Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.825
Word version: 16.0.0
0…
5…
5
Use cases
5.1
Use case for Initial authorization to operate
5.2
Use case for live data acquisition by UTM
5.3
Use case for data acquisition by law enforcement
5.4
Use case for enforcement of no-fly zones
5.5
Use case for distributed close-field separation service
5.6
Use case for local broadcast of UAS identity
5.7
Use case of differentiation between UAV specific UE and regular UE attached to UAV
5.8
Cloud-based NLOS UAV operation
5.9
Use case of UAV fly range restriction
5.10
Use Case for the UAS Based Remote Inspection
6
Additional considerations
7
Consolidated potential requirements
8
Conclusions and Recommendations
$
Change history
5
Use cases
p. 6
5.1
Use case for Initial authorization to operate
p. 6
5.1.1
Description
p. 6
5.1.2
Scenario
p. 7
5.1.3
Potential service requirements
p. 8
5.2
Use case for live data acquisition by UTM
p. 8
5.2.1
Description
p. 8
5.2.2
Scenario
p. 9
5.2.3
Potential service requirements
p. 9
5.3
Use case for data acquisition by law enforcement
p. 10
5.3.1
Description
p. 10
5.3.2
Scenario
p. 10
5.3.3
Potential service requirements
p. 10
5.4
Use case for enforcement of no-fly zones
p. 10
5.4.1
Description
p. 10
5.4.2
Scenario
p. 11
5.4.3
Potential service requirements
p. 11
5.5
Use case for distributed close-field separation service
p. 11
5.5.1
Description
p. 11
5.5.2
Scenario
p. 12
5.5.3
Potential service requirements
p. 12
5.6
Use case for local broadcast of UAS identity
p. 13
5.6.1
Description
p. 13
5.6.2
Scenario
p. 13
5.6.3
Potential service requirements
p. 14
5.7
Use case of differentiation between UAV specific UE and regular UE attached to UAV
p. 14
5.7.1
Description
p. 14
5.7.2
Scenario
p. 14
5.7.3
Potential service requirements
p. 15
5.8
Cloud-based NLOS UAV operation
p. 15
5.8.1
Description
p. 15
5.8.2
Scenario
p. 16
5.8.3
Potential requirements
p. 16
5.9
Use case of UAV fly range restriction
p. 16
5.9.1
Description
p. 16
5.9.2
Scenario
p. 17
5.9.3
Potential service requirements
p. 17
5.10
Use Case for the UAS Based Remote Inspection
p. 17
5.10.1
Description
p. 17
5.10.2
Scenario
p. 18
5.10.3
Potential service requirements
p. 18
6
Additional considerations
p. 18
6.1
Considerations on lawful interception
p. 18
6.2
Considerations on security
p. 18
7
Consolidated potential requirements
p. 19
7.1
General
p. 19
7.2
Centralised UAV traffic management
p. 20
7.3
Decentralised UAV traffic management
p. 20
7.4
Security
p. 21
8
Conclusions and Recommendations
p. 21
$
Change history
p. 22