3GPP TS 23.256 V18.3.0 (2024-06)
5.2.2 UUAA at Registration in 5GS (UUAA-MM)..............................................................................................28
5.2.2.1 General ...................................................................................................................................................28
5.2.2.2 UUAA-MM Procedure...........................................................................................................................31
5.2.3 UUAA At PDN Connection/PDU Session Establishment (UUAA-SM) ....................................................33
5.2.3.1 General ...................................................................................................................................................33
5.2.3.2 USS UAV Authorization/Authentication (UUAA) during the PDU Session Establishment ................34
5.2.3.3 USS UAV Authorization/Authentication (UUAA) during default PDN connection at Attach.............36
5.2.3.4 USS UAV Authorization/Authentication (UUAA) using UE requested PDN connectivity
procedure................................................................................................................................................38
5.2.4 UUAA Re-authentication and Re-authorization by USS/UTM...................................................................39
5.2.4.1 UAV Re-authentication procedure in 5GS.............................................................................................39
5.2.4.2 UAV Re-authentication procedure in EPS.............................................................................................40
5.2.4.3 USS initiated UAV Re-authorization procedure in 5GS........................................................................41
5.2.4.4 USS initiated UAV Re-authorization procedure in EPS........................................................................42
5.2.5 Authorization for C2 over Uu ......................................................................................................................43
5.2.5.1 General ...................................................................................................................................................43
5.2.5.2 Procedure for C2 authorization in 5GS ..................................................................................................43
5.2.5.2.1 C2 Authorization request during UUAA-SM procedure in 5GS .....................................................43
5.2.5.2.2 UE initiated PDU Session Modification for C2 Communication.....................................................44
5.2.5.2.3 UE initiated PDU Session Establishment for C2 Communication...................................................45
5.2.5.3 Procedure for C2 authorization in EPS ..................................................................................................47
5.2.5.3.0 C2 Authorization request during UUAA-SM procedure in EPS......................................................47
5.2.5.3.1 UE requested PDN connectivity for C2 authorization .....................................................................48
5.2.5.3.2 UE requested bearer resource modification of an existing PDN connection for C2
authorization .....................................................................................................................................49
5.2.5.4 USS initiated C2 pairing policy configuration.......................................................................................51
5.2.5.4.1 USS initiated C2 pairing policy configuration in 5GS .....................................................................51
5.2.5.4.2 USS initiated C2 pairing policy configuration in EPS .....................................................................52
5.2.6 Void..............................................................................................................................................................53
5.2.7 UUAA Revocation by USS/UTM ...............................................................................................................53
5.2.8 UAV Controller Replacement......................................................................................................................54
5.2.8.1 UAV controller replacement in 5GS......................................................................................................54
5.2.8.2 UAV controller replacement in EPS ......................................................................................................55
5.2.9 Revocation of C2 Connectivity....................................................................................................................56
5.2.9.1 Revocation of C2 connectivity in 5GS...................................................................................................56
5.2.9.2 Revocation of C2 connectivity in EPS...................................................................................................57
5.3 UAV Tracking ...................................................................................................................................................58
5.3.1 UAV Tracking Model ..................................................................................................................................58
5.3.1.1 UAV Location Reporting Mode.............................................................................................................59
5.3.1.2 UAV Presence Monitoring Mode ..........................................................................................................59
5.3.1.3 List of Aerial UEs in a geographic area .................................................................................................59
5.3.2 Procedure for UAV location reporting.........................................................................................................59
5.3.3 Procedure for UAV presence monitoring ....................................................................................................60
5.3.4 Procedure for obtaining list of Aerial UEs in a geographic area .................................................................62
5.4 Direct C2 Communication.................................................................................................................................63
5.4.1 General.........................................................................................................................................................63
5.4.2 Authorization policy for A2X Direct C2 Communication service ..............................................................63
5.4.3 Procedure for C2 authorization by the USS for using the A2X Direct C2 Communication service...........63
5.4.3.1 General ...................................................................................................................................................63
5.4.3.2 Authorization of Direct C2 Communication service via UUAA-MM...................................................63
5.4.3.3 Authorization of Direct C2 Communication service via UUAA-SM ....................................................64
5.4.4 Procedure for Direct C2 Communication establishment .............................................................................65
5.5 Broadcast Remote ID.........................................................................................................................................65
5.5.1 Broadcast Remote ID using PC5 .................................................................................................................65
5.5.2 Broadcast Remote ID using MBS................................................................................................................66
5.5.2.1 Policy/Parameter provisioning ...............................................................................................................66
5.5.2.2 Broadcast Remote ID reception via MBS ..............................................................................................66
5.5.2.3 QoS handling..........................................................................................................................................66
5.5.2.4 MBS service area mapping ....................................................................................................................66
5.6 Mechanisms for Detect and Avoid (DAA)........................................................................................................66
5.6.1 Mechanisms for Detect and Avoid (DAA) based on PC5 ...........................................................................66
5.7 Ground-based DAA for an Area........................................................................................................................68