H04K3/94

Encapsulated electronic warfare architecture

Electronic devices and a method of providing electronic warfare (EW) data in an encapsulated architecture in a vehicle are generally described. Emitters targeting the vehicle during a mission may be detected and an observable history of each emitter obtained as a function of time. Properties of each emitter may be both inferred based on the observable history and extracted from locally-stored pre-mission intelligence. The emitter properties, as well as current and historical state and threat level of the emitter and effectiveness of various countermeasures may be stored in an adaptive radar model (ARM) for the emitter. Each emitter may have its own ARM. The ARM may be used to take appropriate countermeasures for a particular emitter, based on the emitter alone or taking into account all of the emitters.

Monitoring system for a cellular telephone network

Systems and methods are described herein for monitoring an on-board cellular network infrastructure. In one aspect, a controller and one or more noise generation units can be used to inhibit passenger devices from connecting to ground-based cellular stations while on-board. The noise generation unit can be configured to generate a noise signal. If a loss of power to an on-board cell station is identified, the noise generation can generate a different noise signal in response.

METHOD FOR ALLOCATING TRANSFER TIMES IN A WIRELESS POWERED COMMUNICATION NETWORK

The present invention relates to a method for allocating transfer times of a low degree of complexity for improving physical-layer security in a wireless powered communication network. A method for allocating transfer times in a wireless powered communication network according to an embodiment of the invention can provide a low-complexity method of allocating transfer times that enables physical-layer security in a secure wireless powered communication network (WPCN) using an energy harvesting jammer, and this method can be utilized to establish an energy harvesting communication system that is efficient in terms of information security.

System and method for detecting and defeating a drone

A system for detecting and defeating a drone is disclosed which includes a detection antenna array configured to detect the drone and a control signal of the drone in a 360 degree field, the detection antenna array being further configured to detect the directionality of the drone with reference to the most dominant of the control signal of the drone detected by each of a plurality of antennas within the detection antenna array; a neutralization system disposed in communication with the detection antenna array; the neutralization system including a transmission antenna configured to transmit an override signal to the detected drone, an amplifier configured to modulate a gain of the override signal, and a processing device configured to generate the override signal and control transmission of the override signal.

SYSTEM AND METHOD FOR TRIGGERING AN ALARM DURING A SENSOR JAMMING ATTACK

Methods, systems, and apparatus, including computer programs encoded on a storage device, for triggering an alarm during a sensor jamming attack. In one aspect, a monitoring system sensor unit is disclosed that includes a sensor, a communication unit configured to communicate with a monitoring system using a range of frequencies, and a jamming detection unit. The jamming detection unit may include a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include detecting a sensor jamming event, selecting a different form of communication other than the range of radio frequencies for the communication unit to communicate with the monitoring system, and providing, to the communication unit, an instruction to communicate with the monitoring system using the form of communication, wherein the communication unit may communicate, to the monitoring system using the form of communication, the sensor data.

Electromagnetic jamming device and method for an integrated circuit

A device is provided for jamming electromagnetic radiation liable to be emitted by at least one portion of an interconnect region located above at least one zone of an integrated electronic circuit produced in and on a semiconductor substrate. The device includes an antenna located above the at least one zone of the circuit and generating circuit coupled to the antenna and configured to generate an electrical signal having at least one pseudo-random property to pass through the antenna.

ACTIVE ANTENNA STEERING FOR NETWORK SECURITY
20180342803 · 2018-11-29 · ·

The disclosure concerns wireless communication systems, including antenna systems and related methods, which are each directed to utilizing one or more multi-mode antennas for the purpose of varying a radiation pattern characteristic thereof to enhance network security and communication link between an access point and one or more client devices on a network.

SYSTEM AND METHOD FOR TRIGGERING AN ALARM DURING A SENSOR JAMMING ATTACK

Methods, systems, and apparatus, including computer programs encoded on a storage device, for triggering an alarm during a sensor jamming attack. In one aspect, a monitoring system sensor unit is disclosed that includes a sensor, a communication unit configured to communicate with a monitoring system using a range of frequencies, and a jamming detection unit. The jamming detection unit may include a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include detecting a sensor jamming event, selecting a different form of communication other than the range of radio frequencies for the communication unit to communicate with the monitoring system, and providing, to the communication unit, an instruction to communicate with the monitoring system using the form of communication, wherein the communication unit may communicate, to the monitoring system using the form of communication, the sensor data.

Monitoring System for a Cellular Telephone Network
20180270345 · 2018-09-20 ·

Systems and methods are described herein for monitoring an on-board cellular network infrastructure. In one aspect, a controller and one or more noise generation units can be used to inhibit passenger devices from connecting to ground-based cellular stations while on-board. The noise generation unit can be configured to generate a noise signal. If a loss of power to an on-board cell station is identified, the noise generation can generate a different noise signal in response.

Systems and methods for securing wireless communications

Systems and methods of friendly jamming for securing wireless communications at the physical layer are presented. Under the assumption of exact knowledge of the eavesdropping channel, a resource-efficient distributed approach is used to improve the secrecy sum-rate of a multi-link network with one or more eavesdroppers while satisfying an information-rate constraint for all links. A method based on mixed strategic games can offer robust solutions to the distributed secrecy sum-rate maximization. In addition, a block fading broadcast channel with a multi-antenna transmitter, sending two or more independent confidential data streams to two or more respective users in the presence of a passive eavesdropper is considered. Lastly, a per-link strategy is considered and an optimization problem is formulated, which aims at jointly optimizing the power allocation and placement of the friendly jamming devices for a given link under secrecy constraints.