Various example embodiments of the present disclosure generally relate to the field of telecommunication and in particular, to methods, devices, apparatuses and computer readable storage media for attacker detection in ambient Internet of Things (IoT).
In 5G NR, IoT technology has evolved to be suitable for cellular deployment. Such IoT technology may rely on ultra-low complexity devices with ultra-low power consumption for the very-low end IoT applications. In terms of energy storage, two types of IoT devices are considered, that is, pure batteryless devices and devices with energy storage capability. In particular, the batteryless devices are with no energy storage capability, and completely dependent on the availability of the ambient source of energy it is harvesting. The devices with energy storage capability are supplied by ambient sources via energy harvesting, and thus may not need to be replaced or recharged manually and can manage a short period of ambient energy unavailability.
Those IoT devices are to be detected via a tag detection session. However, in the cellular-based deployment, there may be fraudulent devices intended to block or jam passive tag signals from reaching a tag reader. For example, the fraudulent devices may disturb the tag detection session by proactively or reactively emitting malicious or jamming signals, so that the NR network is prevented from acquiring tag information, and ultimately compromising the detection integrity.
In a first aspect of the present disclosure, there is provided an apparatus. The apparatus comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to perform: receive at least one signal which is at least associated with a trick tag signal transmitted from a terminal device; determine a number of attackers of a tag detection session based on the at least one signal; and transmit, to a network device, attacker information at least comprising the number of attackers.
In a second aspect of the present disclosure, there is provided an apparatus. The apparatus comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the apparatus at least to perform: receive, from a device, attacker information at least comprising a number of attackers of a tag detection session, wherein the number of attackers is determined based on at least one signal received at the device, and the at least one signal is at least associated with a trick tag signal transmitted from a terminal device.
In a third aspect of the present disclosure, there is provided a method. The method comprises: receiving at least one signal which is at least associated with a trick tag signal transmitted from a terminal device; determining a number of attackers of a tag detection session based on the at least one signal; and transmitting, to a network device, attacker information at least comprising the number of attackers.
In a fourth aspect of the present disclosure, there is provided a method. The method comprises: receiving, from a device, attacker information at least comprising a number of attackers of a tag detection session, wherein the number of attackers is determined based on at least one signal received at the device, and the at least one signal is at least associated with a trick tag signal transmitted from a terminal device.
In a fifth aspect of the present disclosure, there is provided an apparatus. The apparatus comprises means for receiving at least one signal which is at least associated with a trick tag signal transmitted from a terminal device; means for determining a number of attackers of a tag detection session based on the at least one signal; and means for transmitting, to a network device, attacker information at least comprising the number of attackers.
In a sixth aspect of the present disclosure, there is provided an apparatus. The apparatus comprises means for receiving, from a device, attacker information at least comprising a number of attackers of a tag detection session, wherein the number of attackers is determined based on at least one signal received at the device, and the at least one signal is at least associated with a trick tag signal transmitted from a terminal device.
In a seventh aspect of the present disclosure, there is provided a computer readable medium. The computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the third aspect.
In an eighth aspect of the present disclosure, there is provided a computer readable medium. The computer readable medium comprises instructions stored thereon for causing an apparatus to perform at least the method according to the fourth aspect.
It is to be understood that the Summary section is not intended to identify key or essential features of embodiments of the present disclosure, nor is it intended to be used to limit the scope of the present disclosure. Other features of the present disclosure will become easily comprehensible through the following description.
Some example embodiments will now be described with reference to the accompanying drawings, where:
Throughout the drawings, the same or similar reference numerals represent the same or similar element.
Principles of the present disclosure will now be described with reference to some example embodiments. It is to be understood that these embodiments are described only for the purpose of illustration and help those skilled in the art to understand and implement the present disclosure, without suggesting any limitation as to the scope of the disclosure. Embodiments described herein can be implemented in various manners other than the ones described below.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
References in the present disclosure to “one embodiment,” “an embodiment,” “an example embodiment,” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It shall be understood that although the terms “first,” “second” and the like may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the listed terms.
As used herein, “at least one of the following: <a list of two or more elements>” and “at least one of <a list of two or more elements>” and similar wording, where the list of two or more elements are joined by “and” or “or”, mean at least any one of the elements, or at least any two or more of the elements, or at least all the elements.
As used herein, unless stated explicitly, performing a step “in response to A” does not indicate that the step is performed immediately after “A” occurs and one or more intervening steps may be included.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof.
As used in this application, the term “circuitry” may refer to one or more or all of the following:
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
As used herein, the term “communication network” refers to a network following any suitable communication standards, such as New Radio (NR), Long Term Evolution (LTE), LTE-Advanced (LTE-A), Wideband Code Division Multiple Access (WCDMA), High-Speed Packet Access (HSPA), Narrow Band Internet of Things (NB-IoT) and so on. Furthermore, the communications between a terminal device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G), the second generation (2G), 2.5G, 2.75G, the third generation (3G), the fourth generation (4G), 4.5G, the fifth generation (5G) communication protocols, and/or any other protocols either currently known or to be developed in the future. Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting the scope of the present disclosure to only the aforementioned system.
As used herein, the term “network device” refers to a node in a communication network via which a terminal device accesses the network and receives services therefrom. The network device may refer to a base station (BS) or an access point (AP), for example, a node B (NodeB or NB), an evolved NodeB (eNodeB or eNB), an NR NB (also referred to as a gNB), a Remote Radio Unit (RRU), a radio header (RH), a remote radio head (RRH), a relay, an Integrated Access and Backhaul (IAB) node, a low power node such as a femto, a pico, a non-terrestrial network (NTN) or non-ground network device such as a satellite network device, a low earth orbit (LEO) satellite and a geosynchronous earth orbit (GEO) satellite, an aircraft network device, and so forth, depending on the applied terminology and technology. In some example embodiments, radio access network (RAN) split architecture comprises a Centralized Unit (CU) and a Distributed Unit (DU) at an IAB donor node. An IAB node comprises a Mobile Terminal (IAB-MT) part that behaves like a UE toward the parent node, and a DU part of an IAB node behaves like a base station toward the next-hop IAB node.
The term “terminal device” refers to any end device that may be capable of wireless communication. By way of example rather than limitation, a terminal device may also be referred to as a communication device, user equipment (UE), a Subscriber Station (SS), a Portable Subscriber Station, a Mobile Station (MS), or an Access Terminal (AT). The terminal device may include, but not limited to, a mobile phone, a cellular phone, a smart phone, voice over IP (VOIP) phones, wireless local loop phones, a tablet, a wearable terminal device, a personal digital assistant (PDA), portable computers, desktop computer, image capture terminal devices such as digital cameras, gaming terminal devices, music storage and playback appliances, vehicle-mounted wireless terminal devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE), laptop-mounted equipment (LME), USB dongles, smart devices, wireless customer-premises equipment (CPE), an Internet of Things (IoT) device, a watch or other wearable, a head-mounted display (HMD), a vehicle, a drone, a medical device and applications (e.g., remote surgery), an industrial device and applications (e.g., a robot and/or other wireless devices operating in an industrial and/or an automated processing chain contexts), a consumer electronics device, a device operating on commercial and/or industrial wireless networks, and the like. The terminal device may also correspond to a Mobile Termination (MT) part of an IAB node (e.g., a relay node). In the following description, the terms “terminal device”, “communication device”, “terminal”, “user equipment” and “UE” may be used interchangeably.
As used herein, the term “resource,” “transmission resource,” “resource block,” “physical resource block” (PRB), “uplink resource,” or “downlink resource” may refer to any resource for performing a communication, for example, a communication between a terminal device and a network device, such as a resource in time domain, a resource in frequency domain, a resource in space domain, a resource in code domain, or any other resource enabling a communication, and the like. In the following, unless explicitly stated, a resource in both frequency domain and time domain will be used as an example of a transmission resource for describing some example embodiments of the present disclosure. It is noted that example embodiments of the present disclosure are equally applicable to other resources in other domains.
As used herein, the term “fraudulent device”, “tag jammer”, or “attacker” may refer to a device that emit jamming signals to disturb a tag reading session. The tag jammer may be either proactive or reactive. The proactive jammer emits the jamming signals regardless of whether any tags are active or even present in a coverage area of the tag jammer. The reactive jammer monitors bands, and listens for tag activities, e.g., either activation signals, or tag replies. As soon as such activities are detected in any of the monitored bands, the reactive jammer may start jamming the associated spectrum.
As compared with the reactive jammers, the proactive jammers are less efficient and more easily detected. On the other hand, the reactive jammers are more aggressive, since they can concentrate their jamming powers in the resources that matter. Those tag jammers would severely threaten the integrity of tag detection in NR network.
If the NR network is able to detect the tag jammers in time, and accurately determine the number of the jammers, it is possible to locate those attackers and ensure the integrity of tag detection accordingly. However, detecting jamming attacks is a challenging task mainly because it involves distinguishing malicious behaviors from legitimate bad link conditions (e.g., caused by interference, fading, impulsive noise, hidden node, etc.) that cause poor performance.
According to the example embodiments of the present disclosure, there is provided a solution of attacker detection for ambient IoTs. In this solution, one NR network element (e.g., a UE) may act as a trick tag (TT) that emulates a tag to stimulate the attackers in the deployment. Another NR network element (e.g., a gNB or a UE) may act as a tag reader that observes a spectrum associated with the TT transmission and assesses whether the spectrum becomes polluted by additional signals, after the TT transmission has started. In this way, the tag reader can then profile the attackers of ambient IoTs. Such profiles may help the NR network against the attackers.
The reader device 110 may be either a terminal device (e.g., UE) or a network device (e.g., a gNB) that acts as a tag reader. The TT device 112 may be a terminal device (e.g., UE) that acts as a trick tag. In particular, the TT device 112 may mimic a tag to stimulate one or more attackers to react, so that the network device 120 can identify the malicious activity.
In some example embodiments, the TT device 112 may not wait for an activation signal, but transmit a tag signal as configured. This is done to avoid activating other random tags from also transmitting and thus hampering the attacker detection. Accordingly, the reader device 110 may monitor a spectrum for activation signal transmission and assesses whether the spectrum is polluted by additional signals.
Moreover, as shown in
It should be understood that although multiple attackers are shown in
In order to ensure the integrity of tag detection session, the network device 120 may be interested in the number of the attackers. For example, the network device 120 may be able to locate or at least determine a direction of the attack 130 relative to a network element in the communication network 100 based on the number of the attackers. In some example embodiments, the number of the attackers may be determined from at least a part of attacker detection procedure between the reader device 110 and the TT device 112, which will be described in detail below.
In the following, for the purpose of illustration, some example embodiments are described with the reader device 110 operating as a terminal device, and the TT device 112 operating as a network device. However, in some example embodiments, operations described in connection with a terminal device may be implemented at a network device or other device, and operations described in connection with a network device may be implemented at a terminal device or other device.
In some example embodiments, if the reader device 110 is a terminal device, a link from the network device 120 to the reader device 110 is referred to as a downlink (DL), while a link from the reader device 110 to the network device 120 is referred to as an uplink (UL). In DL, the network device 120 is a transmitting (TX) device (or a transmitter) and the reader device 110 is a receiving (RX) device (or a receiver). In UL, the reader device 110 is a TX device (or a transmitter) and the network device 120 is a RX device (or a receiver).
Communications in the communication environment 100 may be implemented according to any proper communication protocol(s), comprising, but not limited to, cellular communication protocols of the first generation (1G), the second generation (2G), the third generation (3G), the fourth generation (4G), the fifth generation (5G), the sixth generation (6G), and the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future. Moreover, the communication may utilize any proper wireless communication technology, comprising but not limited to: Code Division Multiple Access (CDMA), Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Frequency Division Duplex (FDD), Time Division Duplex (TDD), Multiple-Input Multiple-Output (MIMO), Orthogonal Frequency Division Multiple (OFDM), Discrete Fourier Transform spread OFDM (DFT-s-OFDM) and/or any other technologies currently known or to be developed in the future.
Example embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings.
Reference is now made to
The attacker detection process 200 may be implemented between the reader device 110, the TT device 112, and the network device 120. In particular, the TT device 112 may transmit a TT signal, which is referred to as an initialization signal. Such a TT signal may stimulate the attacker 130 react, for example, transmitting at least one signal in response to the TT signal. On the other hand, the reader device 110 may monitor a spectrum associated with the TT signal transmission, and profile if any signal from the attacker 130 is present. It should be understood that the attacker detection process 200 is applicable to both a case that a single attacker (e.g., attacker 130-1) is present and a case that multiple attackers (e.g., attackers 130-1 to 130-N) are present.
To facilitate the attacker detection process 200, the network device 120 may configure 205 the reader device 110 with a TT signal configuration. The network device 110 may also configure 210 the TT device 112 with the same or analogous TT signal configuration. The network device 120 may either simultaneously or sequentially transmit the TT signal configuration to the reader device 110 and the TT device 112.
In some example embodiments, the attacker detection process 200 may be triggered by the transmission of the TT signal configuration. The TT signal configuration may be transmitted over a secure link with the TT device 112 to prevent from being predicted by the attacker 130.
In addition, a location of the TT device 112 relative to the reader device 110 may be predetermined or estimated prior to starting the attacker detection procedure. For example, if the TT device 112 and the reader device 110 are NR UEs in RRC_CONNECTED mode, their relative locations may be derived by the network device 120 by using channel state information (CSI) obtained from primary synchronization signal (PSS), secondary synchronization signal (SSS), channel state information reference signal (CSI-RS), downlink positioning reference signal (DL PRS), uplink sounding reference signal (UL SRS), etc. Alternatively, the TT device 112 may be triggered to perform sidelink (SL) positioning with the reader device 110, that is, the TT device 112 is configured to transmit SL PRS that allow the reader device 110 to estimate the location of the TT device 112 and/or channel related parameters, e.g., propagation delay and path-loss. With the location information of the TT device 112, the reader device 110 is enabled to capture the total TT signal and not only later reflections.
The TT signal configuration may indicate at least the following parameters:
Based on the TT signal configuration, the TT device 112 may transmit the TT signal only in the active period TA, and mute in the first and second quiet periods TP1 and TP2, thus the TX power is zero.
The TT signal configuration for the reader device 110 may also indicate an observation window (denoted by W) that starts at Tstart and ends at Tstop, i.e., W=[Tstart, Tstop]. Tstart ensures that the reader device 110 can start listening at the right time so that the entire TT signal is made available for analysis. In view of this, Tstart may be proportional to a distance between the TT device 112 and the reader device 110.
The observation window comprises at least the first quiet period TP1, the active period of TA, and the second quiet period of TP2. In other words, the observation window W lasts for at least Tt=t1+T+t2 (e.g., in seconds).
The above configuration is given as one of various implementations of the TT signal. In some other example embodiments, it is possible to implement different variations of the TT signal, for instance without forcing the same TX power (e.g., the power P) for the whole active period T. As an example, the active period T may be divided in two halves, in the first T/2, the TT device 110 may transmit with power P1, while in the second T/2 with power P2.
Other functions or variations can be implemented as well. This may be beneficial to the attacker detection, as more complex “power modulation” functions are more difficult to be predicted by the attacker(s).
The TT device 112 may then transmit TT signals based on the TT signal configuration. In some example embodiments, the TT signal, denoted by s(t), is determined as below:
where the first quiet period TP1 ranges from 0 to t1, the active period TA ranges from t1 to t1+T, and the second quiet period TP2 ranges from t1+T to t1+T+t2. In the above example, the first quiet period TP1 starting from 0 is given as a default setting, which refers to the start time in relation to a known clock reference. It should be understood that the first quiet period may start from any appropriate time point preceding t1 in other example embodiments of the present disclosure. The transmitted (TX) powers of s(t) in the first quiet period TP1 and the second quiet period TP2 are constant and negligible, and the TX power b(t) in the active period TA is non-zero.
The TT signal may travel 215 to the reader device 110 over a channel with impulse response h(t), which is determined as below:
where ho represents a channel gain of the first propagation path, and τ0 represents its delay. Since the location of the TT device 112 relative to the reader device 110 has been computed by the network device 120, the delay τ0 is known. The second term of the equation (2) sums all other reflections.
In some example embodiments, since the attacker 130 may be reactive, their attacks may be expected at the reader device 110 after the first reception of the TT signal. In this case, the reader device 110 may monitor 220 the spectrum (e.g., spectral resources) associated with the TT signal during the observation window W.
In some example embodiments, the reader device 110 may measure the received power profile (RPP) for each of the intervals, i.e., the first quiet period TP1, the active period TA, and the second quiet period TP2. Depending on whether the attack 130 is present, different RPPs may be obtained by the reader device 110.
If no attacker is present, the RX signal should be dominated by the TT signal without jamming signals. In this case, the RPP during the active period T may be constant and non-negligible, for example, above a first threshold. In addition, the RPP during the first quiet period TP1 and the second quiet period TP2 may be negligible, e.g., below a second threshold (e.g., Pn≥0).
On the other hand, if at least one attacker 130 is present in the communication network 100, the TT signal may be also heard by the attacker 130. Referring back to
Accordingly, the attackers 130-1 to 130-N may transmit 235, 240 the attack signals. These attack signals may also reach the reader device 110 via respective channels. In particular, each of the attack signals may travel via a channel hx(t), which is determined as below.
As previously mentioned, the attack signals may be expected at the reader device 110 after the first reception of the TT signal, i.e., τx0>>τ0, ∀x=1:X. Therefore, in case that the attacker 130 is present, during the observation window W, the reader device 110 may observe a RX signal y(t) as below:
where the operator (*) denotes convolution.
In this case, the RPP during the active period T may exhibit a step behavior. This is because the attackers 130-1 to 130-N act unsynchronized (i.e., with respect to the TT device 112), and have different locations. Therefore, their attacks will be observed at different moments in time as seen by the reader device 110.
Accordingly, the reader device 110 determines 245 a number of attackers 130-1 to 130-N of the tag detection session based on the attack signal. In some example embodiments, if the power profile part in the active period TA is substantially flat and non-negligible (e.g., above the first threshold), and the power profile parts in the first and second quiet periods TP1 and TP1 non-negligible (e.g., below the second threshold), as shown in
Otherwise, if there is a step behavior in the power profile part in the active period T, the reader device 110 may increment 255 the number of the attackers 130 in a counter which may be integrated in the reader device or separate therefrom. In some example embodiments, when such step behavior is identified, the reader device 110 may be configured to log the number of steps for a subsequent reporting to the network device 120. The number of steps may be counted by using a counter that is expected to be proportional to the number of attackers 130.
In some example embodiments, the reader device 110 may determine the number of the attackers 130 based on the power profile. In particular, the reader device 110 may sample the RX signal every Ts, which is the sampling time of the system, and collect the samples in the vector, denoted by y, as below:
Using the collected samples, the reader device 110 may apply the following method which comprises the following main steps.
The power profile of the active period TA may comprise power levels in a plurality of bins of the active period TA. First, the reader device 110 may split the vector y into B vectors or bins as below:
where dt is the shortest time to attack i.e., the time that an attacker would take to detect the TT signal, switch to transmission, and generate and transmit the attack signal, e.g., approximately 1 microsecond. Note that, a gap period standardized in TS 38.211 to allow the TX-RX switch is around 13 microseconds.
Thus, bin b=1 is expected to be a reference bin, i.e., a bin dominated by the TT signal. Before the B bins, there may also have a bin with index 0, i.e., b=0, expected to receive the first quiet period TP1. With bin 0, it may be convenient to detect simpler non-reactive jammers.
After binning the samples, for each bin b, where b=1:B, the reader device 110 may compute a vector of RPP, denoted by RPP(b), and a vector of channel profile (CP), denoted by CP(b), as below
where * denotes cross-correlation, and |⋅|2 applies the squared absolute value to each entry of the vector y to which it is applied. Note that operation (8) describes a standard envelope detection in which the CP is isolated from the TX signal.
The reference bin b=1 is expected to contain the sole TT signal, therefore the operation (8) will return the approximate channel delay profile for the TT-reader channel i.e., the useful channel. The remaining bins contain in addition to the TT signal, the attacker signals, therefore the operation (8) will return a noisy TT-reader channel, where the noise level depends on the power and number of attackers 130. In the worst-case scenario, the useful channel may be completely drowned in noise, and operation (8) will return only the noise power profile.
Next, the reader device 110 may check if the RPP is negligible during the first and second quiet periods TP1 and TP2, and if the RPP exhibits a step behavior across bins corresponding to the active period TA, that is, if the RPP exhibits a step or a jump larger than a selected threshold between any two consecutive samples. For example, the jump may be positive or negative.
If a jump is detected between two consecutive samples, then the reader device 110 may increment an attacker counter c, e.g., c=c+1. Moreover, the reader device 110 may store a size of the jump. For example, the reader device 110 may compute a difference between the RPPs for the samples corresponding to the jump dp. In the context of the present disclosure, the size of the jump may be also referred to as a size of a step. It is to be understood that a size is related to a value corresponding to a measured power profile difference in any consecutive two RPPs.
Additionally, or alternatively, the reader device 110 may analyze the CP. For example, the reader device 110 may count the number of relevant taps (i.e., entries in the vector CP(b) with a value being above a threshold) in each bin, and compute a sparsity metric, for example, a bin sparsity metric S(b). The sparsity of a channel is a property of the channel impulse response when the channel is observed to exhibit a small number of multipath components.
The reader device 110 may compare the sparsity of each bin with index b>2 with that of the reference bin with index b=1. The reader device 110 may then determine the number of attackers 130 based on the sparsity metrics. For example, the reader device 110 may increment the counter c if both of the following conditions are met:
Otherwise, if all of the sparsity metrics are the same as the sparsity metric of the reference bin, the reader device 110 may determine the number of attackers 130 to be zero.
In the context of the present disclosure, the channel sparsity may refer to a property of a channel impulse response when said channel is observed to exhibit a small number of multipath components.
The metrics in the above operation (8) expresses the CP in a certain bin (e.g., CP (b)) with a distribution of the channel energy on different paths in a “delay” domain. Alternatively, other metrics may be used for expressing CP(b). For example, if the reader device 110 is equipped with multiple antennas, CP(b) may be expressed with a distribution of the channel energy in a “spatial” domain, which tries to exploit different angles of arrivals (AoAs) of different paths.
As an example, if the reader device 110 is equipped with N antennas, for each bin b, it may estimate a channel between the TT device 112 and its n-th antenna as below:
where y[b,n] represents a RX signal on bin b by n-th antenna. In this case, now the reader device 110 receives N signals, one for each antenna. The function ƒ represents a channel estimation algorithm. Such a channel estimation algorithm can be implemented by using a de-correlator as in operation (8), but other methods can also be used.
Then, the reader device 110 may compute a channel frequency response Hn(b) from the time domain representation hn(b) for each antenna n.
After that, for each bin b, the reader device 110 may estimate a covariance matrix R(b) (e.g., of size N×N),
The reader device 110 may also calculate its eigen-vector decomposition as below:
where the eigenvectors in U(b) represent spatial directions from which the energy is received at the reader device 110.
Therefore, a potential expression for CP(b) can be expressed as below:
where CP(b) is a matrix with each column representing a spatial direction from which some energy is received at the reader device 110.
Note that metric in operation (12) may be beneficial for example in a scenario where a lot of scatterers are around the reader device 110, so that the channel may be characterized by many paths, but all have a similar delay, i.e., they cannot be distinguished by using metric in operation (8), but can be separated because of their different AoA with a metric in operation (12).
It should be understood that the number of the attackers 130 may be determined based on the power profile of the attack signal alone, or based on a combination of the power profile and the channel profile of the attack signal. The present disclosure is not limited in this regard.
The reader device 110 then transmits 260 attacker information at least comprising the number of attackers 130-1 to 130-N to the network device 120. Additionally, in some example embodiments, the attacker information may further comprise a size of at least one step in the power profile part in the active period T. For example, the size of the at least one step may be a difference between a first power level of a first bin and a second power level of a second bin, where the first bin and the second bin are consecutive bins.
According to the example embodiments of the present disclosure, there is provided a solution of attacker detection in ambient IoTs. In this solution, the tag reader is able to identify the attacks that intend to block or jam tag sessions, and report attacker information to the NR network. This information helps the NR network to detect the attacks of ambient IoTs and take appropriate measures to ensure the integrity of the tag detection. Thus, network performances and communication reliability can be improved.
At block 510, the apparatus receives at least one signal which is at least associated with a trick tag signal transmitted from a terminal device.
In some example embodiments, the terminal device may act as the TT device 112 as shown in
At block 520, the apparatus determines a number of attackers of a tag detection session based on the at least one signal.
At block 530, the apparatus transmits, to a network device, attacker information at least comprising the number of attackers. In some example embodiments, the network device may be a gNB, for example, the network device 130 as shown in
In some example embodiments, the method 500 may further comprise: obtaining a power profile of the at least one signal, the power profile comprising power profile parts in a first quiet period, an active period, and a second quiet period; and determining the number of attackers based on the power profile.
In some example embodiments, the method 500 may further comprise: in accordance with a determination that the power profile part in the active period is above a first threshold and flat, and the power profile parts in the first and second quiet periods are below a second threshold, determining the number of attackers to be zero. It is to be understood that as in real life operations a power profile might not be completely flat due to the fact that devices may not operate in an ideal manner. Hence, herein, reference to flat power profile part in the active period may refer to a power profile part that is substantially flat or approximately flat.
In some example embodiments, the method 500 may further comprise: in accordance with a determination that there is a step in the power profile part in the active period, incrementing the count of the number of attackers.
In some example embodiments, the power profile part in the first quiet period may be below a second threshold, and the power profile part in the second quiet period is above the second threshold.
In some example embodiments, the method 500 may further comprise: in accordance with a determination that a difference between a first power level of a first bin and a second power level of a second bin is larger than a third threshold, determining that there is the step in the power profile part in the active period, the first bin and the second bin being consecutive bins.
In some example embodiments, the attacker information may further comprise a size of at least one step in the power profile part in the active period.
In some example embodiments, the method 500 may further comprise: obtaining a channel profile of the at least one signal, the channel profile at least comprising channel profile parts in a plurality of bins of an active period; determining sparsity metrics for the plurality of bins based on the channel profile parts; and determining the number of attackers based on the sparsity metrics.
In some example embodiments, the method 500 may further comprise: comparing sparsity metrics of the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and in accordance with a determination that all of the sparsity metrics are the same as the reference sparsity metric, determining the number of attackers to be zero.
In some example embodiments, the method 500 may further comprise: comparing a first sparsity metric of a first bin in the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and in accordance with a determination that the first sparsity metric is different from the reference sparsity metric, incrementing the count corresponding to the number of attackers.
In some example embodiments, the method 500 may further comprise: obtaining a power profile of the at least one signal, the power profile comprising power profile parts in a first quiet period, an active period, and a second quiet period; obtaining a channel profile of the at least one signal, the channel profile at least comprising channel profile parts in a plurality of bins of the active period; and determining the number of attackers based on the power profile and the channel profile.
In some example embodiments, the method 500 may further comprise: in accordance with a determination that the power profile part in the active period is above a first threshold and flat (or substantially flat), and the power profile parts in the first and second quiet periods are below a second threshold, comparing sparsity metrics of the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and in accordance with a determination that all the sparsity metrics are the same as the reference sparsity metric, determining the number of attackers to be zero.
In some example embodiments, the method 500 may further comprise: in accordance with a determination that there is a step in the power profile part in the active period, comparing a sparsity metric of a third bin associated with the step in the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and in accordance with a determination that the sparsity metric of the third bin is different from the reference sparsity metric, incrementing the count of the number of attackers.
In some example embodiments, the at least one signal may comprise a plurality of signals, and each of the plurality of the signals is received through a respective one of a plurality of antennas of the apparatus.
In some example embodiments, the method 500 may further comprise: receiving, from the network device, a configuration indicative of a first quiet period, an active period, and a second quiet period of the trick tag signal.
In some example embodiments, the apparatus may be a further terminal device or a further network device.
At block 610, the apparatus receives, from a device, attacker information at least comprising a number of attackers of a tag detection session. The number of attackers is determined based on at least one signal received at the device, and the at least one signal is at least associated with a trick tag signal transmitted from a terminal device.
In some example embodiments, the attacker information may further comprise a size of at least one step in a power profile part in an active period, and the power profile part is a part of a power profile of the at least one signal.
In some example embodiments, the method 600 may further comprise: transmitting, to the device, a configuration indicative of a first quiet period, an active period, and a second quiet period of the trick tag signal.
In some example embodiments, the apparatus may be a network device, and the device may be a further terminal device or a further network device.
In some example embodiments, an apparatus, which is also referred to as a first apparatus hereafter, capable of performing any of the method 500 (for example, the reader device 110 in
In some example embodiments, the first apparatus comprises means for receiving at least one signal which is at least associated with a trick tag signal transmitted from a terminal device; means for determining a number of attackers of a tag detection session based on the at least one signal; and means for transmitting, to a network device, attacker information at least comprising the number of attackers.
In some example embodiments, the first apparatus further comprises: means for obtaining a power profile of the at least one signal, the power profile comprising power profile parts in a first quiet period, an active period, and a second quiet period; and means for determining the number of attackers based on the power profile.
In some example embodiments, the first apparatus further comprises: means for in accordance with a determination that the power profile part in the active period is above a first threshold and flat (or substantially flat), and the power profile parts in the first and second quiet periods are below a second threshold, determining the number of attackers to be zero.
In some example embodiments, the first apparatus further comprises: means for in accordance with a determination that there is a step in the power profile part in the active period, incrementing the count of the number of attackers.
In some example embodiments, the power profile part in the first quiet period is below a second threshold, and the power profile part in the second quiet period is above the second threshold.
In some example embodiments, the first apparatus further comprises: means for in accordance with a determination that a difference between a first power level of a first bin and a second power level of a second bin is larger than a third threshold, determining that there is the step in the power profile part in the active period, the first bin and the second bin being consecutive bins.
In some example embodiments, the attacker information further comprises a size of at least one step in the power profile part in the active period.
In some example embodiments, the first apparatus further comprises: means for obtaining a channel profile of the at least one signal, the channel profile at least comprising channel profile parts in a plurality of bins of an active period; means for determining sparsity metrics for the plurality of bins based on the channel profile parts; and means for determining the number of attackers based on the sparsity metrics.
In some example embodiments, the first apparatus further comprises: means for comparing sparsity metrics of the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and means for in accordance with a determination that all of the sparsity metrics are the same as the reference sparsity metric, determining the number of attackers to be zero.
In some example embodiments, the first apparatus further comprises: means for comparing a first sparsity metric of a first bin in the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and means for in accordance with a determination that the first sparsity metric is different from the reference sparsity metric, incrementing the count of the number of attackers.
In some example embodiments, the first apparatus further comprises: means for obtaining a power profile of the at least one signal, the power profile comprising power profile parts in a first quiet period, an active period, and a second quiet period; means for obtaining a channel profile of the at least one signal, the channel profile at least comprising channel profile parts in a plurality of bins of the active period; and means for determining the number of attackers based on the power profile and the channel profile.
In some example embodiments, the first apparatus further comprises: means for in accordance with a determination that the power profile part in the active period is above a first threshold and flat (or substantially flat), and the power profile parts in the first and second quiet periods are below a second threshold, comparing sparsity metrics of the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and means for in accordance with a determination that all the sparsity metrics are the same as the reference sparsity metric, determining the number of attackers to be zero.
In some example embodiments, the first apparatus further comprises: means for in accordance with a determination that there is a step in the power profile part in the active period, comparing a sparsity metric of a third bin associated with the step in the plurality of bins with a reference sparsity metric of a reference bin affected by the trick tag signal; and means for in accordance with a determination that the sparsity metric of the third bin is different from the reference sparsity metric, incrementing the count of the number of attackers.
In some example embodiments, the at least one signal comprises a plurality of signals, and each of the plurality of the signals is received through a respective one of a plurality of antennas of the apparatus.
In some example embodiments, the first apparatus further comprises: means for receiving, from the network device, a configuration indicative of a first quiet period, an active period, and a second quiet period of the trick tag signal.
In some example embodiments, the first apparatus is a further terminal device or a further network device.
In some example embodiments, the first apparatus further comprises means for performing other operations as described in the example embodiments of the method 500 or the reader device 110. In some example embodiments, the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the first apparatus as disclosed herein.
In some example embodiments, an apparatus, also referred to as a second apparatus, capable of performing any of the method 600 (for example, the network device 120 in
In some example embodiments, the second apparatus comprises means for receiving, from a device, attacker information at least comprising a number of attackers of a tag detection session, wherein the number of attackers is determined based on at least one signal received at the device, and the at least one signal is at least associated with a trick tag signal transmitted from a terminal device.
In some example embodiments, the attacker information further comprises a size of at least one step in a power profile part in an active period, and the power profile part is a part of a power profile of the at least one signal.
In some example embodiments, the second apparatus further comprises: means for transmitting, to the device, a configuration indicative of a first quiet period, an active period, and a second quiet period of the trick tag signal.
In some example embodiments, the second apparatus is a network device, and the device is a further terminal device or a further network device.
In some example embodiments, the second apparatus further comprises means for performing other operations as described in some example embodiments of the method 600 or the network device 120. In some example embodiments, the means comprises at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the performance of the second apparatus.
The communication module 740 is for bidirectional communications. The communication module 740 has one or more communication interfaces to facilitate communication with one or more other modules or devices. The communication interfaces may represent any interface that is necessary for communication with other network elements. In some example embodiments, the communication module 740 may include at least one antenna.
The processor 710 may be of any type suitable to the local technical network and may include one or more of the following: general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The device 700 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
The memory 720 may include one or more non-volatile memories and one or more volatile memories. Examples of the non-volatile memories include, but are not limited to, a Read Only Memory (ROM) 724, an electrically programmable read only memory (EPROM), a flash memory, a hard disk, a compact disc (CD), a digital video disk (DVD), an optical disk, a laser disk, and other magnetic storage and/or optical storage. Examples of the volatile memories include, but are not limited to, a random access memory (RAM) 722 and other volatile memories that will not last in the power-down duration.
A computer program 730 includes computer executable instructions that are executed by the associated processor 710. The instructions of the program 730 may include instructions for performing operations/acts of some example embodiments of the present disclosure. The program 730 may be stored in the memory, e.g., the ROM 724. The processor 710 may perform any suitable actions and processing by loading the program 730 into the RAM 722.
The example embodiments of the present disclosure may be implemented by means of the program 730 so that the device 700 may perform any process of the disclosure as discussed with reference to
In some example embodiments, the program 730 may be tangibly contained in a computer readable medium which may be included in the device 700 (such as in the memory 720) or other storage devices that are accessible by the device 700. The device 700 may load the program 730 from the computer readable medium to the RAM 722 for execution. In some example embodiments, the computer readable medium may include any types of non-transitory storage medium, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like. The term “non-transitory,” as used herein, is a limitation of the medium itself (i.e., tangible, not a signal) as opposed to a limitation on data storage persistency (e.g., RAM vs. ROM).
Generally, various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of embodiments of the present disclosure are illustrated and described as block diagrams, flowcharts, or using some other pictorial representations, it is to be understood that the block, apparatus, system, technique or method described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
Some example embodiments of the present disclosure also provide at least one computer program product tangibly stored on a computer readable medium, such as a non-transitory computer readable medium. The computer program product includes computer-executable instructions, such as those included in program modules, being executed in a device on a target physical or virtual processor, to carry out any of the methods as described above. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, or the like that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Machine-executable instructions for program modules may be executed within a local or distributed device. In a distributed device, program modules may be located in both local and remote storage media.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. The program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagrams to be implemented. The program code may execute entirely on a machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present disclosure, the computer program code or related data may be carried by any suitable carrier to enable the device, apparatus or processor to perform various processes and operations as described above. Examples of the carrier include a signal, computer readable medium, and the like.
The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable medium may include but not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of the computer readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are contained in the above discussions, these should not be construed as limitations on the scope of the present disclosure, but rather as descriptions of features that may be specific to particular embodiments. Unless explicitly stated, certain features that are described in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, unless explicitly stated, various features that are described in the context of a single embodiment may also be implemented in a plurality of embodiments separately or in any suitable sub-combination.
Although the present disclosure has been described in languages specific to structural features and/or methodological acts, it is to be understood that the present disclosure defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Number | Date | Country | Kind |
---|---|---|---|
2303502.5 | Mar 2023 | GB | national |