US-20260128876-A1 - SYNCHRONIZING DEVICES BASED ON A SEQUENCE NUMBER OR KEY MISMATCH
Abstract
Various aspects of the present disclosure relate to receiving a first request message comprising a first set of parameters. Aspects of the present disclosure may relate to determining, based on the first set of parameters and a corresponding set of parameters stored in an internet-of-things (IoT) device, a mismatch of a sequence number (SQN) or a security key. Aspects of the present disclosure may relate to generating a synchronization ID based on a device SQN. Aspects of the present disclosure may relate to transmitting a response message comprising at least an expected result based on a default ID of the IoT device, and the device SQN.
Inventors
- Andreas Kunz
- Sheeba Backia Mary BASKARAN
Assignees
- LENOVO (UNITED STATES) INC.
Dates
- Publication Date
- 20260507
- Application Date
- 20241101
Claims (20)
- 1 . An internet-of-things (IoT) device for wireless communication, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the IoT device to: receive a first request message comprising a first set of parameters; determine, based on the first set of parameters and a corresponding set of parameters stored in the IoT device, a mismatch of a sequence number (SQN) or a security key; generate a synchronization identifier (ID) based on a device SQN; and transmit a response message comprising at least an expected result based on a default ID of the IoT device, and the device SQN.
- 2 . The IoT device of claim 1 , wherein the at least one processor is configured to cause the IoT device to: receive a second request message comprising a second set of parameters, wherein the second set of parameters comprises the synchronization ID, an encrypted nonce, an updated SQN, a set of encrypted command parameters, and a message authentication code for integrity (MAC-I).
- 3 . The IoT device of claim 2 , wherein the at least one processor is configured to cause the IoT device to: validate the MAC-I and the synchronization ID; decipher the encrypted nonce and the command parameters using a synchronization encryption key; perform one or more actions corresponding to the command parameters; and transmit a second response message comprising an encrypted command result based on the one or more actions, wherein the command result is encrypted using the synchronization encryption key.
- 4 . The IoT device of claim 1 , wherein the at least one processor is configured to cause the IoT device to: generate a new nonce in response to the mismatch of the SQN or the security key; and generate the synchronization ID and a synchronization encryption key in parallel based on the new nonce, the device SQN, and a shared secret parameter.
- 5 . The IoT device of claim 4 , wherein the expected result comprises a security context proof based on the default ID, and wherein to generate the expected result, the at least one processor is configured to cause the IoT device to generate the security context proof based on a hash-based message authentication code (HMAC) function, using the default ID, the new nonce, and the shared secret as inputs to the HMAC function.
- 6 . The IoT device of claim 4 , wherein the response message further comprises the new nonce, an indication of the mismatch of the SQN or the security key, and a message authentication code for integrity (MAC-I) based on the response message.
- 7 . The IoT device of claim 1 , wherein the first set of parameters comprise a first temporary ID, a first SQN, an encrypted nonce, an encrypted command, and a message authentication code for integrity (MAC-I), and wherein the at least one processor is configured to cause the IoT device to: validate the MAC-I and the first temporary ID; and determine the mismatch of the SQN or the security key based on the first SQN or the encrypted nonce and command, or both.
- 8 . The IoT device of claim 7 , wherein the first temporary ID comprises a paging identity of the IoT device, wherein the at least one processor is configured to cause the IoT device to register with a service provider using the default ID.
- 9 . A processor for wireless communication, comprising: at least one controller coupled with at least one memory and configured to cause the processor to: receive a first request message comprising a first set of parameters; determine, based on the first set of parameters and a corresponding set of parameters stored in the at least one memory, a mismatch of a sequence number (SQN) or a security key; generate a synchronization identifier (ID) based on a device SQN; and transmit a response message comprising at least an expected result based on a default ID of an internet-of-things (IoT) device, and the device SQN.
- 10 . The processor of claim 9 , wherein the at least one controller is configured to cause the processor to: receive a second request message comprising a second set of parameters, wherein the second set of parameters comprises the synchronization ID, an encrypted nonce, an updated SQN, a set of encrypted command parameters, and a message authentication code for integrity (MAC-I).
- 11 . The processor of claim 9 , wherein the at least one controller is configured to cause the processor to: generate a new nonce in response to the mismatch of the SQN or the security key; and generate the synchronization ID and a synchronization encryption key in parallel based on the new nonce, the device SQN, and a shared secret parameter, wherein synchronization ID is generated based on the new nonce, the device SQN, and the shared secret.
- 12 . An apparatus in a wireless communication network entity, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the wireless communication network entity to: transmit a first request message comprising a first set of parameters; receive a response message comprising at least an indication of a mismatch of a sequence number (SQN) or a security key, and a device SQN of an internet-of-things (IoT) device; generate a synchronization identifier (ID) based on the device SQN; and determine an updated SQN based on the device SQN.
- 13 . The apparatus of claim 12 , wherein the at least one processor is configured to cause the wireless communication network entity to: transmit a second request message comprising a second set of parameters, wherein the second set of parameters comprises the synchronization ID, an encrypted nonce, the updated SQN, a set of encrypted command parameters, and a message authentication code for integrity (MAC-I).
- 14 . The apparatus of claim 13 , wherein the at least one processor is configured to cause the wireless communication network entity to: generate the encrypted nonce and the set of encrypted command parameters using a synchronization encryption key; receive a second response message comprising an encrypted command result based on the command parameters; and decipher the command result using the synchronization encryption key.
- 15 . The apparatus of claim 12 , wherein the response message further comprises a new nonce and an expected result based on a default ID of the IoT device, wherein the at least one processor is configured to cause the wireless communication network entity to synchronize a system SQN to the device SQN in response to a verification of the expected result, and wherein the updated SQN comprises an incremented system SQN.
- 16 . The apparatus of claim 15 , wherein the expected result comprises a security context proof based on a default ID, wherein the default ID is stored at the wireless communication network entity, and wherein the at least one processor is configured to cause the wireless communication network entity to verify the security context proof based on a hash-based message authentication code (HMAC) function, using the default ID, the new nonce, and a shared secret as inputs to the HMAC function.
- 17 . The apparatus of claim 16 , wherein the at least one processor is configured to cause the wireless communication network entity to: generate the synchronization ID and a synchronization encryption key in parallel based on the new nonce, the device SQN, and the shared secret parameter.
- 18 . The apparatus of claim 12 , wherein the first set of parameters comprise a first temporary ID, a first SQN, an encrypted nonce, an encrypted command, and a message authentication code for integrity (MAC-I).
- 19 . The apparatus of claim 18 , wherein the first temporary ID comprises a paging identity of the IoT device.
- 20 . A method performed by a wireless communication network entity, the method comprising: transmitting a first request message comprising a first set of parameters; receiving a response message comprising at least an indication of a mismatch of a sequence number (SQN) or a security key, and a device SQN of an internet-of-things (IoT) device; generating a synchronization identifier (ID) based on the device SQN; and determining an updated SQN based on the device SQN.
Description
TECHNICAL FIELD The present disclosure relates to wireless communications, and more specifically to techniques for synchronizing devices in case of a sequence number (SQN) or key mismatch. BACKGROUND A wireless communications system may include one or multiple network communication devices, such as base stations, which may support wireless communications for one or multiple user communication devices, which may be otherwise known as user equipment (UE), or other suitable terminology. The wireless communications system may support wireless communications with one or multiple user communication devices by utilizing resources of the wireless communication system (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers, or the like). Additionally, the wireless communications system may support wireless communications across various radio access technologies (RATs) including third generation (3G) radio access technology, fourth generation (4G) radio access technology, fifth generation (5G) radio access technology, among other suitable radio access technologies beyond 5G (e.g., sixth generation (6G)). SUMMARY An article “a” before an element is unrestricted and understood to refer to “at least one” of those elements or “one or more” of those elements. The terms “a,” “at least one,” “one or more,” and “at least one of one or more” may be interchangeable. As used herein, including in the claims, “or” as used in a list of items (e.g., a list of items prefaced by a phrase such as “at least one of” or “one or more of” or “one or both of) indicates an inclusive list such that, for example, a list of at least one of A, B, or C means A or B or C or AB or AC or BC or ABC (i.e., A and B and C). Also, as used herein, the phrase “based on” shall not be construed as a reference to a closed set of conditions. For example, an example step that is described as “based on condition A” may be based on both a condition A and a condition B without departing from the scope of the present disclosure. In other words, as used herein, the phrase “based on” shall be construed in the same manner as the phrase “based at least in part on. Further, as used herein, including in the claims, a “set” may include one or more elements. Some implementations of the method and apparatuses described herein may include means for receiving a first request message comprising a first set of parameters. The method and apparatuses described herein may include means for determining, based on the first set of parameters and a corresponding set of parameters stored in the UE, a mismatch of an SQN or a security key. The method and apparatuses described herein may include means for generating a synchronization identifier (ID) based on a device SQN. The method and apparatuses described herein may include means for transmitting a response message comprising at least an expected result based on a default ID of the UE, and the device SQN. In some implementations of the method and apparatuses described herein may include means for transmitting a first request message comprising a first set of parameters. The method and apparatuses described herein may include means for receiving a response message comprising at least an indication of a mismatch of a SQN or a security key, and a device SQN. The method and apparatuses described herein may include means for generating a synchronization ID based on the device SQN. The method and apparatuses described herein may include means for determining an updated SQN based on the device SQN. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates an example of a wireless communication system in accordance with aspects of the present disclosure. FIG. 2 illustrates an example of a protocol stack, in accordance with aspects of the present disclosure. FIG. 3A illustrates an example of a procedure for the initial registration of an IoT device and subsequent IoT communications, in accordance with aspects of the present disclosure. FIG. 3B is a continuation of the procedure of FIG. 3A. FIG. 4A illustrates an example of a procedure for re-synchronization in case of key or SQN mismatch, in accordance with aspects of the present disclosure. FIG. 4B is a continuation of the procedure of FIG. 4A. FIG. 5 illustrates an example of temporary ID and encryption key generation, in accordance with aspects of the present disclosure. FIG. 6 illustrates an example of a transfer procedure for long term evolution (LTE) positioning protocol (LPP) capability exchange, in accordance with aspects of the present disclosure. FIG. 7 illustrates an example of an indication procedure for LPP capability exchange, in accordance with aspects of the present disclosure. FIG. 8 illustrates an example of a mapping structure of an associated identifier (ID) to information relating to UE and network conditions and applicable functionalities, in accordance with aspects of the present disclosure. FIG. 9 illust