Patent classifications
H04W12/104
Authentication of vehicle-to-vehicle communications
Systems, methods, and devices for authenticating vehicle-to-vehicle communication are disclosed. A method includes receiving sensor data from a first vehicle and receiving secondary sensor data from a second vehicle. The method includes extracting, based on the sensor data and the secondary sensor data, an authentication comprising one or more of: a proximity of the second vehicle to the first vehicle or a common object identified by the sensor data and the secondary sensor data. The method includes determining whether the authentication satisfies a trust threshold of the first vehicle.
User equipment authentication
Apparatuses, methods, and systems are disclosed for user equipment authentication. One method includes transmitting, from a user equipment, a request message to one or more network devices. The method includes, in response to transmitting the request message, attempting authentication with the one or more network devices. The method includes, in response to successfully authenticating with the one or more network devices, transmitting a message comprising first location information corresponding to the user equipment to the one or more network devices.
Assigning contextual identity to a device based on proximity of other devices
A device management service at a provider network may assign a contextual identity to a newly installed device at a client network based on proximity of other devices to the new device. When a new device is installed on a client network, the device broadcasts a request for proximity data. When another device receives the request, it generates proximity data. For example, it may measure a strength of the radio signal received from the new device, which varies depending on how close the devices are. The new device receives proximity data from the other devices on the client network. The new device then transmits the proximity data to a device management service. The device management service uses an algorithm to determine an estimated location of the new device based on the proximity data. The device management service determines a contextual identity of the new device based on the estimated location.
METHOD, DEVICE AND SYSTEM FOR VERIFYING UWB RANGING RESULTS
There is described a method of verifying a time-of-flight based ranging result in a UWB ranging device, the method comprising: exchanging a sequence of messages between the UWB ranging device and a further UWB ranging device as part of a double-sided ranging process to obtain round times and response times at both the UWB ranging device and the further UWB ranging device; estimating a time-of-flight value based on the round times and response times; and verifying the ranging result by performing a consistency check based on the estimated time-of-flight value and one or more predetermined parameter values. Furthermore, a UWB ranging device and a UWB ranging system are described.
IMPLEMENTING CONFIDENCE METRICS IN VEHICLE-TO-EVERYTHING (V2X) COMMUNICATIONS
Certain aspects of the present disclosure provide techniques for enhancing vehicle operations safety using coordinating vehicle platooning or enhancing platooning safety against location spoofing attacks. In one example, a source user equipment (UE) detects a potential spoofing event associated with location information being altered in an unauthorized manner, the source UE may transmit a request to a platoon control system (PCS) to join a vehicle platoon. In another example, a first UE associated with a lead vehicle in an existing platoon may detect a potential spoofing event associated with location information being altered in an unauthorized manner. The lead vehicle may transmit to a second UE of another vehicle in the platoon an indication of the detection and a request to exchange the respective roles in the platoon. The PCS may also monitor the conditions of the first and the second UEs, and arrange for the platoon reorganization.
IMPLEMENTING CONFIDENCE METRICS IN VEHICLE-TO-EVERYTHING (V2X) COMMUNICATIONS
Certain aspects of the present disclosure provide techniques for enhancing vehicle operations safety using coordinating vehicle platooning or enhancing platooning safety against location spoofing attacks. In one example, a source user equipment (UE) detects a potential spoofing event associated with location information being altered in an unauthorized manner, the source UE may transmit a request to a platoon control system (PCS) to join a vehicle platoon. In another example, a first UE associated with a lead vehicle in an existing platoon may detect a potential spoofing event associated with location information being altered in an unauthorized manner. The lead vehicle may transmit to a second UE of another vehicle in the platoon an indication of the detection and a request to exchange the respective roles in the platoon. The PCS may also monitor the conditions of the first and the second UEs, and arrange for the platoon reorganization.
Enhancement of flexibility to change STS index/counter for IEEE 802.15.4z
A method and apparatus of a first network entity in a wireless communication system is provide. The method and apparatus comprises: identifying at least one set of bit strings to generate a ranging scrambled timestamp sequence (STS); identifying at least one initialization vector (IV) field corresponding to the at least one set of bit strings, wherein the at least one IV field comprises a 4-octet string; generating a ranging STS key and IV information element (RSKI IE) that includes the at least one IV field to convey and align a seed that is used to generate the ranging STS; and transmitting, to a second network entity, the generated RSKI IE for updating the ranging STS of the second network entity.
Method, device and system for secure distance measurement
Device for secure distance measurement being a prover (P) or a verifier (V) comprising: a receiver (R3) configured to receive a receiving signal (RS) with a transmitted message (M) encoded therein, wherein the transmitted message (M) contains a verifying bit sequence (VBS), wherein a bit of the transmission message (M) is transmitted in the transmission signal (TS) by a pulse with a pulse modulation parameter with two pulse states, and a decoder (R2) configured to decode the verifying bit sequence (VBS) from the transmitted message (M) encoded in the receiving signal (RS). The decoder (R2) is based on a transmission format of the transmitted message (M) and based on the transmitted message (M) detected in the receiving signal (RS) defines sub-periods (4) in the receiving signal (RS) in which the first path (F1, F2) of the pulses (S1, S2) of the bits of the verifying bit sequence (VBS) of the transmitted message (M) are expected in the receiving signal (RS); and the decoder (R2) decodes a pulse state of a pulse (S1, S2) of a bit of the verifying bit sequence (VBS) based on the receiving signal (RS) received during one of the defined sub-periods (4) belonging to the pulse (S1, S2) to be decoded.
Collecting a database of spoofed devices
A method, apparatus and computer-readable storage medium are provided that maintain a database including information identifying of one or more mobile devices. Each mobile device of the one or more mobile devices is configured to enable positioning based on radio signals. The positioning enabled by the respective mobile device is considered to be at least partially unexpected.
Security System Providing Protection from Drones
The present invention is a security system for providing a zone (area) of protection from triphibian drones in the form of an apparatus comprising sonic sensors to sonically detect and triangulate the presence and current position of remotely controlled, operated, or otherwise unmanned vehicles within six-hundred meters of said apparatus; computer enabled software to automatically and securely identify a plurality of users, and to detect, configure, and establish a perimeter for a home or ranch with two or more sensors, and to automatically activate and provide notices and/or warnings for users and occupants when drones are detected; and software to automatically activate/enable drone countermeasures to prevent intrusion by and provide protection against autonomous vehicles and aerial, aquatic, terrestrial, amphibian, biphibian, and triphibian drones into the space surrounding a home or ranch.