US-20260129442-A1 - GENERIC BOOTSTRAPPING ARCHITECTURE AUTHENTICATION IN AN AMBIENT INTERNET OF THINGS ENVIRONMENT
Abstract
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, an ambient Internet of Things (AIoT) device may receive generic bootstrapping architecture (GBA) push information (GPI) from an AIoT controller. The AIoT device may generate, using the GPI, a root key associated with the AIoT controller. The AIoT device may transmit, to the AIoT controller, a key confirmation message using the root key. Numerous other aspects are described.
Inventors
- Hongil KIM
- Soo Bum Lee
- Sebastian Speicher
Assignees
- QUALCOMM INCORPORATED
Dates
- Publication Date
- 20260507
- Application Date
- 20251031
Claims (18)
- 1 . An ambient Internet of Things (AIoT) device, comprising: a processing system that includes one or more processors and one or more code-storing memories coupled with the one or more processors, the processing system configured to cause the AIoT device to: receive generic bootstrapping architecture (GBA) push information (GPI) from an AIoT controller; generate, using the GPI, a root key associated with the AIoT controller; and transmit, to the AIoT controller, a key confirmation message using the root key.
- 2 . The AIoT device of claim 1 , wherein, to generate the root key, the one or more processors are configured to cause the AIoT device to: derive the root key using a plurality of parameters included in the GPI.
- 3 . The AIoT device of claim 1 , wherein a protection key is generated based on the root key.
- 4 . The AIoT device of claim 3 , wherein an algorithm for generating the protection key is preconfigured for the AIoT device.
- 5 . The AIoT device of claim 3 , wherein the processing system is configured to cause the AIoT device to: receive, from the AIoT controller, a message; and verify or decrypt the message using the protection key.
- 6 . The AIoT device of claim 1 , wherein the GPI is received from the AIoT controller via an AIoT reader.
- 7 . A method of wireless communication performed by an ambient Internet of Things (AIoT) device, comprising: receiving generic bootstrapping architecture (GBA) push information (GPI) from an AIoT controller; generating, using the GPI, a root key associated with the AIoT controller; and transmitting, to the AIoT controller, a key confirmation message using the root key.
- 8 . The method of claim 7 , wherein generating the root key comprises: deriving the root key using a plurality of parameters included in the GPI.
- 9 . The method of claim 7 , wherein a protection key is generated based on the root key.
- 10 . The method of claim 9 , wherein an algorithm for generating the protection key is preconfigured for the AIoT device.
- 11 . The method of claim 9 , further comprising: receiving, from the AIoT controller, a message; and verifying or decrypt the message using the protection key.
- 12 . The method of claim 7 , wherein the GPI is received from the AIoT controller via an AIoT reader.
- 13 . A non-transitory computer-readable medium storing a set of instructions for wireless communication, the set of instructions comprising: one or more instructions that, when executed by one or more processors of an ambient Internet of Things (AIoT) device, cause the AIoT device to: receive generic bootstrapping architecture (GBA) push information (GPI) from an AIoT controller; generate, using the GPI, a root key associated with the AIoT controller; and transmit, to the AIoT controller, a key confirmation message using the root key.
- 14 . The non-transitory computer-readable medium of claim 13 , wherein the one or more instructions, that cause the AIoT device to generate the root key, cause the AIoT device to: derive the root key using a plurality of parameters included in the GPI.
- 15 . The non-transitory computer-readable medium of claim 13 , wherein a protection key is generated based on the root key.
- 16 . The non-transitory computer-readable medium of claim 15 , wherein an algorithm for generating the protection key is preconfigured for the AIoT device.
- 17 . The non-transitory computer-readable medium of claim 15 , wherein the one or more instructions cause the AIoT device to: receive, from the AIoT controller, a message; and verify or decrypt the message using the protection key.
- 18 . The non-transitory computer-readable medium of claim 13 , wherein the GPI is received from the AIoT controller via an AIoT reader.
Description
CROSS-REFERENCE TO RELATED APPLICATION This Patent Application claims priority to U.S. Provisional Patent Application No. 63/716,081, filed on November 4, 2024, entitled “GENERIC BOOTSTRAPPING ARCHITECTURE AUTHENTICATION IN AN AMBIENT INTERNET OF THINGS ENVIRONMENT,” and assigned to the assignee hereof. The disclosure of the prior Application is considered part of and is incorporated by reference into this Patent Application. FIELD OF THE DISCLOSURE Aspects of the present disclosure generally relate to wireless communication and specifically relate to techniques, apparatuses, and methods associated with generic bootstrapping architecture authentication in an ambient Internet of Things environment. BACKGROUND Wireless communication systems are widely deployed to provide various services, which may involve carrying or supporting voice, text, other messaging, video, data, and/or other traffic. Typical wireless communication systems may employ multiple-access radio access technologies (RATs) capable of supporting communication among multiple wireless communication devices including user devices or other devices by sharing the available system resources (for example, time domain resources, frequency domain resources, spatial domain resources, and/or device transmit power, among other examples). Such multiple-access RATs are supported by technological advancements that have been adopted in various telecommunication standards, which define common protocols that enable different wireless communication devices to communicate on a local, municipal, national, regional, or global level. An example telecommunication standard is New Radio (NR). NR, which may also be referred to as 5G, is part of a continuous mobile broadband evolution promulgated by the Third Generation Partnership Project (3GPP). NR (and other RATs beyond NR) may be designed to better support enhanced mobile broadband (eMBB) access, Internet of things (IoT) networks or reduced capability device deployments, and ultra-reliable low latency communication (URLLC) applications. To support these verticals, NR systems may be designed to implement a modularized functional infrastructure, a disaggregated and service-based network architecture, network function virtualization, network slicing, multi-access edge computing, millimeter wave (mmWave) technologies including massive multiple-input multiple-output (MIMO), licensed and unlicensed spectrum access, non-terrestrial network (NTN) deployments, sidelink and other device-to-device direct communication technologies (for example, cellular vehicle-to-everything (CV2X) communication), multiple-subscriber implementations, high-precision positioning, and/or radio frequency (RF) sensing, among other examples. As the demand for connectivity continues to increase, further improvements in NR may be implemented, and other RATs, such as 6G and beyond, may be introduced to enable new applications and facilitate new use cases. SUMMARY Some aspects described herein relate to a method of wireless communication performed by an ambient Internet of Things (AIoT) device. The method may include receiving generic bootstrapping architecture (GBA) push information (GPI) from an AIoT controller. The method may include generating, using the GPI, a root key associated with the AIoT controller. The method may include transmitting, to the AIoT controller, a key confirmation message using the root key. Some aspects described herein relate to a method of wireless communication performed by an AIoT controller. The method may include receiving, from a network function, GPI. The method may include transmitting, to an AIoT device, the GPI. The method may include validating, from the AIoT device, a key confirmation message using a root key generated from the GPI. Some aspects described herein relate to an AIoT device. The AIoT device may include a processing system that includes one or more processors and one or more code-storing memories coupled with the one or more processors. The processing system may be configured to cause the AIoT device to receive GPI from an AIoT controller. The processing system may be configured to cause the AIoT device to generate, using the GPI, a root key associated with the AIoT controller. The processing system may be configured to cause the AIoT device to transmit, to the AIoT controller, a key confirmation message using the root key. Some aspects described herein relate to an AIoT controller. The AIoT controller may include a processing system that includes one or more processors and one or more code-storing memories coupled with the one or more processors. The processing system may be configured to cause the AIoT controller to receive, from a network function, GPI. The processing system may be configured to cause the AIoT controller to transmit, to an AIoT device, the GPI. The processing system may be configured to cause the AIoT controller to validate, from the AIoT device, a key confirmation message using a roo