US-20260128830-A1 - SECURITY ENHANCEMENTS ON TRACKING REFERENCE SIGNAL (TRS) FOR POSITIONING AND SENSING OPERATIONS
Abstract
Disclosed are techniques for wireless sensing. In some aspects, a user equipment (UE) may receive, from a network node, one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types. The UE may perform one or more sensing operations, one or more positioning operations, or any combination thereof, based on the one or more TRS resource configurations.
Inventors
- WEIMIN DUAN
- Jing Lei
- Kangqi LIU
Assignees
- QUALCOMM INCORPORATED
Dates
- Publication Date
- 20260507
- Application Date
- 20241104
Claims (20)
- 1 . A user equipment (UE), comprising: one or more memories; one or more transceivers; and one or more processors communicatively coupled to the one or more memories and the one or more transceivers, the one or more processors, either alone or in combination, configured to: receive, via the one or more transceivers, from a network node, one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and perform one or more sensing operations, one or more positioning operations, or any combination thereof, based on the one or more TRS resource configurations.
- 2 . The UE of claim 1 , wherein the plurality of security attack types comprise: a cyclic prefix (CP) attack type; a noise or jamming attack type; a computational attack type; a frequency domain (FD) attack type; a sample-by-sample attack type; a minimum mean square error (MMSE) attack type; a time domain (TD) attack type; or any combination thereof.
- 3 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise a configuration for a TRS sequence generated with a distinct scrambling identification (ID) per symbol.
- 4 . The UE of claim 3 , wherein: the distinct scrambling ID is a scrambling ID of a plurality of scrambling IDs; the symbol is a symbol of a plurality of symbols; and the plurality of scrambling IDs are not correlated to the plurality of symbols.
- 5 . The UE of claim 1 , wherein: the one or more TRS resource configurations comprise a configuration for a plurality of TRSs having a plurality of scrambling identifications (IDs) configured at a symbol; and the plurality of scrambling IDs are not correlated to each other.
- 6 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise one or more configurations for: a time location; a frequency location; a periodicity; quasi co-location (QCL) information; one or more scrambling identification (ID) parameters; or any combination thereof.
- 7 . The UE of claim 6 , wherein the one or more TRS resource configurations are transmitted as a radio resource control (RRC) message.
- 8 . The UE of claim 6 , wherein the one or more TRS resource configurations further comprise a configuration for one or more scrambling identification (ID) parameters.
- 9 . The UE of claim 8 , wherein the one or more scrambling ID parameters are transmitted as a medium access control-control element (MAC-CE) message or a downlink control information (DCI) message.
- 10 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise a configuration for a plurality of precoded TRS parameters.
- 11 . The UE of claim 10 , wherein the plurality of precoded TRS parameters are obtained by dividing one or more sub-bands or bandwidth parts (BWPs) into a plurality of physical resource block groups (PRGs) and applying precoding to the plurality of PRGs to obtain the plurality of precoded TRS parameters.
- 12 . The UE of claim 11 , wherein the plurality of PRGs comprise at least a first PRG of a first size and a second PRG of a second size different from the first size.
- 13 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise a configuration for a plurality of resource block (RB) combs offset from each other in a time domain and in a frequency domain.
- 14 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise a configuration for a zero cyclic prefix (CP) for one or more of a plurality of TRS symbols.
- 15 . The UE of claim 1 , wherein the one or more TRS resource configurations comprise a configuration for the UE to avoid a sensing measurement, a positioning measurement, or both based on a comparison of a first packet data protocol (PDP) estimated by a TRS and a second PDP estimated by a nearby reference signal (RS) indicating a potential cyclic prefix (CP) attack.
- 16 . A network node, comprising: one or more memories; one or more transceivers; and one or more processors communicatively coupled to the one or more memories and the one or more transceivers, the one or more processors, either alone or in combination, configured to: determine, for a user equipment (UE), one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and transmit, via the one or more transceivers, to the UE, the one or more TRS resource configurations.
- 17 . The network node of claim 16 , wherein the plurality of security attack types comprise: a cyclic prefix (CP) attack type; a noise or jamming attack type; a computational attack type; a frequency domain (FD) attack type; a sample-by-sample attack type; a minimum mean square error (MMSE) attack type; a time domain (TD) attack type; or any combination thereof.
- 18 . The network node of claim 16 , wherein the one or more TRS resource configurations comprise a configuration for a TRS sequence generated with a distinct scrambling identification (ID) per symbol.
- 19 . The network node of claim 18 , wherein: the distinct scrambling ID is a scrambling ID of a plurality of scrambling IDs; the symbol is a symbol of a plurality of symbols; and the plurality of scrambling IDs are not correlated to the plurality of symbols.
- 20 . The network node of claim 16 , wherein: the one or more TRS resource configurations comprise a configuration for a plurality of TRSs having a plurality of scrambling identifications (IDs) configured at a symbol; and the plurality of scrambling IDs are not correlated to each other.
Description
TECHNICAL FIELD Aspects of the disclosure relate generally to wireless technologies. BACKGROUND Wireless communication systems have developed through various generations, including a first-generation analog wireless phone service (1G), a second-generation (2G) digital wireless phone service (including interim 2.5G and 2.75G networks), a third-generation (3G) high speed data, Internet-capable wireless service and a fourth-generation (4G) service (e.g., Long Term Evolution (LTE) or WiMax). There are presently many different types of wireless communication systems in use, including cellular and personal communications service (PCS) systems. Examples of known cellular systems include the cellular analog advanced mobile phone system (AMPS), and digital cellular systems based on code division multiple access (CDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), the Global System for Mobile communications (GSM), etc. A fifth generation (5G) wireless standard, referred to as New Radio (NR), enables higher data transfer speeds, greater numbers of connections, and better coverage, among other improvements. The 5G standard, according to the Next Generation Mobile Networks Alliance, is designed to provide higher data rates as compared to previous standards, more accurate positioning (e.g., based on reference signals for positioning (RS-P), such as downlink, uplink, or sidelink positioning reference signals (PRS)), RF sensing, and other technical enhancements. These enhancements, as well as the use of higher frequency bands, enable improved RF sensing and 5G-based positioning. SUMMARY The following presents a simplified summary relating to one or more aspects disclosed herein. Thus, the following summary should not be considered an extensive overview relating to all contemplated aspects, nor should the following summary be considered to identify key or critical elements relating to all contemplated aspects or to delineate the scope associated with any particular aspect. Accordingly, the following summary has the sole purpose to present certain concepts relating to one or more aspects relating to the mechanisms disclosed herein in a simplified form to precede the detailed description presented below. In some aspects, a method of wireless communication at a user equipment (UE) includes receiving, from a network node, one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and performing one or more sensing operations, one or more positioning operations, or any combination thereof, based on the one or more TRS resource configurations. In some aspects, a method of wireless communication at a network node includes determining, for a user equipment (UE), one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and transmitting, to the UE, the one or more TRS resource configurations. In some aspects, a user equipment (UE) includes one or more memories; one or more transceivers; and one or more processors communicatively coupled to the one or more memories and the one or more transceivers, the one or more processors, either alone or in combination, configured to: receive, via the one or more transceivers, from a network node, one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and perform one or more sensing operations, one or more positioning operations, or any combination thereof, based on the one or more TRS resource configurations. In some aspects, a network node includes one or more memories; one or more transceivers; and one or more processors communicatively coupled to the one or more memories and the one or more transceivers, the one or more processors, either alone or in combination, configured to: determine, for a user equipment (UE), one or more tracking reference signal (TRS) resource configurations of a plurality of TRS resource configurations for a plurality of TRS resources, wherein each of the plurality of TRS resource configurations configures one or more TRS resources to avoid one or more security attack types of a plurality of security attack types; and transmit, via the one or more transceivers, to the UE, the one or more TRS resource configurations. In some aspect