Systems and methods for utilizing models to identify location spoofing by user equipment

ABSTRACT

A device may receive user equipment (UE) location data identifying a latitude and a longitude of a UE, as reported by the UE, and may receive network location data identifying a latitude and a longitude of the UE, as reported by a core network. The device may process the UE location data and the network location data to determine a confidence score associated with an actual location of the UE. The device may process the UE location data and the network location data, when the confidence score is outside a confidence interval, to determine whether the UE location data is valid. The device may perform one or more actions based on determining whether the UE location data is valid.

BACKGROUND

Multi-access edge computing (MEC) is a technology that providescomputing resources at an edge of a network (e.g., near a base stationof the network). An MEC device may support computing requirements ofuser equipment (UEs) and/or a base station that are within an area ofservice of the MEC device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1F are diagrams of an example associated with utilizing modelsto identify location spoofing by a UE.

FIG. 2 is a diagram illustrating an example of training and using amachine learning model in connection with identifying location spoofingby a UE.

FIG. 3 is a diagram of an example environment in which systems and/ormethods described herein may be implemented.

FIG. 4 is a diagram of example components of one or more devices of FIG.3 .

FIG. 5 is a flowchart of an example process for utilizing models toidentify location spoofing by a UE.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

Some services require receipt of accurate location data from UEs over anetwork. However, a UE that spoofs the location data (e.g., changeslocation data associated with a communication from a current location ofthe UE to another location at which the UE is not located) may createissues for such services. For example, vehicle-to-everythingcommunications require accurate location data from all connectedvehicles for safety purposes and to prevent chaos on the roads. A fleetmanagement system may require accurate location data of a vehicle fleetto track and manage deliveries. Inaccurate location data or spoofing maycause operational issues for the fleet management system. Navigationsoftware crowdsources location data from UEs to determine trafficconditions. Location data spoofing by the UEs may induce fake trafficjams by the navigation software.

Unfortunately, there are many ways for an attacker to spoof locationdata. For example, an attacker may spoof location data sent by a UE toweb services when the UE sends the location data over an insecurechannel or when credentials of the UE are compromised. An attacker maycompromise and cause a UE to fake location data provided to a mobileapplication. An attacker may spoof location data by sending to a UEfalse timing and coordinates, since a global navigation satellite system(GNSS) of the UE uses an insecure protocol and provides no integritychecks. Current techniques to mitigate location data spoofing utilizecorrections that occur at a client device (e.g., at a UE). However,location data spoofing may still occur in transit (e.g., between the UEand a service).

Some implementations described herein provide a device (e.g., an MECdevice and/or a base station) that utilizes models to identify locationspoofing by a UE. For example, the device may receive, from a pluralityof UEs, first location data identifying respective first latitudes andrespective first longitudes of the plurality of UEs and may receive,from a core network, second location data identifying respective secondlatitudes and respective second longitudes of the plurality of UEs. Thedevice may process the first location data and the second location data,with a statistical model, to determine a confidence interval associatedwith actual locations of the plurality of user equipments and may traina machine learning model, with the first location data and the secondlocation data, to generate a trained machine learning model. The devicemay receive UE location data identifying a latitude and a longitude of aUE, as reported by the UE, and may receive network location dataidentifying a latitude and a longitude of the UE, as reported by thecore network. The device may process the UE location data and thenetwork location data, for example with the statistical model, todetermine a confidence score associated with an actual location of theUE and may determine whether the confidence score is within theconfidence interval. The device may determine whether the UE locationdata is valid based on whether the confidence score is within theconfidence interval and may perform one or more actions based ondetermining whether the UE location data is valid.

In this way, the device may utilize models to identify location spoofingby a UE. The device may identify location spoofing occurring on a clientdevice (e.g., a UE) and location spoofing occurring in transit (e.g.,between a UE and a network device). Location spoofing may occur intransit as a result of a network-based attack, such as, for example, aman-in-the-middle attack. For example, the device may process locationdata received by a base station associated with a UE and location dataprovided by the UE, with a statistical model, to determine whether theUE is spoofing the location data. If the device cannot determine withthe statistical model whether the UE is spoofing the location data, thedevice may utilize a machine learning model to determine whether the UEis spoofing the location data. This may enable the device to determinewhether the location data provided by the UE is valid or invalid. Thus,the device may conserve computing resources, networking resources, andother resources that would have otherwise been consumed by attempting tolocate UEs, handling traffic accidents on the roads caused by spoofedlocation data, handling operational issues for fleet management systemscaused by spoofed location data, handling customer complaints associatedwith navigation software caused by spoofed location data, and/or thelike.

FIGS. 1A-1F are diagrams of an example 100 associated with utilizingmodels to identify location spoofing by a UE. As shown in FIGS. 1A-1F,example 100 includes a base station 105 associated with a UE 110, an MECdevice 115, and a core network 120. Further details of base station 105,UE 110, MEC device 115, and core network 120 are provided below.Although certain operations are shown in FIGS. 1A-1F as being performedby MEC device 115, in some implementations, the operations may beperformed by base station 105 and MEC device 115 together, by basestation 105 alone, and/or the like.

As shown in FIG. 1A, and by reference number 125, the base station 105and/or the MEC device 115 receives, from a plurality of UEs 110, firstlocation data identifying first locations of the UEs 110. For example, aUE 110 may include a sensor device for determining a location of the UE110, such as a global positioning system (GPS) device. The sensor devicemay obtain location information (e.g., a latitude and a longitude)indicating a current location of the UE 110, direction informationindicating a heading or direction in which the UE 110 is traveling,speed information indicating a current speed of the UE 110, timeinformation indicating a time of day and/or a day of the week associatedwith the location information, and/or the like. The UE 110 may providethe location information, the direction information, the speedinformation, and/or the time information to the base station 105 and/orthe MEC device 115.

For example, the UE 110 may provide the location information, thedirection information, the speed information, and/or the timeinformation to the base station 105 and/or the MEC device 115periodically (e.g., every thirty seconds, every minute, every twominutes, and/or the like), based on an occurrence of an event (e.g.,based on connecting to the core network 120, based on a change in alocation of the UE 110 satisfying one or more criteria, and/or thelike), based on receiving a request from the base station 105 and/or theMEC device 115, and/or the like. The first location data may include thelocation information, the direction information, the speed information,and/or the time information provided by the UE 110, and/or locationinformation, direction information, speed information, and/or timeinformation provided by one or more other UEs.

Alternatively, and/or additionally, the base station 105 and/or the MECdevice 115 may obtain the first location data from another device. Forexample, the UEs 110 may provide the location information, the directioninformation, the speed information, and/or the time information to aserver device. The server device may store the received information in adata structure (e.g., a database, a table, a list, and/or the like). Theserver device may provide first location data corresponding to theinformation stored in the data structure to the base station 105 and/orthe MEC device 115 based on receiving a request for the first locationinformation from the base station 105 and/or the MEC device 115.

As shown by reference number 130, the base station 105 and/or the MECdevice 115 receives, from the core network 120, second location dataidentifying second locations of the UEs 110. For example, the secondlocation data may include information identifying latitudes andlongitudes of the UEs 110 and the base station 105 and/or the MEC device115 may receive the second location data periodically, based onproviding a request for the second location data to the core network 120(e.g., a service capability exposure function (SCEF) of the core network120), and/or the like. In some implementations, the second location datais determined based on a base station 105 to which a UE 110 isconnected, a network location capability (e.g., a timing advance andsounding reference signal and/or a cellular-received signal strengthindicator, among other examples), and/or the like.

As shown in FIG. 1B, and by reference number 135, the MEC device 115processes the first location data and the second location data, with astatistical model, to determine a confidence interval associated withactual locations of the UEs 110. The MEC device 115 may identify aposition pair of location data. The position pair of location data mayinclude location data associated with a UE 110 that is included in thefirst location data and corresponding location data associated with theUE 110 that is included in the second location data.

As an example, the first location data may include first locationinformation associated with a UE 110. The first location information mayinclude a first latitude and a first longitude for the UE 110 at aparticular time. The second location data may include second locationinformation associated with the UE 110. The second location informationmay include a second latitude and a second longitude for the UE 110within a threshold time difference of the particular time. A positionpair of location data for the UE 110 may include a first positioncorresponding to the first latitude and the first longitude and a secondposition corresponding to the second latitude and the second longitude.

The confidence interval may indicate a maximum difference between aposition pair of location data for which location information reportedby a UE 110 is determined to be valid location data (rather than invalidlocation data, such as spoofed location data). In some implementations,the confidence interval is defined as a distance between locationinformation (e.g., a latitude and a longitude) that is provided by a UE110 and location information associated with the UE 110 that is providedby the core network 120.

The MEC device 115 may apply a central limit theorem model, to positionpairs of location data included in the first location data and thesecond location data, to calculate an arithmetic mean of the confidenceintervals associated with the position pairs of location data. Forexample, the MEC device 115 may determine a distance between a firstposition and a second position of each position pair of location data.The MEC device 115 may calculate a sum of the determined distances. TheMEC device 115 may calculate the arithmetic mean based on dividing thesum of the determined distances by a quantity of the position pairs.

The MEC device 115 may generate a normal distribution based on thearithmetic mean. The normal distribution may approximate a probabilitydistribution of the arithmetic mean. The MEC device 115 may determinethe confidence interval based on the normal distribution. For example,the MEC device 115 may determine that a percentage (e.g., 75%, 80%, 90%,and/or the like) of distances between the position pairs of locationdata are less than a particular distance based on the normaldistribution. The MEC device 115 may determine the confidence intervalbased on the particular distance (e.g., valid location data reported bya UE 110 within the particular distance from location data for the UE110 reported by the core network 120).

Alternatively, and/or additionally, the confidence interval may bedetermined by another device. For example, the MEC device 115 mayprovide the first location data and/or the second location data to aserver device included in a cloud computing environment, a networkdevice included in the core network 120, another MEC device, and/or thelike. The other device may receive the first location data and/or thesecond location data and may determine the confidence interval in amanner similar to that described above. The other device may provideinformation identifying the confidence interval to the MEC device 115.

As shown by reference number 140, the MEC device 115 trains a machinelearning model, with the first location data and the second locationdata, to generate a trained machine learning model. Alternatively, theMEC may rely on a machine learning model that is not trained at the MEC.The machine learning model may include a classification machine learningmodel, a logistic regression machine learning model, a decision treemachine learning model, a support vector machine learning model, aneural network, and/or the like. In some implementations, in addition tothe first location data and the second location data, the MEC device 115trains the machine learning model with direction information, speedinformation, time information, and/or information associated with a basestation 105 (e.g., a cell identifier, a location of the base station105, a transmission band associated with the base station 105, and/orthe like) to which a UE 110 is connected that is included in the firstlocation data and/or the second location data.

The MEC device 115 may train the machine learning model to receivelocation data provided by a UE and location data for the UE provided bya core network as inputs and to generate an output indicating whetherthe location data provided by a UE is valid (e.g., whether the locationdata provided by the UE corresponds to an actual location of the UE) anda score that reflects a measure of confidence that the indication ofwhether the location data provided by the UE is valid is accurate. Insome implementations, the MEC device 115 trains the machine learningmodel in a manner similar to that described below with respect to FIG. 2.

As shown in FIG. 1C, and by reference number 145, the base station 105and/or the MEC device 115 receives UE location data identifying alocation of a UE 110 as reported by the UE 110. For example, the basestation 105 and/or the MEC device 115 may receive UE locationinformation identifying a latitude and a longitude of the UE 110, asreported by the UE 110.

As shown by reference number 150, the base station 105 and/or the MECdevice 115 receives network location data identifying a location of theUE 110 as reported by the core network 120. For example, the basestation 105 and/or the UE 110 may receive network location dataidentifying a latitude and a longitude of the UE 110, as reported and/ordetermined by the core network 120.

As shown in FIG. 1D, and by reference number 155, the MEC device 115processes the UE location data and the network location data, with thestatistical model, to determine a confidence score associated with anactual location of the UE 110. In some implementations, the confidencescore is determined based on a distance between a first locationcorresponding to the UE location data and a second locationcorresponding to the network location data. For example, the UE locationdata may include a first latitude and a first longitude. The networklocation data may include a second latitude and a second longitude. TheMEC device 115 may determine a distance between a first locationcorresponding to the first latitude and the first longitude and a secondlocation corresponding to the second latitude and the second longitude.The MEC device 115 may determine the confidence score based on thedistance between the first location and the second location.

In some implementations, the confidence score corresponds to thedistance between the first location and the second location. Forexample, the confidence score may be a value of 45 based on the distancebetween the first location and the second location being 45 meters.

In some implementations, the confidence score may be determined based ona plurality of ranges of distances. For example, the confidence scoremay be a first value when the distance between the first location andthe second location is within a first range of distances (e.g., lessthan 50 meters, between 0 meters to 50 meters). In some implementations,the first range of distances corresponds to the confidence interval. Theconfidence score may be a second value when the distance between thefirst location and the second location is within a second range ofdistances (e.g., greater than 50 meters, 50 meters to 100 meters, and/orthe like).

As shown by reference number 160, the MEC device 115 determines whetherthe confidence score is within the confidence interval. The MEC device115 may compare the confidence score and the confidence interval and maydetermine whether the confidence score is within the confidence intervalbased on the comparison.

In some implementations, the confidence score corresponds to thedistance between the first location and the second location, describedabove. In some implementations, the confidence interval includes amaximum distance (e.g., 50 meters, 100 meters, and/or the like) and thebase station 105 determines that the confidence score is within theconfidence interval when the distance between the first location and thesecond location is less than the maximum distance. Alternatively, and/oradditionally, the confidence interval may include a range of distancesand the base station 105 may determine that the confidence score iswithin the confidence interval when the distance between the firstlocation and the second location is within the range of distances.

In some implementations, the confidence score is the first value or thesecond value, described above. The MEC device 115 may determine that theconfidence score is within the confidence interval when the confidencescore comprises the first value.

The MEC device 115 may determine that the UE location data is valid whenthe confidence score is within the confidence interval. The MEC device115 may determine that the UE location data is invalid when theconfidence score is not within the confidence interval. Alternatively,and/or additionally, the MEC device 115 may determine to process the UElocation data and the network location data with the trained machinelearning model, as described below, when the confidence score is notwithin the confidence interval.

As shown in FIG. 1E, and by reference number 165, the MEC device 115processes the UE location data and the network location data, with thetrained machine learning model and when the confidence score is outsidethe confidence interval, to determine whether the UE location data isvalid. The machine learning model may receive the UE location data andthe network location data as an input and may generate an outputindicating whether the UE location data is valid.

Alternatively, and/or additionally, the MEC device 115 may process theUE location data and the network location data with the trained machinelearning model when the confidence score is inconclusive as to whetherthe UE location data is valid. As an example, the confidence intervalmay include a range of distances defined by a minimum distance (e.g., 0meters) and a maximum distance (e.g., 100 meters) and the confidencescore may correspond to a distance between the first location and thesecond location, described above. The confidence score may beinconclusive as to whether the UE location data is valid when theconfidence score (e.g., the distance between the first location and thesecond location) is within a predetermined distance (e.g., 1 meter, 5meters, 10 meters, and/or the like) of the maximum distance.

In some implementations, the MEC device 115 processes the UE locationdata and the network location data, with the trained machine learningmodel, to determine whether the UE location data is valid when theconfidence score is within the confidence interval. The MEC device 115may compare the confidence score with an output of the machine learningmodel and may determine whether the UE location data is valid based onthe comparison. For example, the MEC device 115 may determine that theUE location data is valid based on the confidence score being within theconfidence interval and the output of the machine learning modelindicating that the UE location data is valid.

In some implementations, the MEC device 115 stores informationindicating whether the UE location data is valid, informationidentifying the UE 110, the confidence score, and/or the like in a datastructure. The MEC device 115 may monitor a quantity of times that UElocation data reported by the UE 110 is determined to be invalid basedon the information stored in the data structure. In someimplementations, the MEC device 115 performs one or more actions (e.g.,the one or more actions described below with respect to FIG. 1F) basedon the quantity of times that UE location data reported by the UE 110 isdetermined to be invalid satisfying one or more criteria (e.g.,satisfying a quantity threshold).

As shown in FIG. 1F, and by reference number 170, the MEC device 115performs one or more actions based on determining whether the UElocation data is valid. In some implementations, the one or more actionsinclude the MEC device 115 disconnecting the UE 110 from the corenetwork 120 and the base station 105. For example, the MEC device 115may disconnect the UE 110 from the core network 120 and the base station105 when the UE location data is invalid.

In some implementations, the one or more actions include the MEC device115 reporting the UE 110 to authorities. For example, the MEC device 115may provide information identifying the UE 110, information identifyinga location of the UE 110, information identifying a user associated withthe UE 110, and/or the like to a device associated with a lawenforcement agency when the UE location data is invalid.

In some implementations, the one or more actions include the MEC device115 reporting the UE 110 to a vehicle management system when the UElocation data is invalid. For example, the UE 110 may be associated witha fleet management service that requires an employee to periodicallyprovide location information via the UE 110. The fleet managementservice may register a device identifier associated with a vehiclemanagement system, information identifying the UE 110, informationidentifying a frequency at which the UE 110 provides UE location data,and/or the like with a service provider associated with the MEC device115 and/or the core network 120. The core network 120 may providenetwork location data associated with the UE 110 to the MEC device 115based on the fleet management service registering the device identifier,the information identifying a frequency at which the UE 110 provides UElocation data, and/or the like with the service provider.

In some implementations, the core network 120 synchronizes providing thenetwork location data with the UE 110 providing the UE location data.For example, a SCEF of the core network 120 may be configured to providethe network location data at a frequency at which the UE 110 providesthe UE location data to the MEC device 115. The MEC device 115 maysubscribe to receive the UE location data from the SCEF based on the UE110 connecting to a base station 105 associated with the MEC device 115and/or based on receiving the UE location data. The SCEF may provide thenetwork location data at the frequency at which the UE 110 provides theUE location data to the MEC device 115 based on the SCEF beingconfigured to provide the network location data at the frequency atwhich the UE 110 provide the UE location data and/or based on the MECdevice 115 subscribing to receive the UE location data. The MEC device115 may utilize the device identifier associated with the vehiclemanagement system to report the UE 110 to the vehicle management systemwhen the UE location data is invalid based on the fleet managementservice registering with the service provider.

In some implementations, the one or more actions include the MEC device115 providing, for display, information identifying the UE 110 and/orproviding an alert notification when the UE location data is invalid.For example, the base station 105 may cause an alert notification to begenerated and/or information identifying the UE 110 to be displayed bythe UE 110, a device associated with a fleet management system, a deviceassociated with a law enforcement agency, and/or the like when the UElocation data is invalid.

In some implementations, the one or more actions include the MEC device115 retraining the machine learning model based on determining whetherthe UE location data is valid. The base station 105 may utilize the UElocation data, the network location data, and/or the confidence score asadditional training data for retraining the machine learning model,thereby increasing the quantity of training data available for trainingthe machine learning model. Accordingly, the MEC device 115 may conservecomputing resources (e.g., processing resources, memory resources,communication resources, and/or the like) associated with identifying,obtaining, and/or generating historical data for training the machinelearning model relative to other systems for identifying, obtaining,and/or generating historical data for training machine learning models.

As described above, the MEC device 115 may utilize models to determinewhether UE location data is valid (e.g., to identify location spoofingby a UE). The MEC device 115 may identify location spoofing occurring ona client device (e.g., UE 110) and location spoofing occurring intransit (e.g., between the UE 110 and the base station 105 or the MECdevice 115). Location spoofing may occur in transit as a result of anetwork-based attack, such as, for example, a man-in-the-middle attack.For example, MEC device 115 may process location data received by basestation 105 associated with UE 110 and location data provided by UE 110,with a statistical model, to determine whether UE 110 is spoofing thelocation data. If MEC device 115 cannot determine whether UE 110 isspoofing the location data with the statistical model, MEC device 115may utilize a machine learning model to determine whether UE 110 isspoofing the location data. This may enable MEC device 115 to determinewhether the location data provided by UE 110 is valid or invalid. Thus,MEC device 115 may conserve computing resources, networking resources,and other resources that would have otherwise been consumed byattempting to locate UEs 110, handling traffic accidents on the roadscaused by spoofed location data, handling operational issues for fleetmanagement systems caused by spoofed location data, handling customercomplaints associated with navigation software caused by spoofedlocation data, and/or the like.

As indicated above, FIGS. 1A-1F are provided as an example. Otherexamples may differ from what is described with regard to FIGS. 1A-1F.The number and arrangement of devices shown in FIGS. 1A-1F are providedas an example. In practice, there may be additional devices, fewerdevices, different devices, or differently arranged devices than thoseshown in FIGS. 1A-1F. Furthermore, two or more devices shown in FIGS.1A-1F may be implemented within a single device, or a single deviceshown in FIGS. 1A-1F may be implemented as multiple, distributeddevices. Additionally, or alternatively, a set of devices (e.g., one ormore devices) shown in FIGS. 1A-1F may perform one or more functionsdescribed as being performed by another set of devices shown in FIGS.1A-1F.

FIG. 2 is a diagram illustrating an example 200 of training and using amachine learning model in connection with identifying location spoofingby UE 110. The machine learning model training and usage describedherein may be performed using a machine learning system. The machinelearning system may include or may be included in a computing device, aserver, a cloud computing environment, and/or the like, such as MECdevice 115 described in more detail elsewhere herein.

As shown by reference number 205, a machine learning model may betrained using a set of observations. The set of observations may beobtained from historical data, such as data gathered during one or moreprocesses described herein. In some implementations, the machinelearning system may receive the set of observations (e.g., as input)from MEC device 115, as described elsewhere herein.

As shown by reference number 210, the set of observations includes afeature set. The feature set may include a set of variables, and avariable may be referred to as a feature. A specific observation mayinclude a set of variable values (or feature values) corresponding tothe set of variables. In some implementations, the machine learningsystem may determine variables for a set of observations and/or variablevalues for a specific observation based on input received from MECdevice 115. For example, the machine learning system may identify afeature set (e.g., one or more features and/or feature values) byextracting the feature set from structured data, by performing naturallanguage processing to extract the feature set from unstructured data,by receiving input from an operator, and/or the like.

As an example, a feature set for a set of observations may include afirst feature of first location data, a second feature of secondlocation data, a third feature of time of day (e.g., a time at which thefirst location data was determined and a time at which the secondlocation data was determined), and so on. As shown, for a firstobservation, the first feature may have a value of first location data1, the second feature may have a value of second location data 1, thethird feature may have a value of time of day 1 a (e.g., a time at whichthe first location data was determined) and time of day 1 b (e.g., atime at which the second location data was determined), and so on. Thesefeatures and feature values are provided as examples and may differ inother examples.

As shown by reference number 215, the set of observations may beassociated with a target variable. The target variable may represent avariable having a numeric value, may represent a variable having anumeric value that falls within a range of values or has some discretepossible values, may represent a variable that is selectable from one ofmultiple options (e.g., one of multiple classes, classifications,labels, and/or the like), may represent a variable having a Booleanvalue, and/or the like. A target variable may be associated with atarget variable value, and a target variable value may be specific to anobservation. In example 200, the target variable is a validity of firstlocation data, which has a value of valid for the first observation.

The target variable may represent a value that a machine learning modelis being trained to predict, and the feature set may represent thevariables that are input to a trained machine learning model to predicta value for the target variable. The set of observations may includetarget variable values so that the machine learning model can be trainedto recognize patterns in the feature set that lead to a target variablevalue. A machine learning model that is trained to predict a targetvariable value may be referred to as a supervised learning model.

In some implementations, the machine learning model may be trained on aset of observations that do not include a target variable. This may bereferred to as an unsupervised learning model. In this case, the machinelearning model may learn patterns from the set of observations withoutlabeling or supervision, and may provide output that indicates suchpatterns, such as by using clustering and/or association to identifyrelated groups of items within the set of observations.

As shown by reference number 220, the machine learning system may traina machine learning model using the set of observations and using one ormore machine learning algorithms, such as a regression algorithm, adecision tree algorithm, a neural network algorithm, a k-nearestneighbor algorithm, a support vector machine algorithm, and/or the like.After training, the machine learning system may store the machinelearning model as a trained machine learning model 225 to be used toanalyze new observations.

As shown by reference number 230, the machine learning system may applythe trained machine learning model 225 to a new observation, such as byreceiving a new observation and inputting the new observation to thetrained machine learning model 225. As shown, the new observation mayinclude a first feature of first location data X, a second feature ofsecond location data Y, a third feature of time of day 3 a and time ofday 3 b, and so on, as an example. The machine learning system may applythe trained machine learning model 225 to the new observation togenerate an output (e.g., a result). The type of output may depend onthe type of machine learning model and/or the type of machine learningtask being performed. For example, the output may include a predictedvalue of a target variable, such as when supervised learning isemployed. Additionally, or alternatively, the output may includeinformation that identifies a cluster to which the new observationbelongs, information that indicates a degree of similarity between thenew observation and one or more other observations, and/or the like,such as when unsupervised learning is employed.

As an example, the trained machine learning model 225 may predict avalue of valid for the target variable of the validity of first locationdata for the new observation, as shown by reference number 235. Based onthis prediction, the machine learning system may provide a firstrecommendation, may provide output for determination of a firstrecommendation, may perform a first automated action, may cause a firstautomated action to be performed (e.g., by instructing another device toperform the automated action), and/or the like.

In some implementations, the trained machine learning model 225 mayclassify (e.g., cluster) the new observation in a cluster, as shown byreference number 240. The observations within a cluster may have athreshold degree of similarity. As an example, if the machine learningsystem classifies the new observation in a first cluster (e.g., a firstlocation data cluster), then the machine learning system may provide afirst recommendation. Additionally, or alternatively, the machinelearning system may perform a first automated action and/or may cause afirst automated action to be performed (e.g., by instructing anotherdevice to perform the automated action) based on classifying the newobservation in the first cluster.

As another example, if the machine learning system were to classify thenew observation in a second cluster (e.g., a second location datacluster), then the machine learning system may provide a second (e.g.,different) recommendation and/or may perform or cause performance of asecond (e.g., different) automated action.

In some implementations, the recommendation and/or the automated actionassociated with the new observation may be based on a target variablevalue having a particular label (e.g., classification, categorization,and/or the like), may be based on whether a target variable valuesatisfies one or more thresholds (e.g., whether the target variablevalue is greater than a threshold, is less than a threshold, is equal toa threshold, falls within a range of threshold values, and/or the like),may be based on a cluster in which the new observation is classified,and/or the like.

In this way, the machine learning system may apply a rigorous andautomated process to identify location spoofing of location dataassociated with the UE 110. The machine learning system enablesrecognition and/or identification of tens, hundreds, thousands, ormillions of features and/or feature values for tens, hundreds,thousands, or millions of observations, thereby increasing accuracy andconsistency and reducing delay associated with identifying locationspoofing of location data associated with the UE 110 relative torequiring computing resources to be allocated for tens, hundreds, orthousands of operators to manually identify location spoofing oflocation data associated with the UE 110.

As indicated above, FIG. 2 is provided as an example. Other examples maydiffer from what is described in connection with FIG. 2 .

FIG. 3 is a diagram of an example environment 300 in which systemsand/or methods described herein may be implemented. As shown in FIG. 3 ,environment 300 may include base station 105, UE 110, MEC device 115,and/or core network 120. Devices and/or elements of environment 300 mayinterconnect via wired connections and/or wireless connections.

Base station 105 includes one or more devices capable of transferringtraffic, such as audio, video, text, and/or other traffic, destined forand/or received from UE 110. For example, base station 105 may includean eNodeB (eNB) associated with an LTE network that receives trafficfrom and/or sends traffic to a core network, a gNodeB (gNB) associatedwith a RAN of a 5G network, a base transceiver station, a radio basestation, a base station subsystem, a cellular site, a cellular tower, anaccess point, a transmit receive point (TRP), a radio access node, amacrocell base station, a microcell base station, a picocell basestation, a femtocell base station, and/or another network entity capableof supporting wireless communication.

UE 110 includes one or more devices capable of receiving, generating,storing, processing, and/or providing information, as describedelsewhere herein. UE 110 may include a communication device. Forexample, UE 110 may include a wireless communication device, a mobilephone, a laptop computer, a tablet computer, a gaming console, a set-topbox, a wearable communication device (e.g., a smart wristwatch, a pairof smart eyeglasses, a head mounted display, or a virtual realityheadset), or a similar type of device.

MEC device 115 includes one or more devices capable of receiving,generating, storing, processing, providing, and/or routing information,as described elsewhere herein. MEC device 115 may include acommunication device and/or a computing device. For example, MEC device115 may include a device, such as an application device, a clientdevice, a web device, a database device, a host device, a proxy device,a virtual device (e.g., executing on computing hardware), or a device ina cloud computing system. In some implementations, MEC device 115includes computing hardware used in a cloud computing environment.

Core network 120 may include a core network or a RAN that includes oneor more base stations 105 that take the form of eNBs, gNBs, among otherexamples, via which a user device (e.g., a mobile phone, a laptopcomputer, a tablet computer, a desktop computer, among other examples)communicates with a core network. Core network 120 may include one ormore wired and/or wireless networks. For example, core network 120 mayinclude a cellular network (e.g., a 5G network, an LTE network, a 3Gnetwork, a code division multiple access (CDMA) network), a public landmobile network (PLMN), a local area network (LAN), a wide area network(WAN), a metropolitan area network (MAN), a telephone network (e.g., thePublic Switched Telephone Network (PSTN)), a private network, an ad hocnetwork, an intranet, the Internet, a fiber optic-based network, amongother examples, and/or a combination of these or other types ofnetworks.

The number and arrangement of devices and networks shown in FIG. 3 areprovided as an example. In practice, there may be additional devicesand/or networks, fewer devices and/or networks, different devices and/ornetworks, or differently arranged devices and/or networks than thoseshown in FIG. 3 . Furthermore, two or more devices shown in FIG. 3 maybe implemented within a single device, or a single device shown in FIG.3 may be implemented as multiple, distributed devices. Additionally, oralternatively, a set of devices (e.g., one or more devices) ofenvironment 300 may perform one or more functions described as beingperformed by another set of devices of environment 300.

FIG. 4 is a diagram of example components of one or more devices of FIG.3 . The one or more devices may include a device 400, which maycorrespond to base station 105, UE 110, and/or MEC device 115. In someimplementations, base station 105, UE 110, and/or MEC device 115 mayinclude one or more devices 400 and/or one or more components of thedevice 400. As shown in FIG. 4 , the device 400 may include a bus 410, aprocessor 420, a memory 430, a storage component 440, an input component450, an output component 460, and a communication component 470.

The bus 410 includes a component that enables wired and/or wirelesscommunication among the components of device 400. The processor 420includes a central processing unit, a graphics processing unit, amicroprocessor, a controller, a microcontroller, a digital signalprocessor, a field-programmable gate array, an application-specificintegrated circuit, and/or another type of processing component. Theprocessor 420 is implemented in hardware, firmware, or a combination ofhardware and software. In some implementations, the processor 420includes one or more processors capable of being programmed to perform afunction. The memory 430 includes a random-access memory, a read onlymemory, and/or another type of memory (e.g., a flash memory, a magneticmemory, and/or an optical memory).

The storage component 440 stores information and/or software related tothe operation of device 400. For example, the storage component 440 mayinclude a hard disk drive, a magnetic disk drive, an optical disk drive,a solid-state disk drive, a compact disc, a digital versatile disc,and/or another type of non-transitory computer-readable medium. Theinput component 450 enables device 400 to receive input, such as userinput and/or sensed inputs. For example, the input component 450 mayinclude a touch screen, a keyboard, a keypad, a mouse, a button, amicrophone, a switch, a sensor, a global positioning system component,an accelerometer, a gyroscope, and/or an actuator. The output component460 enables device 400 to provide output, such as via a display, aspeaker, and/or one or more light-emitting diodes. The communicationcomponent 470 enables the device 400 to communicate with other devices,such as via a wired connection and/or a wireless connection. Forexample, the communication component 470 may include a receiver, atransmitter, a transceiver, a modem, a network interface card, and/or anantenna.

The device 400 may perform one or more processes described herein. Forexample, a non-transitory computer-readable medium (e.g., the memory 430and/or the storage component 440) may store a set of instructions (e.g.,one or more instructions, code, software code, and/or program code) forexecution by the processor 420. The processor 420 may execute the set ofinstructions to perform one or more processes described herein. In someimplementations, execution of the set of instructions, by one or moreprocessors 420, causes the one or more processors 420 and/or the device400 to perform one or more processes described herein. In someimplementations, hardwired circuitry may be used instead of or incombination with the instructions to perform one or more processesdescribed herein. Thus, implementations described herein are not limitedto any specific combination of hardware circuitry and software.

The number and arrangement of components shown in FIG. 4 are provided asan example. The device 400 may include additional components, fewercomponents, different components, or differently arranged componentsthan those shown in FIG. 4 . Additionally, or alternatively, a set ofcomponents (e.g., one or more components) of the device 400 may performone or more functions described as being performed by another set ofcomponents of the device 400.

FIG. 5 is a flowchart of an example process 500 for utilizing models toidentify location spoofing by UE 110. In some implementations, one ormore process blocks of FIG. 5 may be performed by a device (e.g., basestation 105 and/or MEC device 115). In some implementations, one or moreprocess blocks of FIG. 5 may be performed by another device or a groupof devices separate from or including the device, such as a UE (e.g., UE110) and/or a device of core network 120. Additionally, oralternatively, one or more process blocks of FIG. 5 may be performed byone or more components of the device 400, such as the processor 420, thememory 430, the storage component 440, the input component 450, theoutput component 460, and/or the communication component 470.

As shown in FIG. 5 , process 500 may include receiving first locationdata identifying respective locations of a plurality of UEs (block 505).For example, the device may receive, from a plurality of UEs, firstlocation data identifying respective first latitudes and respectivefirst longitudes of the plurality of UEs, as described above. The devicemay include a base station (e.g., base station 105) and/or an MEC device(e.g., MEC device 115).

As further shown in FIG. 5 , process 500 may include receiving, from acore network, second location data identifying respective locations ofthe plurality of UEs (block 510). For example, the device may receive,from a core network, second location data identifying respective secondlatitudes and respective second longitudes of the plurality of UEs, asdescribed above.

As further shown in FIG. 5 , process 500 may include determining aconfidence interval associated with actual locations of the plurality ofUEs (block 515). For example, the device may process the first locationdata and the second location data, with a statistical model, todetermine a confidence interval associated with actual locations of theplurality of UEs, as described above. The device may apply a centrallimit theorem model, to the first location data and the second locationdata, to calculate an arithmetic mean and to create a normaldistribution based on the arithmetic mean. The device may determine theconfidence interval based on the normal distribution.

As further shown in FIG. 5 , process 500 may include receiving UElocation data identifying a location of a UE, as reported by the UE(block 520). For example, the device may receive UE location dataidentifying a latitude and a longitude of a UE, as reported by the UE,as described above.

As further shown in FIG. 5 , process 500 may include receiving networklocation data identifying a location of the UE, as reported by the corenetwork (block 525). For example, the device may receive networklocation data identifying a latitude and a longitude of the UE, asreported by the core network, as described above.

As further shown in FIG. 5 , process 500 may include determining aconfidence score associated with an actual location of the UE (block530). For example, the device may process the UE location data and thenetwork location data, with the statistical model, to determine aconfidence score associated with an actual location of the UE, asdescribed above.

As further shown in FIG. 5 , process 500 may include determining whetherthe UE location data is valid based on whether the confidence score iswithin a confidence interval (block 535). For example, the device maydetermine that the UE location data is valid when the confidence scoreis within a confidence interval and may determine that the UE locationdata is invalid when the confidence score is not within the confidenceinterval, as described above.

In some implementations, the device may process the UE location data andthe network location data, with a machine learning model, to determinewhether the UE location data is valid based on whether the confidencescore is within the confidence interval. For example, the device maytrain a machine learning model, with historical first location data andhistorical second location data, to generate a trained machine learningmodel, as described above. Alternatively, and/or additionally, thedevice may generate the trained machine learning model based on trainingthe machine learning model with a heading of a UE, a speed of a UE, atime of day associated with the historical first location data, a timeof day associated with the historical second location data, and/or a dayof week associated with receipt of the first location data. The machinelearning model may include a classification machine learning model, alogistic regression machine learning model, a decision tree machinelearning model, and/or a support vector machine learning model.

Alternatively, and/or additionally, the device may generate a firstresult indicating whether the UE location data is valid based on whetherthe confidence score is within the confidence interval. The device maygenerate a second result indicating whether the UE location data isvalid based on processing the UE location data and the network locationdata with the machine learning model. The device may determine whetherthe UE location data is valid based on comparing the first result andthe second result.

As further shown in FIG. 5 , process 500 may include performing one ormore actions based on determining whether the UE location data is valid(block 540). For example, based on determining whether the UE locationdata is valid, the device may perform one or more actions, such asretraining the machine learning model based on determining whether theUE location data is valid, disconnecting the UE from the core networkand/or the device when the UE location data is invalid, and/or reportingthe UE to authorities and/or a vehicle management system associated withthe UE when the UE location data is invalid. Alternatively, and/oradditionally, when the UE location data is invalid the device mayprovide, for display, information identifying the UE and/or provide analert notification.

In some implementations, the device may provide information indicatingwhether the UE location data is valid to another device (e.g., the UE, adevice associated with a supervisor of an employee associated with theUE, and/or the like). The device may receive feedback associated withthe information indicating whether the UE location data is valid. Forexample, the device may receive feedback indicating whether theinformation indicating whether the UE location data is valid wascorrectly determined. The device may modify and/or retrain the machinelearning model based on the feedback. Alternatively, and/oradditionally, the device may modify the confidence interval based on thefeedback.

Although FIG. 5 shows example blocks of process 500, in someimplementations, process 500 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 5 . Additionally, or alternatively, two or more of theblocks of process 500 may be performed in parallel.

As used herein, the term “component” is intended to be broadly construedas hardware, firmware, or a combination of hardware and software. Itwill be apparent that systems and/or methods described herein may beimplemented in different forms of hardware, firmware, and/or acombination of hardware and software. The actual specialized controlhardware or software code used to implement these systems and/or methodsis not limiting of the implementations. Thus, the operation and behaviorof the systems and/or methods are described herein without reference tospecific software code—it being understood that software and hardwarecan be used to implement the systems and/or methods based on thedescription herein.

As used herein, satisfying a threshold may, depending on the context,refer to a value being greater than the threshold, greater than or equalto the threshold, less than the threshold, less than or equal to thethreshold, equal to the threshold, not equal to the threshold, or thelike.

To the extent the aforementioned implementations collect, store, oremploy personal information of individuals, it should be understood thatsuch information shall be used in accordance with all applicable lawsconcerning protection of personal information. Additionally, thecollection, storage, and use of such information can be subject toconsent of the individual to such activity, for example, through wellknown “opt-in” or “opt-out” processes as can be appropriate for thesituation and type of information. Storage and use of personalinformation can be in an appropriately secure manner reflective of thetype of information, for example, through various encryption andanonymization techniques for particularly sensitive information.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of various implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of various implementations includes each dependent claim incombination with every other claim in the claim set. As used herein, aphrase referring to “at least one of” a list of items refers to anycombination of those items, including single members. As an example, “atleast one of: a, b, or c” is intended to cover a, b, c, a-b, a-c, b-c,and a-b-c, as well as any combination with multiple of the same item.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems and may be used interchangeably with “one or more.” Further, asused herein, the article “the” is intended to include one or more itemsreferenced in connection with the article “the” and may be usedinterchangeably with “the one or more.” Furthermore, as used herein, theterm “set” is intended to include one or more items (e.g., relateditems, unrelated items, or a combination of related and unrelateditems), and may be used interchangeably with “one or more.” Where onlyone item is intended, the phrase “only one” or similar language is used.Also, as used herein, the terms “has,” “have,” “having,” or the like areintended to be open-ended terms. Further, the phrase “based on” isintended to mean “based, at least in part, on” unless explicitly statedotherwise. Also, as used herein, the term “or” is intended to beinclusive when used in a series and may be used interchangeably with“and/or,” unless explicitly stated otherwise (e.g., if used incombination with “either” or “only one of”).

In the preceding specification, various example embodiments have beendescribed with reference to the accompanying drawings. It will, however,be evident that various modifications and changes may be made thereto,and additional embodiments may be implemented, without departing fromthe broader scope of the invention as set forth in the claims thatfollow. The specification and drawings are accordingly to be regarded inan illustrative rather than restrictive sense.

What is claimed is:
 1. A method, comprising: receiving, by a device andfrom a plurality of user equipment, first location data identifyingrespective first locations of the plurality of user equipments;receiving, by the device and from a core network, second location dataidentifying respective second locations of the plurality of userequipments; determining, by the device, a confidence interval associatedwith actual locations of the plurality of user equipment based on thefirst location data and the second location data; receiving, by thedevice, user equipment location data identifying a first reportedlocation of a user equipment; receiving, by the device, network locationdata identifying a second reported location of the user equipment, asreported by the core network; processing, by the device, the userequipment location data and the network location data to determine aconfidence score associated with an actual location of the userequipment; determining, by the device, whether the user equipmentlocation data is valid based on whether the confidence score is withinthe confidence interval; and performing, by the device, one or moreactions based on determining whether the user equipment location data isvalid.
 2. The method of claim 1, wherein determining whether the userequipment location data is valid based on whether the confidence scoreis within the confidence interval comprises: processing the userequipment location data and the network location data, with a machinelearning model, to determine whether the user equipment location data isvalid based on whether the confidence score is within the confidenceinterval, wherein the machine learning model is trained based on thefirst location data and the second location data.
 3. The method of claim2, further comprising: generating a first result indicating whether theuser equipment location data is valid based on whether the confidencescore is within the confidence interval; generating a second resultindicating whether the user equipment location data is valid based onprocessing the user equipment location data and the network locationdata with the machine learning model; and determining whether the userequipment location data is valid based on comparing the first result andthe second result.
 4. The method of claim 2, further comprising:training the machine learning model, with one or more of: the firstlocation data, the second location data, a heading of the userequipment, a speed of the user equipment, a time of day associated withreceipt of the first location data, a time of day associated withreceipt of the second location data, a day of a week associated withreceipt of the first location data, or a day of a week associated withreceipt of the second location data; and determining whether the userequipment location data is valid based on processing the user equipmentlocation data and the network location data with the trained machinelearning model.
 5. The method of claim 4, wherein the machine learningmodel includes one or more of: a classification machine learning model,a logistic regression machine learning model, a decision tree machinelearning model, or a support vector machine learning model.
 6. Themethod of claim 1, further comprising: applying a central limit theoremmodel, to the first location data and the second location data, tocalculate an arithmetic mean and to create a normal distribution basedon the arithmetic mean; and determining the confidence interval based onthe normal distribution.
 7. The method of claim 1, wherein the deviceincludes one or more of a base station or a multi-access edge computingdevice.
 8. A device, comprising: one or more processors configured to:receive user equipment location data identifying a latitude and alongitude of a user equipment, as reported by the user equipment;receive network location data identifying a latitude and a longitude ofthe user equipment, as reported by a core network; process the userequipment location data and the network location data to determine aconfidence score associated with an actual location of the userequipment; determine whether the confidence score is within a confidenceinterval, wherein the confidence interval is determined based onprocessing historical location data received from the core network andfrom a plurality of user equipment; process the user equipment locationdata and the network location data, when the confidence score is outsidethe confidence interval, to determine whether the user equipmentlocation data is valid; and perform one or more actions based ondetermining whether the user equipment location data is valid.
 9. Thedevice of claim 8, wherein the device includes one or more of a basestation or a multi-access edge computing device.
 10. The device of claim8, wherein the one or more processors, to determine whether theconfidence score is within the confidence interval, are configured to:determine that the confidence score is outside the confidence interval,wherein the one or more processors, to determine whether the userequipment location data is valid based on whether the confidence scoreis within the confidence interval, are configured to: determine that theuser equipment location data is invalid based on determining that theconfidence score is outside the confidence interval.
 11. The device ofclaim 8, wherein the one or more processors, to perform the one or moreactions, are configured to one or more of: disconnect the user equipmentfrom the core network and the device when the user equipment locationdata is invalid; report the user equipment to authorities when the userequipment location data is invalid; or report the user equipment to avehicle management system when the user equipment location data isinvalid.
 12. The device of claim 8, wherein the one or more processors,to perform the one or more actions, are configured to one or more of:provide, for display, information identifying the user equipment whenthe user equipment location data is invalid; provide an alertnotification when the user equipment location data is invalid; orretrain a machine learning model used to process the user equipmentlocation data based on determining whether the user equipment locationdata is valid.
 13. The device of claim 8, wherein the one or moreprocessors, to perform the one or more actions, are configured to:provide information indicating whether the user equipment location datais valid; receive feedback associated with the information indicatingwhether the user equipment location data is valid; and modify a machinelearning model used to process the user equipment location data and thenetwork location data based on the feedback.
 14. The device of claim 8,wherein the one or more processors, to perform the one or more actions,are configured to: provide information indicating whether the userequipment location data is valid; receive feedback associated with theinformation indicating whether the user equipment location data isvalid; and modify the confidence interval based on the feedback.
 15. Anon-transitory computer-readable medium storing a set of instructions,the set of instructions comprising: one or more instructions that, whenexecuted by one or more processors of a device, cause the device to:receive, from a plurality of user equipment, first location dataidentifying respective first latitudes and respective first longitudesof the plurality of user equipment; receive, from a core network, secondlocation data identifying second respective latitudes and respectivesecond longitudes of the plurality of user equipment; process the firstlocation data and the second location data to determine a confidenceinterval associated with actual locations of the plurality of userequipments; receive user equipment location data identifying a latitudeand a longitude of a user equipment, as reported by the user equipment;receive network location data identifying a latitude and a longitude ofthe user equipment, as reported by the core network; process the userequipment location data and the network location data to determine aconfidence score associated with an actual location of the userequipment; process the user equipment location data and the networklocation data, when the confidence score is outside the confidenceinterval, to determine whether the user equipment location data isvalid; and perform one or more actions based on determining whether theuser equipment location data is valid.
 16. The non-transitorycomputer-readable medium of claim 15, wherein the one or moreinstructions, when executed by the one or more processors, further causethe device to: train a machine learning model, with the first locationdata, the second location data, a heading of the user equipment, a speedof the user equipment, a time of day associated with receipt of thefirst location data, a time of day associated with receipt of the secondlocation data, a day of a week associated with receipt of the firstlocation data, and a day of a week associated with receipt of the secondlocation data, to generate a trained machine learning model, wherein,when the confidence score is outside the confidence interval, thetrained machine learning model is used to process the user equipmentlocation data and the network location data to determine whether theuser equipment location data is valid.
 17. The non-transitorycomputer-readable medium of claim 16, wherein the one or moreinstructions, that cause the device to perform the one or more actions,cause the device to one or more of: disconnect the user equipment fromthe core network and the device when the user equipment location data isinvalid; report the user equipment to authorities when the userequipment location data is invalid; report the user equipment to avehicle management system when the user equipment location data isinvalid; provide, for display, information identifying the userequipment when the user equipment location data is invalid; provide analert notification when the user equipment location data is invalid; orretrain the machine learning model used to process the user equipmentlocation data and the network location data to determine whether theuser equipment location data is valid based on determining whether theuser equipment location data is valid.
 18. The non-transitorycomputer-readable medium of claim 16, wherein the one or moreinstructions, that cause the device to perform the one or more actions,cause the device to: provide information indicating whether the userequipment location data is valid; receive feedback associated with theinformation indicating whether the user equipment location data isvalid; and modify the machine learning model used to process the userequipment location data and the network location data to determinewhether the user equipment location data is valid based on the feedback.19. The non-transitory computer-readable medium of claim 15, wherein theone or more instructions, that cause the device to process the firstlocation data and the second location data to determine the confidenceinterval, cause the device to: apply a central limit theorem model, tothe first location data and the second location data, to calculate anarithmetic mean and to create a normal distribution based on thearithmetic mean; and determine the confidence interval based on thenormal distribution.
 20. The non-transitory computer-readable medium ofclaim 15, wherein the one or more instructions, that cause the device toperform the one or more actions, cause the device to: provideinformation indicating whether the user equipment location data isvalid; receive feedback associated with the information indicatingwhether the user equipment location data is valid; and modify theconfidence interval based on the feedback.