US-20260129438-A1 - SYNCHRONIZING DEVICES BASED ON A TEMPORARY ID MISMATCH
Abstract
Various aspects of the present disclosure relate to transmitting a first request message comprising a first set of parameters. Aspects of the present disclosure may relate to receiving a first response message comprising an indication that a device is unreachable. Aspects of the present disclosure may relate to resetting a sequence number (SQN) and a device profile for the device in response to the first response message. Aspects of the present disclosure may relate to transmitting a second request message comprising a second set of parameters, wherein the second set of parameters comprises a default identifier (ID) of the device, a nonce, and the SQN. Aspects of the present disclosure may relate to receiving a second response message from the device comprising a result based on the default ID.
Inventors
- Andreas Kunz
- Sheeba Backia Mary BASKARAN
Assignees
- LENOVO (UNITED STATES) INC.
Dates
- Publication Date
- 20260507
- Application Date
- 20241101
Claims (20)
- 1 . An apparatus in a wireless communication network entity, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the wireless communication network entity to: transmit a first request message comprising a first set of parameters; receive a first response message comprising an indication that a device is unreachable; reset a sequence number (SQN) and a device profile for the device in response to the first response message; transmit a second request message comprising a second set of parameters, wherein the second set of parameters comprises a default identifier (ID) of the device, a nonce, and the SQN; and receive a second response message from the device comprising a result based on the default ID.
- 2 . The apparatus of claim 1 , wherein the second response message further comprises a second nonce and an incremented SQN, wherein the at least one processor is configured to cause the wireless communication network entity to authenticate the device based at least in part on the result and the second nonce.
- 3 . The apparatus of claim 2 , wherein the result comprises a security context proof based on the default ID, wherein the default ID is stored at the wireless communication network entity, and wherein the at least one processor is configured to cause the wireless communication network entity to verify the security context proof based on a hash-based message authentication code (HMAC) function, using the default ID, the second nonce, and a shared secret parameter as inputs to the HMAC function.
- 4 . The apparatus of claim 1 , wherein the at least one processor is configured to cause the wireless communication network entity to: generate an encryption key and a temporary ID based on the nonce, the SQN, and a shared secret parameter; and activate the encryption key and the temporary ID in response to a verification of the second response message.
- 5 . The apparatus of claim 4 , wherein the at least one processor is configured to cause the wireless communication network entity to transmit a third request message comprising a third set of parameters in response to the second response message, wherein the third set of parameters comprises a second nonce encrypted using the encryption key, a set of command parameters, and a message authentication code for integrity (MAC-I).
- 6 . The apparatus of claim 5 , wherein the at least one processor is configured to cause the wireless communication network entity to: receive a third response message comprising an encrypted command result based on the set of command parameters; and decipher the encrypted command result using the encryption key.
- 7 . The apparatus of claim 4 , wherein the temporary ID comprises a paging identity of an internet-of-things (IoT) device.
- 8 . A method performed by a wireless communication network entity, the method comprising: transmitting a first request message comprising a first set of parameters; receiving a first response message comprising an indication that a device is unreachable; resetting a sequence number and a device profile for the device in response to the first response message; transmitting a second request message comprising a second set of parameters, wherein the second set of parameters comprises a default identifier (ID) of the device, a nonce, and the sequence number; and receiving a second response message from the device comprising a result based on a default ID.
- 9 . The method of claim 8 , wherein the second response message further comprises a second nonce and an incremented sequence number, the method further comprising authenticating the device based at least in part on the result and the second nonce.
- 10 . The method of claim 9 , wherein the result comprises a security context proof based on the default ID, wherein the default ID is stored at the wireless communication network entity, and wherein the method further comprises verifying the security context proof based on a hash-based message authentication code (HMAC) function, using the default ID, the second nonce, and a shared secret parameter as inputs to the HMAC function.
- 11 . The method of claim 8 , further comprising: generating an encryption key and a temporary ID based on the nonce, the sequence number, and a shared secret parameter; and activating the encryption key and the temporary ID in response to a verification of the second response message.
- 12 . The method of claim 11 , further comprising transmitting a third request message comprising a third set of parameters in response to the second response message, wherein the third set of parameters comprises a second nonce encrypted using the encryption key, a set of command parameters encrypted using the encryption key, and a message authentication code for integrity (MAC-I).
- 13 . The method of claim 12 , further comprising: receiving a third response message comprising an encrypted command result based on the set of command parameters; and deciphering the encrypted command result using the encryption key.
- 14 . An internet-of-things (IoT) device for wireless communication, comprising: at least one memory; and at least one processor coupled with the at least one memory and configured to cause the IoT device to: receive a first request message comprising a first set of parameters; determine that the first set of parameters comprises a default identifier (ID) of the IoT device and a reset sequence number (SQN); generate a temporary ID based at least in part on the first set of parameters; transmit a response message comprising at least an expected result based on the default ID; and receive a second request message comprising a second set of parameters, wherein the second set of parameters comprises the temporary ID and a set of command parameters.
- 15 . The IoT device of claim 14 , wherein the first set of parameters comprises a nonce, and wherein the at least one processor is configured to cause the IoT device to: generate the temporary ID and an encryption key based on the nonce, the reset SQN, and a shared secret parameter.
- 16 . The IoT device of claim 15 wherein the expected result comprises a security context proof based on the default ID, and wherein to generate the expected result, the at least one processor is configured to cause the IoT device to generate the security context proof based on a hash-based message authentication code (HMAC) function, using the default ID, the nonce, and the shared secret parameter as inputs to the HMAC function.
- 17 . The IoT device of claim 15 , wherein the second set of parameters further comprises an encrypted nonce, a set of encrypted command parameters, and a message authentication code for integrity (MAC-I), and wherein the at least one processor is configured to cause the IoT device to: validate the MAC-I and the temporary ID; decipher the encrypted nonce and the set of encrypted command parameters using the encryption key; perform one or more actions corresponding to the command parameters; and transmit a second response message comprising a command result based on the one or more actions, wherein the command result is encrypted using the encryption key.
- 18 . The IoT device of claim 14 , wherein the first set of parameters comprises the default ID, the reset SQN, a nonce, and a message authentication code for integrity (MAC-I), and wherein the at least one processor is configured to cause the IoT device to: validate the MAC-I; and determine an ID mismatch profile reset based on the default ID and the reset SQN.
- 19 . The IoT device of claim 14 , wherein the temporary ID comprises a paging identity of the IoT device, wherein the at least one processor is configured to cause the IoT device to register with a service provider using the default ID.
- 20 . A processor for wireless communication, comprising: at least one controller coupled with at least one memory and configured to cause the processor to: receive a first request message comprising a first set of parameters; determine that the first set of parameters comprises a default identifier (ID) of an internet-of-things device and a reset sequence number (SQN); generate a temporary ID based at least in part on the first set of parameters; transmit a response message comprising at least an expected result based on the default ID; and receive a second request message comprising a second set of parameters, wherein the second set of parameters comprises the temporary ID and a set of command parameters.
Description
TECHNICAL FIELD The present disclosure relates to wireless communications, and more specifically to techniques for synchronizing devices in case of a temporary identifier (ID) mismatch. BACKGROUND A wireless communications system may include one or multiple network communication devices, such as base stations, which may support wireless communications for one or multiple user communication devices, which may be otherwise known as user equipment (UE), or other suitable terminology. The wireless communications system may support wireless communications with one or multiple user communication devices by utilizing resources of the wireless communication system (e.g., time resources (e.g., symbols, slots, subframes, frames, or the like) or frequency resources (e.g., subcarriers, carriers, or the like). Additionally, the wireless communications system may support wireless communications across various radio access technologies (RATs) including third generation (3G) radio access technology, fourth generation (4G) radio access technology, fifth generation (5G) radio access technology, among other suitable radio access technologies beyond 5G (e.g., sixth generation (6G)). SUMMARY An article “a” before an element is unrestricted and understood to refer to “at least one” of those elements or “one or more” of those elements. The terms “a,” “at least one,” “one or more,” and “at least one of one or more” may be interchangeable. As used herein, including in the claims, “or” as used in a list of items (e.g., a list of items prefaced by a phrase such as “at least one of” or “one or more of” or “one or both of) indicates an inclusive list such that, for example, a list of at least one of A, B, or C means A or B or C or AB or AC or BC or ABC (i.e., A and B and C). Also, as used herein, the phrase “based on” shall not be construed as a reference to a closed set of conditions. For example, an example step that is described as “based on condition A” may be based on both a condition A and a condition B without departing from the scope of the present disclosure. In other words, as used herein, the phrase “based on” shall be construed in the same manner as the phrase “based at least in part on.” Further, as used herein, including in the claims, a “set” may include one or more elements. Some implementations of the method and apparatuses described herein may include means for transmitting a first request message comprising a first set of parameters. The method and apparatuses described herein may include means for receiving a first response message comprising an indication that a device is unreachable. The method and apparatuses described herein may include means for resetting a sequence number (SQN) and a device profile for the device in response to the first response message. The method and apparatuses described herein may include means for transmitting a second request message comprising a second set of parameters, wherein the second set of parameters comprises a default identifier (ID) of the device, a nonce, and the SQN. The method and apparatuses described herein may include means for receiving a second response message from the device comprising a result based on the default ID. In some implementations of the method and apparatuses described herein may include means for receiving a first request message including a first set of parameters. The method and apparatuses described herein may include means for determining that the first set of parameters includes a default ID of the UE and a reset SQN. The method and apparatuses described herein may include means for generating a temporary ID based at least in part on the first set of parameters. The method and apparatuses described herein may include means for transmitting a response message including at least an expected result based on the default ID. The method and apparatuses described herein may include means for receiving a second request message including a second set of parameters, where the second set of parameters includes the temporary ID and a set of command parameters. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates an example of a wireless communication system in accordance with aspects of the present disclosure. FIG. 2 illustrates an example of a protocol stack, in accordance with aspects of the present disclosure. FIG. 3A illustrates an example of a procedure for the initial registration of an IoT device and subsequent IoT communications, in accordance with aspects of the present disclosure. FIG. 3B is a continuation of the procedure of FIG. 3A. FIG. 4A illustrates an example of a procedure for re-synchronization in case of temporary ID mismatch, in accordance with aspects of the present disclosure. FIG. 4B is a continuation of the procedure of FIG. 4A. FIG. 4C is a continuation of the procedure of FIGS. 4A and 4B. FIG. 5 illustrates an example of temporary ID and encryption key generation, in accordance with aspects of the present disclosure. FIG. 6 illustrat