-
公开(公告)号:US20190215695A1
公开(公告)日:2019-07-11
申请号:US16230971
申请日:2018-12-21
申请人: Liuyang Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
发明人: Liuyang Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
摘要: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
-
2.
公开(公告)号:US20200280842A1
公开(公告)日:2020-09-03
申请号:US16729077
申请日:2019-12-27
摘要: Embodiments of the present disclosure describe methods, apparatuses, storage media, and systems for a device disposed at an edge of a vehicular communication network or vehicles within a coverage area of the device. The device is to generate a list of vehicle security data to be distributed to vehicles currently within a coverage area of the device, based at least in part on a context related to the vehicles. The device is further to announce, on a control channel communicatively coupling the device and the vehicles, that the list of vehicle security data are available and a service channel to receive the list of vehicle security data. The list of vehicle security data are to be provided to the vehicles via the service channel. Other embodiments may be described and claimed.
-
公开(公告)号:US20200029210A1
公开(公告)日:2020-01-23
申请号:US16586540
申请日:2019-09-27
申请人: Rafael Rasales , Liuyang Lily Yang , Xiruo Liu
发明人: Rafael Rasales , Liuyang Lily Yang , Xiruo Liu
摘要: Systems and techniques for securing vehicle privacy in a driving infrastructure are described herein. A vehicle may contact a group identification (ID) issuer to register itself. A group ID may be received from the group ID issuer to indicate acceptance as a member. The vehicle may then contact the driving infrastructure to attach to the driving infrastructure using the group ID to identify the vehicle. In response, the vehicle receives an attachment ID from the driving infrastructure. Here, the attachment ID is used to secure communications between the vehicle and the driving infrastructure.
-
公开(公告)号:US20220116315A1
公开(公告)日:2022-04-14
申请号:US17559577
申请日:2021-12-22
申请人: Yi Zhang , Hao Feng , Srikathyayani Srikanteswara , Nageen Himayat , Xiruo Liu
发明人: Yi Zhang , Hao Feng , Srikathyayani Srikanteswara , Nageen Himayat , Xiruo Liu
摘要: System and techniques for information centric network (ICN) distributed path selection are described herein. An ICN node transmits a probes message to other ICN nodes. The ICN node receives a response to the probe message and derives a path strength metric from the response. Later, when a discovery packet is received by the ICN node, the path strength metric is added to the discovery packet.
-
公开(公告)号:US20180183603A1
公开(公告)日:2018-06-28
申请号:US15392266
申请日:2016-12-28
申请人: Xiruo Liu , Rafael Misoczki , Manoj R. Sastry , Santosh Ghosh , Li Zhao
发明人: Xiruo Liu , Rafael Misoczki , Manoj R. Sastry , Santosh Ghosh , Li Zhao
CPC分类号: H04L9/3247 , H04L9/0643 , H04L9/14 , H04L9/30 , H04L9/3236 , H04L2209/80
摘要: An attestation protocol between a prover device (P), a verifier device (V), and a trusted third-party device (TTP). P and TTP have a first trust relationship represented by a first cryptographic representation based on a one-or-few-times, hash-based, signature key. V sends an attestation request to P, with the attestation request including a second cryptographic representation of a second trust relationship between V and TTP. In response to the attestation request, P sends a validation request to TTP, with the validation request being based on a cryptographic association of the first trust relationship and the second trust relationship. TTP provides a validation response including a cryptographic representation of verification of validity of the first trust relationship and the second trust relationship. P sends an attestation response to V based on the validation response.
-
-
-
-