Abstract:
Embodiments of a folded meta-inspired antenna for dual-band operation and user equipment for dual-band operation in a wireless network are generally described herein. In some embodiments, the folded meta-inspired antenna may include first and second conductive layers disposed on opposite sides of a substrate to provide a wideband distributed structure comprising a plurality of high-Q resonances resulting from, at least in part, metamaterial-based loading. Conductive material on the first side of the substrate is arranged around a central longitudinal slot coupled with a plurality of perpendicular slots. For dual-band operation, the folded meta-inspired antenna may operate as a folded monopole at a higher frequency band and operate as a slot-type radiator at a lower frequency band. The plurality of resonances may cause the folded meta-inspired antenna to achieve broader bandwidth at both lower and higher frequency bands.
Abstract:
Millimeter wave (mmWave) technology, apparatuses, and methods that relate to transceivers, receivers, and antenna structures for wireless communications are described. The various aspects include co-located millimeter wave (mmWave) and near-field communication (NFC) antennas, scalable phased array radio transceiver architecture (SPARTA), phased array distributed communication system with MIMO support and phase noise synchronization over a single coax cable, communicating RF signals over cable (RFoC) in a distributed phased array communication system, clock noise leakage reduction, IF-to-RF companion chip for backwards and forwards compatibility and modularity, on-package matching networks, 5G scalable receiver (Rx) architecture, among others.
Abstract:
Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
Abstract:
Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
Abstract:
Systems, methods, and circuitries are disclosed for providing a retrodirective array. One example retrodirective array includes a plurality of dual-polarized antenna elements configured to receive a pilot signal having a first polarization and phase conjugation circuitry. The phase conjugation circuitry includes, for each of the plurality of antenna elements, a mixer configured to mix the pilot signal with an LO signal to generate a phase conjugated signal and excitation circuitry configured to generate an excitation signal for the antenna element to transmit the phase conjugated signal with a second polarization that is different from the first polarization.
Abstract:
An antenna system including an antenna configured to emit an electromagnetic wave, and a beamwidth controller disposed on the antenna and configured to align with a magnetic or electric field direction of the electromagnetic wave, and when the electromagnetic wave at least partially or wholly propagates through the beamwidth controller, resonate and induce a magnetic field to interact with the electromagnetic wave to control a beamwidth of the electromagnetic wave based on a permittivity or permeability of the beamwidth controller.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to validate data communicated by a vehicle. An example apparatus an anomaly detector to, in response to data communicated by a vehicle, at least one of compare an estimated speed with a reported speed or compare a location of the vehicle with a reported location. The apparatus including the anomaly detector further to generate an indication of the vehicle in response to the comparison. The apparatus further includes a notifier to discard data sent by the vehicle and notify surrounding vehicles of the data communicated by the vehicle.
Abstract:
Embodiments of wireless antenna array systems to achieve three-dimensional beam coverage are described herein. Other embodiments may be described and claimed.