H04K3/255

Methods to mitigate denial of service attacks on time synchronization using link redundancy for industrial/autonomous systems

Systems and methods in which devices synchronize their clocks for purposes of data transmission are described. Particularly, the disclosed systems and methods provide detection and mitigation of interference by malicious (or non-malicious) wireless devices with communication of time synchronized data over wireless networks. Systems and methods are provided where times statistics related to multiple instances of wireless time synchronization are collected and collated. Devices in the system can discipline their internal clocks based on the collated time statistics.

DETECTION OF GNSS INTERFERENCE USING SURVEILLANCE MESSAGES
20230017616 · 2023-01-19 ·

In some examples, a system includes a transceiver configured to receive surveillance messages from Y target vehicles, where Y is an integer greater than two. The system includes processing circuitry configured to determine predicted positions of the Y target vehicles based on the surveillance messages. The processing circuitry is also configured to determine reported positions of the Y target vehicles based on later received surveillance messages. The processing circuitry is further configured to determine that respective differences between the respective predicted position and the respective reported position for X of the Y target vehicles is greater than a threshold distance. The processing circuitry is configured to determine that Global Navigation Satellite System interference has occurred in response to determining that X divided by Y is greater than a threshold level.

Radio Frequency Jamming or Interference Detection and Mitigation in an Electronic Monitoring System
20220393785 · 2022-12-08 ·

An electronic monitoring system and method are provided. The electronic monitoring system monitors communication of data between a device primary radio of a monitoring device and a hub primary radio through a primary communication path. Communication of the data is transferred to a secondary communication path between a device secondary radio of the monitoring device and a hub secondary radio in response to the detection of a disruption on the primary communication path resulting from interference or jamming of communications over the primary communication path. The primary and secondary radios operate a different frequencies.

Ensuring transmissions are completed in a wireless network

A method comprising determining that interference may occur in a wireless network an apparatus is connected to, obtaining a first link that is of a first type, obtaining a second link that is of a second type, determining data to be transmitted from the apparatus to another apparatus connected to the wireless network, determining that a transmission occurs in the first link and transmitting the data in the second link, wherein the transmission in the first link has a longer duration than transmitting the data in the second link and the transmission in the first link and transmitting the data in the second link overlap in time.

Detection of GNSS interference using surveillance messages

In some examples, a system includes a transceiver configured to receive surveillance messages from Y target vehicles, where Y is an integer greater than two. The system includes processing circuitry configured to determine predicted positions of the Y target vehicles based on the surveillance messages. The processing circuitry is also configured to determine reported positions of the Y target vehicles based on later received surveillance messages. The processing circuitry is further configured to determine that respective differences between the respective predicted position and the respective reported position for X of the Y target vehicles is greater than a threshold distance. The processing circuitry is configured to determine that Global Navigation Satellite System interference has occurred in response to determining that X divided by Y is greater than a threshold level.

Method and device for detecting a decoy operation of a GNSS system
11635524 · 2023-04-25 · ·

A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.

Controlling data communication quality in software-defined heterogenous multi-hop ad hoc networks

Methods, devices and systems that use a control channel to coordinate quality of data communications in software-defined heterogenous multi-hop ad hoc networks are described. In some embodiments, an example apparatus for wireless communication in a network includes performing, using a control plane, network management functions over a control channel that has a first bandwidth, implements a frequency-hopping operation, and operates at in a first frequency band, and performing, using a data plane that is physically and logically decoupled from the control plane, data forwarding functions, based on a routing decision, over at least one data channel that has a second bandwidth and operates in a second frequency band different from the first frequency band.

DETECTION METHOD OF DECOYING OF A TRAFFIC ALERT AND COLLISION AVOIDANCE SYSTEM, AND ASSOCIATED TRAFFIC ALERT AND COLLISION AVOIDANCE SYSTEM
20230196927 · 2023-06-22 ·

Disclosed is a method of detecting spoofing of a traffic alert and collision avoidance system, known as a TCAS, the TCAS having a Mode A, a Mode C and a Mode S for communicating with surrounding aircraft. The method includes: querying a suspected spoofing aircraft via Mode S of the TCAS and receiving a response to this query; deducing from the response at least some data, known as Mode S data, relating to the suspected spoofing aircraft; and validating Mode S data by querying the suspected spoofing aircraft via Mode A or Mode C of the TCAS.

EXPLOITING MULTI-RADIO DUAL CONNECTIVITY (MR-DC) FOR ROBUST TACTICAL 5G
20230180012 · 2023-06-08 ·

A communication system is described. The communication system includes 5g base stations (gNodeB) which are communicatively coupled to a user equipment (UE) by a multiple radio access technology (multi-RAT) dual connectivity. A first of the gNodeBs is a master gNodeB which relays control signaling from a 5G network core to a secondary gNodeB. To avoid spectral interference of the control signals between the master gNodeB and the secondary gNodeB, the control signals are transmitted according to a tactical waveform protocol selected from the Department of Defense (DoD) Communication Waveform Inventory (2020), such as a common data link (CDL) protocol.

GPS spoofing detection techniques

Disclosed herein are system, method, and computer program product embodiments for detecting spoofing of a navigation device. A plurality of anti-spoofing techniques are provided. The plurality of anti-spoofing techniques detect interference with data provided by one or more navigation devices for a plurality of threat situations. Positioning, timing and frequency characteristics associated with the one or more navigation devices are analyzed in order to identify a threat situation among the plurality of threat situations. Based on the identified threat situation one or more of the anti-spoofing techniques are executed. The one or more anti-spoofing techniques can be executed in parallel in order to provide various anti-spoofing detection techniques at the same time.