MESSAGE RETRANSMISSION MISBEHAVIOR DETECTION

    公开(公告)号:US20240236681A9

    公开(公告)日:2024-07-11

    申请号:US18049400

    申请日:2022-10-25

    CPC classification number: H04W12/106 H04W12/122

    Abstract: Various embodiments include methods and systems for performing misbehavior detection in a message retransmission. In various embodiments, a computing device may compare a first aspect of a first message to a second aspect of a second message that purports to be a retransmission of the first message, identify retransmission misbehavior in the second message based on the comparison, and take an action in response to identifying retransmission misbehavior in the second message.

    Misbehavior Indication Aggregators For Identifying Misbehavior Conditions In Vehicle-To-Everything (V2X) Communication Systems

    公开(公告)号:US20230345249A1

    公开(公告)日:2023-10-26

    申请号:US17660513

    申请日:2022-04-25

    CPC classification number: H04W12/122 H04W4/40

    Abstract: Embodiment methods implemented in vehicle-to-everything (V2X) systems may include detecting multiple indications of V2X misbehavior by multiple misbehavior detection mechanisms, aggregating misbehavior indications output from the misbehavior detection mechanisms, determining whether a reportable or actionable misbehavior condition exists based on aggregated misbehavior indications, and acting on a determined misbehavior condition. Aggregating misbehavior indications may include determining whether any of the misbehavior detection mechanisms outputs a misbehavior indication, determining whether any one of a select subset of the one or more misbehavior detection mechanisms outputs a misbehavior indication, aggregating misbehavior indications output from multiple misbehavior detection mechanisms and comparing the number to a threshold, applying a weight to misbehavior indication outputs and aggregating the weighted outputs, or determining a number of events classified as an attack or misbehavior indications output by each of a plurality of misbehavior detection mechanisms within a window of time or set number of events.

    MAC ADDRESS CLONING ATTACK DETECTION FOR V2X DEVICES

    公开(公告)号:US20240380782A1

    公开(公告)日:2024-11-14

    申请号:US18316025

    申请日:2023-05-11

    Abstract: A method of wireless communication at a first V2X device is described herein. The method includes obtaining a message including a MAC header, an L1 source ID, and an L1 destination ID. The method includes decoding the MAC header to produce an L2 source ID associated with the message based on at least one of (1) the L1 destination ID of the message matching a first number of bits of an L2 source ID of the first V2X device or (2) the L1 source ID of the message matching a second number of bits of the L2 source ID of the first V2X device. The method includes outputting an indication of a MAC cloning attack based on the L2 source ID of the message matching the L2 source ID of the first V2X device.

    MODE SWITCH FOR LINK-BASED AND APPLICATION-BASED SECURITY OPERATIONS

    公开(公告)号:US20240320351A1

    公开(公告)日:2024-09-26

    申请号:US18188647

    申请日:2023-03-23

    CPC classification number: G06F21/606 G06F21/602 H04L9/3242 H04L2209/84

    Abstract: A method for managing a plurality of imaging devices in a vehicle includes determining that a change of data security mode is indicated for frames of image data transmitted over a first data communication link, determining whether a sensor management system has sufficient processing capacity to support the change of data security mode, increasing the processing capacity of the sensor management system by modifying data security settings for at least one other data communication link when the processing capacity of the sensor management system is insufficient to support the change of data security mode, and initiating the change of data security mode when the sensor management system has sufficient processing capacity to support the change of data security mode. The change of data security mode may include a change from an application-based to a link-based data security mode or a change from the link-based to the application-based data security mode.

Patent Agency Ranking