Patent classifications
H04K2203/18
Designating a voting classifier using distributed learning machines
In one embodiment, possible voting nodes in a network are identified. The possible voting nodes each execute a classifier that is configured to select a label from among a plurality of labels based on a set of input features. A set of one or more eligible voting nodes is selected from among the possible voting nodes based on a network policy. Voting requests are then provided to the one or more eligible voting nodes that cause the one or more eligible voting nodes to select labels from among the plurality of labels. Votes are received from the eligible voting nodes that include the selected labels and are used to determine a voting result.
System and Method for Defending Unmanned Aerial Vehicles from Hijack Cyber Attacks
The system and methods described herein aids in the defense of unmanned vehicles, such as aerial vehicles, from wifi cyber attacks. Such attacks usually do not last long and in the case of many point-to-point command and control systems, the attacks originate from close proximity to the unmanned vehicle. The system and methods described herein allow a team to rapidly identify and physically respond to an adversary trying to take control of the unmanned vehicle. Another aspect of the embodiment taught herein is to allow for the location of a wifi signal in a hands-free manner by able to visualize the source of the signal using an augmented reality display coupled to an antenna array.
WIRELESS COMMUNICATION SYSTEM WITH DISCRIMINATION BETWEEN EXTRANEOUS RECEIVED SIGNALS
A wireless communication system having base stations and remotely located terminal units. The base stations and the remotely located terminal units communicate data over operational wireless communication links assigned to respective sub-channels having tiles separated by frequency and time. Detectors for analysing extraneous received signals in unassigned tiles of the communication links discriminate between a first type of extraneous signals detected in unassigned tiles of one sub-frame and also detected in other unassigned tiles, and a second type of extraneous signals detected in the unassigned tiles but not detected in other unassigned tiles. The reaction of the base stations is different based on the type of extraneous signals.
Security-enhanced Deep Learning Fingerprint-Based Indoor Localization
An exemplary radio fingerprint-based indoor localization method and system is disclosed that is resistant to spoofing or jamming attacks (e.g., at nearby radios, e.g., access points), among other types of interference. The exemplary method and system may be applied in the configuring of a secured convolutional neural network (S-CNNLOC) or secured deep neural network configured for attack-resistant fingerprint-based indoor localization.
METHODS AND TOOLS FOR ASSISTING IN THE CONFIGURATION OF A WIRELESS RADIO NETWORK
Tools and methods for optimizing the selection and placement of wireless radio devices in a wireless network within a geographic region using a remote database that includes a geographic mapping of existing wireless devices within the network and/or adjacent networks, device characteristics for the wireless devices within the network and/or adjacent networks, and radio frequency spectral information across times for a plurality of regions (e.g., corresponding to locations of existing wireless devices). A tool may include a local user interface, a remote database, and a processor that communicates with the user interface and remote database. The methods and tools described herein may receive user input indicating a desired location and/or operational characteristics of new wireless radio device and may determine and suggest an optimal type, location and/or operational parameters for the additional device, or may suggest other modifications to the current network to optimize the network including the new device.
Communication system, communication device, control device and communication control method
A communication device includes a first module, a communication portion communicating with a second module, a memory, and a processor that executes instructions stored in the memory. The instructions cause the processor to perform: executing a processing of changing a first radio communication to a non-restrictive state when a first signal is received from the second module in a state that the first radio communication is in a restrictive state; and executing a first processing of transmitting a second signal for changing a second radio communication to the non-restrictive state to the second module and a second processing of changing the first radio communication to the restrictive state when the priority signal using the first channel is detected in a state that the first radio communication is in the non-restrictive state.
Wireless communication system with detectors for extraneous received signals
A wireless communication system having base stations, remotely located terminal units and a base station controller. The base stations and the remotely located terminal units communicate data over operational wireless communication links between them. The base stations include respective in-channel detectors and out-of-channel detectors for detecting radar or other extraneous received signals. The in-channel detectors analyse signals over the operational communication links. The out-of-channel detectors include respective out-of-channel receiver elements that monitor possibly available channels alternative to the respective operational communication link channels. The base station controller registers whether channels are available or not for communication links, and allocates to the base stations respective target channel parameters including frequencies available for operational and alternative communication links. The base stations store the respective target channel parameters for available operational and alternative communication links.
METHODS AND NETWORK DEVICES FOR REPORTING NETWORK DYSFUNCTION IN A WIRELESS COMMUNICATION NETWORK
The present disclosure relates to the area of telecommunication, and in particular to methods for reporting network dysfunction in a wireless communication network (1). According to a first aspect of embodiments herein it is provided a method, for use in a wireless communication device (10), for reporting network dysfunction. The method comprises obtaining information defining radio communication properties (e.g. use of a relaying wireless communication device (30)) for use when reporting network dysfunction in a wireless communication network (1). The method further comprises detecting network dysfunction, and sending a report indicating the detected network dysfunction e.g. to a radio network node 20 using the obtained radio communication properties. The disclosure also relates to a corresponding radio network node (20) and wireless communication devices (10), (30) and to a computer program for implementing the proposed method.
METHODS TO MITIGATE DENIAL OF SERVICE ATTACKS ON TIME SYNCHRONIZATION USING LINK REDUNDANCY FOR INDUSTRIAL/AUTONOMOUS SYSTEMS
Systems and methods in which devices synchronize their clocks for purposes of data transmission are described. Particularly, the disclosed systems and methods provide detection and mitigation of interference by malicious (or non-malicious) wireless devices with communication of time synchronized data over wireless networks. Systems and methods are provided where times statistics related to multiple instances of wireless time synchronization are collected and collated. Devices in the system can discipline their internal clocks based on the collated time statistics.
Spectrum sensing falsification detection in dense cognitive radio networks
Systems and associated methods for detecting a set of spectrum sensing falsification (SSF) attacks in a geographic database (GDB) driven cognitive radio (CR) system. Viewing the GDB as a type of non-orthogonal compressive sensing (CS) dictionary, the composite power spectral density (PSD) estimate at a candidate CR is approximated by a small number of sensor nodes listed in the GDB. In a dense CR network, the PSD estimate at a CR may contain a composite mixture of spectrally overlapping signals. An implementation of an optimized, greedy algorithm orthogonal matching pursuit (OMP) returns a set of sensor nodes which are suspected to be in the vicinity of the CR. A sufficient match between the PSD estimate reported by a candidate CR and the PSD that is sparsely approximated from the SNs in its area provides confidence (trust) metrics which may be used to detect potential SSF attacks.