Methods and apparatus for detecting attacks in V2X networks

Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packe...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chen, Kuilin Clark, Sivanesan, Kathiravetpillai, Gottschlich, Justin, Choudhury, Debabani, Ambrosin, Moreno, Yang, Liuyang Lily, Sharma, Sridhar, Yona, Yair, Zhang, Zheng, Liu, Xiruo
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Chen, Kuilin Clark
Sivanesan, Kathiravetpillai
Gottschlich, Justin
Choudhury, Debabani
Ambrosin, Moreno
Yang, Liuyang Lily
Sharma, Sridhar
Yona, Yair
Zhang, Zheng
Liu, Xiruo
description Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11902785B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11902785B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11902785B23</originalsourceid><addsrcrecordid>eNrjZLD2TS3JyE8pVkjMS1FILChILEosKS1WSMsvUkhJLUlNLsnMS1dILClJTM4uVsjMUwgzilDISy0pzy_KLuZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqUCl8aHBhoaWBkbmFqZORsbEqAEAkk4vTQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Methods and apparatus for detecting attacks in V2X networks</title><source>esp@cenet</source><creator>Chen, Kuilin Clark ; Sivanesan, Kathiravetpillai ; Gottschlich, Justin ; Choudhury, Debabani ; Ambrosin, Moreno ; Yang, Liuyang Lily ; Sharma, Sridhar ; Yona, Yair ; Zhang, Zheng ; Liu, Xiruo</creator><creatorcontrib>Chen, Kuilin Clark ; Sivanesan, Kathiravetpillai ; Gottschlich, Justin ; Choudhury, Debabani ; Ambrosin, Moreno ; Yang, Liuyang Lily ; Sharma, Sridhar ; Yona, Yair ; Zhang, Zheng ; Liu, Xiruo</creatorcontrib><description>Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240213&amp;DB=EPODOC&amp;CC=US&amp;NR=11902785B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240213&amp;DB=EPODOC&amp;CC=US&amp;NR=11902785B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Chen, Kuilin Clark</creatorcontrib><creatorcontrib>Sivanesan, Kathiravetpillai</creatorcontrib><creatorcontrib>Gottschlich, Justin</creatorcontrib><creatorcontrib>Choudhury, Debabani</creatorcontrib><creatorcontrib>Ambrosin, Moreno</creatorcontrib><creatorcontrib>Yang, Liuyang Lily</creatorcontrib><creatorcontrib>Sharma, Sridhar</creatorcontrib><creatorcontrib>Yona, Yair</creatorcontrib><creatorcontrib>Zhang, Zheng</creatorcontrib><creatorcontrib>Liu, Xiruo</creatorcontrib><title>Methods and apparatus for detecting attacks in V2X networks</title><description>Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLD2TS3JyE8pVkjMS1FILChILEosKS1WSMsvUkhJLUlNLsnMS1dILClJTM4uVsjMUwgzilDISy0pzy_KLuZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqUCl8aHBhoaWBkbmFqZORsbEqAEAkk4vTQ</recordid><startdate>20240213</startdate><enddate>20240213</enddate><creator>Chen, Kuilin Clark</creator><creator>Sivanesan, Kathiravetpillai</creator><creator>Gottschlich, Justin</creator><creator>Choudhury, Debabani</creator><creator>Ambrosin, Moreno</creator><creator>Yang, Liuyang Lily</creator><creator>Sharma, Sridhar</creator><creator>Yona, Yair</creator><creator>Zhang, Zheng</creator><creator>Liu, Xiruo</creator><scope>EVB</scope></search><sort><creationdate>20240213</creationdate><title>Methods and apparatus for detecting attacks in V2X networks</title><author>Chen, Kuilin Clark ; Sivanesan, Kathiravetpillai ; Gottschlich, Justin ; Choudhury, Debabani ; Ambrosin, Moreno ; Yang, Liuyang Lily ; Sharma, Sridhar ; Yona, Yair ; Zhang, Zheng ; Liu, Xiruo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11902785B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>Chen, Kuilin Clark</creatorcontrib><creatorcontrib>Sivanesan, Kathiravetpillai</creatorcontrib><creatorcontrib>Gottschlich, Justin</creatorcontrib><creatorcontrib>Choudhury, Debabani</creatorcontrib><creatorcontrib>Ambrosin, Moreno</creatorcontrib><creatorcontrib>Yang, Liuyang Lily</creatorcontrib><creatorcontrib>Sharma, Sridhar</creatorcontrib><creatorcontrib>Yona, Yair</creatorcontrib><creatorcontrib>Zhang, Zheng</creatorcontrib><creatorcontrib>Liu, Xiruo</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chen, Kuilin Clark</au><au>Sivanesan, Kathiravetpillai</au><au>Gottschlich, Justin</au><au>Choudhury, Debabani</au><au>Ambrosin, Moreno</au><au>Yang, Liuyang Lily</au><au>Sharma, Sridhar</au><au>Yona, Yair</au><au>Zhang, Zheng</au><au>Liu, Xiruo</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Methods and apparatus for detecting attacks in V2X networks</title><date>2024-02-13</date><risdate>2024</risdate><abstract>Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11902785B2
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title Methods and apparatus for detecting attacks in V2X networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T04%3A53%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Chen,%20Kuilin%20Clark&rft.date=2024-02-13&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11902785B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true