H04W12/125

METHOD FOR MONITORING AN IOT DEVICE AND USING IT AS BATTERY PROTECTION WATCHDOG FOR IOT DEVICES
20200409783 · 2020-12-31 · ·

A method of monitoring an Internet-of-Things (IoT) device. An objective is to provide can detection of device malfunction issues, help to prevent hacking attacks and increase the reliability of IoT devices and IoT networks will be solved by monitoring functional behavior of the device; verifying the functional behavior and comparing the functional behavior with defined configuration functional behavior limits of the device; initiating an action by a watchdog associated with the IoT device based on the comparison between the functional behavior and the defined configuration functional behavior limits of the device.

Forwarding method, forwarding apparatus, and forwarder for authentication information in Internet of Things

Embodiments of the present application disclose a forwarding method, a forwarding apparatus, and a forwarder for authentication information in the Internet of Things. The method is applied to a constrained node and includes: receiving authentication information; determining whether the authentication information is received for the first time; and if the authentication information is received not for the first time, forwarding the authentication information; or if the authentication information is received for the first time, determining whether the authentication information is valid authentication information, and if the authentication information is not valid authentication information, discarding the authentication information, or if the authentication information is valid authentication information, verifying the valid authentication information, and forwarding the valid authentication information after the verification succeeds. The embodiments of the present application can reduce resources of the constrained node, and improve performance of the Internet of Things.

Wireless communication with replay attack protection for low power building control applications
10863322 · 2020-12-08 · ·

A system that implements wireless communication with replay protection for lower power building control applications. In one example, a battery-powered device includes a counter value with each message transmitted to an always-on device. If the always-on device receive an invalid counter value, instead of sending back an acknowledgement, it sends back a message containing an updated counter value. The battery-powered device may keep its receiver on after sending a message for at least a period of time, the battery-powered device receives the message and updates its counter with the received updated counter value. Since it did not receive an acknowledgement, it retries its original message, this time with the updated counter value. The retry message is likely to be successfully transmitted.

Broadband repeater with security for ultrawideband technologies
10797783 · 2020-10-06 ·

An ultrawideband radio transceiver/repeater provides a low cost infrastructure solution that merges wireless and wired network devices while providing connection to the plant, flexible repeater capabilities, network security, traffic monitoring and provisioning, and traffic flow control for wired and wireless connectivity of devices or networks. The ultrawideband radio transceiver/repeater can be implemented in discrete, integrated, distributed or embedded forms.

METHOD CIRCUITS DEVICES SYSTEMS AND FUNCTIONALLY ASSOCIATED COMPUTER EXECUTABLE CODE FOR DETECTING AND MITIGATING DENIAL OF SERVICE ATTACK DIRECTED ON OR THROUGH A RADIO ACCESS NETWORK
20200162506 · 2020-05-21 ·

The present invention includes methods, circuits, systems and functionally associated computer executable code for systems and functionally associated computer executable code for detecting and mitigating a denial of service attack on or through a radio access network. According to some embodiments, there may be provided a radio access network with one or more radio access points to wirelessly engage in communication with one or more wireless communication devices, a Malicious Packet Detector (MPD) communicatively coupled to one or more radio access points and configured to detect one or more malicious packets transmitted to the radio access network by the one or more wireless communication devices, and a controller functionally associated with the MPD and configured to alter network operation so as to mitigate malicious packet flow from the one or more malicious packet transmitting wireless communication devices.

IN-VEHICLE RELAY DEVICE, RELAY METHOD, AND RECORDING MEDIUM STORING PROGRAM
20200145437 · 2020-05-07 ·

An in-vehicle relay device for a vehicle is provided. The in-vehicle relay device includes a first communication circuit that transmits and receives first data to and from a first in-vehicle equipment in the vehicle. A second communication circuit transmits and receives second data to and from a second in-vehicle equipment in the vehicle. A control circuit controls relay of third data among the first communication circuit and the second communication circuit. In a case where reception data received by the control circuit from the first communication circuit or the second communication circuit is unauthorized, the control circuit stops relaying the third data in accordance with a traveling state of the vehicle.

Establishing a secure uplink channel by transmitting a secret word over a secure downlink channel
10608999 · 2020-03-31 · ·

An apparatus includes a Base Station (BS) that includes an antenna array and circuitry. The antenna array is configured to transmit downlink transmissions and to receive uplink transmissions. The circuitry is configured to generate secret bits to be used for securing uplink transmissions from legitimate user devices, and to distribute the secret bits over one or more data streams destined to the legitimate user devices, to further generate one or more jamming streams, and to apply to the jamming streams beamforming that directs the jamming streams away from the legitimate user devices, to transmit the data streams and the jamming streams using the antenna array, to receive, via the antenna array, data that was encrypted by a legitimate user device based on the secret bits, and to recover the data by decoding the encrypted data using the secret bits.

SYSTEM AND METHOD FOR SUPPRESSING TRANSMISSIONS FROM A WIRELESS DEVICE

When several devices communicate through a wireless network, a device may, for example, as a result of having been compromised, transmit an unacceptably high level of traffic, which may interfere with the ability of other devices to communicate through the network, and which may burden the processing resources of devices receiving the traffic. As such, a system and method for suppressing transmissions from a wireless device are provided.

SYSTEM AND METHOD FOR SUPPRESSING TRANSMISSIONS FROM A WIRELESS DEVICE

When several devices communicate through a wireless network, a device may, for example, as a result of having been compromised, transmit an unacceptably high level of traffic, which may interfere with the ability of other devices to communicate through the network, and which may burden the processing resources of devices receiving the traffic. As such, a system and method for suppressing transmissions from a wireless device are provided.

WIRELESS COMMUNICATION WITH REPLAY ATTACK PROTECTION FOR LOW POWER BUILDING CONTROL APPLICATIONS
20200053517 · 2020-02-13 ·

A system that implements wireless communication with replay protection for lower power building control applications. In one example, a battery-powered device includes a counter value with each message transmitted to an always-on device. If the always-on device receive an invalid counter value, instead of sending back an acknowledgement, it sends back a message containing an updated counter value. The battery-powered device may keep its receiver on after sending a message for at least a period of time, the battery-powered device receives the message and updates its counter with the received updated counter value. Since it did not receive an acknowledgement, it retries its original message, this time with the updated counter value. The retry message is likely to be successfully transmitted.