Patent classifications
H04K3/25
Radio jamming detection
There is provided a method for a first network element of a wireless communication network, the method comprising: obtaining blanked subcarrier index data indicating one or more blanked subcarriers in a time-frequency resource grid; initiating reception of a transmission from a second network element of the wireless communication network on said time-frequency resource grid; causing performing an interference measurement on said one or more blanked subcarriers to obtain interference measurement data on said one or more blanked subcarriers; and outputting the interference measurement data for detecting a presence of radio jamming.
System and method for phase manipulation attack protection and detection in AoA and AoD
Systems and methods for detecting and protecting against phase manipulation during AoA or AoD operations are disclosed. For AoA operations, the network device receiving the constant tone extension (CTE) generates an antenna switching pattern, which may be randomly generated. The network device then receives the CTE using a plurality of antenna elements. In one embodiment, the network device compares the phase of portions of the CTE signal received that utilize the same antenna element. If the phase of these portions differs by more than a threshold, the network device detects a malicious attack and acts accordingly. In another embodiment, if the AoA algorithm cannot determine the angle of arrival, the network device detects a malicious attack and acts accordingly. For angle of departure operations, the network device that transmits the CTE signal generates the antenna switching pattern and transmits it to the position engine, which performs the comparisons described above.
ALL SOURCE POSITION, NAVIGATION, AND TIMING
The system and method for position, navigation, and timing and more particularly to a system that is time and/or position independent and capable of autonomous transition from GPS to non-GPS navigation. The integrated position, navigation, and timing system uses primary and secondary navigation sensors and primary and secondary navigation measurement sources with a common time reference architecture, an integrated “dual-grid” navigation module, an integrated “dual-grid” navigation Kalman filter, and an integrated “dual-grid” navigation source selection module to provide both geodetic and relative grid timing and/or location among members of a network of platforms, particularly in GPS denied or degraded environments.
System and method for index modulation based joint mode frequency hopping with vortex electromagnetic waves for anti-jamming
A system and method of index modulation based joint mode frequency hopping with vortex electromagnetic waves for anti-jamming are provided. The system is additionally provided with a transmit signal carrier selector that provides diversified options, a receive signal carrier selector that is strictly synchronized with the transmit signal carrier selector, and a group of fast Fourier transformation modules to output a binary demodulation signal with jamming eliminated. The method includes: binary information division; index modulation and information modulation; information loading and hopping; information transmission, de-hopping, and jamming filtering; and calculation of the jamming probability and an average bit error rate. The present disclosure combines orbital angular momentum modes and subcarrier frequencies to form OAM mode-subcarrier frequency pair sets so as to diversify information transmission carriers, and performs simultaneously modulation and hopping to increase a spectrum efficiency and enhance the anti-jamming capability.
Detecting network jamming
A method in a wireless device comprises monitoring one or more aspects of signaling with a network for abnormal signals indicative of network jamming. The method comprises detecting, based on the monitored one or more aspects of signaling with the network, one or more abnormal signals indicative of network jamming.
CELLULAR COMMUNICATIONS UNDER RADAR INTERFERENCE
Methods of reducing the interferences of radar signals with uplink or downlink data communication signals in a wireless system for both data communication and radar sensing may include configuring the transmitters of the radar signals and the data communication signals such that the data communication signals and the radar signals are transmitted using different radio frequency resources, and/or configuring the receivers of the data communication signals to receive the data communication signals using a receive beam that does not collide with radar beams. The methods may also include using a reference signal for both downlink data communication and radar sensing and/or determining a Quasi-Colocation (QCL) configuration for downlink data reception based on information regarding a radar beam.
Dynamic preambles for establishing secure communication channels
The present disclosure provides systems and methods for enhanced wireless communication security. The preambles used for the identification of an upcoming wireless communication may be periodically changed (e.g., dynamic), on a time basis, based on a secret key function shared between the communicating parties. In this way, only the intended parties are able to recognize the start of an ongoing communication, synchronize with the transmitters, and access the information contained therein. An attacker, being unaware of the specific preamble sequence used for the synchronization, will not recognize the pattern of the communication, and thus will be unable to recognize when communications are ongoing. Additional authentication measures may also be implemented with the transmissions.
MACHINE-LEARNING BASED ANALYSIS AND RESPONSE TO ELECTROMAGNETIC WAVEFORMS
A method includes determining, based at least in part on parameters of a software-defined radio (SDR), waveform data descriptive of an electromagnetic waveform. The method also includes generating feature data based on the waveform data and based on one or more symbols decoded from the electromagnetic waveform. The method further includes providing the feature data as input to a first machine-learning model and initiating a response action based on an output of the first machine-learning model.
Backscatter Communication Method, Excitation Device, Backscatter Device, and Receiving Device
Embodiments of this application disclose a backscatter communication method and a related apparatus. The method includes: An excitation device determines a first sequence, generates a first signal, and sends the first signal, where the first signal carries the first sequence; after receiving the first signal, a backscatter device modulates backscatter device data onto the received first signal to obtain a second signal, and backscatters the second signal, to implement first scrambling on the backscatter device data by using the first sequence; and a receiving device determines the first sequence, receives the second signal from the backscatter device, and demodulates the received second signal based on the first sequence, to obtain the backscatter device data carried on the second signal.
COMPOUND TRANSMISSION SECURITY (TRANSEC) FOR MILITARY-GRADE FIFTH GENERATION (5G) RADIO SYSTEMS
A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.