H04W12/12

WIRELESS INTRUSION PREVENTION SYSTEM, WIRELESS NETWORK SYSTEM COMPRISING SAME, AND METHOD FOR OPERATING WIRELESS NETWORK SYSTEM
20230099706 · 2023-03-30 ·

Provided herein are a wireless intrusion prevention system, a wireless network system including the wireless intrusion prevention system, and a method for operating the wireless network system. Of these, the wireless intrusion prevention system includes an access point, a plurality of stations configured to transmit/receive a wireless frame to/from the access point over a wireless network, and a wireless intrusion prevention system configured to monitor the wireless frame, wherein the wireless intrusion prevention system transmits a dis-association request to a specific station, among the plurality of stations, and prevents the access point from responding to the specific station.

Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication

An authorization process employs a network ID as a possession factor for a secure account, such as a bank account or e-mail account, and determines one or more risk indicators associated with the possession factor. The authorization process is successfully completed when a risk score that is based on the risk indicators is less than a certain risk threshold. The risk indicators include a device history of the network ID and/or at least one attribute of a cellular account associated with the network ID. The device history identifies other mobile devices and/or SIM cards, if any, that have been previously activated with the network ID, while the one or more attributes can further indicate potentially fraudulent activity associated with the cellular account through which wireless services for the network ID are currently provided.

IMPLEMENTING CONFIDENCE METRICS IN VEHICLE-TO-EVERYTHING (V2X) COMMUNICATIONS
20230101576 · 2023-03-30 ·

Certain aspects of the present disclosure provide techniques for enhancing vehicle operations safety using coordinating vehicle platooning or enhancing platooning safety against location spoofing attacks. In one example, a source user equipment (UE) detects a potential spoofing event associated with location information being altered in an unauthorized manner, the source UE may transmit a request to a platoon control system (PCS) to join a vehicle platoon. In another example, a first UE associated with a lead vehicle in an existing platoon may detect a potential spoofing event associated with location information being altered in an unauthorized manner. The lead vehicle may transmit to a second UE of another vehicle in the platoon an indication of the detection and a request to exchange the respective roles in the platoon. The PCS may also monitor the conditions of the first and the second UEs, and arrange for the platoon reorganization.

IMPLEMENTING CONFIDENCE METRICS IN VEHICLE-TO-EVERYTHING (V2X) COMMUNICATIONS
20230101576 · 2023-03-30 ·

Certain aspects of the present disclosure provide techniques for enhancing vehicle operations safety using coordinating vehicle platooning or enhancing platooning safety against location spoofing attacks. In one example, a source user equipment (UE) detects a potential spoofing event associated with location information being altered in an unauthorized manner, the source UE may transmit a request to a platoon control system (PCS) to join a vehicle platoon. In another example, a first UE associated with a lead vehicle in an existing platoon may detect a potential spoofing event associated with location information being altered in an unauthorized manner. The lead vehicle may transmit to a second UE of another vehicle in the platoon an indication of the detection and a request to exchange the respective roles in the platoon. The PCS may also monitor the conditions of the first and the second UEs, and arrange for the platoon reorganization.

PHYSICAL LAYER TECHNIQUES TO MITIGATE THE HANDOVER PROCESS VULNERABILITIES

An apparatus and system to mitigate non-genuine handovers are described. The handovers include handovers based on fake measurements and handovers to malicious cells. To mitigate these, a mitigation procedure is initiated when excessive handovers are detected. Location information obtained from the UE, estimation of PHY layer properties by the serving and/or target cell, or AI modeling of the best serving cell at the UE location is used to determine whether the handover is valid. If not, the handover is canceled and the UE is stopped from initiating new handovers for a specified time, the UE may be instructed to perform re-authentication with the network, and/or the serving cell recommends to the network authentication entity to revoke the UE authentication. To ensure that the target cell is legitimate, an AI model is used to classify the target cell as known/unknown and the result sent to the network in NAS signaling.

DIGITAL COUPONS FOR SECURITY SERVICE OF COMMUNICATIONS SYSTEM
20230034908 · 2023-02-02 ·

A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an coupon to protect the wireless device against the cybersecurity threat, and send the coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.

DIGITAL COUPONS FOR SECURITY SERVICE OF COMMUNICATIONS SYSTEM
20230034908 · 2023-02-02 ·

A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an coupon to protect the wireless device against the cybersecurity threat, and send the coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.

AUTONOMOUS MACHINE LEARNING METHODS FOR DETECTING AND THWARTING MALICIOUS DATABASE ACCESS
20230033716 · 2023-02-02 · ·

An anomaly detection method includes receiving, at a processor, a request including a query that references a database. A plurality of attributes is identified based on the request. The processor concurrently processes the query to identify a result, and analyzes the plurality of attributes to identify an anomaly score. When the anomaly score exceeds a first predefined threshold, a signal representing a quarantine request is sent, and a signal representing the result is not sent. When the anomaly score is between the first predefined threshold and a second predefined threshold, a signal representing a notification and a signal representing the result are sent. When the anomaly score is below the second predefined threshold, a signal representing a quarantine request is sent, and a signal representing the result is not sent.

Apparatus and method for managing interference in wireless communication system

The disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system, such as long term evolution (LTE). A method for operating a management device in a wireless communication system is provided. The method includes obtaining measurement results of a plurality of cells respectively, identifying an aggressor cell and a victim cell by atmospheric interference among the plurality of the cells, based on the measurement results, and performing interference control on at least one of the aggressor cell or the victim cell, wherein the measurement results include interference information related to a downlink signal of at least one other cell measured in an uplink resource duration of a measurement cell and cell information of the at least one other cell.

Automated surveillance system
11490225 · 2022-11-01 · ·

An internet of things is disclosed, comprising plural SDR receivers and possibly a centralised system, where one or more of the receivers may be mobile. The internet of things thus allows for a very large proportion of RF signals present within a city, for example, to be monitored and analysed for the purpose of identifying, tracking and/or preventing criminal behaviour. The receivers may be equipped with secure SDRs for increased security and privacy and the system preferably includes artificial intelligence using machine learning technology, for increased adaptability among others. The system is flexible due to the programmability of the SDRs.