Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.754
Word version: 17.1.0
1…
4…
6…
7…
6
Solutions
6
Solutions
p. 16
6.0
Mapping Solutions to Key Issues
p. 16
6.1
Solution 1: Identification of UAVs in a target area
p. 17
6.1.1
Introduction
p. 17
6.1.2
Functional Description
p. 17
6.1.3
Procedures
p. 17
6.1.4
Impacts on services, entities and interfaces
p. 18
6.2
Solution #2: 3GPP reference architecture for UAV remote identification
p. 19
6.2.1
Introduction
p. 19
6.2.2
Functional Description
p. 19
6.2.2.1
3GPP reference architecture for UAV remote identification (5GC)
p. 19
6.2.2.2
3GPP reference architecture for UAV remote identification (EPC)
p. 20
6.3
Solution #3: USS/UTM Discovery
p. 20
6.3.1
Introduction
p. 20
6.3.2
Functional Description
p. 20
6.3.3
Procedures
p. 21
6.3.4
Impacts on services, entities and interfaces
p. 21
6.4
Solution 4: Solution using User plane for UAV identification and authorization
p. 21
6.4.1
Introduction
p. 21
6.4.2
Procedure
p. 23
6.4.2.1
Procedure for 5GS
p. 24
6.4.2.2
Procedure for EPS
p. 26
6.4.2.3
Procedure for UAVC and UAV Association
p. 29
6.4.3
Impacts on services, entities and interfaces
p. 31
6.5
Solution #5: UAV authentication and authorization by USS/UTM based on NAS supplementary and secondary authentication and authorization procedures
p. 31
6.5.1
Introduction
p. 31
6.5.2
Functional Description
p. 31
6.5.2.1
Assumptions
p. 31
6.5.2.2
Overview of the Solution
p. 32
6.5.2.3
USS Discovery
p. 34
6.5.2.4
Applicability to 5GS
p. 35
6.5.2.5
Applicability to EPC
p. 35
6.5.3
Procedures
p. 36
6.5.3.1
5GS Procedures
p. 36
6.5.3.1.1
5GS Procedure For Authentication/Authorization
p. 36
6.5.3.1.2
Procedure For UUAA Revocation
p. 42
6.5.3.1.3
Procedure For Revocation of Pairing
p. 42
6.5.3.1.4
Procedure For Update/Revocation of flight-related communication
p. 43
6.5.3.2
EPS Procedures
p. 44
6.5.3.2.1
EPS Procedure For Authentication/Authorization
p. 44
6.5.3.2.2
Procedures for Authorization Revocation
p. 48
6.5.4
Impacts on services, entities and interfaces
p. 49
6.6
Solution #6: Control-plane assisted UAV authentication and authorization
p. 49
6.6.1
Introduction
p. 49
6.6.2
Functional Description
p. 50
6.6.2.1
Architecture
p. 50
6.6.3
Procedures
p. 50
6.6.4
Impacts on services, entities and interfaces
p. 52
6.7
Solution #7: Enhanced Secondary Authentication/Authorization for UAVs
p. 52
6.7.1
Introduction
p. 52
6.7.2
Functional Description
p. 53
6.7.2.1
Architecture
p. 53
6.7.3
Procedures
p. 53
6.7.4
Impacts on services, entities and interfaces
p. 55
6.8
Solution #8: Support of Aerial UE function in the 5G system
p. 55
6.8.1
Functional Description
p. 55
6.8.2
Procedures
p. 56
6.8.3
Impacts on services, entities and interfaces
p. 56
6.9
Solution #9: UAV Identities Allocation and Usage for Remote Identification
p. 56
6.9.1
Introduction
p. 56
6.9.2
Functional Description
p. 57
6.9.2.1
Adoption of a UAV Flight Enablement Subsystem (UFES)
p. 57
6.9.2.2
Functional Assumptions about the CAA-Level UAV ID for Remote Identification
p. 57
6.9.2.3
CAA-Level UAV ID assignment
p. 57
6.9.2.3.1
3GPP Assisted CAA-Level UAV ID Assignment
p. 58
6.9.2.4
Resolution of UAV Identity for Broadcast Remote Identification
p. 58
6.9.2.4.1
USS-assigned CAA-Level UAV ID
p. 58
6.9.2.4.2
3GPP Assisted CAA-Level UAV ID Assignment
p. 59
6.9.2.5
Applicability for Network publishing Remote Identification and tracking
p. 59
6.9.3
Procedures
p. 59
6.9.3.1
Use of CAA-level UAV ID for Broadcast Remote Identification
p. 59
6.9.3.2
Remote identification and tracking for Unknown UAV (Unknown to TPAE or UTM)
p. 61
6.9.3.3
Remote identification and tracking known UAV (TPAE or UTM has some UAV identifier information)
p. 62
6.9.4
Impacts on services, entities and interfaces
p. 62
6.10
Solution 10: Control Plane based Registration of UAV and issuance of CAA-Level UAV Identity for Remote Identification and Tracking
p. 62
6.10.1
Introduction
p. 62
6.10.2
Functional description
p. 63
6.10.2.1
Applicability to 5GS
p. 63
6.10.2.2
Applicability to EPS
p. 66
6.10.3
Impacts on services, entities and interfaces
p. 67
6.11
Solution 11: Network publishing server and indication of UAS flight authorization
p. 68
6.11.1
Introduction
p. 68
6.11.2
Functional description
p. 68
6.11.3
Procedures
p. 69
6.11.4
Impacts on services, entities and interfaces
p. 70
6.12
Solution 12: Exposing Restricted Area for UAV Flight Path Authorization
p. 70
6.12.1
Introduction
p. 70
6.12.2
Functional Description
p. 71
6.12.3
Procedures
p. 71
6.12.4
Impacts on services, entities and interfaces
p. 72
6.13
Solution 13: Area of Interest for support of UTM's geofencing
p. 73
6.13.1
Description
p. 73
6.13.2
Procedures
p. 74
6.13.3
Impacts on services, entities and interfaces
p. 75
6.14
Solution #14: UAV and UAVC tracking and flight route analysis
p. 75
6.14.1
Introduction
p. 75
6.14.2
Functional Description
p. 75
6.14.3
Procedures
p. 76
6.14.3.1
UAV and UAV Controller tracking
p. 76
6.14.4
Impacts on services, entities and interfaces
p. 76
6.15
Solution #15: UAV and UAV Controller tracking based on LCS mechanism
p. 76
6.15.1
Introduction
p. 76
6.15.2
Functional Description
p. 77
6.15.3
Procedures
p. 77
6.15.3.1
UAV and UAV Controller tracking in 5GS based on eLCS mechanism
p. 77
6.15.3.2
UAV and UAV Controller tracking in EPS based on LCS mechanism
p. 78
6.15.4
Impacts on services, entities and interfaces
p. 78
6.16
Solution #16: Location Exposure to UTM/USS
p. 78
6.16.1
Introduction
p. 78
6.16.2
Functional Description
p. 79
6.16.3
Procedures
p. 79
6.16.3.1
General
p. 79
6.16.3.2
Unified Location Service Exposure Procedure
p. 80
6.16.3.3
Procedure of Cancellation of Reporting of Location Events by the UTM/USS
p. 81
6.16.4
Impacts on services, entities and interfaces
p. 82
6.17
Solution #17: Network-Assisted UAV Verification and Monitoring
p. 82
6.17.1
Introduction
p. 82
6.17.2
Functional Description
p. 82
6.17.3
Procedures
p. 82
6.17.4
Impacts on services, entities and interfaces
p. 84
6.18
Solution #18: Handling of PDU session established by UAV
p. 84
6.18.1
Introduction
p. 84
6.18.2
Functional Description
p. 85
6.18.3
Procedures
p. 85
6.18.3.1
UTM Initiated PDU Session Release
p. 85
6.18.3.2
UTM Initiated PDU Session Modification
p. 85
6.18.4
Impacts on services, entities and interfaces
p. 86
6.19
Solution #18: USS/UTM triggered C2 communication authorization revocation
p. 86
6.19.1
Introduction
p. 86
6.19.2
Functional Description
p. 86
6.19.3
Procedures
p. 87
6.19.4
Impacts on services, entities and interfaces
p. 87
6.20
Solution 20: UAV and UAVC Association and Connectivity Control Using Secondary Authorization
p. 87
6.20.1
Introduction
p. 87
6.20.2
Functional Description
p. 88
6.20.3
Procedures
p. 89
6.20.4
Impacts on services, entities and interfaces
p. 90
6.21
Solution #21: Connectivity setup for C2 communication and association between UAV and UAV-C
p. 90
6.21.1
Introduction
p. 90
6.21.2
Functional Description
p. 91
6.21.3
Procedures
p. 92
6.21.4
Impacts on services, entities and interfaces
p. 93
6.22
Solution #23: UAV identification and authentication by RID USS
p. 94
6.22.1
Introduction
p. 94
6.22.2
Functional Description
p. 94
6.22.2.1
Assumptions
p. 94
6.22.2.2
Overview of the solution
p. 94
6.22.3
Procedures
p. 95
6.22.3.1
UAV identification and notification to Remote ID USS
p. 95
6.22.4
Impacts on existing entities and interfaces
p. 96
6.23
Solution #23: UAV/UAVC authentication/authorization by USS/UTM and C2 communication establishment
p. 96
6.23.1
Introduction
p. 96
6.23.2
Functional Description
p. 97
6.23.2.1
Assumptions
p. 97
6.23.2.2
Overview of the solution
p. 97
6.23.2.3
Usage of secondary DN AAA authentication / authorization
p. 100
6.23.3
Procedures
p. 101
6.23.3.1
Authentication/authorization and C2 communication establishment of UAV/UAVC by USS/UTM via 5GC network
p. 101
6.23.3.2
Authentication/authorization and C2 communication establishment of UAV/UAVC by USS/UTM via EPC network
p. 105
6.23.3.3
Authentication/authorization revocation by USS/UTM
p. 107
6.23.4
Impacts on existing entities and interfaces
p. 107
6.24
Solution #24: UAV Re-authentication and Re-authorization
p. 108
6.24.1
Introduction
p. 108
6.24.2
Functional Description
p. 108
6.24.3
Procedures
p. 108
6.24.3.1
5GS Procedures
p. 108
6.24.3.1.1
UTM triggered UAV Re-authentication and Re-authorization in 5GS
p. 108
6.24.3.1.2
UTM Triggered UAV and UAVC Pairing Re-authorization
p. 109
6.24.3.3
EPS Procedures
p. 110
6.24.3.3.1
UTM triggered Re-authentication and Re-authorization
p. 110
6.24.4
Impacts on services, entities and interfaces
p. 110
6.25
Solution #25: Network Exposure to support UAV and UAVC tracking
p. 110
6.25.1
Introduction
p. 110
6.25.2
Functional Description
p. 111
6.25.3
Procedures
p. 113
6.25.4
Impacts on services, entities and interfaces
p. 115
6.26
Solution 26: UAV establishing user plane connectivity for remote identification & tracking for UAV operations
p. 115
6.26.1
Introduction
p. 115
6.26.2
Functional Description
p. 115
6.26.3
Procedures
p. 116
6.26.4
Impacts on Existing Nodes and Functionality
p. 119
6.27
Solution #27: Replacement of the UAV Controller of a UAS
p. 119
6.27.1
Introduction
p. 119
6.27.2
Procedures
p. 119
6.27.2.1
5GS Procedure
p. 119
6.27.2.2
EPS Procedure
p. 120
6.27.4
Impacts on services, entities and interfaces
p. 120