H04K2203/16

METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
20180007548 · 2018-01-04 ·

A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.

DISTRIBUTED RATE ALLOCATION AND COLLISION DETECTION IN WIRELESS NETWORKS
20180014311 · 2018-01-11 ·

A hybrid cellular and non-cellular multi-hop communication device, including a hand-held wireless device having one or more antennas, a cellular wireless interface connected to at least some of the one or more antennas, and a non-cellular wireless interface connected to at least some of the one or more antennas. The non-cellular wireless interface may include a rate allocator configured to select a physical-layer rate of transmission of data from the non-cellular wireless interface based on a queue length of data to be transmitted from the hand-held cellular device and a transmitter configured to wirelessly transmit data from the queue and adjust physical-layer transmission parameters based on a physical-layer rate selected by the rate allocator.

DIGITAL CAPACITY CENTRIC DISTRIBUTED ANTENNA SYSTEM

Disclosed herein is an architecture for a Digital Capacity Centric Distributed Antenna System (DCC-DAS) that dynamically manages and distributes resources in different locations where there is demand for capacity. The DCC-DAS also allows for the routing of resources to other applications such as location finding devices, jamming devices, repeaters, etc.

Electromagnetic interference control method and related product

Disclosed are an electromagnetic interference control method and a related product. The method is for an electronic device including an antenna and a camera. The method includes: obtaining a first operating frequency of the camera and a second operating frequency of the antenna; determining the second operating frequency is interfered; in response to the second operating frequency being interfered, obtaining a target frame rate range; determining an operating frequency of the camera corresponding to each frame rate in the target frame rate range; obtaining an operating frequency list; determining at least one third operating frequency from the operating frequency list; and selecting one third operating frequency from the at least one third operating frequency as a first target operating frequency; determining a first target frame rate; operating the camera at the first target operating frequency; and performing the video function based on the first target frame rate.

Methods to mitigate denial of service attacks on time synchronization using link redundancy for industrial/autonomous systems

Systems and methods in which devices synchronize their clocks for purposes of data transmission are described. Particularly, the disclosed systems and methods provide detection and mitigation of interference by malicious (or non-malicious) wireless devices with communication of time synchronized data over wireless networks. Systems and methods are provided where times statistics related to multiple instances of wireless time synchronization are collected and collated. Devices in the system can discipline their internal clocks based on the collated time statistics.

JAMMING SIGNAL CANCELLATION

There is disclosed an apparatus. The apparatus comprises means for performing: in response to detecting a jamming signal, obtaining a sample waveform of the jamming signal; and sending information of the jamming signal to another apparatus.

FULL-DUPLEX COMMUNICATIONS AND PHYSICAL LAYER SECURITY

Methods, systems, and devices for wireless communications are described. A base station may indicate for a first device to transmit random information in the direction of an adverse device on at least partially overlapping time and frequency resources that are also used for receiving a downlink message from the base station. By transmitting the random information in the direction of the adverse device, the first device may cause entropy overhead to the adverse device, impacting an ability of the adverse device to decode portions of the downlink message transmitted to and intended for the first device. Accordingly, the first device may receive the downlink message and may concurrently transmit the random information in the direction of the adverse device on time and frequency resources that at least partially overlap with time and frequency resources used for receiving the downlink message based on receiving the indication from the base station.

Virtual sensing via sensor sharing for C-V2X scheduling
11696099 · 2023-07-04 · ·

A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.

METHOD, MANAGEMENT SERVER, AND BASE STATION FOR DEFENDING ATTACK FROM FAKE BASE STATION IN COMMUNICATION NETWORK
20220417753 · 2022-12-29 · ·

A base station of a communication system may include an antenna; a memory; and a processor. The processor analyzes a signal received through the antenna to determine if the received signal is a signal transmitted from a fake base station. Based on a determination that the source of the received signal is the fake base station, the processor generates a random access preamble signal for accessing the fake base station. The processor transmits the generated random access preamble signal through the antenna. Thus, the base station may effectively defend against an attack from a fake base station by detecting the fake base station based on collected information of a neighboring base station and causing radio resources of the detected fake base station to be exhausted. Various other embodiments are possible.

Securing Downlink Control Information in Cellular Communication Networks
20220399950 · 2022-12-15 ·

According to an example aspect of the present invention, there is provided a method including determining at least one possible downlink control information for the user equipment to schedule the data transmission, checking a scrambled version of the at least one possible downlink control information to determine whether the scrambled version of the at least one possible downlink control information defines valid downlink control information, transmitting the scrambled version of the at least one possible downlink control information and scheduling the data transmission based on the at least one possible downlink control information and if it is determined that the scrambled version of the at least one possible downlink control information defines valid downlink control information, scheduling the jamming transmission based on the scrambled version of the at least one possible downlink control information.