WO2016207243A1 - Method and system for checking the authenticity of received data - Google Patents

Method and system for checking the authenticity of received data

Info

Publication number
WO2016207243A1
WO2016207243A1 PCT/EP2016/064463 EP2016064463W WO2016207243A1 WO 2016207243 A1 WO2016207243 A1 WO 2016207243A1 EP 2016064463 W EP2016064463 W EP 2016064463W WO 2016207243 A1 WO2016207243 A1 WO 2016207243A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
data
wireless
system
unit
angle
Prior art date
Application number
PCT/EP2016/064463
Other languages
German (de)
French (fr)
Inventor
Richard Roskosch
Stefan Schwarzer
Original Assignee
Siemens Aktiengesellschaft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/10Integrity
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/04Position of source determined by a plurality of spaced direction-finders

Abstract

The invention relates to a method and to a system for checking the authenticity of received data in a more secure manner for the authenticity of the received data involving no or only little additional expense while offering the advantage of providing additional functionalities. According to the invention the location of the transmitting unit is ascertained and checked against stored location information by infrastructure components, which without further action by the participating communication partners evaluate the data packets sent during the data transmission for the purpose of determining the location.

Description

description

Method and system for verifying the authenticity of received data

The invention relates to a method for verifying the authenticity of transmitted or received data according to the preamble of claim 1. The invention relates to moving ¬ chen further purpose a system according to the preamble of the claim. 4

By radio or wirelessly linked to an infrastructure or embedded machines, plants, plant parts such as sensors and / or actuators, control units or other data transmitting units are playing an ever increasing role in industrial environments. This must be linked a growing number of, for example, sensors and / or actuators that ever more powerful and more intelligent systems cause with ever larger amounts of data to be transmitted.

So the networking of systems via radio in the age of "Industry 4.0" and the "Internet of Things" brings many pros ¬ share with them, such as a large installation flexibility by eliminating permanently installed communication lines. In contrast, the networking of systems via radio also brings some problems with it, which are absent in the case connected by wire components. In wireless systems in industrial environments, special emphasis must be placed on the reliability of data transmission, the determination of the authenticity of received data and manipulation immunity to caused for example by jamming hervorge ¬ called interference or by third parties onsversuchen. Particularly for larger systems with a corresponding number of networked by radio subsystems is to be feared that can be limited by disruptions or manipulations of the entire system in its function or for shutting ¬ was brought.

In the professional world, it is known that in terms of wireless networks is for example the possibility of encrypted Übertra ¬ supply in accordance with the so-called WPA2 method. It is therefore a third party not readily possible to listen übertra ¬ generate useful data or assume the role of the legitimate communication partners and to sell fake data.

However, the encryption is reaching its limits when third parties bring the network password in experience. This could be done, for example, that a third party obtains physical access to a network subscriber, so stolen, for example, a wireless sensor from the network and reads out with expertise, signal stored in said device in a corresponding form network password from the ¬ sem device.

It is also especially with short and / or simple network passwords is a risk that a third party simply given ¬ if automated conducted communication attempts ausfindet the network password manufacturer by a corresponding number. This process is characterized as a "brute force attack" be ¬.

Also known as the MAC address of a network subscriber with comparatively little effort can be replicated, can be so that the authenticity of a network subscriber in case of found-out Network Password nachge ¬ forms.

Here methods and systems could further improve the safety of such a network by providing more options for authentication of the individual communication partners. At best, little or no additional cost to ¬ should be caused by such methods and systems.

Another problem could be jammers that interfere with a radio network intentionally or due to technical malfunction.

For example, if the entire usable for a so-called wireless LAN network frequency range by a corresponding jamming, known in the art as "WLAN jammer" or "wireless Blocker", covered with suitable high-frequency signals, the transmission of WLAN packets can be greatly slowed or be completely prevented. With conventional solutions, although this circumstance can be determined and, for example, on the evaluation of information of different so-called ac- cess Points also an easy way of locating the

Be jammer run, but an elegant solution Lö ¬ missing for rapid localization of the jammer.

The problems mentioned result in a similar way also in other radio standards used in the industrial environment. For example, there is the possibility of an encrypted transmission, in the art as so-called AES-128 transmission, however, finding the key would open up third also the possibility to manipulate even when so-called WirelessHART standard.

Particularly clever solutions to the above problems would arise if they would offer caused little additional effort and costs or no additional or, in the industrial environment good useful additional functions.

The object of the present invention is, starting from a method and a system with appropriate infrastructure components of the aforementioned type to improve it in such a way that the problems described above are solved or at least improved, thereby causing little or no additional effort and costs are necessary or additional, well-usable additional functionali ¬ activities in industrial environments.

This object is achieved by a process of ren respect procedural having the attached give ¬ nen in the characterizing part of claim 1 process step. This object is furthermore be ¬ züglich of the system achieved by a system having the feature stated in the characterizing part of claim 6. Advantageous embodiments of the invention are the subject of the respective dependent claims.

The solutions have the fundamental advantage of being at least solve some of these problems, or at least improve. In particular, they provide additional functions such as a Ortungsfunkti ¬ on that can be used well in an industrial environment advantageously at comparatively low additional Aufwänden. The inventive step lies in the elegant extension common, standards-based systems for data transmission in industrial environments to provide an additional check the authenticity of received data with enhanced security. For this is determined by appropriate infrastructure components required in addition to the already data transmission of the location of the transmitter of transmitted data packets and checked against a stored location information.

For the implementation of such functionality, it is not necessary to change the mobile unit in terms of hardware or software. Also the appropriate communica ¬ tion partner must, for example, the WLANZugangsknoten are not necessarily changed for locating functionality. The location information obtained can also further

Functions are used in a system, such as the control of an autonomously moving transport carriage, whereby a multiple benefits for the installed infrastructure components is obtained. As a result of such a system of high benefits in relation to efforts and costs. Possible variants of the internal structure of the infrastructure equipment and the procedures for determining the angle of incidence of the wave fronts of high frequency electromagnetic signals on antennas can be considered as prior art. With most of the known variants results in an additional benefit because the presence and localization of jammers with the same infrastructure components are also possible.

Upon receipt of a sent from a radio transmitter Datenpa- Ketes is always determined by the installed infrastructure components, the position of the transmitter in the room and compared with corresponding data sets. The data packet is considered among other things, only valid when the determined position within the accuracy of measurement coincides with the stored values ​​in the data set. Thus, an additional testing facility for the authenticity of received data results on the position determination. For others it would be addressed ¬ difficult to depose manipulated data packages and simultaneously to provoke an appropriate position value in the infra- structure components.

In principle, no additional measures in the hardware or the software sector to be taken on the side of the sending unit for determining the position value. It is sufficient that the transmitting entity settles data packets.

Thus, no to ¬ sätzlichen costs, which installed especially in a larger number wireless sensors or wireless actuators built on the side of the transmitting unit appears very beneficial.

On the side of the infrastructure components, the data packets are received and decoded. Additionally geeigne ¬ th antennas and receivers of each infrastructure component installed an incoming angle of light emitted from the transmitter signal of the relevant data packet is ermit ¬ telt. the positions of the transmitters are determined using trigonometric functions from the determined spatial angles. The installation of redundant components Infrastrukturkompo ¬ improved fail-safety and accuracy of the system. In addition to other measures, such as an encrypted data transfer or test a MAC address, the authenticity of data obtained as already described are tested using the ermittel ¬ th position values. Of course, the position data obtained for other functions in the industrial environment can be used, for example, to determine the position of movable systems in the area.

In principle, the method / system described can be applied to many industrial environments wireless standards used. Examples include the WLAN or the

WirelessHART standard and / or others.

The Infrastrukturkompo ¬ components described in more detail in the following can be used for other functions. It can jammers such as "WiFi jammer" or "Wireless blocker" or due to a defect interfering devices are made fixed and located. In particular, the location function can be very helpful for you to quickly locate the offending device.

The method / system shown is by additional functionalities such as "positioning" and "detection and location of jammers" and low expenses, since only specific infrastructure components are needed and little or no effort on the side of wireless sensors relationship ¬ as wireless actuators consist particularly advantageous.

The first illustrating the operation principle of the pre ¬ presented method / system of the invention is shown in FIG 1 of the drawing, are provided in the same in the other parts with the same reference characters, an exemplary Anord ¬ voltage, here on the basis of a WLAN system.

In each of the four corners of the room 1, an infrastructure is component 2, 3, 4, 5, referred to herein as "multi-channel wireless receiver," installed. In space, a mobile wireless device is 6. This could be, for example, be a system unit, which is equipped with a WLAN radio interface 7. There is an example bi-directional 1er data exchange 8 between the mobile wireless unit 6 and a WLAN access node 9 instead. This data exchange is handled exactly as it without would take place in the space in ¬ stallierte components more. in addition to the wireless access node 9, the data packets are 10 now also received by the multi-channel wireless receiver 2, 3, 4, 5. the multi-channel wireless receiver 2, 3, 4, 5 determine a respective angle Φι, ct> 2 and so on for the direction from which the WLAN packet in relation to the respective reference angle, for example, a 90 ° -. was received angle to the antenna surface, the multi-channel wireless receiver 2, 3, 4, 5 are, for example, by a permanently installed LAN network with a central unit (not shown in detail in the figure) and transmit the sustainer ¬ requested angle values for each received data packet 10 to a central unit. Since the position of the installed multi-channel wireless receiver 2, 3, 4, 5 is known, as well as the reference angle may be from the central unit with the help of trigonometri ¬'s functions in a simple way, the position 11 of the mobi ¬ len wireless device 6 in the room are determined. 1 The positions of the infrastructure components 2, 3, 4, 5 and 6 of the mobile wireless device are in the Figure 1 as an xy coordinate xi / yi, x 2 / y 2, xs / ys,

Figure imgf000009_0001
and Xcerät / Ycerät a superimposed x / y-coordinate system starting from a zero point ¬ 0/0 of the superimposed x / y-coordinate system given.

The wireless access node 9 can also be connected via LAN to the central unit and then the position information along with the net capacity of the data packets 10 BEITEN weiterverar- and the data obtained refer to higher-level units. The audit received data packets 10 on authenticity can be done in the central unit.

Figure 2 of the drawing shows an exemplary flow diagram for a communication and authentication process in accordance with the method described above. In detail, the blocks are 12 to 23 repeat procedure ¬ ge for the following principle:

12: request for new trial data by the Central Unit; 13: Sending a wireless data packet to query new pro ¬ process data;

14: processing the request in the mobile wireless device, determining the new process data;

15: Encrypted sending the new process data by the mobile wireless device;

16: receiving and decrypting the data packet from the WLAN

Access node;

17: transmitting the received data to the central unit via a LAN;

18: checking the authenticity of the obtained data in the central unit on the basis:

- MAC address of the mobile wireless device;

- checksum of the decrypted data;

- plausibility test for the new process data;

- Examination of the location information (comparison use saved);

19: Received data authentic?

20: transmitting the received measured values to a higher level system, optionally together with the local Informa ¬ functions to the mobile wireless device;

21: receiving the data packet by the multi-channel wireless receiver 2 to 5, determining the respective angle of incidence of the wireless packets;

22: communicating the angle of incidence in each case determined at ¬ together with edge information about the respective data packet by each of the four multi-channel wireless receiver to the central unit via a LAN;

23: Report of a non-authentic data packet along with details for the operation.

According to the Figure 2 process data is retrieved and transmitted. The dashed blocks in the flow chart containing at least partially steps relating to the new procedure, that is the determination of the location of the mobile wireless device and the additional check of authenticity are received, ¬ gener data packets based on the location information. It can be easy to see that the essential steps in the communication process to be completed as well as without a ¬ set of locating method, and that for determining the location of the mobile wireless device no additional interaction Zvi ¬ rule the mobile wireless device and the multi-channel wireless - recipients is required. Rather, the communication between the mobile wireless device and the wireless access point runs in the same way as from without locating functionality. The multi-channel wireless receiver evaluate the transmitted wireless data packets from only addition.

The method itself used in the wireless multi-channel receiver for determining the angle of incidence of light incident on antennas wavefronts of a high-frequency signal to those skilled in terms such as "Angle of Arrival (AoA) Estimation" or "Angle of Arrival (AoA) Measurement" be ¬ known. The present case relates solely to the application of the angle information obtained for the purpose of authentication received radio packets with the

Additional benefits of the possibility of locating the sending unit.

On the basis of Figure 1 is also the detection and location of jammers or defective devices may be described.

for example, is located in place of the mobile WLANGerätes 6 a jammer in space 1, so although no communication is one in place between the jammer and the WLAN access point 9, but the wireless access node 9 could determine, under certain circumstances, that this disturbing data packets are dropped or that requests for communication partners remain un- answered and report this to the central unit.

The multi-channel wireless receiver 2, 3, 4, 5, however, can also receive interfering signals for receiving various high-frequency signals in the appropriate frequency range, even if the signals are not standard at a suitable internal design, for example as facilities and also the angle to the source of interference determine. Both information can be transmitted to the central unit 5 of each of the multi-channel wireless receiver 2, 3, 4, where, in turn, determines a position 11 in the room 1 and a corresponding message can be issued to a übergeord ¬ designated unit. By sending a location information of the jammers can be made within the room one more quickly identify, as would be the case for example in the identification of problems in the area of ​​a wireless access point. 9

As mentioned above, the method and system described may also in other wireless standards such as

WirelessHART be used in a similar manner.

As mentioned above, it may under certain circumstances be required that an encrypted communication between sensors, actuators, machinery and plant components and so on and the infrastructure components take place must relate hung instance that the communication partners must authenticate each other in the course of settlement. The method described above, radio-transmitted data packets "ERS ¬ listen" to win an angle information, also works for the transmission of encrypted data packets, since these data packets are transmitted within the so-called data frames, the edge information remains even unencrypted. Thus, in carried out generally at least in the Hin ¬ view of the directly participating communication partners, as before, an angle measurement and the assignment of the angle determined for each device. for the implementation of the angle measurement, no complete decoding is required tion / decryption of the data packet.

To further clarify the above details the invention, some more practical embodiments will be explained with reference to the drawing below.

These show as already addressed

1 shows an exemplary system of the invention on the

Based on a wireless system; and

2 shows an exemplary process according to the invention flow diagram for a communication and authentication; He continues: 3 shows a system with plant components and mobile

Devices as a first concrete Ausführungsbei ¬ play of the invention;

4 shows a multi-channel wireless receiver combined with a

WLAN access points as a second exemplary embodiment of the invention, game for use in a system according to Figure 3;

5 shows a mobile control unit for production facilities and manufacturing plants as a third embodiment of the invention for use in a system according to Figure 3; and

6 shows a production line according to FIG 5 with conven tional ¬ position detection with transponders.

Is similar in the Figure 3 to the Figure 1, in turn, the floor plan of a room 1 is shown. This is now actually a production hall where a number of production cells or production sections 24 are located. In these manufacturing cells sensors or machines or plant sections 25 and so installed that are equipped with WLANFunkschnittstellen 7 are. The data exchange between these machines and plant components with a higher-level unit is principles-Piell place via the WLAN access point 9A. For redundancy, the wireless access node 9B is additionally installed. In addition, running in specific areas of the production hall two autonomous industrial trucks 26 with Wi-Funkschnitt- represent around 7, transport the parts from one processing station to the next.

From the sensors, machines and parts of the system 25 sent data packets still thentizität on Au in addition to an encrypted transmission according to a so-called WPA2 protocol tested by by the above-described manner, the location of the transmitter by "listening" to the sent wireless data packets is the four installed multi-channel wireless receiver 2, 3, 4, 5 and an evaluating central processing unit which is not shown in detail in Figure 3, determined and overall a list of the installation sites of the various sensors, machines and components 25 gen checked . This leads to increased safety for the WLAN radio network to manipulation by third parties. a parent unit also controls the autonomous propelled industrial trucks 26 by their WLANFunkschnittstellen 7 communicate with the wireless access point 9A or 9B data. the data packets sent by the floor conveyors 26 are additionally also from the four in stal- Herten multichannel wireless receivers 2, 3, 4, "tapped" 5, whereby the current position of the industrial trucks 26 is determined also on the manner described above. This he ¬ mittelte position can now on the one hand are ge ¬ checked for plausibility, for example in that it is determined whether the coordinate currently determined is close to the previously ermittel ¬ th coordinate, as well as the current Positionsinfor ¬ mation, optionally in addition to measurement data a laser scanner or the like, for further processing. Thus, the proposed solution ER- höht also with regard to the mobi ¬ len Flurförderfahrzeuge 26 the security of the wireless data transfer and the reliability of Ortsinformati ¬ on which is the basis for the following control commands for the industrial truck 26th

If in the production hall or possibly in na ¬ hen environment a jammer are, for example because of a manipulation by a third party that makes a wireless communication in the production hall impossible, this can be recognized by an over ¬ parent unit if the WLAN access points pass on relevant information to a master unit. However, then one would like to locate the jammer, as can significantly speed up the search for the jammer one determined by the multi-channel wireless receiver 2, 3, 4, 5 position. The same functionality can also be used to make devices quickly identify which are defective or disrupt or cause a very high data volume on the radio interface for some reason, resulting in unnecessary latency in radio transmission or temporary outages of the radio network ,

The multifunctional usability of the domestic stallierten system components described above means that the cost and installation cost of such a system quickly pay off ¬.

In the above example, a Wi-Fi network was mentioned. Of course, the functions described can be similarly applied in other, used in industrial environments wireless networks.

Figure 4 shows the upper right corner of the view according to Figure 3 with the change that the used herein

Multi-channel wireless receiver has four equal coordinate the WLAN access point 9B. The respective antenna systems jeweili ¬ gen WLAN radio interface 7 of the multi-channel wireless receiver 4 and the wireless access node 9B are kept but each further separated.

The combination of a multi-channel wireless receiver to Example 4 and a wireless access node, for example, 9B in the form of a single (combination) device 27 may optionally be used to reduce the cost of installation of the previously beschrie ¬ surrounded solution. Is for a product, only this version used as Kombinationsge ¬ advises the instruction the increased complexity of the function blocks ¬ for a wireless access point, for example 9B towards reduced costs for stock. Is required for the particular installation, a wireless access node 9, the corresponding part of the system is also put into operation.

The possibility of production of combination devices ¬ 27 described is also conceivable for others, include customary in industrial environments radio interfaces in a similar manner.

The market are used to control manufacturing facilities and manufacturing equipment mobile control units, similar to remote controls, some with simple or elaborate dis- plays available which made the appropriate settings and control commands via radio or complete sequence programs can also be set up.

Also available on the market are positioning systems for such mobile control units to force, for example, the user to reside for controlling a given system in a more or less well-defined area. Thus, with the aid of so-equipped control units safety requirements, such as a direct Sichtkon- clock to a certain part of the system implemented. Now the user leaves, for example, here the defined area, the system automatically stops until the user returns to the restricted area, so the control panel is again in the defined area.

Also in the radio data communication between the control panel and the associated system the above-described functi ¬ tionality with multi-channel receivers for angle determination for a can improve the assessment of the authenticity of receiving data, on the other hand provide an angle or location information to the current position of the user. The angle or location information may be utilized alone or, in particularly safety-related applications, in conjunction with other methods that also provide an angular or position information. Figure 5 shows the present invention, a mobile control unit 28 in the environment of a manufacturing facility and / or manufacturing system 29 at two different locations of 30, 31 to Ferti ¬ restriction device and / or production facility 29, which is equipped with a combination device 27th In the figure 5, the allowed for the mobile control unit 28 location area 32 is shown hatched.

The mobile control unit is 28, and thus the on ¬ pancake, in the permitted location area 32, so the examples game on the spot 30, the plant is 29 freigeschal ¬ tet and running. on the other hand leaves the user with the mobile control unit 28 to the permissible location area 32 and is located for example at the location 31, the system 29 stops for safety and sets the loading processing again only continue when the mobile control unit 28 again within the marked area 32 is located.

The current angle Φι in relation to a reference angle 33 for the angle determination is hereby determined as above already be ¬ wrote. In addition, on the evaluation of reception levels as additional information that provide, for example, built-in wireless receiver modules, which is known to one skilled in the art, even a rough distance information di, d2 determines the position of the user. Since in many applications is required only that the user can hen from a certain angle on or in the plant se- and is not too far away from the plant, position information determined in this way appears to be sufficient.

Of course, the authenticity can also be checked by the system received data to ¬ additionally or even a further functionality are offered on the Positionsinforma- tion. The user can switch to using the same mobile Steuereinheit28 of a piece of equipment 29 to a different part of the system 29, and within the respectively prescribed location area 32, for example confi ¬ configurations perform on the respective plants 29th By the demarcation of various fields, the user need not take any additional measures for the change from one system to the next 29.

Compared to the inventive example of Figures 1 to 5 in the 6 A reaction corresponding in the technological world of already used systems is evident. Here, the transponders are tri to Tr3 installed to define the permissible location area 32nd The mobile STEU ¬ ereinheit 28, the current distances di, d 2, d 3 to determine with radar distance measuring methods, for example, for the staying ¬ haltsort 30 between it and the three transponders Tri, Tr2, Tr3 and from these distance values in turn trigonometric functions because the installation positions of the three transponders Tri, Tr2, Tr3 are known to the system, determine its own position. The disadvantage here is that the three transponders Tri, Tr2, Tr3 must be installed at relatively unfavorable positions. In addition, a separate, relatively complex functional block in the mobile control unit is required for radar distance measurement. The method / system described above according to the invention fits into an environment according to Figure 6 in excellent where ¬ no additional effort is required in the implementation of the system concept according to the invention on the side of the mobile control unit 28th

The use of smart phones as a mobile control unit 28 for parts of the system 29 is also possible with the appropriate application programs and corresponding fuses. Again, the functions described above would be available.

Subsequently, a fourth, fifth and sixth OF INVENTION ¬ dung invention method / system will be generally described.

For the fourth inventive method / system:

Here reference communication partners are used in the system. In the described method / system according to the Figure 6 can, for example, by multiple reflections of the RF signal on the walls and corners result by spatial conditions under certain circumstances, certain deviations for the determined angle. Also, it may happen that due to spatial Gege- benheiten from the perspective of a multi-channel receiver to a transmitter, no clear angle is assigned. Since this known from the radar system technology effects mostly relate to a single multi-channel receiver, and for redundancy reasons anyway installing more than two multi-channel receivers is advised, individual deviating angle values or individual non-deliverable angle ¬ information act mostly on the total system is not further. The software in the central unit can such effects he know ¬ and rate accordingly.

Additional security can provide the installation of additional, fixed communications partner with a radio interface here. At some positions in space this communi- cation partner are installed and checked for example, a wireless radio network, at regular intervals from the wireless access point. When sending the corresponding response, the position of the relevant com- described above is always determined and munikationspartners just ¬ if compared with the record stored values. Thus, the system can determine if generally a malfunction in the radio network is present. If the communication partner installed in some significant or "difficult" places, the accuracy or the uniqueness of the angle measurement in certain areas can be so by comparative de measurements are improved. Similar results obtained for the angle measurement for commu ¬ nikationspartner no. X and sensor y indicate a high probability that both are in the same angular range.

Since it may be at the radio interface of the reference communication partners to standard components, no change to hardware or software is required for a rule, this reference are communication partners inexpensive and easy to install.

For the fifth inventive method / system:

Here, a transfer of additional informa- done NEN to angle values.

With respect to the foregoing fourth embodiment can achieve a further improvement of the system by an extension of the data provided by the multi-channel receivers: If, for example of the multi-channel receivers adjacent to the angular value of additional information such as the respective reception levels or even a number to classifi ¬ supplied cation of the reliability of the determined angle value, for example 1 for "very uncertain / questionable" to 5 "very Si rather", so this information can be taken into account in the central unit. Thus, a "very uncertain / questionable" ge ¬ kennzeichneter angle value is, for example, in the central unit easily discarded as without this additional information. Also, a current supplied reception level value may allow a certain conclusion about the distance between the transmitter and the multi-channel receiver in question, allowing the positioning easier or more tests for plausibility.

For the sixth inventive method / system:

Here, a three-dimensional position determination is performed by ¬.

The method described around the figure 1 can be from a number of three multi-channel receivers and three-dimensionally apply: If the multi-channel receiver installed for example in a high-bay warehouse, so can be achieved by using the multichannel receivers angle values, such as a angle value per multi-channel receiver, in sliding ¬ cher manner as described above in addition to the x and y coordinates and the height of sensors, system components, and so on determine the room.

Claims

claims
1. A method for verifying the authenticity step wireless gesende ¬ ter or received data with a process in which data as encrypted data packets which are transferred within data frames, between a transmitting and a receiving unit as a communication ¬ partner via intervening infrastructure components of an infrastructure are described in the sending and the receiving unit embedded, are made, and with a further method step, in which the location of the transmitting unit is determined and checked against a stored location information is carried infrastructure components without further intervention of communication partners during the data transmission evaluate sent encrypted data packets for the purpose of localization.
2. The method according to claim 1, characterized by a sole or other existing Authentifizierungsverfah- ren complementary embodiments for verifying the authenticity of received data.
3. The method of claim 1 or 2, characterized in that the data of a machine, a plant, a plant part, a control unit or other data transmitting unit are transmitted.
4. The method according to any one of claims 1 to 3, characterized in that location information obtained can be used in the local intended for other functions in an infrastructure component.
5. The method according to any one of claims 1 to 4, characterized in that inputs are determined angle of incidence of the wave fronts of high frequency electromagnetic signals to antennas for determining the location of a transmitter.
6. System with forming the system infrastructure components also for wirelessly transmitting or receiving of transmitted between a transmitting and receiving unit as respective communication partner data in the form of scrambling system rare data packets that are transmitted within data frames, with the in the data transmission of sent data packets without further action by the communication partners involved for the purpose of locating the sending unit the sent encrypted data packets evaluating infrastructure components.
7. System according to claim 6, characterized in that a data transmitting infrastructure component is a machine, a plant, a plant part, a control unit or other data transmitting unit.
8. System according to claim 6 or 7, characterized in that for the purpose of locating the sending unit the sent encrypted data packets evaluating infrastructure component is a redundant infrastructure component.
PCT/EP2016/064463 2015-06-25 2016-06-22 Method and system for checking the authenticity of received data WO2016207243A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE102015211825.8 2015-06-25
DE201510211825 DE102015211825A1 (en) 2015-06-25 2015-06-25 Method and system for verifying the authenticity of received data

Publications (1)

Publication Number Publication Date
WO2016207243A1 true true WO2016207243A1 (en) 2016-12-29

Family

ID=56511533

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2016/064463 WO2016207243A1 (en) 2015-06-25 2016-06-22 Method and system for checking the authenticity of received data

Country Status (2)

Country Link
DE (1) DE102015211825A1 (en)
WO (1) WO2016207243A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4728959A (en) * 1986-08-08 1988-03-01 Ventana Sciences Inc. Direction finding localization system
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US20140253390A1 (en) * 2013-03-05 2014-09-11 Yaron Alpert Passive wireless transmitter authentication used for receiver location determination

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346358B2 (en) * 2002-06-24 2008-03-18 Intel Corporation Logical boundaries in communications networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4728959A (en) * 1986-08-08 1988-03-01 Ventana Sciences Inc. Direction finding localization system
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US20140253390A1 (en) * 2013-03-05 2014-09-11 Yaron Alpert Passive wireless transmitter authentication used for receiver location determination

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Also Published As

Publication number Publication date Type
DE102015211825A1 (en) 2016-12-29 application

Similar Documents

Publication Publication Date Title
US20100195590A1 (en) Method and apparatus for radio spectrum sensing or monitoring
US20100079237A1 (en) Device and method for providing rfid identification data for an authentication server
US7295115B2 (en) Radio-frequency identification (RFID) tag employing unique reception window and method therefor
US6907252B2 (en) Method and apparatus for detecting the presence of mobile terminals
US20050176442A1 (en) Estimating the location of inexpensive wireless terminals by using signal strength measurements
US20120276848A1 (en) Wireless array device and system for managing wireless arrays having magnetometers
US20060190538A1 (en) Method and apparatus for recognizing location of a home device using RFID
US20130231130A1 (en) Method for determining wireless device location based on proximate sensor devices
US20080139125A1 (en) Automatic network configuration apparatus and method between short-range wireless terminals
US20120276918A1 (en) Method for determining a geospatial location of a client in signal communication with a wireless array
US20100178872A1 (en) Initiating wireless communication between a vehicle and an access point
US20100164720A1 (en) Apparatus and method for location-based access control in wireless networks
JP2003315433A (en) Positioning of mobile radio terminal
US6788938B1 (en) Construction method of radio network system and radio transmission device
US20060194587A1 (en) System and method for asset location in wireless networks
US20090024272A1 (en) Wireless network and methodology for automotive service systems
US7496948B1 (en) Method for controlling access to a target application
US20150330761A1 (en) Metrology device and method of communicating with portable devices
WO2004059912A1 (en) Spatial boundary admission control for wireless networks
JP2006279438A (en) Illegal access detecting method and device
CN101363910A (en) Wireless radio frequency positioning method based on Bayesian theory
US7120417B2 (en) Mobile communications terminal, service area calculation apparatus and method of calculating service area
US20100237994A1 (en) Automated RFID Reader Detection
US20150330765A1 (en) Articulated arm coordinate measurement machine having a rotary switch
US20150330763A1 (en) Metrology device and method of servicing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16741868

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE