H04K3/22

DETECTION AND MITIGATION OF WIDE BAND SIGNAL JAMMING
20220167190 · 2022-05-26 ·

A wireless network device in a wide area network is disclosed. A radio of the network device receives a plurality of communication signals. The device detects a signal to noise ratio value and/or a noise floor value and determines, for each frequency channel, when one of the detected signal to noise ratio value is less than a signal to noise ratio threshold value for a period of time and/or the detected noise floor value is greater than a noise floor threshold value for the period of time. The device transmits a jamming warning signal when one of the detected signal to noise ratio value for each of the channels is determined to be greater than the signal to noise ratio threshold value for the period of time and/or the detected noise floor value for each channel is greater than the noise floor threshold value for the period of time.

CYBER-PHYSICAL SYSTEM FOR DETECTING POLE-DYNAMICS ATTACK

Disclosed is a cyber-physical system for detecting a pole-dynamics attack, including an attack detector configured to receive a sensor signal output from a physical system and to output an attack detection signal based on the received sensor signal, and a mode controller configured to receive the sensor signal and to output an input control signal for controlling the physical system based on the received sensor signal, wherein the mode controller controls a normal control (NC) mode and an attack detection control (ADC) mode for detecting pole-dynamics attack (PDA) from an output to be repeatedly executed at a preset switching period.

METHOD AND APPARATUS FOR RADIO JAMMING DETECTION
20230254833 · 2023-08-10 ·

A solution for radio jamming detection is disclosed. The solution comprises determining M subcarriers in a time-frequency resource grid to be blanked and outputting the M subcarriers in the time-frequency resource grid to be blanked by performing at least one of the following operations: first determination of a number M of subcarriers in a time-frequency resource grid to be blanked based on probability of detecting a jammer attack or on channel quality of subcarriers in the time-frequency resource grid, second determination of which M subcarriers in the time-frequency resource grid are blanked taking into account the channel quality of subcarriers in the time-frequency resource grid.

REACTIVE JAMMING DETECTION

Embodiments of the present disclosure relate to device, method, apparatus and computer readable storage media of reactive jamming detection. The method comprises in accordance with a determination that an interference to the first device is to be detected, determining at least one set of actual receiving powers at the first device on a bandwidth and a frequency of a channel associated with a transmission of the first device within a time interval; determining at least one set of reference receiving powers at the first device on the bandwidth and the frequency; and in accordance with a determination that a difference between the at least one set of reference receiving powers and the at least one set of actual receiving powers exceeds a threshold difference, determining the first device is interfered by reactive jamming. In this way, the malicious device that does not respect the LBT procedure in unlicensed bands can be recognized and meanwhile the devices using a different technology while respecting the LBT procedure can be allowed to access the channel.

CONNECTED DEVICE REGION IDENTIFICATION

Various aspects of methods, systems, and use cases include region identification of a malicious device based on crowdsourced locations. A method may include generating a grid of bins of a local radio coverage region, receiving location data from a plurality of devices in the local radio coverage region, and classifying locations of the plurality of devices with respect to the bins. The method may include associating the classified locations of the plurality of devices to the received location data for corresponding devices of the plurality of devices, and generating a model, from the associated classified locations and the received location data.

RADIO JAMMING DETECTION
20210344437 · 2021-11-04 ·

There is provided a method for a first network element of a wireless communication network, the method comprising: obtaining blanked subcarrier index data indicating one or more blanked subcarriers in a time-frequency resource grid; initiating reception of a transmission from a second network element of the wireless communication network on said time-frequency resource grid; causing performing an interference measurement on said one or more blanked subcarriers to obtain interference measurement data on said one or more blanked subcarriers; and outputting the interference measurement data for detecting a presence of radio jamming.

Magnetic detection of replay attack
11164588 · 2021-11-02 · ·

A method of detecting a replay attack on a voice biometrics system comprises: receiving an audio signal representing speech; detecting a magnetic field; determining if there is a correlation between the audio signal and the magnetic field; and if there is a correlation between the audio signal and the magnetic field, determining that the audio signal may result from a replay attack.

Security-enhanced deep learning fingerprint-based indoor localization

An exemplary radio fingerprint-based indoor localization method and system is disclosed that is resistant to spoofing or jamming attacks (e.g., at nearby radios, e.g., access points), among other types of interference. The exemplary method and system may be applied in the configuring of a secured convolutional neural network (S-CNNLOC) or secured deep neural network configured for attack-resistant fingerprint-based indoor localization.

Collaborative signal jamming detection
11757559 · 2023-09-12 · ·

A method for detecting communication jamming attacks includes collecting, via a processor associated with a base station, local jamming information from a first vehicle and a second vehicle. The local jamming information having an attack time, an attack localization, and an attack frequency. The method further includes building a global jamming map comprising global jamming information, based on the local jamming information, determining, based on the global jamming map, a location of a communication jamming device, and causing to transmit global jamming information to a third vehicle. The global jamming information is associated with the location of the communication jamming device.

Biasing technique for receiver based on radio frequency (RF) jammer detection

The disclosure relates to an apparatus including a receiver configured to process a radio frequency (RF) signal to generate a baseband signal; a radio frequency (RF) jammer detector configured to generate a signal indicative of whether an RF jammer is present at an input of the receiver; and a receiver bias circuit configured to generate a supply voltage for the receiver based on the RF jammer indication signal. In another aspect, the apparatus includes constant gain bias circuit to maintain the gain of the receiver constant in response to changes in the supply voltage. In other aspects, the receiver bias circuit may suspend the generating of the supply voltage based on the RF jammer indication signal if the power level of the target received signal is above a threshold. In other aspects, the receiver bias circuit changes the supply voltage during cyclic prefix (CP) intervals between downlink intervals.