Patent classifications
H04K3/22
METHOD AND APPARATUS FOR DETECTING AND CHARACTERIZING PULSE SEQUENCES
Method and apparatus for detecting and characterizing a pulse sequence using a finite impulse filter to determine a pulse width (PW) of pulses within the pulse sequence. The method and apparatus may also apply a histogram to the filtered pulses to determine the pulse rate interval (PRI) of pulses in the pulse sequence.
COOPERATIVE EARLY THREAT DETECTION AND AVOIDANCE IN C-V2X
Method and apparatus for cooperative early threat detection and avoidance in C-V2X. In one aspect, the apparatus detects a threat entity within a threat zone based on data signals received from the threat entity, wherein the threat entity obstructs wireless spectrum or resources utilized in cooperative or automated driving decisions. The apparatus transmits, to at least one second wireless device, a message indicating the threat entity within the threat zone.
VIRTUAL SENSING VIA SENSOR SHARING FOR C-V2X SCHEDULING
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
COLLABORATIVE SIGNAL JAMMING DETECTION
A method for detecting communication jamming attacks includes collecting, via a processor associated with a base station, local jamming information from a first vehicle and a second vehicle. The local jamming information having an attack time, an attack localization, and an attack frequency. The method further includes building a global jamming map comprising global jamming information, based on the local jamming information, determining, based on the global jamming map, a location of a communication jamming device, and causing to transmit global jamming information to a third vehicle. The global jamming information is associated with the location of the communication jamming device.
Detection of GNSS interference using surveillance messages
In some examples, a system includes a transceiver configured to receive surveillance messages from Y target vehicles, where Y is an integer greater than two. The system includes processing circuitry configured to determine predicted positions of the Y target vehicles based on the surveillance messages. The processing circuitry is also configured to determine reported positions of the Y target vehicles based on later received surveillance messages. The processing circuitry is further configured to determine that respective differences between the respective predicted position and the respective reported position for X of the Y target vehicles is greater than a threshold distance. The processing circuitry is configured to determine that Global Navigation Satellite System interference has occurred in response to determining that X divided by Y is greater than a threshold level.
A device, a system, a method and computer program product for identifying interfering devices in position measurements
A interference detection device (22) perform the following actions: receiving individual position data from mobile terminals (4(j)) which individual position data indicates an area (12(j)) in which individual ones of the mobile terminals (4(j)) are located based on positioning signals received by the mobile terminals (4(j)); identifying if individual position data may have been affected by one or more interfering signals transmitted by interfering device (14(m)) and interfering with the positioning signals; (A) identifying if a number of mobile terminals (4.sub.v(j)) in a first area (18) is higher than a maximum threshold number, and, if so, determining that individual position data of the number of mobile terminals (4.sub.v(j)) may have been affected by the interfering signals; or (B) identifying if a number of the mobile terminals (4(j)) in a second area (36) is lower than a minimum threshold number; and, if so, determining that individual position data of the number of mobile terminals (4(j)) may have been affected by interfering signals; or (C) receiving further individual position data which indicates further areas (18) in which mobile terminals (4(j)) are located based on another positioning technique than a positioning technique used to determine the individual position data as received from the mobile terminals (4(j)); determining if the areas (12(j)) overlap with the further areas (18) at least to a minimum extent, and, if not, determining that individual position data of the mobile terminals (4(j)) may have been affected by the interfering signals.
FREQUENCY JAMMING DETECTION AND JAMMER DIRECTION DETECTION
A mobile device sends to a radio communicatively coupled to the mobile device, an instruction to monitor a frequency band. It is determined that the frequency band is jammed by a jamming source. The mobile device receives, from the radio, signal waveform information corresponding to the frequency band that is received by the radio from a 360 span about the radio. Based on the waveform information a direction of the jamming source is determined. The mobile device presents on a display device information that indicates that the frequency band is being jammed, and a direction of the jamming source with respect to a current location of the radio.
Methods and systems for detecting and defending against invalid time signals
Some embodiments of the time resilient system and methods disclosed herein can be configured to detect and defend against invalid time signals. According to various embodiments of the disclosed technology, the time resilient system include a receiver for collecting time signals sourced from an external clock. By way of example only, the external clock may be a high precision clock housed within a Global Positioning System. Other embodiments may include an internal clock calibrated to a time reflected on the external clock so that the internal clock and the external clock are synchronized. Additionally, a controller may monitor changes in time signals of the external over a period of time against the internal clock, where the system is alerted of a timing attack when the time signals collected from the receiver deviate a pre-determined time range with the time of the internal clock.
RECEIVER POWER-MANAGEMENT MECHANISM AND RELATED METHODS OF OPERATION
Circuits and methods for operating a receiver in a communication system is disclosed. The receiver analyzes interference power levels at two or more frequency regions within a received signal. The receiver selects a low-power circuit based on the frequency-analyzed interference power for processing the received signal.
Service for real-time spoofing/jamming/meaconing warning
A method is disclosed that includes obtaining one or more pieces of threat information indicative of a data set enabling positioning based on radio signals sent by a respective radio node. The data set is further indicative of one or more parameters based on which said positioning is performed and/or controlled and which is considered to be at least partially unexpected. The method also includes utilizing the one or more pieces of threat information in a positioning. In order to obtain the one or more pieces of threat information, the method includes at least one of: obtaining the one or more pieces of threat information by using an application programming interface; or obtaining the one or more pieces of spoofing information by using a push method. A corresponding apparatus, computer-readable storage medium and system are also disclosed.