Patent classifications
H04K2203/16
COMMUNICATION DEVICE AND METHOD FOR SECURE COMMUNICATION
A first communication device for use in a wireless communication system to communicate with a second communication device comprises circuitry configured to transmit probe signals into multiple directions, receive echo signals in response to the transmitted probe signals, and determine the position of a potentially eavesdropping communication device from the received echo signals.
Radio Frequency Jamming or Interference Detection and Mitigation in an Electronic Monitoring System
An electronic monitoring system and method are provided. The electronic monitoring system monitors communication of data between a device primary radio of a monitoring device and a hub primary radio through a primary communication path. Communication of the data is transferred to a secondary communication path between a device secondary radio of the monitoring device and a hub secondary radio in response to the detection of a disruption on the primary communication path resulting from interference or jamming of communications over the primary communication path. The primary and secondary radios operate a different frequencies.
COOPERATIVE EARLY THREAT DETECTION AND AVOIDANCE IN C-V2X
Method and apparatus for cooperative early threat detection and avoidance in C-V2X. In one aspect, the apparatus detects a threat entity within a threat zone based on data signals received from the threat entity, wherein the threat entity obstructs wireless spectrum or resources utilized in cooperative or automated driving decisions. The apparatus transmits, to at least one second wireless device, a message indicating the threat entity within the threat zone.
VIRTUAL SENSING VIA SENSOR SHARING FOR C-V2X SCHEDULING
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
TECHNIQUES FOR PERFORMING PHYSICAL LAYER SECURITY DURING FULL-DUPLEX COMMUNICATIONS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive, from a base station, a control signal scheduling the UE to receive a downlink message from the base station using a set of time and frequency resources. The UE may identify an aggressor UE attempting to receive uplink communications, downlink communications, or both, transmitted between the UE and the base station and determine a transmit power for transmitting a jamming signal to the aggressor UE during the set of time and frequency resources. The UE may apply a jamming signal power scheme to the jamming signal by either using the determined transmit power or adjusting the determined transmit power in accordance with the jamming signal power scheme.
A device, a system, a method and computer program product for identifying interfering devices in position measurements
A interference detection device (22) perform the following actions: receiving individual position data from mobile terminals (4(j)) which individual position data indicates an area (12(j)) in which individual ones of the mobile terminals (4(j)) are located based on positioning signals received by the mobile terminals (4(j)); identifying if individual position data may have been affected by one or more interfering signals transmitted by interfering device (14(m)) and interfering with the positioning signals; (A) identifying if a number of mobile terminals (4.sub.v(j)) in a first area (18) is higher than a maximum threshold number, and, if so, determining that individual position data of the number of mobile terminals (4.sub.v(j)) may have been affected by the interfering signals; or (B) identifying if a number of the mobile terminals (4(j)) in a second area (36) is lower than a minimum threshold number; and, if so, determining that individual position data of the number of mobile terminals (4(j)) may have been affected by interfering signals; or (C) receiving further individual position data which indicates further areas (18) in which mobile terminals (4(j)) are located based on another positioning technique than a positioning technique used to determine the individual position data as received from the mobile terminals (4(j)); determining if the areas (12(j)) overlap with the further areas (18) at least to a minimum extent, and, if not, determining that individual position data of the mobile terminals (4(j)) may have been affected by the interfering signals.
Automated surveillance system
An internet of things is disclosed, comprising plural SDR receivers and possibly a centralised system, where one or more of the receivers may be mobile. The internet of things thus allows for a very large proportion of RF signals present within a city, for example, to be monitored and analysed for the purpose of identifying, tracking and/or preventing criminal behaviour. The receivers may be equipped with secure SDRs for increased security and privacy and the system preferably includes artificial intelligence using machine learning technology, for increased adaptability among others. The system is flexible due to the programmability of the SDRs.
Identifying, tracking, and disrupting unmanned aerial vehicles
Systems, methods, and apparatus for identifying, tracking, and disrupting UAVs are described herein. Sensor data can be received from one or more portable countermeasure devices or sensors. The sensor data can relate to an object detected proximate to a particular airspace. The system can analyze the sensor data relating to the object to determine a location of the object and determine that the object is flying within the particular airspace based at least in part on location data. A portable countermeasure device can be identified that corresponds to the location of the object. The system can transmit information about the object to the identified portable countermeasure device. The portable countermeasure device can transmit additional data relating to the object to the system.
PHYSICAL LAYER SECURITY ACTIVATION
Methods, systems, and devices for wireless communications are described. In some wireless communications systems, a user equipment (UE) may receive, from a base station, control signaling identifying a configuration of a set of time intervals for communication with the base station, the set of time intervals including a subset of the time intervals for which the UE is to perform a physical layer security procedure. In some cases, the UE may activate a timer associated with performing the physical layer security procedure in response to a trigger. The UE and the base station may communicate one or more messages using the physical layer security procedure, for example, in the subset of the time intervals identified by the control signaling, while the timer is active, or both. The physical layer security procedure may involve the UE performing physical layer security encoding, signal jamming, or both.
PROTECTION LEVEL INDICATION AND CONFIGURATION
Methods, systems, and devices for wireless communications are described. A base station may transmit, to a user equipment (UE), a control message that includes an identification of a set of protection levels corresponding to different degrees of physical layer security for securing communications between the UE and the base station. The base station may transmit, to the UE, an indication of an identified protection level of the set of protection levels to be used by the UE for securing the communications between the UE and the base station. The UE may communicate with the base station in accordance with the identified protection level.