H04W12/12

Automated surveillance system
11490225 · 2022-11-01 · ·

An internet of things is disclosed, comprising plural SDR receivers and possibly a centralised system, where one or more of the receivers may be mobile. The internet of things thus allows for a very large proportion of RF signals present within a city, for example, to be monitored and analysed for the purpose of identifying, tracking and/or preventing criminal behaviour. The receivers may be equipped with secure SDRs for increased security and privacy and the system preferably includes artificial intelligence using machine learning technology, for increased adaptability among others. The system is flexible due to the programmability of the SDRs.

System and method of secure ranging measurement

Methods and apparatus for performing secure ranging measurements between wireless devices are disclosed herein according to embodiments of the present invention. The described embodiments use key values to indicate which LTF sequence (e.g., LTF measurement exchange) to use for performing wireless ranging measurements. A LTF sequence that is received by a wireless device that does not correspond with the associated key value is determined to be invalid. Invalid LTF sequences may be disregarded as signal noise.

System and method of secure ranging measurement

Methods and apparatus for performing secure ranging measurements between wireless devices are disclosed herein according to embodiments of the present invention. The described embodiments use key values to indicate which LTF sequence (e.g., LTF measurement exchange) to use for performing wireless ranging measurements. A LTF sequence that is received by a wireless device that does not correspond with the associated key value is determined to be invalid. Invalid LTF sequences may be disregarded as signal noise.

Secure boundary area communication systems and methods

Systems and methods are provided for secure vehicular communications, including determining a size of a file to be transferred to or from a vehicle; determining the data transfer speed at which the file may be transferred; based on the file size and transfer speed, determining a travel distance of the vehicle needed to complete transfer of the file; assigning a secure data transfer zone in which to perform the transfer based on the determined travel distance and based on a size of the secure data transfer zone.

Secure boundary area communication systems and methods

Systems and methods are provided for secure vehicular communications, including determining a size of a file to be transferred to or from a vehicle; determining the data transfer speed at which the file may be transferred; based on the file size and transfer speed, determining a travel distance of the vehicle needed to complete transfer of the file; assigning a secure data transfer zone in which to perform the transfer based on the determined travel distance and based on a size of the secure data transfer zone.

Transmit-side misbehavior condition management

In various embodiments, a vehicle-to-everything (V2X) processing device detecting a misbehavior condition in a system of the vehicle, and prevent the vehicle from sending a V2X message related to the detected misbehavior condition in response to detecting the misbehavior condition in the system of the vehicle. In some embodiments, the V2X processing device may receive information from a plurality of information sources of the vehicle, and may detect the misbehavior condition in the system of the vehicle by performing a cross-check of information received from the plurality of information sources of the vehicle to detect an inconsistency within the received information.

DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING
20230087873 · 2023-03-23 · ·

Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may comprise obtaining a media presentation description that comprises a content authenticity, requesting a key for a hash-based message authentication code; receiving the key for the hash-based message authentication code, determining a determined hash for a segment of the media presentation description, requesting a reference hash for the segment from a server, receiving the reference hash for the segment from the server, and comparing the reference hash to the determined hash to determine whether the requested hash matches the determined hash.

METHOD FOR HANDLING CASE OF DETECTING UNAUTHORIZED FRAME TRANSMITTED OVER ONBOARD NETWORK

An anomaly handling method using a device installed outside of a vehicle is disclosed. The method includes receiving, from the vehicle, an anomaly detection notification, which includes level information indicating a level affecting safety, and a location of the vehicle. The method also includes obtaining a location of another vehicle and determining whether a distance between the location of the vehicle and the location of the other vehicle is within a predetermined range. When the distance is within the predetermined range and is shorter than a first predetermined distance, not changing the level information and transmitting the received anomaly detection information to the other vehicle. When the distance is within the predetermined range and is longer than or equal to the first predetermined distance, changing to decrement a level indicated by the level information, and transmitting changed anomaly detection information to the other vehicle.

METHOD FOR HANDLING CASE OF DETECTING UNAUTHORIZED FRAME TRANSMITTED OVER ONBOARD NETWORK

An anomaly handling method using a device installed outside of a vehicle is disclosed. The method includes receiving, from the vehicle, an anomaly detection notification, which includes level information indicating a level affecting safety, and a location of the vehicle. The method also includes obtaining a location of another vehicle and determining whether a distance between the location of the vehicle and the location of the other vehicle is within a predetermined range. When the distance is within the predetermined range and is shorter than a first predetermined distance, not changing the level information and transmitting the received anomaly detection information to the other vehicle. When the distance is within the predetermined range and is longer than or equal to the first predetermined distance, changing to decrement a level indicated by the level information, and transmitting changed anomaly detection information to the other vehicle.

INTELLIGENT CYBERSECURITY PROTECTION SYSTEM, SUCH AS FOR USE IN 5G NETWORKS
20230091852 · 2023-03-23 ·

The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.