18592733. ATTACKER DETECTION IN AMBIENT IOT simplified abstract (Nokia Technologies Oy)

From WikiPatents
Jump to navigation Jump to search

ATTACKER DETECTION IN AMBIENT IOT

Organization Name

Nokia Technologies Oy

Inventor(s)

Oana-Elena Barbu of Aalborg (DK)

Paolo Baracca of Munich (DE)

Benny Vejlgaard of Aalborg (DK)

ATTACKER DETECTION IN AMBIENT IOT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18592733 titled 'ATTACKER DETECTION IN AMBIENT IOT

The abstract of this patent application describes a system for detecting attackers in ambient IoT environments. The system receives signals associated with trick tag signals from terminal devices, determines the number of attackers in a tag detection session, and transmits attacker information to a network device.

  • The apparatus receives signals related to trick tag signals from terminal devices.
  • It determines the number of attackers in a tag detection session based on the received signals.
  • Attacker information, including the number of attackers, is transmitted to a network device.
  • This system enables the identification and reporting of jamming activities to the network in real-time, ensuring the integrity of tag detection.

Potential Applications: - Security systems in IoT environments - Anti-jamming measures in wireless networks - Intrusion detection systems for smart devices

Problems Solved: - Detecting and mitigating attacks in IoT environments - Ensuring the integrity of tag detection sessions - Preventing jamming activities in wireless networks

Benefits: - Enhanced security in IoT systems - Real-time detection and response to attacks - Improved reliability of tag detection sessions

Commercial Applications: Title: "IoT Security System for Attack Detection" This technology can be used in various industries such as smart home automation, industrial IoT, and smart city infrastructure to enhance security measures and protect against cyber threats.

Questions about IoT Security System for Attack Detection: 1. How does this system differentiate between legitimate signals and trick tag signals? - The system uses advanced algorithms to analyze the characteristics of the signals and identify patterns associated with trick tag signals.

2. What measures are in place to ensure the accuracy of the attacker detection process? - The system continuously monitors and updates its algorithms to adapt to new attack techniques and maintain high accuracy in detecting attackers.


Original Abstract Submitted

Example embodiments of the present disclosure relate to attacker detection in ambient IoT. An apparatus receives at least one signal which is at least associated with a trick tag signal transmitted from a terminal device. The apparatus determines a number of attackers of a tag detection session based on the at least one signal. The apparatus transmits, to a network device, attacker information at least comprising the number of attackers. In this way, the NR element is enabled to identify and report jamming activities to the network in time. Therefore, the tag detection integrity can be guaranteed.