Intrusion detection system for wireless networks
First Claim
1. A system for detecting intrusion into a wireless network, the system comprising:
- a monitoring station, having a first transceiver, the first transceiver comprising;
a first receiver front end for receiving and demodulating a first signal, a first transmitter for sending a first communication, and a first processor coupled to said first receiver front end for processing the first signal, and coupled to said first transmitter for controlling the first transmitter; and
a fusion station, having a second transceiver, the second transceiver comprising;
a second receiver front end for receiving and demodulating said first communication;
a second transmitter for sending a second communication, and a second processor coupled to said second receiver front end for processing the first communication from said monitoring station, and said second processor coupled to the second transmitter for controlling the second transmitter.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system (FIG. 2) for facilitating detection of intruders into a wireless network, through the use of physical layer anomalies. One or more monitoring stations (22, 24, 26) can be distributed across the potential intruder'"'"'s sign transmission region. They process these transmissions and extract attributes of the signals, which can then transmit to one or more fusion stations (28), which correlate the calculated attributes with stored attributes of signals of known, authorized users of the network, and transmit alert messages in the case that these signal attributes do not match those of known, authorized users. Signal attributes in accordance with the instant invention include the carrier frequency, spurious emissions, and power-on and power-down transients. Also in accordance with the instant invention are methods and systems using both direct and multipath received signal strength, signal-to-noise ratio, and geometric characteristics such as direction/angle of arrival (AOA), time of arrival, position/range, time dispersion, Doppler shift and polarization.
-
Citations
19 Claims
-
1. A system for detecting intrusion into a wireless network, the system comprising:
-
a monitoring station, having a first transceiver, the first transceiver comprising;
a first receiver front end for receiving and demodulating a first signal, a first transmitter for sending a first communication, and a first processor coupled to said first receiver front end for processing the first signal, and coupled to said first transmitter for controlling the first transmitter; and
a fusion station, having a second transceiver, the second transceiver comprising;
a second receiver front end for receiving and demodulating said first communication;
a second transmitter for sending a second communication, and a second processor coupled to said second receiver front end for processing the first communication from said monitoring station, and said second processor coupled to the second transmitter for controlling the second transmitter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for intrusion detection into a wireless network comprising the steps of:
-
monitoring a first signal having attributes;
receiving and demodulating a first signal having attributes;
transmitting a first communication;
receiving and demodulating the first communication; and
sending a second communication. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification