Qualcomm incorporated (20240104202). POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK simplified abstract
Contents
- 1 POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK
Organization Name
Inventor(s)
Weimin Duan of San Diego CA (US)
Alexandros Manolakos of Escondido CA (US)
Soo Bum Lee of San Diego CA (US)
Aziz Gholmieh of Del Mar CA (US)
Gavin Bernard Horn of La Jolla CA (US)
POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240104202 titled 'POSITIONING REFERENCE SIGNAL ATTACK DETECTION IN A WIRELESS COMMUNICATION NETWORK
Simplified Explanation
The abstract describes a method for detecting man-in-the-middle attacks on reference signals used for positioning a mobile device in a wireless network through time and/or angle consistency checks. Time consistency checks involve comparing peak location and power delay profiles across multiple reference signals, while angle consistency checks involve comparing the angle at which a reference signal is received across multiple signals or in comparison with an expected angle.
- Time consistency checks involve comparing peak location and power delay profiles across multiple reference signals.
- Angle consistency checks involve comparing the angle at which a reference signal is received across multiple signals or in comparison with an expected angle.
- Embodiments may include reporting detected attacks.
Potential Applications
This technology can be applied in wireless networks to enhance security measures and protect against man-in-the-middle attacks on mobile devices.
Problems Solved
This technology helps in detecting and preventing man-in-the-middle attacks on reference signals used for positioning mobile devices in a wireless network.
Benefits
The benefits of this technology include improved security for mobile devices in wireless networks, enhanced protection against unauthorized access, and increased trust in the positioning system.
Potential Commercial Applications
This technology can be utilized by mobile device manufacturers, wireless network providers, and security companies to enhance the security of positioning systems and protect user data.
Possible Prior Art
One possible prior art in this field is the use of encryption and authentication protocols to secure wireless communications and prevent unauthorized access to network resources.
What are the limitations of this technology in real-world applications?
The abstract does not mention any potential limitations or challenges that may arise when implementing this technology in real-world applications.
How does this technology compare to existing methods for detecting man-in-the-middle attacks in wireless networks?
The abstract does not provide a comparison with existing methods for detecting man-in-the-middle attacks in wireless networks.
Original Abstract Submitted
man-in-the-middle attacks on reference signals used for positioning a mobile device in a wireless network can be detected through time and/or angle consistency checks. time consistency checks may be based on a consistency of peak location and/or power delay profile across multiple reference signals and/or across different signal types, for example. angle consistency checks may be based on a consistency of an angle at which a reference signal is received across multiple reference signals and/or in comparison with an expected angle, for example. embodiments may further include reporting detected attacks.