Case ID: M25-329P

Published: 2026-04-09 16:00:18

Last Updated: 1775750418


Inventor(s)

Eirini Eleni Tsiropoulou
Dipanjan Adhikary

Technology categories

Artificial Intelligence/Machine LearningEnergy & PowerEnvironmentalIntelligence & SecurityPhysical Science

Licensing Contacts

Physical Sciences Team

AI-Driven Security Framework for Over-the-Air Computation in Concentrated Solar Power Systems

Invention Description
Concentrated Solar Power (CSP) systems increasingly rely on real-time data aggregation through advanced communication frameworks such as Over-the-Air Computation (AirComp) in emerging 6G-IoT environments. However, these systems are vulnerable to signal interference and jamming attacks, which can disrupt data transmission and compromise system performance. Both simple and coordinated attacks pose significant risks to the reliability and efficiency of energy operation.
 
Researchers at Arizona State University have developed a robust security framework designed to protect AirComp-enabled CSP systems from jamming attacks. The technology leverages AI-driven statistical signal analysis, adaptive detection thresholds and spatially-aware mitigation strategies to identify and counteract interference. It can effectively detect and neutralize both basic and coordinated jamming attempts, ensuring reliable and continuous data aggregation. This approach enhances system resilience and supports optimal performance in next-generation 6G-IoT energy networks.
 
This AI-powered security framework ensures reliable data aggregation and resilience against jamming attacks in AirComp-enabled Concentrated Solar Power systems.
 
Potential Applications
  • Enhancing security and performance of Concentrated Solar Power plants with real-time IoT data aggregation
  • Deployment in 6G-enabled Industrial IoT networks requiring robust, low-latency communication
  • Integration into smart grid energy management systems
  • Use in critical infrastructure monitoring where resilience against signal interference is mandatory
Benefits and Advantages
  • AI-based differentiation between legitimate sensor data and malicious interference using binary hypothesis testing
  • Dynamic threshold adjustment through reinforcement learning for optimized attack detection sensitivity
  • Secure enrollment phase for reliable node registration and baseline profiling
  • Power allocation strategy minimizing errors under power constraints
  • Hierarchical defense combining signal fingerprinting, adaptive beamforming, and node ejection protocols
  • Experimental validation proving significant improvements in data aggregation and attack detection
For more information about this opportunity, please see