Qualcomm incorporated (20240104202). POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK simplified abstract

From WikiPatents
Jump to navigation Jump to search

POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK

Organization Name

qualcomm incorporated

Inventor(s)

Weimin Duan of San Diego CA (US)

Alexandros Manolakos of Escondido CA (US)

Soo Bum Lee of San Diego CA (US)

Aziz Gholmieh of Del Mar CA (US)

Gavin Bernard Horn of La Jolla CA (US)

POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240104202 titled 'POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK

Simplified Explanation

The abstract describes a method for detecting man-in-the-middle attacks on reference signals used for positioning a mobile device in a wireless network through time and/or angle consistency checks. Time consistency checks involve comparing peak location and power delay profiles across multiple reference signals, while angle consistency checks involve comparing the angle at which a reference signal is received across multiple signals or in comparison with an expected angle.

  • Time consistency checks involve comparing peak location and power delay profiles across multiple reference signals.
  • Angle consistency checks involve comparing the angle at which a reference signal is received across multiple signals or in comparison with an expected angle.
  • Embodiments may include reporting detected attacks.

Potential Applications

This technology can be applied in wireless networks to enhance security measures and protect against man-in-the-middle attacks on mobile devices.

Problems Solved

This technology helps in detecting and preventing man-in-the-middle attacks on reference signals used for positioning mobile devices in a wireless network.

Benefits

The benefits of this technology include improved security for mobile devices in wireless networks, enhanced protection against unauthorized access, and increased trust in the positioning system.

Potential Commercial Applications

This technology can be utilized by mobile device manufacturers, wireless network providers, and security companies to enhance the security of positioning systems and protect user data.

Possible Prior Art

One possible prior art in this field is the use of encryption and authentication protocols to secure wireless communications and prevent unauthorized access to network resources.

What are the limitations of this technology in real-world applications?

The abstract does not mention any potential limitations or challenges that may arise when implementing this technology in real-world applications.

How does this technology compare to existing methods for detecting man-in-the-middle attacks in wireless networks?

The abstract does not provide a comparison with existing methods for detecting man-in-the-middle attacks in wireless networks.


Original Abstract Submitted

man-in-the-middle attacks on reference signals used for positioning a mobile device in a wireless network can be detected through time and/or angle consistency checks. time consistency checks may be based on a consistency of peak location and/or power delay profile across multiple reference signals and/or across different signal types, for example. angle consistency checks may be based on a consistency of an angle at which a reference signal is received across multiple reference signals and/or in comparison with an expected angle, for example. embodiments may further include reporting detected attacks.