首页 星云 工具 资源 星选 资讯 热门工具
:

PDF转图片 完全免费 小红书视频下载 无水印 抖音视频下载 无水印 数字星空

3GPP TS 23.256 技术报告-无人机系统(UAS)的连接、识别和跟踪

网络技术 1.56MB 15 需要积分: 1
立即下载

资源介绍:

这份文件是3GPP TS 23.256 V18.3.0技术规范,专注于3GPP系统对无人机的全面支持。文件定义了无人机的认证、授权及跟踪流程,确保操作安全合规。列出了关键术语、缩写和参考文档,提供了详细的架构模型,展示了无人机在5G和EPS中的集成方式。 文件描述了功能实体如UAS NF、AMF、SMF等在支持无人机中的作用及其交互。重点介绍了无人机的认证授权(UUAA)流程,包括注册和PDU会话建立过程。同时,定义了C2通信的授权流程,保障无人机与控制器间安全通信。 此外,提出了无人机跟踪模式、直接C2通信机制、广播远程识别(BRID)和探测与避障(DAA)机制,增强了无人机的安全性和避障能力。A2X服务章节定义了通信架构、授权、参数配置和QoS处理,支持无人机在复杂环境中的高效通信。 总之,这份技术规范为无人机在3GPP系统中的集成、操作和安全提供了全面的技术指导和实现框架。
3GPP TS 23.256 V18.3.0 (2024-06)
Technical Specification
3rd Generation Partnership Project;
Technical Specification Group Services and System Aspects;
Support of Uncrewed Aerial Systems (UAS) connectivity,
identification and tracking; Stage 2
(Release 18)
The present document has been developed within the 3rd Generation Partnership Project (3GPP
TM
) and may be further elaborated for the purposes of 3GPP.
The present document has not been subject to any approval process by the 3GPP
Organizational Partners and shall not be implemented.
This Specification is provided for future development work within 3GPP
only. The Organizational Partners accept no liability for any use of this Specification.
Specifications and Reports for implementation of the 3GPP
TM
system should be obtained via the 3GPP Organizational Partners' Publications Offices.
3GPP
3GPP TS 23.256 V18.3.0 (2024-06)
2
Release 18
3GPP
Postal address
3GPP support office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Internet
http://www.3gpp.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© 2024, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).
All rights reserved.
UMTS™ is a Trade Mark of ETSI registered for the benefit of its members
3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
LTE™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
GSM® and the GSM logo are registered and owned by the GSM Association
3GPP
3GPP TS 23.256 V18.3.0 (2024-06)
3
Release 18
Contents
Foreword .............................................................................................................................................................7
1 Scope.........................................................................................................................................................9
2 References.................................................................................................................................................9
3 Definitions and abbreviations .................................................................................................................10
3.1 Definitions .........................................................................................................................................................10
3.2 Abbreviations.....................................................................................................................................................12
4 Architecture model and concepts............................................................................................................13
4.1 General concept .................................................................................................................................................13
4.2 Architectural reference model ...........................................................................................................................13
4.2.1 General.........................................................................................................................................................13
4.2.1.1 Support for general UAV features .........................................................................................................13
4.2.1.2 Void........................................................................................................................................................15
4.2.2 Logical UAV Reference Architecture..........................................................................................................15
4.2.3 5GS Non-roaming Reference Architecture..................................................................................................17
4.2.4 5GS Roaming Reference Architecture.........................................................................................................18
4.2.4A Void..............................................................................................................................................................19
4.2.5 Service-based interfaces...............................................................................................................................19
4.2.6 Reference points...........................................................................................................................................20
4.3 Functional entities..............................................................................................................................................20
4.3.1 General.........................................................................................................................................................20
4.3.2 UAS NF .......................................................................................................................................................20
4.3.3 UAV.............................................................................................................................................................20
4.3.4 AMF.............................................................................................................................................................21
4.3.5 SMF..............................................................................................................................................................21
4.3.6 SMF+PGW-C ..............................................................................................................................................22
4.3.7 PCF ..............................................................................................................................................................22
4.3.8 UDM ............................................................................................................................................................22
4.3.9 A2X Application Server ..............................................................................................................................22
4.3.10 UDR .............................................................................................................................................................22
4.3.11 NRF..............................................................................................................................................................22
4.4 High level function ............................................................................................................................................23
4.4.1 Service Operations .......................................................................................................................................23
4.4.1.1 NEF Services..........................................................................................................................................23
4.4.1.1.1 General..............................................................................................................................................23
4.4.1.1.2 Nnef_Authentication service ............................................................................................................23
4.4.1.2 AF Services ............................................................................................................................................24
4.4.1.2.1 General..............................................................................................................................................24
4.4.1.2.2 Naf_Authentication service ..............................................................................................................24
4.4.1.3 AMF Services.........................................................................................................................................25
4.4.1.4 SMF Services .........................................................................................................................................25
4.4.1.5 UDM Services ........................................................................................................................................25
4.4.1.6 LMF Services .........................................................................................................................................25
4.4.1.7 GMLC Services......................................................................................................................................25
4.4.1.8 UDR Services.........................................................................................................................................25
4.4.1.9 PCF Services ..........................................................................................................................................25
4.4.2 USS Discovery.............................................................................................................................................25
4.4.3 CAA-Level UAV ID Assignment................................................................................................................26
4.5 Identifiers...........................................................................................................................................................27
4.5.1 General.........................................................................................................................................................27
4.5.2 CAA-Level UAV Identity............................................................................................................................27
4.5.3 3GPP UAV ID .............................................................................................................................................27
5 Functional description and information flows ........................................................................................27
5.1 Control and user plane stacks ............................................................................................................................27
5.2 UAV Authentication and Authorization............................................................................................................27
5.2.1 UUAA Model...............................................................................................................................................27
3GPP
3GPP TS 23.256 V18.3.0 (2024-06)
4
Release 18
5.2.2 UUAA at Registration in 5GS (UUAA-MM)..............................................................................................28
5.2.2.1 General ...................................................................................................................................................28
5.2.2.2 UUAA-MM Procedure...........................................................................................................................31
5.2.3 UUAA At PDN Connection/PDU Session Establishment (UUAA-SM) ....................................................33
5.2.3.1 General ...................................................................................................................................................33
5.2.3.2 USS UAV Authorization/Authentication (UUAA) during the PDU Session Establishment ................34
5.2.3.3 USS UAV Authorization/Authentication (UUAA) during default PDN connection at Attach.............36
5.2.3.4 USS UAV Authorization/Authentication (UUAA) using UE requested PDN connectivity
procedure................................................................................................................................................38
5.2.4 UUAA Re-authentication and Re-authorization by USS/UTM...................................................................39
5.2.4.1 UAV Re-authentication procedure in 5GS.............................................................................................39
5.2.4.2 UAV Re-authentication procedure in EPS.............................................................................................40
5.2.4.3 USS initiated UAV Re-authorization procedure in 5GS........................................................................41
5.2.4.4 USS initiated UAV Re-authorization procedure in EPS........................................................................42
5.2.5 Authorization for C2 over Uu ......................................................................................................................43
5.2.5.1 General ...................................................................................................................................................43
5.2.5.2 Procedure for C2 authorization in 5GS ..................................................................................................43
5.2.5.2.1 C2 Authorization request during UUAA-SM procedure in 5GS .....................................................43
5.2.5.2.2 UE initiated PDU Session Modification for C2 Communication.....................................................44
5.2.5.2.3 UE initiated PDU Session Establishment for C2 Communication...................................................45
5.2.5.3 Procedure for C2 authorization in EPS ..................................................................................................47
5.2.5.3.0 C2 Authorization request during UUAA-SM procedure in EPS......................................................47
5.2.5.3.1 UE requested PDN connectivity for C2 authorization .....................................................................48
5.2.5.3.2 UE requested bearer resource modification of an existing PDN connection for C2
authorization .....................................................................................................................................49
5.2.5.4 USS initiated C2 pairing policy configuration.......................................................................................51
5.2.5.4.1 USS initiated C2 pairing policy configuration in 5GS .....................................................................51
5.2.5.4.2 USS initiated C2 pairing policy configuration in EPS .....................................................................52
5.2.6 Void..............................................................................................................................................................53
5.2.7 UUAA Revocation by USS/UTM ...............................................................................................................53
5.2.8 UAV Controller Replacement......................................................................................................................54
5.2.8.1 UAV controller replacement in 5GS......................................................................................................54
5.2.8.2 UAV controller replacement in EPS ......................................................................................................55
5.2.9 Revocation of C2 Connectivity....................................................................................................................56
5.2.9.1 Revocation of C2 connectivity in 5GS...................................................................................................56
5.2.9.2 Revocation of C2 connectivity in EPS...................................................................................................57
5.3 UAV Tracking ...................................................................................................................................................58
5.3.1 UAV Tracking Model ..................................................................................................................................58
5.3.1.1 UAV Location Reporting Mode.............................................................................................................59
5.3.1.2 UAV Presence Monitoring Mode ..........................................................................................................59
5.3.1.3 List of Aerial UEs in a geographic area .................................................................................................59
5.3.2 Procedure for UAV location reporting.........................................................................................................59
5.3.3 Procedure for UAV presence monitoring ....................................................................................................60
5.3.4 Procedure for obtaining list of Aerial UEs in a geographic area .................................................................62
5.4 Direct C2 Communication.................................................................................................................................63
5.4.1 General.........................................................................................................................................................63
5.4.2 Authorization policy for A2X Direct C2 Communication service ..............................................................63
5.4.3 Procedure for C2 authorization by the USS for using the A2X Direct C2 Communication service...........63
5.4.3.1 General ...................................................................................................................................................63
5.4.3.2 Authorization of Direct C2 Communication service via UUAA-MM...................................................63
5.4.3.3 Authorization of Direct C2 Communication service via UUAA-SM ....................................................64
5.4.4 Procedure for Direct C2 Communication establishment .............................................................................65
5.5 Broadcast Remote ID.........................................................................................................................................65
5.5.1 Broadcast Remote ID using PC5 .................................................................................................................65
5.5.2 Broadcast Remote ID using MBS................................................................................................................66
5.5.2.1 Policy/Parameter provisioning ...............................................................................................................66
5.5.2.2 Broadcast Remote ID reception via MBS ..............................................................................................66
5.5.2.3 QoS handling..........................................................................................................................................66
5.5.2.4 MBS service area mapping ....................................................................................................................66
5.6 Mechanisms for Detect and Avoid (DAA)........................................................................................................66
5.6.1 Mechanisms for Detect and Avoid (DAA) based on PC5 ...........................................................................66
5.7 Ground-based DAA for an Area........................................................................................................................68
3GPP
3GPP TS 23.256 V18.3.0 (2024-06)
5
Release 18
5.7.1 Functional Description.................................................................................................................................68
5.7.2 Procedures....................................................................................................................................................70
5.8 Void ...................................................................................................................................................................71
5.9 Void ...................................................................................................................................................................71
5.10 Void ...................................................................................................................................................................71
5.11 Void ...................................................................................................................................................................71
6 Aircraft-to-Everything (A2X) services...................................................................................................72
6.1 Architecture model and concepts.......................................................................................................................72
6.1.1 General concept............................................................................................................................................72
6.1.2 Architectural reference model......................................................................................................................73
6.1.2.1 PC5 and Uu based A2X architecture reference model...........................................................................73
6.1.2.1.1 Non-roaming 5G System architecture for A2X communication over PC5 and Uu reference
points ................................................................................................................................................73
6.1.2.1.2 Roaming 5G System architecture for A2X communication over PC5 and Uu reference points .....73
6.1.2.1.3 Inter-PLMN 5G System architecture for A2X communication over PC5 reference point ..............73
6.1.2.2 AF-based service parameter provisioning for A2X communication......................................................73
6.1.2.3 MBS for Uu based A2X architecture reference model ..........................................................................74
6.1.2.4 Reference points.....................................................................................................................................74
6.1.2.5 Service-based interfaces.........................................................................................................................74
6.1.3 Functional entities........................................................................................................................................74
6.2 High level functionality and features.................................................................................................................74
6.2.1 Authorization and Provisioning for A2X communications .........................................................................74
6.2.1.1 General ...................................................................................................................................................74
6.2.1.2 Authorization and Provisioning for A2X communications over PC5 reference point...........................74
6.2.1.2.1 Policy/Parameter provisioning .........................................................................................................74
6.2.1.2.2 Principles for applying parameters for A2X communications over PC5 reference point ................75
6.2.1.3 Authorization and Provisioning for A2X communications over Uu reference point.............................75
6.2.1.3.1 Policy/Parameter provisioning .........................................................................................................75
6.2.2 A2X communication....................................................................................................................................75
6.2.2.1 A2X communication over PC5 reference point .....................................................................................75
6.2.2.1.1 General..............................................................................................................................................75
6.2.2.1.2 Broadcast mode communication over PC5 reference point .............................................................75
6.2.2.1.3 Unicast mode communication over PC5 reference point .................................................................76
6.2.2.1.4 IP address allocation.........................................................................................................................76
6.2.2.2 A2X communication over Uu reference point .......................................................................................76
6.2.2.2.1 A2X communication via unicast ......................................................................................................76
6.2.2.2.2 A2X reception via MBS ...................................................................................................................76
6.2.3 A2X Application Server discovery..............................................................................................................76
6.2.4 QoS handling for A2X communication .......................................................................................................76
6.2.4.1 QoS handling for A2X communication over PC5 reference point ........................................................76
6.2.4.2 QoS handling for A2X communication over Uu reference point ..........................................................77
6.2.5 Subscription to A2X service ........................................................................................................................77
6.2.6 Identifiers .....................................................................................................................................................78
6.2.6.1 Identifiers for A2X communication over PC5 reference point ..............................................................78
6.2.7 Interworking between EPS A2X and 5GS A2X ..........................................................................................78
6.2.7.1 A2X Policy and parameter provisioning................................................................................................78
6.2.7.2 PC5 operation.........................................................................................................................................78
6.2.8 MBS Service Description for A2X use........................................................................................................78
6.3 Functional description and information flows...................................................................................................78
6.3.1 Control and user plane stacks for NR PC5 reference point supporting A2X services.................................78
6.3.1.1 User plane for PC5 reference point supporting A2X services ...............................................................78
6.3.1.2 Control plane for NR PC5 reference point supporting A2X services ....................................................79
6.3.2 Procedures for A2X service authorization and provisioning to UE.............................................................79
6.3.2.1 General ...................................................................................................................................................79
6.3.2.2 PCF based A2X Service Authorization and Provisioning to UE ...........................................................79
6.3.2.3 Procedure for UE triggered A2X Policy provisioning ...........................................................................80
6.3.2.4 AF-based service parameter provisioning for A2X communications over control plane......................81
6.3.3 Procedures for A2X communication over PC5 reference point ..................................................................81
6.3.3.1 Broadcast mode A2X communication over NR PC5 reference point....................................................81
6.3.3.2 Unicast mode A2X communication over PC5 reference point ..............................................................81
6.3.4 Procedures for A2X communication over Uu reference point ....................................................................81

资源文件列表:

23256-i30.zip 大约有1个文件
  1. 23256-i30.docx 1.79MB
0评论
提交 加载更多评论
其他资源 ms2国密加密java包
ms2国密加密java包
算法设计与分析 勇者斗恶龙;挖隧道问题;消消乐问题;Shacozzz的生财之道;蜘蛛纸牌
在很久很久以前,地上有一个荣光的王国,在这个王国里,国民安居乐业,国王开明勤政。但是突然有一天,有一群恶龙入侵了这个美丽的国家。恶龙们一路杀到了这个国家的首都,王国岌岌可危。在这个生死攸关的时刻,王国的总共 n个勇者们聚集到了首都,在他们当中第 i个勇者的能力值为 ai ,这代表这个勇者能够对恶龙造成 ai点伤害或者防御住恶龙 ai 的攻击。与此同时,王国的勇士们获得了恶龙们的情报:在城外总共有 m条恶龙,第 i条恶龙的防御力为 xi ,攻击力为 yi。幸运的是,恶龙们每次只会有一条来进攻首都。并且进攻的顺序为 1到 m.为了守住城堡,勇士们开始商量策略:保险起见,勇士们决定每次只派一个勇士出去击杀恶龙,剩下的勇士们将留在城堡中守护首都。为了守住首都,出门迎战的勇士的能力值不能小于恶龙的防御力。而剩下的在首都的城堡里防御的勇士们的能力值之和不能小于恶龙的攻击力。与此同时,国王拿出了一种神奇的药水(数量无限多),每一瓶药水能够让勇士的能力值短暂的提升 1点,药效只能保证勇士们应对一条恶龙,由于神奇药水的效果可以叠加(一个勇士可以同时喝 k瓶药增加 k 点能力值)以及药水数量无限,我们就能
企业微信scrm源码相关
企业微信scrm源码,引流活码
企业微信scrm源码相关
el-tree虚拟滚动
el-tree虚拟滚动
sparseocc在A2上部署
sparseocc在A2上部署
面试问题合集,,,,,,,,,,.zip
面试问题合集,,,,,,,,,,.zip
职场人摸鱼神器,背景动态可调的阅读器
优点:可以动态根据背景的图层进行屏幕取色,并设置阅读器的背景色和字体颜色、字体大小等,各种老板键也是十分方便 适用人群:非常适合办公室的人放在文档或者IDE的一角处,没事看看小说或者看备考书籍,十分隐蔽,我已经用了两个多月了
SPI通信协议(包含主机发送从机接收)及其验证(Verilog)
使用Verilog代码,本次代码采用SPI的工作模式为CPOL=1,CPHA=1(即在总线空闲时为高电平,在上升沿采样) SPI_M_transmitter.v为主机发送模块 SPI_S_receive.v为从机接收模块 SPI_MT_SR.v为调用收发模块,以便进行验证 SPI_MT_SR_TB.v为验证模块,验证了收发数据,及来连续收发数据 注意:本代码近用于学习熟悉SPI协议,无法工程应用或不完善,由于时间关系,逐步完善注释与pdf文档