Patent classifications
H04K3/40
PRIMARY USER EMULATION / SIGNAL JAMMING ATTACK DETECTION METHOD
The method of the invention is related to utilizing the convergence patterns of sparse coding for detecting a primary user emulation/signal jamming attack in a cognitive radio setting. The method basically comprises a training stage and a testing stage. Through the method, the hypothesis which shows that there is no primary user but only noise (H.sub.0), the hypothesis which shows that there is a legitimate primary user present with a right to use the spectrum and the secondary user should not use the spectrum (H.sub.1), and the hypothesis which shows that there is a primary user emulator/signal jammer in the environment (H.sub.2) can be distinguished.
WIRELESS COMMUNICATION SYSTEM AND WIRELESS COMMUNICATION METHOD
A system includes a first node, a second node, and a third node, wherein the first node establishes a wireless communication link with the second node to perform wireless communication, and forwards connection information of the wireless communication to the third node; and the third node receives, by listening on the wireless communication link based on the connection information, transmission data sent by the second node to the first node. If an error occurs when the third node receives the transmission data sent by the second node to the first node, the third node interferes with the first node's reception of the transmission data sent by the second node, so that an error is caused when the first node receives the transmission data sent by the second node, and the second node is triggered to perform retransmission.
Wireless communication system and wireless communication method
A system includes a first node, a second node, and a third node, wherein the first node establishes a wireless communication link with the second node to perform wireless communication, and forwards connection information of the wireless communication to the third node; and the third node receives, by listening on the wireless communication link based on the connection information, transmission data sent by the second node to the first node. If an error occurs when the third node receives the transmission data sent by the second node to the first node, the third node interferes with the first node's reception of the transmission data sent by the second node, so that an error is caused when the first node receives the transmission data sent by the second node, and the second node is triggered to perform retransmission.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
ELECTROMAGNETIC JAMMING DEVICE AND METHOD FOR AN INTEGRATED CIRCUIT
A device is provided for jamming electromagnetic radiation liable to be emitted by at least one portion of an interconnect region located above at least one zone of an integrated electronic circuit produced in and on a semiconductor substrate. The device includes an antenna located above the at least one zone of the circuit and generating circuit coupled to the antenna and configured to generate an electrical signal having at least one pseudo-random property to pass through the antenna.
INTEGRATION OF CELLULAR PHONE DETECTION AND REPORTING INTO A PRISON TELEPHONE SYSTEM
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
Anti-eavesdropping method for IoV based on intermittent cooperative jamming
Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.
Integration of cellular phone detection and reporting into a prison telephone system
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
ANTI-EAVESDROPPING METHOD FOR IOV BASED ON INTERMITTENT COOPERATIVE JAMMING
Disclosed is an anti-eavesdropping method for the Internet of Vehicles (IoV) based on intermittent cooperative jamming. The method comprises: on the premise of effectively preventing an illegitimate user V.sub.e from information eavesdropping, first establishing optimization problems for the purpose of minimizing an energy consumption of a cooperative jamming user V.sub.j; analyzing unique communication characteristics of the IoV based on the Wireless Access in Vehicular Environments (WAVE) protocol, to obtain time structures of physical-layer data packets in the IoV and physical-layer data packet duration; and calculating the shortest physical-layer data packet duration in the IoV; then solving an optimal cooperative jamming scheme for any available power range for the cooperative jamming user V.sub.j; and finally, conducting, by the cooperative jamming user V.sub.j, periodic repetition according to the solved optimal cooperative jamming schemes in a period of data transmission between legitimate users, until transmission between the legitimate users ends.
Concealed jamming attach apparatus and method which use false acknowledgement frame
According to one embodiment of the present invention, in a concealed jamming attack using a false acknowledgement frame, a jamming attack is performed at a point in time during which a data frame is transmitted between a transmission node and a reception node and a false acknowledgement frame is transmitted to the data frame transmission node, such that the data frame transmission node cannot detect a data transmission failure in a MAC layer because of the jamming attack, and thus a jamming attack can be concealed.