×

Cognitive spectrum violation detection

  • US 9,042,359 B1
  • Filed: 09/24/2007
  • Issued: 05/26/2015
  • Est. Priority Date: 09/24/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A radio node in a radio network, comprising:

  • signal processing hardware;

    radio frequency (RF) transceiver hardware;

    a spectrum sensor configured to detect at least one of a potential spectrum policy violation, an accidental violation, a malicious violation, and a jamming;

    a cognitive collision detection and identification engine coupled to the spectrum sensor, the cognitive collision detection and identification engine configured to create a radio profile of radios, the radio profile including an RF fingerprint, received power level, trust level, associated behavior, associated strategy, Doppler variation, variation in received power level, directional movement and local positioning with respect to a particular radio node and store the radio profile in a database, the radio profile is correlated with media access control (MAC) addresses used, internet protocol (IP) addresses used, interference timing and collision rate to determine if a particular radio profile is at least one of a malicious violator, a non-malicious violator, a nonviolator, and trusted;

    a cognitive denial of service detection and identification engine coupled to the spectrum sensor; and

    a non-cooperation discriminator configured to;

    exchange information with at least one of a physical layer device (PHY) layer and a MAC layer of the radio node;

    adjust at least one of a first trust level of a radio profile associated with a first radio node and at least one second trust level of a radio profile associated with a second radio node in response to information received from at least one of the cognitive collision detection and identification engine, a cognitive denial of service detection and identification engine, and a sending radio node; and

    when the first trust level reaches a trust threshold or the first radio node is determined to be a malicious violator, execute a countermeasure other than jamming or attacking the first radio node, the countermeasure including at least one of (1) report to the at least one second radio node at least one of the first trust level and a strategy having a third level no higher than the second trust level, and (2) block forwarding of at least one packet received from the first radio node to the at least one second radio node without notifying the first radio node.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×