100b, or may be configured and connected to the outside of the autonomous driving vehicle 100b as separate hardware.
  • the autonomous driving vehicle 100b acquires state information of the autonomous driving vehicle 100b using sensor information obtained from various types of sensors, detects (recognizes) surrounding environments and objects, generates map data, A moving route and a driving plan may be determined, or an operation may be determined.
  • the autonomous vehicle 100b may use sensor information obtained from at least one sensor among LiDAR, radar, and camera, similarly to the robot 100a, in order to determine a moving route and a driving plan.
  • the autonomous vehicle 100b may receive sensor information from external devices to recognize an environment or object for an area where the field of view is blocked or an area over a certain distance, or receive information recognized directly from external devices. .
  • the autonomous vehicle 100b may perform the above-described operations using a learning model composed of at least one artificial neural network.
  • the autonomous driving vehicle 100b may recognize a surrounding environment and an object using a learning model, and may determine a driving route using the recognized surrounding environment information or object information.
  • the learning model may be directly learned from the autonomous vehicle 100b or learned from an external device such as the AI server 200 .
  • the autonomous vehicle 100b may generate a result by using a direct learning model and perform an operation, but operates by transmitting sensor information to an external device such as the AI server 200 and receiving the result generated accordingly. can also be performed.
  • the autonomous driving vehicle 100b determines a moving route and a driving plan by using at least one of map data, object information detected from sensor information, or object information acquired from an external device, and controls the driving unit to determine the moving path and driving.
  • the autonomous vehicle 100b may be driven according to a plan.
  • the map data may include object identification information for various objects disposed in a space (eg, a road) in which the autonomous vehicle 100b travels.
  • the map data may include object identification information for fixed objects such as street lights, rocks, and buildings, and objects that are allowed to move, such as vehicles and pedestrians.
  • the object identification information may include a name, a type, a distance, a location, and the like.
  • the autonomous vehicle 100b may perform an operation or drive by controlling the driving unit based on the user's control/interaction.
  • the autonomous vehicle 100b may acquire intention information of an interaction according to a user's motion or voice utterance, determine a response based on the obtained intention information, and perform the operation.
  • the XR apparatus 100c is AI technology applied, so a head-mount display (HMD), a head-up display (HUD) provided in a vehicle, a television, a mobile phone, a smart phone, a computer, a wearable device, a home appliance, and a digital signage , a vehicle, a stationary robot, or a mobile robot.
  • HMD head-mount display
  • HUD head-up display
  • the XR device 100c analyzes three-dimensional point cloud data or image data obtained through various sensors or from an external device to generate position data and attribute data for three-dimensional points, thereby providing information on surrounding space or real objects. It can be obtained and output by rendering the XR object to be output. For example, the XR apparatus 100c may output an XR object including additional information on the recognized object to correspond to the recognized object.
  • the XR apparatus 100c may perform the above operations by using a learning model composed of at least one artificial neural network.
  • the XR apparatus 100c may recognize a real object from 3D point cloud data or image data using a learning model, and may provide information corresponding to the recognized real object.
  • the learning model may be directly learned from the XR device 100c or learned from an external device such as the AI server 200 .
  • the XR device 100c may perform an operation by generating a result using the direct learning model, but transmits sensor information to an external device such as the AI server 200 and receives the result generated accordingly to perform the operation. can also be done
  • the robot 100a may be implemented as a guide robot, a transport robot, a cleaning robot, a wearable robot, an entertainment robot, a pet robot, an unmanned flying robot, etc. to which AI technology and autonomous driving technology are applied.
  • the robot 100a to which AI technology and autonomous driving technology are applied may mean a robot having an autonomous driving function or a robot 100a that interacts with the autonomous driving vehicle 100b.
  • the robot 100a having an autonomous driving function may collectively refer to devices that move by themselves according to a given movement line without user's control, or move by determining a movement line by themselves.
  • the robot 100a with the autonomous driving function and the autonomous driving vehicle 100b may use a common sensing method to determine one or more of a moving route or a driving plan.
  • the robot 100a having an autonomous driving function and the autonomous driving vehicle 100b may determine one or more of a moving route or a driving plan by using information sensed through lidar, radar, and camera.
  • the robot 100a interacting with the autonomous driving vehicle 100b exists separately from the autonomous driving vehicle 100b and is linked to an autonomous driving function inside or outside the autonomous driving vehicle 100b, or the autonomous driving vehicle 100b ) can perform an operation associated with the user on board.
  • the robot 100a interacting with the autonomous driving vehicle 100b acquires sensor information on behalf of the autonomous driving vehicle 100b and provides it to the autonomous driving vehicle 100b, or obtains sensor information and obtains information about the surrounding environment or By generating object information and providing it to the autonomous driving vehicle 100b, the autonomous driving function of the autonomous driving vehicle 100b may be controlled or supported.
  • the robot 100a interacting with the autonomous driving vehicle 100b may monitor a user riding in the autonomous driving vehicle 100b or control a function of the autonomous driving vehicle 100b through interaction with the user. .
  • the robot 100a may activate the autonomous driving function of the autonomous driving vehicle 100b or assist the control of the driving unit of the autonomous driving vehicle 100b.
  • the function of the autonomous driving vehicle 100b controlled by the robot 100a may include not only an autonomous driving function, but also a function provided by a navigation system or an audio system provided in the autonomous driving vehicle 100b.
  • the robot 100a interacting with the autonomous driving vehicle 100b may provide information or assist a function to the autonomous driving vehicle 100b from the outside of the autonomous driving vehicle 100b.
  • the robot 100a may provide traffic information including signal information to the autonomous vehicle 100b, such as a smart traffic light, or interact with the autonomous vehicle 100b, such as an automatic electric charger for an electric vehicle. You can also automatically connect an electric charger to the charging port.
  • the robot 100a may be implemented as a guide robot, a transport robot, a cleaning robot, a wearable robot, an entertainment robot, a pet robot, an unmanned flying robot, a drone, etc. to which AI technology and XR technology are applied.
  • the robot 100a to which the XR technology is applied may mean a robot that is a target of control/interaction within an XR image.
  • the robot 100a is distinguished from the XR device 100c and may be interlocked with each other.
  • the robot 100a which is the target of control/interaction in the XR image, obtains sensor information from sensors including a camera, the robot 100a or the XR device 100c generates an XR image based on the sensor information. and the XR apparatus 100c may output the generated XR image.
  • the robot 100a may operate based on a control signal input through the XR device 100c or a user's interaction.
  • the user can check the XR image corresponding to the viewpoint of the remotely linked robot 100a through an external device such as the XR device 100c, and adjust the autonomous driving path of the robot 100a through interaction or , control motion or driving, or check information of surrounding objects.
  • an external device such as the XR device 100c
  • the autonomous vehicle 100b may be implemented as a mobile robot, a vehicle, an unmanned aerial vehicle, etc. by applying AI technology and XR technology.
  • the autonomous driving vehicle 100b to which the XR technology is applied may mean an autonomous driving vehicle equipped with a means for providing an XR image or an autonomous driving vehicle subject to control/interaction within the XR image.
  • the autonomous driving vehicle 100b which is the target of control/interaction in the XR image, is distinguished from the XR device 100c and may be interlocked with each other.
  • the autonomous driving vehicle 100b having means for providing an XR image may obtain sensor information from sensors including a camera, and output an XR image generated based on the acquired sensor information.
  • the autonomous driving vehicle 100b may provide an XR object corresponding to a real object or an object in a screen to the occupant by outputting an XR image with a HUD.
  • the XR object when the XR object is output to the HUD, at least a portion of the XR object may be output to overlap the actual object to which the passenger's gaze is directed.
  • the XR object when the XR object is output to a display provided inside the autonomous driving vehicle 100b, at least a portion of the XR object may be output to overlap the object in the screen.
  • the autonomous vehicle 100b may output XR objects corresponding to objects such as a lane, other vehicles, traffic lights, traffic signs, two-wheeled vehicles, pedestrians, and buildings.
  • the autonomous driving vehicle 100b which is the subject of control/interaction in the XR image, acquires sensor information from sensors including a camera, the autonomous driving vehicle 100b or the XR device 100c performs An XR image is generated, and the XR apparatus 100c may output the generated XR image.
  • the autonomous vehicle 100b may operate based on a control signal input through an external device such as the XR device 100c or a user's interaction.
  • IP Multimedia Subsystem IP Multimedia Core Network Subsystem
  • IP Multimedia Core Network Subsystem an architectural framework for providing standardization for delivering voice or other multimedia services over IP.
  • 3G Generation
  • GSM Global System for Mobile Communication
  • EPS Evolved Packet System
  • IP Internet Protocol
  • EPC Evolved Packet Core
  • UMTS is an evolved network.
  • NodeB base station of GERAN/UTRAN. It is installed outdoors and the coverage is macro cell scale.
  • - eNodeB/eNB base station of E-UTRAN. It is installed outdoors and the coverage is macro cell scale.
  • the UE may be referred to in terms of a terminal (UE), a mobile equipment (ME), a mobile station (MS), and the like.
  • the UE may be a portable device such as a laptop computer, a mobile phone, a personal digital assistant (PDA), a smart phone, a multimedia device, or the like, or a non-portable device such as a personal computer (PC) or in-vehicle device.
  • the term UE or terminal may refer to an MTC device.
  • - HNB Home NodeB: As a base station of the UMTS network, it is installed indoors and the coverage is micro cell scale.
  • - HeNB Home eNodeB: As a base station of the EPS network, it is installed indoors and the coverage is micro-cell scale.
  • - MME Mobility Management Entity: a network node of the EPS network that performs mobility management (MM), session management (SM) functions.
  • MM mobility management
  • SM session management
  • PDN-GW Packet Data Network-Gateway
  • PGW/P-GW A network node of an EPS network that performs UE IP address assignment, packet screening and filtering, charging data collection, and the like.
  • SGW Serving Gateway
  • S-GW mobility anchor (mobility anchor), packet routing (routing), idle mode packet buffering, a function of triggering the MME to paging the UE, etc.
  • Network node of the EPS network .
  • PCRF Policy and Charging Rule Function
  • OMA DM Open Mobile Alliance Device Management: A protocol designed to manage mobile devices such as cell phones, PDAs, and portable computers. Device configuration, firmware upgrade, error report, etc. perform the function of
  • OAM Operaation Administration and Maintenance
  • Non-Access Stratum the upper end of the control plane (control plane) between the UE and the MME (stratum).
  • control plane control plane
  • MME Mobility Management Entity
  • EMM EPS Mobility Management: As a sub-layer of the NAS layer, the EMM is in "EMM-Registered” or “EMM-Deregistered” state depending on whether the UE is network attached or detached. there may be
  • ECM (EMM Connection Management) connection connection: a signaling connection (connection) for the exchange (exchange) of the NAS message established (established) between the UE and the MME.
  • the ECM connection is a logical connection consisting of an RRC connection between the UE and the eNB and an S1 signaling connection between the eNB and the MME.
  • the established ECM connection means having an RRC connection established with the eNB to the UE, and means having an S1 signaling connection established with the eNB to the MME.
  • the ECM may have a status of "ECM-Connected" or "ECM-Idle".
  • - AS Includes the protocol stack between the UE and the wireless (or access) network, and is responsible for data and network control signal transmission.
  • MO Management Object
  • MO Management object used in the process of setting parameters (parameters) related to NAS function (Functionality) to the UE.
  • Packet Data Network A network in which a server supporting a specific service (eg, Multimedia Messaging Service (MMS) server, Wireless Application Protocol (WAP) server, etc.) is located.
  • MMS Multimedia Messaging Service
  • WAP Wireless Application Protocol
  • APN Access Point Name: A string that refers to or distinguishes a PDN. In order to access a requested service or network, it goes through a specific P-GW, which means a name (string) predefined in the network to find this P-GW. (e.g. internet.mnc012.mcc345.gprs)
  • Radio Access Network A unit including a NodeB, an eNodeB, and a Radio Network Controller (RNC) for controlling them in a 3GPP network. It exists between UEs and provides connectivity to the core network.
  • RNC Radio Network Controller
  • HLR Home Location Register
  • HSS Home Subscriber Server
  • the HSS may perform functions such as configuration storage, identity management, and user state storage.
  • PLMN Public Land Mobile Network
  • -ANDSF Access Network Discovery and Selection Function: As one network entity, it provides a policy to discover and select the access allowed by the UE in the operator unit.
  • EPC path (or infrastructure data path): User plane communication path through EPC
  • E-RAB E-UTRAN Radio Access Bearer: refers to the concatenation of the S1 bearer and the corresponding data radio bearer. If the E-RAB exists, there is a one-to-one mapping between the E-RAB and the EPS bearer of the NAS.
  • GTP - GPRS Tunneling Protocol
  • GTP A group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS and LTE networks.
  • GPRS general packet radio service
  • GTP and Proxy Mobile IPv6-based interfaces are specified on various interface points.
  • GTP can be decomposed into several protocols (eg GTP-C, GTP-U and GTP').
  • GTP-C is used within the GPRS core network for signaling between Gateway GPRS Support Nodes (GGSN) and Serving GPRS Support Nodes (SGSN).
  • GGSN Gateway GPRS Support Nodes
  • SGSN Serving GPRS Support Nodes
  • the SGSN activates a session for the user (eg, activates the PDN context), deactivates the same session, and adjusts the quality of service parameters.
  • GTP-U is used to carry user data within the GPRS core network and between the radio access network and the core network.
  • EPS Evolved Packet System
  • EPC Evolved Packet Core
  • the 3GPP LTE / LTE-A system uses the concept of a cell to manage radio resources, and a cell associated with a radio resource is a cell of a geographic area. is separated from A "cell" associated with a radio resource is defined as a combination of downlink resources (DL resources) and uplink resources (UL resources), that is, a combination of a DL carrier and a UL carrier.
  • the cell may be configured with a DL resource alone or a combination of a DL resource and a UL resource.
  • linkage between a carrier frequency of a DL resource and a carrier frequency of a UL resource may be indicated by system information.
  • the carrier frequency means a center frequency of each cell or carrier.
  • a cell operating on a primary frequency is referred to as a primary cell (Pcell)
  • a cell operating on a secondary frequency is referred to as a secondary cell (Scell).
  • the Scell refers to a cell that can be used to allow setup after RRC (Radio Resource Control) connection establishment is made and to provide additional radio resources.
  • RRC Radio Resource Control
  • the Scell may form a set of serving cells for the UE together with the Pcell.
  • a "cell" of a geographic area can be understood as coverage in which a node can provide a service using a carrier
  • a "cell” of a radio resource is a frequency range configured by the carrier. It is related to bandwidth (BW).
  • BW bandwidth
  • Downlink coverage which is a range in which a node can transmit a valid signal
  • uplink coverage which is a range in which a valid signal can be received from the UE, depend on the carrier carrying the corresponding signal, so the coverage of the node depends on the amount of radio resources used by the node It is also associated with the coverage of a "cell”. Therefore, the term "cell” may be used to mean sometimes coverage of a service by a node, sometimes a radio resource, and sometimes a range that a signal using the radio resource can reach with an effective strength.
  • SAE System Architecture Evolution
  • SAE corresponds to a research task to determine a network structure that supports mobility between various types of networks.
  • SAE aims to provide an optimized packet-based system, for example, supporting various radio access technologies based on IP and providing improved data transmission capability.
  • the EPC is a core network of an IP mobile communication system for a 3GPP LTE system, and can support packet-based real-time and non-real-time services.
  • the core network In the existing mobile communication system (ie, 2nd or 3rd generation mobile communication system), the core network through two distinct sub-domains of CS (Circuit-Switched) for voice and PS (Packet-Switched) for data. The function has been implemented.
  • CS Circuit-Switched
  • PS Packet-Switched
  • the connection between the UE and the UE having IP capability is an IP-based base station (eg, eNodeB (evolved Node B)), EPC, application domain (eg, IMS ( IP Multimedia Subsystem)).
  • eNodeB evolved Node B
  • EPC application domain
  • IMS IP Multimedia Subsystem
  • the EPC may include various components, and in FIG. 1 , some of them are a Serving Gateway (SGW), a Packet Data Network Gateway (PDN GW), a Mobility Management Entity (MME), and a Serving General Packet (GPRS) (SGSN). Radio Service) Supporting Node) and ePDG (enhanced Packet Data Gateway) are shown.
  • SGW Serving Gateway
  • PDN GW Packet Data Network Gateway
  • MME Mobility Management Entity
  • GPRS Serving General Packet
  • SGSN Serving General Packet
  • Radio Service Supporting Node
  • ePDG enhanced Packet Data Gateway
  • the SGW (or S-GW) is an element that functions as a boundary point between the radio access network (RAN) and the core network and maintains a data path between the eNB and the PDN GW.
  • the SGW serves as a local mobility anchor point. That is, packets may be routed through the SGW for mobility within the E-UTRAN (Evolved-Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network defined after 3GPP Release-8).
  • E-UTRAN Evolved-Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network defined after 3GPP Release-8.
  • the SGW provides mobility with other 3GPP networks (RANs defined before 3GPP Release-8, for example, UTRAN or GERAN (Global System for Mobile Communication (GSM)/Enhanced Data rates for Global Evolution (EDGE) Radio Access Network)). It may serve as an anchor point for 3GPP networks (RANs defined before 3GPP Release-8, for example, UTRAN or GERAN (Global System for Mobile Communication (GSM)/Enhanced Data rates for Global Evolution (EDGE) Radio Access Network)). It may serve as an anchor point for 3GPP networks (RANs defined before 3GPP Release-8, for example, UTRAN or GERAN (Global System for Mobile Communication (GSM)/Enhanced Data rates for Global Evolution (EDGE) Radio Access Network)). It may serve as an anchor point for 3GPP networks (RANs defined before 3GPP Release-8, for example, UTRAN or GERAN (Global System for Mobile Communication (GSM)/Enhanced Data rates for Global Evolution (EDGE) Radio Access Network)). It may serve as an anchor point for 3GPP networks (RANs defined before 3GP
  • the PDN GW corresponds to the termination point of the data interface towards the packet data network.
  • the PDN GW may support policy enforcement features, packet filtering, charging support, and the like.
  • mobility management between 3GPP networks and non-3GPP networks eg, untrusted networks such as Interworking Wireless Local Area Network (I-WLAN), Code Division Multiple Access (CDMA) networks or trusted networks such as WiMax). It can serve as an anchor point for I-WLAN, Code Division Multiple Access (CDMA) networks or trusted networks such as WiMax). It can serve as an anchor point for 3GPP networks and non-3GPP networks (eg, untrusted networks such as Interworking Wireless Local Area Network (I-WLAN), Code Division Multiple Access (CDMA) networks or trusted networks such as WiMax). It can serve as an anchor point for I-WLAN, Code Division Multiple Access (CDMA) networks or trusted networks such as WiMax). It can serve as an anchor point for I-WLAN, Code Division Multiple Access (CDMA) networks or trusted networks such as WiMax). It can serve as an anchor point for
  • the two gateways may be implemented according to a single gateway configuration option.
  • the MME is an element that performs signaling and control functions to support access to a network connection of the UE, allocation of network resources, tracking, paging, roaming, and handover.
  • the MME controls control plane functions related to subscriber and session management.
  • the MME manages numerous eNBs and performs signaling for selection of a conventional gateway for handover to other 2G/3G networks.
  • the MME performs functions such as security procedures, terminal-to-network session handling, and idle terminal location management.
  • the SGSN handles all packet data such as user's mobility management and authentication to other 3GPP networks (eg, GPRS networks).
  • 3GPP networks eg, GPRS networks.
  • the ePDG acts as a security node for untrusted non-3GPP networks (eg, I-WLAN, WiFi hotspots, etc.).
  • untrusted non-3GPP networks eg, I-WLAN, WiFi hotspots, etc.
  • the UE having IP capability provides IP provided by the operator (ie, operator) via various elements in the EPC on the basis of 3GPP access as well as non-3GPP access.
  • a service network eg, IMS may be accessed.
  • FIG. 4 also shows various reference points (eg, S1-U, S1-MME, etc.).
  • reference points eg, S1-U, S1-MME, etc.
  • Table 1 summarizes the reference points shown in FIG. 4 .
  • various reference points may exist according to the network structure.
  • S1-MME Reference point for the control plane protocol between E-UTRAN and MME S1-U Reference point between E-UTRAN and Serving GW for the per bearer user plane tunneling and inter eNodeB path switching during handover
  • S3 Reference point between MME and SGSN providing user and bearer information exchange for mobility between 3GPP access networks in idle and/or active state.
  • This reference point may be used for intra-PLMN or inter-PLMN (eg, in case of inter-PLMN handover)) (It enables user and bearer information exchange for inter 3GPP access network mobility in idle and/or active state
  • This reference point can be used intra-PLMN or inter-PLMN (eg in the case of Inter-PLMN HO).)
  • S4 A reference point between the SGW and SGSN that provides related control and mobility support between the GPRS core and the 3GPP anchor function of the SGW. Also, it provides related control and mobility support between GPRS Core and the 3GPP Anchor function of Serving GW.
  • Direct Tunnel provides the user plane tunneling .
  • S5 Reference point providing user plane tunneling and tunnel management between SGW and PDN GW. Used for SGW relocation due to terminal mobility and when a connection to a PDN GW where the SGW is not located is required for the required PDN connectivity (It provides user plane tunneling and tunnel management between Serving GW and PDN GW. It is used for Serving GW relocation due to UE mobility and if the Serving GW needs to connect to a non-collocated PDN GW for the required PDN connectivity.) S11 Reference point for control plane protocol between MME and SGW SGi Reference point between PDN GW and PDN.
  • the PDN may be an operator external public or private PDN, or an operator-internal PDN (eg, IMS service).
  • This reference point corresponds to Gi of 3GPP access (It is the reference point between the PDN GW and the packet data network.
  • Packet data network may be an operator external public or private packet data network or an intra operator packet data network, eg for This reference point corresponds to Gi for 3GPP accesses.)
  • S2a and S2b correspond to non-3GPP interfaces.
  • S2a is a reference point that provides the user plane with trusted non-3GPP access and related control and mobility support between PDN GWs.
  • S2b is a reference point that provides related control and mobility support between the ePDG and PDN GW to the user plane.
  • E-UTRAN evolved universal terrestrial radio access network
  • the E-UTRAN system is a system evolved from the existing UTRAN system, and may be, for example, a 3GPP LTE/LTE-A system.
  • Communication networks are widely deployed to provide various communication services such as voice (eg, Voice over Internet Protocol (VoIP)) via IMS and packet data.
  • voice eg, Voice over Internet Protocol (VoIP)
  • VoIP Voice over Internet Protocol
  • the E-UMTS network includes an E-UTRAN, an EPC, and one or more UEs.
  • the E-UTRAN consists of eNBs that provide a control plane and a user plane protocol to the UE, and the eNBs are connected through an X2 interface.
  • An X2 user plane interface (X2-U) is defined between the eNBs.
  • the X2-U interface provides non-guaranteed delivery of a user plane packet data unit (PDU).
  • An X2 control plane interface (X2-CP) is defined between two neighboring eNBs. X2-CP performs functions such as context transfer between eNBs, control of a user plane tunnel between a source eNB and a target eNB, transfer of a handover related message, and uplink load management.
  • the eNB is connected to the terminal through the wireless interface and is connected to the evolved packet core (EPC) through the S1 interface.
  • EPC evolved packet core
  • the S1 user plane interface (S1-U) is defined between the eNB and a serving gateway (S-GW).
  • the S1 control plane interface (S1-MME) is defined between the eNB and a mobility management entity (MME).
  • the S1 interface performs an evolved packet system (EPS) bearer service management function, a non-access stratum (NAS) signaling transport function, network sharing, an MME load balancing function, and the like.
  • EPS evolved packet system
  • NAS non-access stratum
  • the S1 interface supports many-to-many-relation between the eNB and the MME/S-GW.
  • MME is NAS signaling security (security), AS (Access Stratum) security (security) control, CN (Core Network) inter-node (Inter-CN) signaling to support mobility between 3GPP access networks, (perform and control paging retransmission) Including) idle (IDLE) mode UE accessibility (reachability), (for idle and active mode terminals) tracking area identifier (TAI: Tracking Area Identity) management, PDN GW and SGW selection, MME for handover in which the MME is changed Bearer management functions including selection, SGSN selection for handover to 2G or 3G 3GPP access network, roaming, authentication, dedicated bearer establishment, Public Warning System (PWS) System) (including Earthquake and Tsunami Warning System (ETWS) and Commercial Mobile Alert System (CMAS)) message transmission.
  • PWS Public Warning System
  • ETWS Earthquake and Tsunami Warning System
  • CMAS Commercial Mobile Alert System
  • FIG. 6 is a diagram illustrating an architecture of a general NR-RAN.
  • the NG-RAN node may be one of the following.
  • the gNB and ng-eNB are connected to each other through the Xn interface.
  • gNB and ng-eNB via NG interface to 5GC, more specifically via NG-C interface, Access and Mobility Management Function (AMF), user plane function via NG-U interface ( UPF: User Plane Function) (refer to 3GPP TS 23.501 [3]).
  • AMF Access and Mobility Management Function
  • UPF User Plane Function
  • FIG. 7 shows an example of a general architecture of 5G. The following is a description of each reference interface and node in FIG. 7 .
  • Access and Mobility Management Function is a CN inter-node signaling for mobility between 3GPP access networks, a radio access network (RAN: Radio Access Network) CP interface (N2) termination (termination), NAS It supports functions such as the end of signaling (N1), registration management (registration area management), idle mode UE accessibility (reachability), support of network slicing, and SMF selection.
  • AMF Access Management Function
  • a data network means, for example, an operator service, Internet access, or a third party service.
  • the DN transmits a downlink protocol data unit (PDU) to the UPF or receives a PDU transmitted from the UE from the UPF.
  • PDU downlink protocol data unit
  • a policy control function provides a function of receiving information about a packet flow from an application server and determining policies such as mobility management and session management.
  • a session management function (SMF: Session Management Function) provides a session management function, and when the UE has a plurality of sessions, it may be managed by a different SMF for each session.
  • SMF Session Management Function
  • Some or all functions of the SMF may be supported within a single instance of one SMF.
  • Unified Data Management stores user subscription data, policy data, and the like.
  • User plane function delivers the downlink PDU received from the DN to the UE via (R)AN, and delivers the uplink PDU received from the UE via (R)AN to the DN.
  • Application Function supports service provision (e.g., application impact on traffic routing, network capability exposure access, interaction with policy framework for policy control, etc.) to interact with the 3GPP core network.
  • service provision e.g., application impact on traffic routing, network capability exposure access, interaction with policy framework for policy control, etc.
  • Radio Access Network (R)AN: (Radio) Access Network
  • E-UTRA evolved E-UTRA
  • NR New Radio
  • gNB a generic term for a new radio access network that supports both.
  • gNB has functions for radio resource management (ie, Radio Bearer Control, Radio Admission Control, Connection Mobility Control), and dynamic resource allocation to the UE in uplink/downlink. It supports functions such as dynamic allocation of resources (ie, scheduling)).
  • radio resource management ie, Radio Bearer Control, Radio Admission Control, Connection Mobility Control
  • dynamic resource allocation ie, scheduling
  • UE User Equipment
  • a conceptual link connecting NFs in the 5G system is defined as a reference point.
  • N1 is the reference point between the UE and AMF
  • N2 is the reference point between (R)AN and AMF
  • N3 is the reference point between (R)AN and UPF
  • N4 is the reference point between SMF and UPF
  • N6 the reference point between UPF and the data network
  • N9 is a reference point between the two core UPFs
  • N5 is a reference point between PCF and AF
  • N7 is a reference point between SMF and PCF
  • N24 is a PCF in a visited network and a PCF in a home network Reference point
  • N8 is a reference point between UDM and AMF
  • N10 is a reference point between UDM and SMF
  • N11 is a reference point between AMF and SMF
  • N12 is a reference point between AMF and Authentication Server function (AUSF: Authentication Server function)
  • N13 is Reference point between UDM and AUSF
  • N14 is a reference point between two AMFs
  • N15 is a reference
  • N22 is the reference point between AMF and Network Slice Selection Function (NSSF)
  • N23 is the reference point between PCF and NWDAF (Network Data Analytics Function)
  • N24 is the reference point between NSSF and NWDAF
  • N27 is visit Reference point between NRF (Network Repository Function) in network and NRF in home network
  • N31 is N in visited network Reference point between SSF and NSSF in home network
  • N32 is a reference point between SEPP (Security Protection Proxy) in visited network and SEPP in home network
  • N33 is reference point between NEF (Network Exposure Function) and AF
  • N40 is SMF and CHF ( A reference point between the charging function
  • N50 means a reference point between the AMF and the Circuit Bearer Control Function (CBCF).
  • CBCF Circuit Bearer Control Function
  • FIG. 7 illustrates a reference model for a case in which the UE accesses one DN using one PDU session for convenience of description, but is not limited thereto.
  • Hybrid Automatic Repeat and reQuest is a kind of error control method.
  • HARQ-ACK HARQ acknowledgment
  • HARQ-ACK transmitted through uplink is used for error control on downlink data.
  • the transmitter performing the HARQ operation waits for an acknowledgment (ACK) after transmitting data (eg, transport block, codeword).
  • ACK acknowledgment
  • the receiving end performing the HARQ operation sends a positive acknowledgment (ACK) only when data is properly received, and sends a negative acknowledgment (negative ACK, NACK) when an error occurs in the received data.
  • ACK positive acknowledgment
  • NACK negative acknowledgment
  • the transmitting end receives the ACK, it can transmit (new) data, and when it receives the NACK, it can retransmit the data.
  • a time delay occurs until ACK/NACK is received from the UE and retransmission data is transmitted.
  • Such a time delay is caused by a channel propagation delay and a time taken for data decoding/encoding. Therefore, when new data is transmitted after the current HARQ process is finished, a gap occurs in data transmission due to a time delay.
  • a plurality of independent HARQ processes are used to prevent gaps in data transmission during the time delay period. For example, if there are 7 transmission opportunities between the initial transmission and the retransmission, the communication device may operate 7 independent HARQ processes to perform data transmission without a gap. Utilizing a plurality of parallel HARQ processes, UL/DL transmission may be continuously performed while waiting for HARQ feedback for a previous UL/DL transmission.
  • channel state information refers to information capable of indicating the quality of a radio channel (or link) formed between a UE and an antenna port.
  • CSI is a channel quality indicator (channel quality indicator, CQI), precoding matrix indicator (PMI), CSI-RS resource indicator (CSI-RS resource indicator, CRI), SSB resource indicator (SSB resource indicator, SSBRI) , may include at least one of a layer indicator (LI), a rank indicator (RI), and a reference signal received power (RSRP).
  • frequency division multiplexing may mean transmitting/receiving signals/channels/users in different frequency resources
  • time division multiplexing is It may mean transmitting/receiving signals/channels/users in different time resources.
  • frequency division duplex refers to a communication method in which uplink communication is performed on an uplink carrier and downlink communication is performed on a downlink carrier linked to the uplink carrier
  • time division Duplex time division duplex, TDD refers to a communication method in which uplink communication and downlink communication are performed by dividing time on the same carrier.
  • UE User Equipment
  • UE User Equipment
  • PDCP Packet Data Convergence Protocol
  • RRC Radio Resource Control
  • S1AP S1 Application Protocol
  • 3GPPP TS 22.125 Unmanned Aerial System support in 3GPP; Stage 1
  • GPRS General Packet Radio Service
  • E-UTRAN E-UTRAN Access Network
  • NAS Non-Access-Stratum
  • EPS Evolved Packet System
  • 3GPP TS 24.302 Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks; Stage 3
  • EPC Evolved Packet Core
  • UE User Equipment
  • PDCP Packet Data Convergence Protocol
  • RRC Radio Resource Control
  • SDAP Service Data Adaptation Protocol
  • 3GPP TS 24.502 Access to the 3GPP 5G Core Network (5GCN) via non-3GPP access networks
  • V2X communication has two operating modes: V2X communication through PC5 reference point and V2X communication through Uu reference point. These two modes of operation can be used independently by the UE for transmission and reception.
  • V2X communication through the PC5 reference point is supported by LTE and / or NR.
  • V2X communication through Uu reference point is supported by E-UTRA connected to 5GC and/or NR connected to 5GC.
  • FIG. 8 illustrates a non-roaming 5G system architecture to which this specification can be applied. Referring to FIG. 8 , a higher level of non-roaming 5G system architecture through PC5 and Uu reference points is presented.
  • 9 and 10 illustrate a Roaming 5G system architecture to which this specification can be applied.
  • 9 and 10 the upper level of the Roaming 5G system architecture for V2X communication through PC5 and Uu reference point is presented.
  • 9 and 10 UE A uses a subscription of HPLMN.
  • PC5 parameters For communication between PLMN V2X through PC5 reference point, PC5 parameters need to be configured in a consistent way between UEs within a specific area.
  • the architecture of the Inter-PLMN PC5 case is similar to the architecture defined in 2.1).(1).
  • the 5G system provides the NEF service that enables communication between the PLMN and the NF of the V2X Application Server.
  • V2X Application Server can provide V2X service parameters to PLMN through NEF.
  • NEF stores V2X service parameters in UDR.
  • V1 Reference point of V2X application of UE and V2X Application Server. This reference point is outside the scope of this standard.
  • V5 Reference point between V2X applications of the UE. This reference point is not specified in this release of this specification.
  • PC5 A reference point between UEs, including LTE-based PC5 and/or NR-based PC5.
  • N1 For V2X service, in addition to related functions defined in TS 23.501 [6] for N1, for V2X service, it is also used to deliver V2X policies and parameters (including service permission) from AMF to UE.
  • N2 In addition to the related functions defined in TS 23.501 [6] for N2, for V2X service, it is also used to transfer V2X policies and parameters (including service permission) from AMF to NG-RAN.
  • Uu the reference point between the UE and the NG-RAN.
  • Nudm In the case of Nudm, in addition to the related services defined in TS 23.501 [6], in the case of V2X services, the initial registration procedure to notify the AMF that the subscription information has changed or the UE Configuration Update (UCU) procedure to AMF related to the V2X service subscription To give information, the services provided by UDM are used.
  • UCU UE Configuration Update
  • Npcf In the case of Npcf, in the case of V2X service, in addition to the related service defined in TS 23.501 [6], it is used to provide V2X service related parameters to the UE. This service is also used in AMF to update the UE context related to the V2X service.
  • Nudr In addition to the related services defined in TS 23.501 [6] for Nudr, in the case of V2X service, the update of V2X service related information is notified to the PCF using the service provided by UDR.
  • Nnef In the case of V2X service, in addition to the related services defined in TS 23.501 [6] for Nnef, V2X Application Server uses the services provided by NEF to update V2X service related information of 5GC.
  • 5GS V2X and EPS V2X does not require a new interface between the 5GS V2X architecture and the EPS V2X architecture and does not affect the existing network functional entities of EPC and 5GC.
  • the UE may support the following functions in addition to the functions defined in TS 23.501 [6].
  • V2X communication e.g. target layer-2 ID, radio resource parameters, V2X Application Server address information, mapping between service types and V2X frequencies, see clause 5.1
  • these parameters are preset in the UE, or In this case, it can be provisioned or updated by sending a signal from HPLMN's PCF to the N1 reference point or from the V2X Application Server to the V1 reference point or higher.
  • PCF includes the ability to provision UEs and AMFs using the necessary parameters to use V2X communication.
  • V2X Application Server includes AF function and can support at least the following functions.
  • V2X Application Server and V2X service parameter provisioning for V2X service processing may be the same or different.
  • AMF performs the following functions in addition to the functions defined in TS 23.501 [6].
  • V2X-related subscription information from UDM and store it as part of UE context data.
  • UDM performs the following functions in addition to the functions defined in TS 23.501 [6].
  • UDR performs the following functions in addition to the functions defined in TS 23.501 [6].
  • V2X communication there are two types of LTE-based PC5 reference point defined in TS 23.285[8] and NR-based PC5 reference point defined in clause 4.2.3.
  • the UE may use one or both PC5 types for V2X communication according to the services supported by the UE.
  • V2X communication via PC5 reference point supports roaming and inter-PLMN operation.
  • V2X communication through the PC5 reference point is supported when the UE is "serviced by NR or E-UTRA" or the UE is "not serviced by NR or E-UTRA".
  • the UE is authorized to send and receive V2X messages when it has valid authorization and configuration specified in 5.1.2.
  • V2X communication through PC5 reference point The characteristics of V2X communication through PC5 reference point are as follows.
  • V2X communication through NR-based PC5 reference point supports broadcast mode, groupcast mode, and unicast mode in the AS layer.
  • the UE indicates the communication mode of the V2X message for the AS layer. Signaling is supported through the control plane through the PC5 reference point for unicast mode communication management.
  • IPv6 For IP-based V2X messages, only IPv6 is used. IPv4 not supported.
  • the identifier used for V2X communication through the PC5 reference point is described in Section 5.6.1.
  • the UE determines the type of PC5 reference point and Tx profile to use for the transmission of a particular packet based on the settings described in 5.1.2.
  • the QoS processing procedure is defined in TS 23.285 [8]. If an NR-based PC5 reference point is selected, QoS handling and procedures are defined in clauses 5.4.1 and 6.3.
  • the emergency session through the IMS should take precedence over V2X communication through the PC5 reference point.
  • Broadcast mode is supported in both LTE-based PC5 reference point and NR-based PC5 reference point. Therefore, when the broadcast mode is selected for communication through the PC5 reference point, it is necessary to perform the PC5 RAT selection based on the settings described in 5.1.2.
  • broadcast mode is the only supported communication mode, and the operational details are defined in TS 23.285 [8].
  • broadcast mode also supports enhanced QoS handling as defined in 5.4.1.
  • Groupcast communication mode is supported only through NR based PC5 reference point.
  • QoS handling for groupcast communication mode is defined in Section 5.4.1.
  • Unicast communication mode is supported only through NR based PC5 reference point.
  • One PC5 unicast link supports one or more V2X services (eg PSID or ITS-AID). If these V2X services are associated with at least a peer application layer ID pair for this PC5 unicast link. For example, as shown in FIG. 13 , UE A and UE B have two PC5 unicast links, one between peer application layer ID 1/UE A and application layer ID 2/UE B and one It may be between peer application layer ID 3/UE A and application layer ID 4/UE B.
  • V2X services eg PSID or ITS-AID
  • Remark 2 The source UE does not need to know whether different target application layer IDs for different PC5 unicast links belong to the same target UE.
  • - PC5 unicast link supports, for example, V2X communication using a single network layer protocol. i.e. IP or non-IP.
  • the PC5 unicast link supports the per-flow QoS model specified in Section 5.4.1.
  • the UE shall reuse the existing PC5 unicast link, as specified in clause 6.3.3.4. As such, the existing PC5 unicast link must be modified to add this V2X service.
  • the UE triggers the establishment of a new PC5 unicast link as specified in clause 6.3.3.1.
  • UE A and UE B After successful establishment of the PC5 unicast link, UE A and UE B use the same pair of Layer-2 IDs for subsequent PC5-S signaling message exchange and V2X service data transmission as specified in Section 5.6.1.4.
  • the V2X layer of the transmitting UE determines whether the transmission is for a PC5-S signaling delivery message (ie, direct communication request/accept, link identifier update request/response, connection release request/response, link modification request/accept) or V2X service data. It is indicated on the AS layer whether it is for
  • the UE self-assigns a distinct PC5 link identifier that uniquely identifies the UE's PC5 unicast link for the lifetime of the PC5 unicast link.
  • Each PC5 unicast link is associated with a unicast link profile that includes:
  • PFI PC5 QoS Flow Identifier Set
  • the application layer ID and layer 2 ID may change as described in clauses 5.6.1.1 and 6.3.3.2 during the lifetime of the PC5 unicast link, and therefore should be updated in the unicast link profile accordingly.
  • the UE uses the PC5 Link Identifier to indicate the PC5 unicast link to the V2X Application layer, so the V2X Application layer identifies the corresponding PC5 unicast link even if there is more than one unicast link associated with one service type (e.g.: UE establishes multiple unicast links with multiple UEs for the same service type).
  • the unicast link profile shall be updated accordingly after modifying the Layer 2 link for the established PC5 unicast link as specified in 6.3.3.4.
  • IP address/prefix assignment In the case of unicast mode of V2X communication through PC5 reference point, the following mechanism for IP address/prefix assignment can be used.
  • IPv6 link-local addresses as defined in RFC 4862 [21] are formed locally by the UE. IPv6 link-local addresses are exchanged during establishment of a security layer 2 link to a PC5 reference point as described in 6.3.3.1. The UE shall disable duplicate address detection after the layer 2 link is established.
  • the UE In order to perform V2X communication through the PC5 reference point in the broadcast mode operation, the UE is set with the relevant information described in 5.1.2.
  • FIG. 14 is a diagram illustrating a procedure for a broadcast mode of V2X communication using PC5.
  • the receiving terminal determines a destination Layer-2 ID for broadcast reception.
  • the destination Layer-2 ID is transmitted to the AS layer of the receiving terminal for reception.
  • the V2X application layer of the transmitting terminal may provide a data unit, and may provide V2X application requirements (Application Requirements).
  • the transmitting terminal determines the destination Layer-2 ID for the broadcast.
  • the transmitting terminal itself allocates a source Layer-2 ID.
  • One broadcast message transmitted by the transmitting terminal transmits V2X service data using the source Layer-2 ID and the destination Layer-2 ID.
  • step 4 there is only one broadcast message transmitted from the sending terminal.
  • the UE In order to perform the groupcast mode of V2X communication through the PC5 reference point, the UE is set with the relevant information as described in clause 5.1.2.1.
  • 15 is a diagram illustrating a procedure for a groupcast mode of V2X communication using PC5.
  • V2X group management is performed through the V2X application layer.
  • the V2X application layer may provide a group identifier as described in 5.6.1.3 of the 3GPP 23.287 document.
  • the V2X application layer may provide service requirements for the communication.
  • the transmitting terminal determines the source Layer-2 ID and the destination Layer-2 ID, and the receiving terminal determines the destination Layer-2 ID.
  • the destination Layer-2 ID is delivered to the AS Layer of the receiving terminal for group communication transmission.
  • the transmitting terminal determines the PC5 QoS parameters for the groupcast.
  • the transmitting terminal has a V2X service related to group communication.
  • the transmitting terminal transmits the V2X service data using the source Layer-2 ID and the destination Layer-2 ID.
  • the transmitting terminal in step 4 has only one groupcast message.
  • the UE In order to perform the unicast mode of V2X communication through the PC5 reference point, the UE is set with related information as described in clause 5.1.2.1.
  • 16 is a diagram illustrating a procedure for a unicast mode of V2X communication using PC5.
  • the UE determines a destination Layer-2 ID for receiving signaling for establishing a PC5 unicast link.
  • the V2X application layer of terminal-1 provides application information for PC5 unicast communication.
  • the application information includes the service type (eg, PSID or ITS-AID) of the V2X application and the initiating UE's Application Layer ID.
  • the Application Layer ID of the target terminal may be included in the application information.
  • the V2X application layer of UE-1 may provide service requirements for the unicast communication.
  • Terminal-1 determines PC5 QoS parameters and PFI.
  • UE-1 decides to reuse the existing PC5 unicast link, UE triggers a Layer-2 link modification procedure.
  • Terminal-1 transmits a Direct Communication Request message to initiate a unicast layer-2 link establishment procedure.
  • the Direct Communication Request message includes:
  • Application Layer ID of the initiating terminal ie, Application Layer ID of Terminal-1
  • V2X application layer If the V2X application layer provides the target terminal Application Layer ID of step2, it includes the following information.
  • Target User Info Application Layer ID of the target terminal (ie, Application Layer ID of Terminal-2)
  • V2X Service Info Information on V2X Service requesting Layer-2 link establishment (eg PSID or ITS-AID).
  • IP Address Configuration IP address configuration required for this link in IP communication and indicating one of the following values
  • IPv6 router or if the initiating UE supports the IPv6 address allocation mechanism, i.e. acts as an IPv6 router
  • IPv6 address allocation is not supported as directed by IP Address Configuration. not.
  • PC5 QoS Info Information about PC5 QoS Flow.
  • PFI and corresponding PC5 QoS parameters i.e., other parameters conditionally such as PQI and MFBR / GFBR etc.).
  • It is FFS whether QoS information exchange is required or not
  • the source Layer-2 ID and destination Layer-2 ID used to transmit the Direct Communication Request message are determined as specified in 5.6.1.1 and 5.6.1.4.
  • Terminal-1 transmits a Direct Communication Request message through PC5 broadcast using the source Layer-2 ID and the destination Layer-2 ID.
  • Target User Info is included in the Direct Communication Request message, it is transmitted to the target terminal (ie, Terminal-2 responds with a Direct Communication Accept message).
  • Target User Info is not included in the Direct Communication Request message, it is transmitted to the terminal interested in using the known V2X service.
  • To decide to establish a Layer-2 link it responds to terminal-1's request by sending a Direct Communication Accept message (terminal-2 and terminal-4).
  • the Direct Communication Accept message contains:
  • PC5 QoS Info Information about PC5 QoS Flow.
  • PFI and corresponding PC5 QoS parameters i.e. PQI and conditionally other parameters such as MFBR/GFBR, etc.
  • IP Address Configuration In case of IP communication, IP Address Configuration is required for these links, and one of the following values is indicated.
  • IPv6 router or if the target UE supports IPv6 address assignment mechanism, i.e. acts as an IPv6 router
  • Link Local IPv6 Address If the target UE does not support the IPv6 IP address allocation mechanism, the locally formed Link Local IPv6 Address based on RFC 4862 [21], i.e., IP Address Configuration, says "IPv6 address allocation is not supported" ", and UE-1 includes the Link Local IPv6 Address in the Direct Communication Request message. The target UE must contain a non-conflicting Link Local IPv6 Address.
  • Note 1 If the initiating UE or the target UE indicates support of the IPv6 router, the corresponding address setting procedure is performed after establishing the layer 2 link, and the link-local IPv6 address is ignored.
  • the source Layer-2 ID used to transmit the Direct Communication Accept message is determined as specified in clauses 5.6.1.1 and 5.6.1.4.
  • the destination Layer-2 ID is set as the source Layer-2 ID of the received Direct Communication Request message.
  • terminal-1 Upon receiving the Direct Communication Accept message from the peer terminal, terminal-1 acquires the Layer-2 ID of the peer terminal used for future communication for signaling and data traffic for the unicast link.
  • the V2X layer of the terminal that has established the PC5 unicast link delivers the PC5 Link Identifier assigned to the unicast link and information related to the PC5 unicast link to the AS layer.
  • Information related to the PC5 unicast link includes Layer-2 ID information (ie, source Layer-2 ID and destination Layer-2 ID). This allows the AS layer to maintain a PC5 Link Identifier along with information associated with the PC5 unicast link.
  • Terminal-1 transmits the V2X service data using the source Layer-2 ID and the destination Layer-2 ID. (ie, the Layer-2 ID of the peer terminal for the unicast link).
  • the peer terminal of terminal-1 may transmit V2X service data to terminal-1 through the unicast link with terminal-1.
  • FIG. 17 illustrates a link identifier update procedure for a unicast link to which this specification can be applied.
  • the identifiers used for the unicast mode (eg, application layer ID, source layer-2 ID, and IP address/prefix) of V2X communication through the PC5 reference point are 5.6.1.1 and 5.6 It should change over time as specified in .1.4. This procedure is used to update the peer UE on the unicast link of the imminent change of the identifier used for this link before the identifier is changed to avoid service interruption.
  • the UE needs to perform a link identifier update procedure for each unicast link.
  • UE-1 decides to change the identifier by changing the application layer ID or expiration of a timer, and transmits a Link Identifier Update Request message to UE-2 before changing the identifier.
  • the link identifier update request message contains the new identifier to use (including new application layer ID, new layer-2 ID, and new IP address/prefix if IP communication is used). New identifiers should be cyphed to protect privacy.
  • Timers run per source layer 2 ID.
  • UE-2 responds with a Link Identifier Update Response message.
  • UE-1 and UE-2 start using the new identifier for data traffic.
  • UE-1 must receive traffic with the previous Layer-2 ID until it receives the Link Identifier Update Response message from UE-2.
  • the V2X layer of each UE delivers the PC5 link identifier for the unicast link and the updated Layer-2 ID (the destination Layer-2 ID of UE-2) to the AS layer. This allows the AS layer to update the layer 2 ID provided for the unicast link.
  • UE-1 sends a connection release request message to UE-2 to release the layer 2 link and delete all context data related to the layer 2 link.
  • UE-2 may respond with a disconnection response message, and may delete all context data related to the layer 2 link.
  • the V2X layer of each UE informs the AS layer that the unicast link is released. This allows the AS layer to delete the context associated with the published unicast link.
  • FIG. 19 illustrates a layer 2 link modification procedure for a unicast link to which this specification can be applied. Referring to FIG. 19 , this procedure is as follows.
  • the V2X application layer of UE-1 provides application information for PC5 unicast communication.
  • the application information includes the service type (eg, PSID or ITS-AID) of the V2X application and the application layer ID of the initiating UE.
  • the application layer ID of the target UE may be included in the application information. If UE-1 decides to reuse the existing PC5 unicast link as specified in clause 5.2.1.4, therefore, decides to modify the unicast link established by UE-2, UE-1 requests link modification is transmitted to UE-2.
  • Link modification request message includes:
  • V2X service information Information about the V2X service to be added (eg PSID or ITS-AID)
  • - QoS Information Information on PC5 QoS Flow of each V2X service to be added.
  • Each PC5 QoS Flow, PFI and corresponding PC5 QoS parameters ie PQI and other parameters such as MFBR/GFBR conditionally).
  • V2X service information Information about the V2X service to be removed (eg PSID or ITS-AID)
  • - QoS Information Information about the PC5 QoS Flow to be modified.
  • Each PC5 QoS Flow, PFI and corresponding PC5 QoS parameters ie PQI and other parameters such as MFBR/GFBR conditionally).
  • the V2X layer of each UE provides information about unicast link modification to the AS layer. This allows the AS layer to update the context associated with the modified unicast link.
  • Multicast applications such as public transit information and point-of-interest notification services require secure group communication, including message authentication, authorization, and encryption, according to the group's specific security policy.
  • ITS-S uses IP-based multicast communication.
  • ITS-S can join a multicast group using an authorization ticket (see Section 6.2.3.3) following additional registration steps).
  • Key management of multicast applications may be controlled by a multicast service provider or a separate security manager.
  • Such key management may be application-specific or standard multicast key management systems such as the IETF Multicast Security (MSEC) group key management architectures [i.3], [i.8], [i.9] and [i.10]. can be used
  • ETSI TS 103 097 [3] provides a data structure that can be used to establish an SA in a multicast group.
  • the multicast group leader For key establishment, the multicast group leader generates a new symmetric key k, uses it to encrypt the first multicast message (using AES-CCM), and then encrypts k for each recipient with the corresponding recipient key. Should be.
  • the EtsiTs103097Data-Encrypted structure can be used to encapsulate all of this data in the following way:
  • the field recipients MUST contain one or more RecipientInfos for each key used to encrypt symmetric key k.
  • Each RecipientInfo must be of the form certRecipInfo or signedDataRecipInfo:
  • - certRecipInfo MUST be used when symmetric key k is encrypted with the public encryption key in the certificate.
  • signedDataRecipInfo must be used.
  • the field ciphertext MUST contain the encrypted message.
  • each receiver in the multicast group After each receiver in the multicast group receives the encrypted data structure, it must decrypt the encrypted multicast message with key k.
  • This key can be reused to encrypt additional confidential multicast messages with the pskRecipInfo option in RecipientInfo indicating the use of a pre-shared symmetric key.
  • the AES-CCM nonce must be selected randomly and must not be reused with the same key.
  • the group can use this key with the structure EtsiTs103097Data-Encrypted and pskRecipInfo options in RecipientInfo.
  • the EtsiTs103097Data-SignedAndEncrypted structure can be used when authentication is also required in the key establishment phase and/or multicast group communication.
  • Unicast applications such as automatic access control, parking management and media download services require secure unicast communication, including message authentication, authorization and encryption.
  • ITS-S uses IP-based unicast communication.
  • ITS-S can subscribe to that service using an authorization ticket following additional registration protocol steps.
  • Unicast key management is application-specific or application-specific or IETF RFC 4301 [i.4], IETF RFC 4877 [i.12], IETF RFC 4306 [i.11], IETF RFC 4302 [i.5] and IETF RFC 4303 [
  • a standard key management system such as network layer security using IETF RFC 4303[i] defined by i.6] may be used.
  • transport layer security can be provided using methods such as IETF Transport Layer Security (TLS) [i.7].
  • ETSI ITS security standard for ITS G5 communications should be considered (ETSI TS 103 097 [3]).
  • the SA initiator must generate a new symmetric key k, use it to encrypt the first confidential message, and then use that recipient key to encrypt k for the recipient.
  • the EtsiTs103097 data encryption structure shall be used to encapsulate all data in the following way:
  • the field recipient MUST contain a RecipientInfo in the form of certRecipInfo or signedDataRecipInfo depending on the recipient key used.
  • the field ciphertext shall contain the encrypted message.
  • the recipient After receiving the encrypted data structure, the recipient must decrypt the encrypted message with key k.
  • This key can be reused to encrypt additional confidential messages with the pskRecipInfo option in RecipientInfo indicating the use of a pre-shared symmetric key.
  • the AES-CCM nonce must be selected randomly and must not be reused with the same key.
  • the device may use this key with the structures EtsiTs103097Data-Encrypted and pskRecipInfo options in RecipientInfo.
  • EtsiTs103097Data-SignedAnd Encrypted structure can be used when authentication is required even in the key establishment phase and/or unicast communication.
  • 20 is an exemplary diagram showing the structure of a radio interface protocol (Radio Interface Protocol) in the control plane between the UE and the eNodeB.
  • Radio Interface Protocol Radio Interface Protocol
  • the radio interface protocol is based on the 3GPP radio access network standard.
  • the air interface protocol is horizontally composed of a physical layer, a data link layer, and a network layer, and vertically a user plane for data information transmission and control. It is divided into a control plane for signal transmission.
  • the protocol layers are L1 (first layer), L2 (second layer), and L3 (third layer) based on the lower three layers of the Open System Interconnection (OSI) reference model widely known in communication systems. ) can be distinguished.
  • OSI Open System Interconnection
  • the first layer provides an information transfer service using a physical channel.
  • the physical layer is connected to an upper medium access control layer through a transport channel, and data between the medium access control layer and the physical layer is transmitted through the transport channel. And, data is transferred between different physical layers, that is, between the physical layers of the transmitting side and the receiving side through a physical channel.
  • a physical channel is composed of several subframes on the time axis and several sub-carriers on the frequency axis.
  • one sub-frame is composed of a plurality of symbols and a plurality of sub-carriers on the time axis.
  • One subframe is composed of a plurality of resource blocks (Resource Block), and one resource block is composed of a plurality of symbols and a plurality of subcarriers.
  • a transmission time interval (TTI) which is a unit time for data transmission, is 1 ms corresponding to one subframe.
  • the physical channels existing in the physical layer of the transmitting side and the receiving side are a data channel PDSCH (Physical Downlink Shared Channel) and PUSCH (Physical Uplink Shared Channel) and a control channel PDCCH (Physical Downlink Control Channel), It can be divided into a Physical Control Format Indicator Channel (PCFICH), a Physical Hybrid-ARQ Indicator Channel (PHICH), and a Physical Uplink Control Channel (PUCCH).
  • PCFICH Physical Control Format Indicator Channel
  • PHICH Physical Hybrid-ARQ Indicator Channel
  • PUCCH Physical Uplink Control Channel
  • the PCFICH transmitted in the first OFDM symbol of the subframe carries a control format indicator (CFI) regarding the number of OFDM symbols (ie, the size of the control region) used for transmission of control channels in the subframe.
  • CFI control format indicator
  • the wireless device first receives the CFI on the PCFICH and then monitors the PDCCH.
  • the PCFICH does not use blind decoding and is transmitted through a fixed PCFICH resource of a subframe.
  • the PHICH carries a positive-acknowledgement (ACK)/negative-acknowledgement (NACK) signal for a UL hybrid automatic repeat request (HARQ).
  • ACK positive-acknowledgement
  • NACK negative-acknowledgement
  • HARQ UL hybrid automatic repeat request
  • An ACK/NACK signal for UL (uplink) data on a PUSCH transmitted by a wireless device is transmitted on a PHICH.
  • a PBCH Physical Broadcast Channel
  • the PBCH carries system information essential for a wireless device to communicate with a base station, and the system information transmitted through the PBCH is called a master information block (MIB).
  • MIB master information block
  • SIB system information transmitted on the PDSCH indicated by the PDCCH is referred to as a system information block (SIB).
  • PDCCH is a resource allocation and transmission format of a downlink-shared channel (DL-SCH), resource allocation information of an uplink shared channel (UL-SCH), paging information on the PCH, system information on the DL-SCH, random access transmitted on the PDSCH Resource allocation of a higher layer control message such as a response, a set of transmission power control commands for individual UEs in an arbitrary UE group, and activation of voice over internet protocol (VoIP) may be carried.
  • a plurality of PDCCHs may be transmitted in the control region, and the UE may monitor the plurality of PDCCHs.
  • the PDCCH is transmitted on an aggregation of one or several consecutive control channel elements (CCEs).
  • CCEs control channel elements
  • the CCE is a logical allocation unit used to provide the PDCCH with a coding rate according to the state of a radio channel.
  • the CCE corresponds to a plurality of resource element groups.
  • the format of the PDCCH and the possible number of bits of the PDCCH are determined according to the correlation between the number of CCEs and the coding rates provided by the CCEs.
  • DCI downlink control information
  • DCI is a PDSCH resource allocation (this is also called a DL grant (downlink grant)), PUSCH resource allocation (this is also called a UL grant (uplink grant)), a set of transmit power control commands for individual UEs in an arbitrary UE group and/or activation of Voice over Internet Protocol (VoIP).
  • PDSCH resource allocation this is also called a DL grant (downlink grant)
  • PUSCH resource allocation this is also called a UL grant (uplink grant)
  • VoIP Voice over Internet Protocol
  • the Medium Access Control (MAC) layer serves to map various logical channels to various transport channels, and is also a logical channel multiplexing that maps multiple logical channels to one transport channel. play a role
  • the MAC layer is connected to the RLC layer, which is an upper layer, by a logical channel, and the logical channel includes a control channel that transmits information on the control plane and a control channel that largely depends on the type of information to be transmitted. It is divided into a traffic channel that transmits user plane information.
  • the radio link control (RLC) layer of the second layer divides and concatenates data received from the upper layer to adjust the data size so that the lower layer is suitable for data transmission in the radio section. perform the role
  • RLC radio link control
  • TM Transparent mode, transparent mode
  • UM Un-acknowledged mode, no response mode
  • AM Acknowledged mode, Response mode
  • the AM RLC performs a retransmission function through an automatic repeat and request (ARQ) function for reliable data transmission.
  • ARQ automatic repeat and request
  • the packet data convergence protocol (PDCP) layer of the second layer is a relatively large IP containing unnecessary control information in order to efficiently transmit IP packets such as IPv4 or IPv6 in a wireless section with a small bandwidth. It performs a header compression function that reduces the packet header size. This serves to increase the transmission efficiency of the radio section by transmitting only necessary information in the header part of the data.
  • the PDCP layer also performs a security function, which consists of encryption (Ciphering) to prevent data interception by a third party and integrity protection (Integrity protection) to prevent data manipulation by a third party.
  • the Radio Resource Control (RRC) layer located at the top of the third layer is defined only in the control plane, and is configured (setup), reset (Re) of radio bearers (Radio Bearer; abbreviated as RB). -Responsible for controlling logical channels, transport channels and physical channels in relation to setting) and release.
  • the RB means a service provided by the second layer for data transfer between the UE and the E-UTRAN.
  • the terminal If there is an RRC connection between the RRC of the terminal and the RRC layer of the radio network, the terminal is in the RRC connected state (Connected mode), otherwise it is in the RRC idle state (Idle mode).
  • the RRC state refers to whether or not the RRC of the UE is logically connected to the RRC of the E-UTRAN. If it is connected, it is called an RRC_CONNECTED state, and if it is not connected, it is called an RRC_IDLE state. Since the UE in the RRC_CONNECTED state has an RRC connection, the E-UTRAN can determine the existence of the UE on a cell-by-cell basis, and thus can effectively control the UE.
  • the E-UTRAN cannot detect the UE, and the core network manages the UE in a tracking area (TA) unit that is a larger area unit than the cell. That is, in the UE in the RRC_IDLE state, only the presence of the UE is determined in a larger area unit than the cell, and in order to receive a normal mobile communication service such as voice or data, the UE must transition to the RRC_CONNECTED state.
  • TA is identified through a tracking area identity (TAI).
  • the UE may configure the TAI through a tracking area code (TAC), which is information broadcast in a cell.
  • TAC tracking area code
  • the terminal When the user turns on the terminal for the first time, the terminal first searches for an appropriate cell, establishes an RRC connection in the cell, and registers the terminal information in the core network. After this, the UE stays in the RRC_IDLE state. The terminal staying in the RRC_IDLE state selects (re-)selects a cell as needed, and examines system information or paging information. This is called camping on the cell.
  • the UE that stayed in the RRC_IDLE state needs to establish an RRC connection, it establishes an RRC connection with the RRC of the E-UTRAN through an RRC connection procedure and transitions to the RRC_CONNECTED state.
  • RRC_CONNECTED state There are several cases in which the UE in the RRC_IDLE state needs to establish an RRC connection. For example, when uplink data transmission is required for reasons such as a user's call attempt, or when a paging signal is received from the E-UTRAN. and sending a response message to it.
  • the NAS (Non-Access Stratum) layer performs functions such as session management and mobility management.
  • the NAS layer is divided into a NAS entity for MM (Mobility Management) and a NAS entity for SM (Session Management).
  • NAS entity for MM provides the following general functions.
  • NAS procedures related to AMF including the following.
  • AMF supports the following functions.
  • the NAS entity for SM performs session management between the UE and the SMF.
  • the SM signaling message is processed, ie, generated and processed in the NAS-SM layer of the UE and SMF.
  • the content of the SM signaling message is not interpreted by the AMF.
  • the NAS entity for MM creates a NAS-MM message that derives how and where to forward the SM signaling message with a security header indicating the NAS transmission of the SM signaling, additional information about the receiving NAS-MM.
  • the NAS entity for the SM Upon receiving the SM signaling, the NAS entity for the SM performs an integrity check of the NAS-MM message, and interprets the additional information to derive a method and a place to derive the SM signaling message.
  • the RRC layer, the RLC layer, the MAC layer, and the PHY layer located below the NAS layer are collectively referred to as an access layer (Access Stratum: AS).
  • 21 is an example of the configuration of the 3GPP V2X Layer and Application Layer (or ITS Layer) to which this specification can be applied.
  • ITS layer is a specific ITS technology or standard, as well as any application that can be used on 3GPP V2X communication that does not conform to it.
  • XX6 and the left side indicate the Control Plane and the right side indicate the User Plane, and TCP/UDP and IP in the User Plane may or may not be included depending on the configuration.
  • the EPS system is used using the eNB, but the eNB is the gNB, the MM (mobility management) function of the MME is AMF, and the SM function of the S/P-GW is SMF, S/P- The user plane-related functions of the GW can be replaced by the 5G system using UPF, etc.
  • the three main requirement areas for 5G are (1) enhanced mobile broadband (eMBB) area, (2) massive machine type communication (mMTC) area, and (3) high reliability/ultra-low latency communication (URLLC; ultra-reliable and low latency communications).
  • eMBB enhanced mobile broadband
  • mMTC massive machine type communication
  • URLLC ultra-reliable and low latency communications
  • KPI key performance indicator
  • eMBB focuses on overall improvements in data rates, latency, user density, capacity and coverage of mobile broadband connections. eMBB aims for a throughput of around 10 Gbps. eMBB goes far beyond basic mobile Internet access, covering rich interactive work, media and entertainment applications in the cloud or augmented reality. Data is one of the key drivers of 5G, and for the first time in the 5G era, we may not see dedicated voice services. In 5G, voice is simply expected to be processed as an application using the data connection provided by the communication system. The main causes of the increased traffic volume are the increase in content size and the increase in the number of applications requiring high data rates. Streaming services (audio and video), interactive video and mobile Internet connections will become more widely used as more devices are connected to the Internet.
  • Cloud storage and applications are rapidly increasing in mobile communication platforms, which can be applied to both work and entertainment.
  • Cloud storage is a special use case that drives the growth of uplink data rates.
  • 5G is also used for remote work on the cloud, requiring much lower end-to-end latency to maintain a good user experience when tactile interfaces are used.
  • cloud gaming and video streaming are another key factor demanding improvements in mobile broadband capabilities.
  • Entertainment is essential on smartphones and tablets anywhere, including in high-mobility environments such as trains, cars and airplanes.
  • Another use example is augmented reality for entertainment and information retrieval.
  • augmented reality requires very low latency and instantaneous amount of data.
  • mMTC is designed to enable communication between a large number of low-cost devices powered by batteries and is intended to support applications such as smart metering, logistics, field and body sensors.
  • mMTC is targeting a battery life of 10 years or so and/or a million devices per square kilometer.
  • mMTC enables the seamless connection of embedded sensors in all fields to form a sensor network, and is one of the most anticipated 5G use cases. Potentially, by 2020, there will be 20.4 billion IoT devices. Smart networks leveraging industrial IoT are one of the areas where 5G will play a major role in enabling smart cities, asset tracking, smart utilities, agriculture and security infrastructure.
  • URLLC enables devices and machines to communicate very reliably, with very low latency and high availability, enabling autonomous vehicle-to-vehicle communication and control, industrial control, factory automation, mission-critical applications such as telesurgery and healthcare, smart grid and public Ideal for safety applications.
  • URLLC aims for a delay on the order of 1 ms.
  • URLLC includes new services that will transform the industry through high-reliability/ultra-low-latency links such as remote control of critical infrastructure and autonomous vehicles. This level of reliability and latency is essential for smart grid control, industrial automation, robotics, and drone control and coordination.
  • 5G could complement fiber-to-the-home (FTTH) and cable-based broadband (or DOCSIS) as a means of delivering streams rated from hundreds of megabits per second to gigabits per second.
  • FTTH fiber-to-the-home
  • DOCSIS cable-based broadband
  • Such high speed may be required to deliver TVs with resolutions of 4K or higher (6K, 8K and higher) as well as virtual reality (VR) and augmented reality (AR).
  • VR and AR applications almost include immersive sporting events. Certain applications may require special network settings. For VR games, for example, game companies may need to integrate core servers with network operators' edge network servers to minimize latency.
  • Automotive is expected to be an important new driving force for 5G, with many use cases for mobile communication to vehicles. For example, entertainment for passengers requires both high capacity and high mobile broadband. The reason is that future users will continue to expect high-quality connections regardless of their location and speed.
  • Another example of use in the automotive sector is augmented reality dashboards.
  • the augmented reality contrast board allows drivers to identify objects in the dark above what they are seeing through the front window.
  • the augmented reality dashboard superimposes information to inform the driver about the distance and movement of objects.
  • wireless modules will enable communication between vehicles, information exchange between vehicles and supporting infrastructure, and information exchange between vehicles and other connected devices (eg, devices carried by pedestrians).
  • Safety systems can help reduce the risk of accidents by guiding drivers through alternative courses of action to help them drive safer.
  • the next step will be remote-controlled vehicles or autonomous vehicles.
  • This requires very reliable and very fast communication between different autonomous vehicles and/or between vehicles and infrastructure.
  • autonomous vehicles will perform all driving activities, allowing drivers to focus only on traffic anomalies that the vehicle itself cannot discern.
  • the technological requirements of autonomous vehicles demand ultra-low latency and ultra-fast reliability to increase traffic safety to unattainable levels for humans.
  • Smart cities and smart homes referred to as smart societies, will be embedded as high-density wireless sensor networks as examples of smart networks.
  • a distributed network of intelligent sensors will identify conditions for keeping a city or house cost- and energy-efficient.
  • a similar setup can be performed for each household.
  • Temperature sensors, window and heating controllers, burglar alarms and appliances are all connected wirelessly. Many of these sensors typically require low data rates, low power and low cost.
  • real-time HD video may be required in certain types of devices for surveillance.
  • Smart grids use digital information and communication technologies to interconnect these sensors to collect information and act on it. This information can include supplier and consumer behavior, enabling smart grids to improve efficiency, reliability, economy, sustainability of production and distribution of fuels such as electricity in an automated manner.
  • the smart grid can also be viewed as another low-latency sensor network.
  • the health sector has many applications that can benefit from mobile communications.
  • the communication system may support telemedicine providing clinical care from a remote location. This can help reduce barriers to distance and improve access to consistently unavailable health care in remote rural areas. It is also used to save lives in critical care and emergency situations.
  • a wireless sensor network based on mobile communication may provide remote monitoring and sensors for parameters such as heart rate and blood pressure.
  • Wireless and mobile communications are becoming increasingly important in industrial applications. Wiring is expensive to install and maintain. Thus, the possibility of replacing cables with reconfigurable radio links is an attractive opportunity for many industries. Achieving this, however, requires that wireless connections operate with similar latency, reliability and capacity as cables, and that their management is simplified. Low latency and very low error probability are new requirements that need to be connected with 5G.
  • Logistics and freight tracking are important use cases for mobile communications that use location-based information systems to enable tracking of inventory and packages from anywhere.
  • Logistics and freight tracking use cases typically require low data rates but require wide range and reliable location information.
  • each other checks whether the other UE has received permission to use the V2X service (that is, authenticates the other UE and checks whether the UE is authorized), integrity and confidentiality It is necessary to set a security key to protect (confidentiality).
  • the V2X UE For mutual authentication and security key setting between these V2X UEs, the V2X UE provides the V2X communication in advance with a certificate of the communication service provider and the V2X service provider (eg, vehicle OEM, communication service provider, national or regional authority, etc.) Or get and store the public key. This is possible through 3GPP UE provisioning procedures such as OTA or other well-known general certificate update procedures.
  • a certificate of the communication service provider and the V2X service provider eg, vehicle OEM, communication service provider, national or regional authority, etc.
  • 3GPP UE provisioning procedures such as OTA or other well-known general certificate update procedures.
  • the V2X UE performs the procedure for setting the security key as shown in FIG. 22 with the V2X servicer provider (or ITS service provider) application server and 3GPP service provider subscribed to.
  • a procedure in which the V2X UE is issued a certificate and a security key for protection of 3GPP layer unicast mode communication through the procedure of FIG. 22 is as follows.
  • the V2X UE requests a security key for V2X unicast mode direct communication from the Application server (V2X service provider or ITS service provider). This should include subscriber-related information that can be verified by the 3GPP service network (eg, IP multimedia private identity granted by the 3GPP carrier) and V2X service subscriber information that can be verified by the application server (ie, user ID). .
  • the application server creates a public and private key pair for the V2X UE, and the public key is signed with the public key of the application server.
  • the private key is used for key exchange in direct communication between V2X UEs, if it is necessary to hide it from the 3GPP operator for privacy, it is stored in the public key of the certificate issued separately by the application server to the V2X UE in advance for each UE. Encrypt with the corresponding private key.
  • the application server includes an ID that can be verified by the 3GPP network (eg IMPI), a certificate containing the public key of the UE, a private key (optionally encrypted), and a period for which the key is used (start, end) to the 3GPP network (the UE's home network).
  • An appropriate service license agreement must exist between the application service provider and the 3GPP carrier, and the communication between the two must be protected.
  • the subscriber information is checked through the ID assigned to the subscriber, and in the case of a UE capable of V2X unicast mode communication, the received UE certificate is cross-signed with the 3GPP operator’s certificate or disclosed.
  • a separate certificate is created by signing the key separately.
  • This certificate includes a period granted by the application service provider. For example, the application service provider may set a valid period for the certificate in the certificate.
  • a Provision ID corresponding to this certificate is randomly generated. Upon successful confirmation of subscribers, confirmation of service permission, and certificate issuance, the Key Provision ID is delivered to the service provider.
  • the service provider delivers the Key Provision ID to the V2X UE.
  • V2X UE makes a certificate request with Key Provision ID and subscriber ID (eg IMPI) to the 3GPP home network.
  • the certificate request message may include the aforementioned Key Provision ID and a subscriber ID.
  • the 3GPP home network sees the Key Provision ID, and after confirming that the Key Provision ID is issued to the V2X UE, the certificate signed in step 4 (including the UE's public key for V2X unicast mode communication) and the private key ( may optionally be in encrypted form in step 2) to the UE.
  • the UE stores the delivered certificate and key.
  • steps 1, 3 Direct communication between two V2X UEs that have been issued a certificate is possible through the procedure as shown in FIG.
  • the two V2X UEs exchange the issued certificates (steps 1, 3) to check whether the 3GPP V2X service is a permitted V2X UE, and perform mutual authentication (steps 2, 4).
  • the service policy if mutual communication is possible only in the case of the same V2X service provider, the signature of the V2X service provider is checked, or in the case of the same ITS service provider even if the 3GPP communication operator is different, in the case of V2X UEs capable of direct communication You can verify the signer of the ITS service provider After mutual authentication, security setting is completed by creating a security key to be used for communication encryption, encrypting it with the other party's public key and sending it (step 5). It is also possible to use other key exchange methods depending on the policy.
  • the terminal transmits a key request message for requesting generation of a security key for protecting the V2X communication to the server (S2410).
  • the security key includes a public key and a private key used for V2X communication of the terminal.
  • the key request message may include subscriber information related to the user of the terminal available in the network and the server.
  • the terminal receives an identifier generated in the network for authenticating the terminal from the server (S2420).
  • the terminal transmits a certificate request message including the identifier in order to request a certificate (certificate) associated with the identifier for the V2X communication to the network (S2430).
  • the terminal Based on the verification of the identifier through the network, the terminal receives the certificate and the private key as a response to the certificate request message from the network (S2440).
  • the certificate may be for determining whether the terminal is allowed in relation to the V2X communication through mutual authentication with another terminal.
  • the certificate may include information on a period during which the certificate is valid, set by a service provider related to the server.
  • 25 is an embodiment of a server to which this specification can be applied.
  • a private key generated by the server and information about the terminal are received from the server through a request from a terminal (UE) (S2510).
  • the information of the terminal may include subscriber information related to the user of the terminal, which can be used in the network and the server.
  • the terminal information may further include the private key generated by the server in relation to the terminal.
  • the private key may be encrypted using a private key related to the terminal's certificate preset by the server.
  • a certificate for the V2X communication and an identifier related to the certificate are generated (S2520).
  • the certificate may include information on a period during which the certificate is valid, set by a service provider related to the server.
  • the identifier is transmitted to the server (S2530).
  • the existing 3GPP Generic Bootstrapping Architecture GBA
  • the security key to be used in the 3GPP network is transmitted through the 3GPP network.
  • the 3GPP network may not directly know it, or It has the advantage of making it unknown even in the 3GPP network.
  • 26 shows a wireless communication device according to an embodiment of the present specification.
  • a wireless communication system may include a first device 9010 and a second device 9020 .
  • the first device 9010 includes a base station, a network node, a transmitting terminal, a receiving terminal, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone (Unmanned Aerial Vehicle, UAV), Artificial Intelligence (AI) Module, Robot, AR (Augmented Reality) Device, VR (Virtual Reality) Device, MR (Mixed Reality) Device, Hologram Device, Public Safety Device, MTC Device, IoT Device, Medical Device, Pin It may be a tech device (or financial device), a security device, a climate/environment device, a device related to 5G services, or other devices related to the 4th industrial revolution field.
  • UAV Unmanned Aerial Vehicle
  • AI Artificial Intelligence
  • Robot Robot
  • AR (Augmented Reality) Device VR (Virtual Reality) Device
  • MR (Mixed Reality) Device Hologram Device
  • Public Safety Device MTC Device
  • IoT Device Medical Device
  • the second device 9020 includes a base station, a network node, a transmitting terminal, a receiving terminal, a wireless device, a wireless communication device, a vehicle, a vehicle equipped with an autonomous driving function, a connected car, a drone (Unmanned Aerial Vehicle, UAV), Artificial Intelligence (AI) Module, Robot, AR (Augmented Reality) Device, VR (Virtual Reality) Device, MR (Mixed Reality) Device, Hologram Device, Public Safety Device, MTC Device, IoT Device, Medical Device, Pin It may be a tech device (or financial device), a security device, a climate/environment device, a device related to 5G services, or other devices related to the 4th industrial revolution field.
  • UAV Unmanned Aerial Vehicle, UAV
  • Artificial Intelligence (AI) Module Robot
  • AR Augmented Reality
  • VR Virtual Reality
  • MR Magned Reality
  • Hologram Device Hologram Device
  • Public Safety Device MTC Device
  • IoT Device Medical Device
  • Pin It may be
  • the terminal includes a mobile phone, a smart phone, a laptop computer, a digital broadcasting terminal, personal digital assistants (PDA), a portable multimedia player (PMP), a navigation system, a slate PC, and a tablet.
  • PDA personal digital assistants
  • PMP portable multimedia player
  • PC tablet PC
  • ultrabook ultrabook
  • wearable device wearable device, for example, a watch-type terminal (smartwatch), glass-type terminal (smart glass), HMD (head mounted display), etc.
  • the HMD may be a display device worn on the head.
  • an HMD may be used to implement VR, AR or MR.
  • the drone may be a flying vehicle that does not ride by a person and flies by a wireless control signal.
  • the VR device may include a device that implements an object or a background of a virtual world.
  • the AR device may include a device that implements by connecting an object or background in the virtual world to an object or background in the real world.
  • the MR device may include a device that implements a virtual world object or background by fusion with a real world object or background.
  • the hologram device may include a device for realizing a 360-degree stereoscopic image by recording and reproducing stereoscopic information by utilizing an interference phenomenon of light generated by the meeting of two laser beams called holography.
  • the public safety device may include an image relay device or an image device that can be worn on a user's body.
  • the MTC device and the IoT device may be devices that do not require direct human intervention or manipulation.
  • the MTC device and the IoT device may include a smart meter, a bending machine, a thermometer, a smart light bulb, a door lock, or various sensors.
  • a medical device may be a device used for the purpose of diagnosing, treating, alleviating, treating, or preventing a disease.
  • a medical device may be a device used for the purpose of diagnosing, treating, alleviating or correcting an injury or disorder.
  • a medical device may be a device used for the purpose of examining, replacing, or modifying structure or function.
  • the medical device may be a device used for the purpose of controlling pregnancy.
  • the medical device may include a medical device, a surgical device, an (ex vivo) diagnostic device, a hearing aid, or a device for a procedure.
  • the security device may be a device installed to prevent a risk that may occur and maintain safety.
  • the security device may be a camera, CCTV, recorder or black box.
  • the fintech device may be a device capable of providing financial services such as mobile payment.
  • the fintech device may include a payment device or a Point of Sales (POS).
  • the climate/environment device may include a device for monitoring or predicting the climate/environment.
  • the first device 9010 may include at least one processor such as a processor 9011 , at least one memory such as a memory 9012 , and at least one transceiver such as a transceiver 9013 .
  • the processor 9011 may perform the functions, procedures, and/or methods described above.
  • the processor 9011 may perform one or more protocols.
  • the processor 9011 may perform one or more layers of an air interface protocol.
  • the memory 9012 is connected to the processor 9011 and may store various types of information and/or instructions.
  • the transceiver 9013 may be connected to the processor 9011 and may be controlled to transmit/receive a wireless signal.
  • the second device 9020 may include at least one processor such as a processor 9021 , at least one memory device such as a memory 9022 , and at least one transceiver such as a transceiver 9023 .
  • the processor 9021 may perform the functions, procedures, and/or methods described above.
  • the processor 9021 may implement one or more protocols.
  • the processor 9021 may implement one or more layers of an air interface protocol.
  • the memory 9022 is connected to the processor 9021 and may store various types of information and/or commands.
  • the transceiver 9023 may be connected to the processor 9021 and may be controlled to transmit/receive a wireless signal.
  • the memory 9012 and/or the memory 9022 may be respectively connected inside or outside the processor 9011 and/or the processor 9021, and may be connected to another processor through various technologies such as wired or wireless connection. may be connected to
  • the first device 9010 and/or the second device 9020 may have one or more antennas.
  • antenna 9014 and/or antenna 9024 may be configured to transmit and receive wireless signals.
  • FIG. 27 illustrates a block diagram of a network node according to an embodiment of the present specification.
  • FIG. 27 when the base station is divided into a central unit (CU) and a distributed unit (DU), it is a diagram illustrating the network node of FIG. 26 in more detail.
  • CU central unit
  • DU distributed unit
  • base stations W20 and W30 may be connected to the core network W10 , and the base station W30 may be connected to a neighboring base station W20 .
  • the interface between the base stations W20 and W30 and the core network W10 may be referred to as NG, and the interface between the base station W30 and the neighboring base station W20 may be referred to as Xn.
  • the base station W30 may be divided into CUs W32 and DUs W34 and W36. That is, the base station W30 may be hierarchically separated and operated.
  • the CU W32 may be connected to one or more DUs W34 and W36, for example, an interface between the CU W32 and the DUs W34 and W36 may be referred to as F1.
  • the CU (W32) may perform functions of upper layers of the base station, and the DUs (W34, W36) may perform functions of lower layers of the base station.
  • the CU W32 is a radio resource control (RRC), service data adaptation protocol (SDAP), and packet data convergence protocol (PDCP) layer of a base station (eg, gNB) hosting a logical node (logical node)
  • RRC radio resource control
  • SDAP service data adaptation protocol
  • PDCP packet data convergence protocol
  • the DUs W34 and W36 may be logical nodes hosting radio link control (RLC), media access control (MAC), and physical (PHY) layers of the base station.
  • RLC radio link control
  • MAC media access control
  • PHY physical
  • the CU W32 may be a logical node hosting the RRC and PDCP layers of the base station (eg, en-gNB).
  • One DU (W34, W36) may support one or more cells. One cell can be supported by only one DU (W34, W36).
  • One DU (W34, W36) may be connected to one CU (W32), and one DU (W34, W36) may be connected to a plurality of CUs by appropriate implementation.
  • FIG. 28 illustrates a block diagram of a communication device according to an embodiment of the present specification.
  • FIG. 28 is a diagram illustrating the terminal of FIG. 27 in more detail above.
  • the terminal includes a processor (or a digital signal processor (DSP) (Y10), an RF module (or an RF unit) (Y35), and a power management module (Y05). ), antenna (Y40), battery (Y55), display (Y15), keypad (Y20), memory (Y30), SIM card (SIM (Subscriber Identification Module) ) card) (Y25) (this configuration is optional), a speaker (Y45) and a microphone (Y50) may be included.
  • the terminal may also include a single antenna or multiple antennas. can
  • the processor Y10 implements the functions, processes and/or methods proposed above.
  • the layer of the air interface protocol may be implemented by the processor Y10.
  • the memory Y30 is connected to the processor Y10 and stores information related to the operation of the processor Y10.
  • the memory Y30 may be inside or outside the processor Y10, and may be connected to the processor Y10 by various well-known means.
  • the user inputs command information such as a phone number by, for example, pressing (or touching) a button of the keypad Y20 or by voice activation using the microphone Y50.
  • the processor Y10 receives such command information and processes it to perform an appropriate function, such as making a call to a phone number. Operational data may be extracted from the SIM card Y25 or the memory Y30.
  • the processor Y10 may display command information or driving information on the display Y15 for the user to recognize and for convenience.
  • the RF module Y35 is connected to the processor Y10 to transmit and/or receive RF signals.
  • the processor Y10 transmits command information to the RF module Y35 to transmit, for example, a radio signal constituting voice communication data to initiate communication.
  • the RF module Y35 includes a receiver and a transmitter to receive and transmit a radio signal.
  • the antenna Y40 functions to transmit and receive radio signals.
  • the RF module Y35 may forward the signal and convert the signal to baseband for processing by the processor Y10.
  • the processed signal may be converted into audible or readable information output through the speaker Y45.
  • Embodiments according to the present specification may be implemented by various means, for example, hardware, firmware, software, or a combination thereof.
  • an embodiment of the present specification provides one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), FPGAs ( field programmable gate arrays), a processor, a controller, a microcontroller, a microprocessor, and the like.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • an embodiment of the present specification may be implemented in the form of a module, procedure, function, etc. that perform the functions or operations described above.
  • the software code may be stored in the memory and driven by the processor.
  • the memory may be located inside or outside the processor, and may transmit/receive data to and from the processor by various known means.
  • the above-described specification is permitted to be implemented as computer-readable code on a medium in which a program is recorded.
  • the computer-readable medium includes all kinds of recording devices in which data readable by a computer system is stored. Examples of computer-readable media include Hard Disk Drive (HDD), Solid State Disk (SSD), Silicon Disk Drive (SDD), ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage device, etc. There is also a carrier wave (eg, transmission over the Internet) that is implemented in the form of.
  • the computer may include a processor Y120 of the terminal. Accordingly, the above detailed description should not be construed as restrictive in all respects but as exemplary. The scope of this specification should be determined by a reasonable interpretation of the appended claims, and all modifications within the scope of equivalents of this specification are included in the scope of this specification.
  • the communication method as described above is allowed to be applied to various wireless communication systems including IEEE 802.16x and 802.11x systems in addition to the 3GPP system. Furthermore, the proposed method can be applied to a mmWave communication system using a very high frequency band.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente description se rapporte à un procédé par lequel un équipement utilisateur (UE) protège une communication de véhicule à tout (V2X) au moyen d'un serveur dans un système de communication sans fil, faisant appel aux étapes suivantes: la transmission, au serveur, d'un message de demande de clé pour demander la génération d'une clé de sécurité pour protéger la communication V2X; la réception, en provenance du serveur, d'un identifiant, généré dans un réseau central, pour authentifier l'UE; la transmission, au réseau central, d'un message de demande de certificat comprenant l'identifiant afin de demander un certificat qui est pour la communication V2X et qui est associé à l'identifiant; et la réception, sur la base de la vérification de l'identifiant à travers le réseau central, du certificat et d'une clé privée du réseau central en réponse au message de demande de certificat.
PCT/KR2019/018183 2019-12-20 2019-12-20 Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil WO2021125403A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2019/018183 WO2021125403A1 (fr) 2019-12-20 2019-12-20 Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/KR2019/018183 WO2021125403A1 (fr) 2019-12-20 2019-12-20 Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil

Publications (1)

Publication Number Publication Date
WO2021125403A1 true WO2021125403A1 (fr) 2021-06-24

Family

ID=76476839

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2019/018183 WO2021125403A1 (fr) 2019-12-20 2019-12-20 Procédé permettant de protéger une communication de véhicule à tout (v2x), au moyen d'un serveur dans un système de communication sans fil

Country Status (1)

Country Link
WO (1) WO2021125403A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115955358A (zh) * 2023-01-11 2023-04-11 北京唯科致远科技有限公司 基于点对点通信的数据流传输系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120109580A (ko) * 2009-12-28 2012-10-08 차이나 모바일 커뮤니케이션즈 코포레이션 인증 방법, 시스템 및 장치
US20180007557A1 (en) * 2016-07-01 2018-01-04 Qualcomm Incorporated Core network connectionless small data transfer
KR20180083694A (ko) * 2017-01-13 2018-07-23 에스케이이노베이션 주식회사 이종모재 접합용 용접 금속 및 이를 이용한 용접 방법
US20190200228A1 (en) * 2016-05-06 2019-06-27 Intel IP Corporation Service authorization and credential provisioning for v2x communications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120109580A (ko) * 2009-12-28 2012-10-08 차이나 모바일 커뮤니케이션즈 코포레이션 인증 방법, 시스템 및 장치
US20190200228A1 (en) * 2016-05-06 2019-06-27 Intel IP Corporation Service authorization and credential provisioning for v2x communications
US20180007557A1 (en) * 2016-07-01 2018-01-04 Qualcomm Incorporated Core network connectionless small data transfer
KR20180083694A (ko) * 2017-01-13 2018-07-23 에스케이이노베이션 주식회사 이종모재 접합용 용접 금속 및 이를 이용한 용접 방법

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Editorial corrections for eV2X TR 33.836", S 3-193326, 3GPP TSG SA-WG3 MEETING #96 AD-HOC, 7 October 2019 (2019-10-07), Chongqing, China, XP051796085 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115955358A (zh) * 2023-01-11 2023-04-11 北京唯科致远科技有限公司 基于点对点通信的数据流传输系统
CN115955358B (zh) * 2023-01-11 2023-05-02 北京唯科致远科技有限公司 基于点对点通信的数据流传输系统

Similar Documents

Publication Publication Date Title
WO2020141965A1 (fr) Procédé et dispositif de réalisation d'un enregistrement sur un réseau dans un système de communication sans fil
WO2020141964A1 (fr) Procédé permettant d'effectuer un enregistrement auprès d'un réseau dans un système de communication sans fil et dispositif correspondant
WO2020080913A1 (fr) Procédé prenant en charge une transmission de données séparée pour des tranches de réseau indépendantes dans un système de communication sans fil
WO2020111912A1 (fr) Procédé d'émission et de réception de signal de recherche de mobile dans un système de communications sans fil, et appareil associé
WO2020171529A1 (fr) Procédé permettant de réaliser une communication liée à un état de désactivation de données de commutation de paquets
WO2020204536A1 (fr) Procédé permettant à un terminal de se connecter à un réseau dans un système de communication sans fil
WO2020067790A1 (fr) Procédé et appareil pour déterminer s'il convient d'effectuer une transmission sur un accès aléatoire ou un octroi configuré dans un système de communication sans fil
WO2020046094A1 (fr) Procédé et appareil de sélection de réseau mobile terrestre public (plmn) d'accès dans un système de communication sans fil
WO2020067749A1 (fr) Contrôle d'accès pour la transmission de données
WO2020141956A1 (fr) Procédé de sélection de réseau dans un système de communication sans fil
WO2020138985A1 (fr) Procédé permettant de fournir un service de communication dans un système de communication sans fil
WO2021172964A1 (fr) Procédé et appareil de récupération après une panne dans un système de communication sans fil
WO2020218764A1 (fr) Procédé pour effectuer un enregistrement auprès d'un réseau dans un système de communication sans fil, et appareil correspondant
WO2020046093A1 (fr) Procédé et dispositif de sélection de réseau mobile terrestre public (plmn) dans un système de communication sans fil
WO2020022716A1 (fr) Procédé et dispositif de commande d'état de transmission de données dans un système de communication sans fil
WO2020091281A1 (fr) Procédé et appareil pour effectuer une authentification de serveur mandataire pour une permission d'accès par un terminal dans un système de communication sans fil
WO2020067711A1 (fr) Procédé et appareil d'entrée dans un état connecté avec un réseau pour poursuivre une transmission dans un système de communication sans fil
WO2021162507A1 (fr) Procédé et appareil pour transmettre un message de réponse dans un système de communication sans fil
WO2021177716A2 (fr) Communication liée à une multidiffusion
WO2020009440A1 (fr) Procédé et appareil de détermination de service pouvant être pris en charge dans un système de communications sans fil
WO2020076144A1 (fr) Procédé de configuration, à un réseau, de capacité d'un terminal prenant en charge de multiples systèmes d'accès sans fil dans un système de communication sans fil, et dispositif associé
WO2021091153A1 (fr) Procédé et dispositif de commande de configuration relative à une communication de liaison latérale dans un système de communication sans fil
WO2021091295A1 (fr) Annulation de rapport de sl csi dans un système de communication sans fil
WO2021194134A1 (fr) Procédé et appareil de gestion de défaillance de mobilité conditionnelle dans un système de communication sans fil
WO2020218910A1 (fr) Procédé de sélection de réseau dans un système de communication sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19956242

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19956242

Country of ref document: EP

Kind code of ref document: A1