-
公开(公告)号:US20220124503A1
公开(公告)日:2022-04-21
申请号:US17545721
申请日:2021-12-08
Applicant: INTEL CORPORATION
Inventor: Liuyang Lily Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
IPC: H04W12/12 , H04W4/40 , H04W12/06 , H04L9/32 , H04W12/122
Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
-
公开(公告)号:US11277406B2
公开(公告)日:2022-03-15
申请号:US16455862
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Xiruo Liu , Rafael Misoczki , Santosh Ghosh , Manoj Sastry
Abstract: In one example a prover device comprises one or more processors, a computer-readable memory, and signature logic to store a first cryptographic representation of a first trust relationship between the prover device and a verifier device, the first cryptographic representation based on a pair of asymmetric hash-based multi-time signature keys, receive an attestation request message from the verifier device, the attestation request message comprising attestation data for the verifier device and a hash-based signature generated by the verifier device, and in response to the attestation request message, to verify the attestation data, verify the hash-based signature generated by the verifier device using a public key associated with the verifier device, generate an attestation reply message using a hash-based multi-time private signature key and send the attestation reply message to the verifier device. Other examples may be described.
-
公开(公告)号:US10805086B2
公开(公告)日:2020-10-13
申请号:US15848785
申请日:2017-12-20
Applicant: INTEL CORPORATION
Inventor: Mohammed Karmoose , Rafael Misoczki , Liuyang Yang , Xiruo Liu , Moreno Ambrosin , Manoj R. Sastry
Abstract: Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.
-
公开(公告)号:US20190387401A1
公开(公告)日:2019-12-19
申请号:US16480267
申请日:2018-04-16
Applicant: INTEL CORPORATION
Inventor: Ching-Yu Liao , Xiruo Liu , Liuyang Yang , Moreno Ambrosin
Abstract: Systems and methods are provided for efficient group-based handling of massive internet of things (M-IoT) devices that are compatible with both current cellular networks, and next generation 5G systems. Examples allow reduced overhead between a (radio) access network (R)AN and a core network (CN) that originates from unnecessary signaling traffic for IoT devices transitioning from IDLE to CONNECTED mode, especially when sending small data packets. In addition, or in other embodiments, mobility solutions are provided for group based M-IoT.
-
公开(公告)号:US10341116B2
公开(公告)日:2019-07-02
申请号:US15392266
申请日:2016-12-28
Applicant: Intel Corporation
Inventor: Xiruo Liu , Rafael Misoczki , Manoj R Sastry , Santosh Ghosh , Li Zhao
Abstract: An attestation protocol between a prover device (P), a verifier device (V), and a trusted third-party device (TTP). P and TTP have a first trust relationship represented by a first cryptographic representation based on a one-or-few-times, hash-based, signature key. V sends an attestation request to P, with the attestation request including a second cryptographic representation of a second trust relationship between V and TTP. In response to the attestation request, P sends a validation request to TTP, with the validation request being based on a cryptographic association of the first trust relationship and the second trust relationship. TTP provides a validation response including a cryptographic representation of verification of validity of the first trust relationship and the second trust relationship. P sends an attestation response to V based on the validation response.
-
公开(公告)号:US20190044728A1
公开(公告)日:2019-02-07
申请号:US15848785
申请日:2017-12-20
Applicant: INTEL CORPORATION
Inventor: Mohammed Karmoose , Rafael Misoczki , Liuyang Yang , Xiruo Liu , Moreno Ambrosin , Manoj R. Sastry
CPC classification number: H04L9/3242 , G08G1/22 , H04L9/0637 , H04L9/0643 , H04L9/12 , H04L9/14 , H04L9/30 , H04L9/3297 , H04L61/6022 , H04L2209/80 , H04L2209/84
Abstract: Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.
-
27.
公开(公告)号:US20190039612A1
公开(公告)日:2019-02-07
申请号:US16145285
申请日:2018-09-28
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin , Shabbir Ahmed , Marcio Juliato , Christopher N. Gutierrez
IPC: B60W30/095 , B60W40/02 , G01S5/00
Abstract: In an automated method for providing driving assistance, an electronic control unit (ECU) of a first driving assistance system of a first vehicle receives local object information from at least one sensing component of the first driving assistance system. The first driving assistance system automatically detects external objects outside of the first vehicle, based on the local object information received from the at least one sensing component. The first driving assistance system also receives a reported object list (ROL) from a second vehicle, wherein the ROL describes objects detected by a second driving assistance system in the second vehicle. The first driving assistance system also affects operation of the first vehicle, based on (a) the external objects detected by the first vehicle and (b) the ROL from the second vehicle. Other embodiments are described and claimed.
-
28.
公开(公告)号:US12045348B2
公开(公告)日:2024-07-23
申请号:US17867780
申请日:2022-07-19
Applicant: INTEL CORPORATION
Inventor: Christopher N. Gutierrez , Marcio Juliato , Shabbir Ahmed , Qian Wang , Manoj Sastry , Liuyang L Yang , Xiruo Liu
IPC: G06F21/56
CPC classification number: G06F21/566 , G06F2221/034
Abstract: Logic may implement observation layer intrusion detection systems (IDSs) to combine observations by intrusion detectors and/or other intrusion detection systems. Logic may monitor one or more control units at one or more observation layers of an in-vehicle network, each of the one or more control units to perform a vehicle function. Logic may combine observations of the one or more control units at the one or more observation layers. Logic may determine, based on a combination of the observations, that one or more of the observations represent an intrusion. Logic may determine, based at least on the observations, characteristics of an attack, and to pass the characteristics of the attack information to a forensic logging system to log the attack or pass the characteristics of the attack to a recovery system for informed selection of recovery procedures. Logic may dynamically adjust a threshold for detection of suspicious activity.
-
公开(公告)号:US11930365B2
公开(公告)日:2024-03-12
申请号:US17742890
申请日:2022-05-12
Applicant: Intel Corporation
Inventor: Liuyang Yang , Xiruo Liu , Manoj Sastry , Marcio Juliato , Shabbir Ahmed , Christopher Gutierrez
IPC: G06F21/00 , G06F13/40 , H04W12/00 , H04W12/122
CPC classification number: H04W12/122 , G06F13/40 , H04W12/009
Abstract: Systems, apparatus, methods, and techniques for reporting an attack or intrusion into an in-vehicle network are provided. The attack can be broadcast to connected vehicles over a vehicle-to-vehicle network. The broadcast can include an indication of a sub-system involved in the attack and can include a request for assistance in recovering from the attack. Connected vehicles can broadcast responses over the vehicle-to-vehicle network. The responses can include indications of data related to the compromised sub-system. The vehicle can receive the responses and can use the responses to recover from the attack, such as, estimate data.
-
公开(公告)号:US11553346B2
公开(公告)日:2023-01-10
申请号:US16729250
申请日:2019-12-27
Applicant: Intel Corporation
Inventor: Liuyang Lily Yang , Manoj R. Sastry , Xiruo Liu , Moreno Ambrosin
Abstract: A first roadway system receives a communication from a second roadway system over a wireless channel, where the communication includes a description of a physical object within a driving environment. Characteristics of the physical object are determined based on sensors of the first roadway system. The communication is determined to contain an anomaly based on a comparison of the description of the physical object with the characteristics determined based on the sensors of the first roadway system. Misbehavior data is generated to describe the anomaly. A remedial action is initiated based on the anomaly.
-
-
-
-
-
-
-
-
-