[go: up one dir, main page]

TW201002011A - Method and system for securing wireless communications - Google Patents

Method and system for securing wireless communications Download PDF

Info

Publication number
TW201002011A
TW201002011A TW98106910A TW98106910A TW201002011A TW 201002011 A TW201002011 A TW 201002011A TW 98106910 A TW98106910 A TW 98106910A TW 98106910 A TW98106910 A TW 98106910A TW 201002011 A TW201002011 A TW 201002011A
Authority
TW
Taiwan
Prior art keywords
constellation
modulation
wtru
primary
modulated
Prior art date
Application number
TW98106910A
Other languages
Chinese (zh)
Other versions
TWI459779B (en
Inventor
Alexander Reznik
Alan Gerald Carlton
Alain Charles Louis Briancon
Yogendra C Shah
Prabhakar R Chitrapu
Rajat Pritam Mukherjee
Marian Rudolf
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of TW201002011A publication Critical patent/TW201002011A/en
Application granted granted Critical
Publication of TWI459779B publication Critical patent/TWI459779B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.

Description

201002011 、發明說明: 【發明所屬之技術領域】 本發明整體而言關於無線通信。更明.確 等叙 策略性定位這些通信之來毅/或受者關於 線通信的方法及系統。 【先前技術】 #用連線ί動日益普及並可靠,意料中當今受到廣泛 、有數位運异、資料存儲及媒體存 ^ 全性漏洞。舉例來說,使多方面有資料安 網路筋_ 別使用者直接相互通訊而不使用中間201002011, invention description: TECHNICAL FIELD OF THE INVENTION The present invention generally relates to wireless communication. More clearly. It is necessary to strategically locate the communication and/or the recipient's method and system for line communication. [Prior Art] #Connected lines are increasingly popular and reliable. It is expected that there are widespread, digitally-transported, data storage and media vulnerabilities. For example, there are many aspects of data security network _ users directly communicate with each other without using the middle

Ad-h〇e 為降餘_路㈣妓雜,虹 私密(聰>)、Wl_H保齡取(聊 物連線荨效 及GSM型加穷箄枯淋_ ) 了擴展織協定(ΕΑΡ) i加益寻技*。雖然這些技術提供_ / 對於多種信任 '權利、身份、私密及安全性問用’其 例來說,雖然-特定無線通信節點可能具有盘去舉 :正確猜金鑰,但該使用者可能不知道該;定節4; 此外使射b等金輸之使用者的認證 之較高層。據此,即使是在這些控制就定位二生堆疊 使用者或駭客可能對該通信讀叠有_ 从%、男無線 取創造出弱點,譬如阻斷服務攻擊及^他有限的)存取。此存 無線訊號隨距離退化的事實引發—種自然的保密措施,因 201002011 =摘截—訊號需要夠接近來源方能躺到該訊號。這對小型 、亲η來別顯著’其傳輸功率通常為低而且通信通常以最高 編°e方式進行。在許多情況中,實體鄰近距ΐ 、心心攻擊者來說可能是最難達成的屬性。事實上,僅可 常極短鄰近距_姻測到的通信不怎麼需要非 铁伴Ϊ果行—種能夠棚無線訊號退化所提供之自 【發明内容】 _ t:TT—細來麵麵触之方法及_。在1 :藉;卿 L) 可被二料,定信任區内被收到方 射器傳輸到—位於該等發射器發出之傳由多個發 =·另一選擇,接收器在發射器 (PDUs )上執行一函數。在另_ ^出之封包貝科早兀 + 分成鄰近次要調變點之 器之範圍内的接收器解調變。在/、、僅可由一在發射 形,其用具有已編 ^施例中,傳輸-主波 〇舰訊號。崎心a的分_變(HM)疊加於— 201002011 【實施方式】 在本《兒明書中,術無線傳輸/接收單元,,(^顶^)非 侷,性包含-使用者設備_、—行動站、―固接或行動用 《早:-呼叫器、一站台(STA)或任何其他能夠在一無線 壤境中運作的裝置類型。在本朗書中,術語、、存取點,,(Ap) =限f生包3基地台、一 B節點、一網點控制器或無線環 境中之任何其他介接裝置類型。 本發明係奠基於大多數傳統通道碼(例如触〇碼、低 密^位碼(咖〇、賴似物)在大多數實務_中是接近 於^練⑽細。nllmit)運作的事f。在應祕無線通信 U、略衰落效應)’接收器解調變資料的能力幾乎是接 收讀碼讀之輸人的有效SNR之—二進制函數。 月之特徵可被併入—積體電路(IC)内或被建構在 一 3有4人多互連組件的電路中。 胸^ 1圖是—示出有效解爾入S取與-解碼器輸出 ==!伽_表現。存在—臨界,致使在實 誠界陳町時,雜抑完全失效(亦 ^碼讀出BER是丨),且一無線通信内的資駐法被讀 ^相^也,域解碼器輸入處的實際後舰締該臨界 有極高之縣可祕極低的資料 _ 5 = f通道碼逼近香農極限,故可假設編碼作㈣ :,=數字結果與帶寬無關。就一複數值㈣‘ 訊(AWGN)通道來說,香農容量速率為: 201002011 i? = log2(l + ^) 方程式(1) 其中SNR係以Eb/N〇取向使用。一般認定對於高於此速 率的編碼率來說,可靠資訊解碼是不可能的,且對於低於此速 率的編碼率來說,本質上來說保證有可靠的資訊解碼。事實 上’在有大區塊長度碼譬如LDPC和Turbo碼的情況下,這是 現實可行的假設。Ad-h〇e is the _ _ road (four) noisy, Hong private secret (Cong >), Wl_H bowling take (talking about the connection effect and GSM type plus poor 箄 淋 _) extended weaving agreement (ΕΑΡ) i plus benefit seeking skills*. While these techniques provide _ / for multiple trusts 'rights, identities, privacy, and security questions', for example, although - a particular wireless communication node may have a disk to lift: correctly guess the key, but the user may not know This; the fourth section; in addition to the higher level of the certification of the user who shoots b gold. According to this, even if these controls are located, the user or the hacker may have a _from %, male wireless access to create a weak point, such as blocking service attacks and limited access. This stored wireless signal is triggered by the fact that the distance is degraded - a natural security measure, because 201002011 = extract - the signal needs to be close enough to the source to lie down to the signal. This is notable for small, pro-n's where the transmission power is usually low and communication is usually done in the highest mode. In many cases, physical proximity may be the most difficult attribute to achieve for 攻击 and heart attackers. In fact, only very short-term proximity _ marriage-measured communication does not need non-ferrous companion line--can provide shed wireless signal degradation provided by [invention content] _ t: TT - fine face touch Method and _. In 1: Borrowing; Qing L) can be transmitted to the receiver in the trusted zone. The transmitter is sent by the transmitter. A function is executed on PDUs). The receiver demodulates in the range of the packet that is separated into the vicinity of the secondary modulation point. In /, only one can be in the shape of the emission, which has the transmission-main wave signal. The sub- _ HM of Kasaki a is superimposed on - 201002011 [Embodiment] In this "Children's book, the wireless transmission/reception unit, (^ top ^) is not a bureau, the sexual inclusion - user equipment _, - Mobile stations, "fixed or mobile" "early: - pager, one station (STA) or any other type of device capable of operating in a wireless territory. In this book, the term, access point, (Ap) = limited to a base station, a Node B, a point controller, or any other type of interface device in a wireless environment. The present invention is based on the fact that most conventional channel codes (e.g., touch code, low density code (caffe, lie) are in most practice _ close to ^10 (n). In the case of the secret wireless communication U, the slightly fading effect), the ability of the receiver to demodulate the variable data is almost a binary function that receives the effective SNR of the input of the reading. The features of the month can be incorporated into an integrated circuit (IC) or constructed in a circuit with a multi-connected component of four people. The chest ^ 1 picture is - showing the effective solution into the S and - decoder output ==! gamma_performance. Existence-criticality, causing the miscellaneous failure to be completely invalid in the Chencheng Town of Shicheng District (also the code reading BER is 丨), and the resource resident method in the wireless communication is read ^^, the actual at the domain decoder input The post-shipship has a very high level of information that is extremely high in the county. _ 5 = The f-channel code approaches the Shannon limit, so the code can be assumed to be (4):, = the digital result is independent of the bandwidth. For a complex value (4) ‘AWGN channel, the Shannon capacity rate is: 201002011 i? = log2(l + ^) Equation (1) where SNR is used in Eb/N〇 orientation. It is generally accepted that for information rates above this rate, reliable information decoding is not possible, and for encoding rates below this rate, reliable information decoding is essentially guaranteed. In fact, in the case of large block length codes such as LDPC and Turbo codes, this is a realistic assumption.

SNR基本上取決於發射器與接收器間之距離。SNR對於 離發射器之距離的相依性由下述一功率定律給出: SNR^^ 方程式(2) 其中是-在i單位距離的標稱SNR。在開闊空間中,扑 數r是2,但在實務無線網路中,指數r是介於3和4之^ 複诵it is趙而宕。 。然後,用此臨界 今以SNRC為選定編碼架構之臨界汾仅 SNR涵蓋的距離由下式決定: d =The SNR basically depends on the distance between the transmitter and the receiver. The dependence of SNR on the distance from the transmitter is given by the following power law: SNR^^ Equation (2) where is the nominal SNR at i unit distance. In the open space, the number r is 2, but in the practice wireless network, the index r is between 3 and 4, and it is Zhao. . Then, with this criticality, the SNRC is the criticality of the chosen coding architecture. The distance covered by the SNR is determined by: d =

方程式(3) 砀早位破改寫如下: i〇g^Mi〇gB-i〇gsm^i(£^sm } 。 r r 她’方程式 本發明使d為保密措施之一函數。 距離比d近之接收器可用_較鬆散的保密θ措施^選擇d 比㈣之接收器會需要-較嚴格保密措施。運作,而一足 在-傳統通信_中,通麵° 擁有用於完全不同編碼架構之、、可裎式化"疋固定的,因j 的。因此,是固定的。然後,^編石馬器是相當㊂ 可藉由控制一通信系統中之£和 β式(3)和(4) 7而叉控。為了達到蝴 201002011 心些控制之至少—者必須依—接收 密相關資訊而變動。 此有或沒有的外在保 E被定義為在一單位距離的標稱s 希望給—特定接收器之每資訊位元的傳輪功率在^貫中,E是 義是必要的’因為方兹㈣力羊。標稱SNR定 崩潰且導以限_8二b d值會 氏⑽Rs。因此,控制£音 之輸_。舉例來說,每f訊位元訊位元 列程序之任-者或組合完成: 4力㈣控制可由下 ^ ^直接控制關於狀接收器資料的輪出功率. )藉由以對傳送職添加—附加類魏 . 輸出SNR且因而減低接你哭认私 方式減低 雜接_魏驗。其好處在於 3) ^ ^功率同時調節對於個別接收器的8概。 工1 一調變架構(例如選擇QPSK/M正交碉俨 =M)舰移相物PSK)__(FSK),或類似架田 4) 5) 6) f由調整—位元長度(例如用於UWB系統); 藉由控制傳輪作業之顫動和定時; = ^有_碼率,此為 中車乂佳架構。此方法提供在- WLAN系統中 以-維持一系統中各他間之一致規律格點間距而不 因波動傳輸功率位準影響⑶砸 奶與W則間之悝定功率位準的能力;切持 藉由改變速率匹配規則以便引發 之擊穿或重複; 此里 8)藉由控制一調變指標;及 8 201002011 9)藉由控制接收ϋ將經歷到的干擾量。 Γ擾ΪΓΓ紐可由下述対之―者紐合完成: 2應用可變干擾管理技術,譬如對期望接收哭訊號及 峨作鮮域職轉蚊干_去 2) 3) 4) 5) 該功率控制可為-與保密措施共同 ^時間/鮮/碼聽來㈣潛在干擾者的數量; 藉由動態干擾控制(例如接通和斷開),·及Equation (3) 砀 Early breaks and rewrites are as follows: i〇g^Mi〇gB-i〇gsm^i(£^sm } rr she's equation The invention makes d a function of privacy measures. The distance ratio d is close The receiver can use _ looser security θ measures ^ select d than (4) the receiver will need - stricter security measures. Operation, while in the traditional communication _, the interface has a completely different coding architecture, Can be & & 疋 疋 疋 疋 疋 疋 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 因 疋 疋 疋 疋 疋 疋 ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^. 7 and fork control. In order to achieve at least 201002011, some of the control must be changed according to the reception of confidential information. The external protection E with or without this is defined as the nominal s at a unit distance. The transmission power of each information bit of the receiver is in the middle, and E is the necessary 'because of the square (four) force sheep. The nominal SNR is determined to collapse and the limit is _8 bd value (10) Rs. Therefore, Control the loss of the sound of _. For example, every - or combination of the program of each bit of the bit channel is completed: 4 force (four) control ^ ^ Under direct control by the wheel on the power of the receiver information) for transmission by post added to -. Additional classes Wei output SNR and thus reducing cry recognize you pick a private manner to reduce contact heteroaryl _ Wei test. The benefit is that 3) ^ ^ power is simultaneously adjusted for individual receivers. Work 1 a modulation architecture (for example, choose QPSK / M orthogonal 碉俨 = M) ship phase shift PSK) __ (FSK), or similar field 4) 5) 6) f by adjustment - bit length (for example In the UWB system); by controlling the vibration and timing of the transfer operation; = ^ has _ code rate, this is the best structure of the car. This method provides the ability to maintain a consistent regular grid spacing between the various systems in a WLAN system without affecting the fixed power level between the milk and W in the case of a fluctuating transmission power level; By changing the rate matching rule to induce breakdown or repetition; 8) by controlling a modulation indicator; and 8 201002011 9) by controlling the amount of interference that the reception will experience. The Γ ΪΓΓ ΪΓΓ 可由 可由 可由 可由 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 Control can be - in conjunction with security measures ^ time / fresh / coded (4) the number of potential interferers; by dynamic interference control (such as switching on and off), and

過—第三方信標發信,而該信標隨後發出訊號造 成附加干擾型樣。 I 此外,在有多個接收天線存在的情況中,£之 接收器相對於發射器之角位置(θ)作出(亦即Ε )‘、),、 因而d同樣可被作成㊀之一數 )且 其非觸包含下糊:此引發[組_能性, 1)=方位角、俯仰角或二者將波束成形為朝向或遠離接收 u§ ? 2 )利用智慧天線技術進行干擾管理;及 3) 傳輸型樣之導入。 有關7,τ之值取決於接收訊號的都卜勒效應範圍 (_erSprcad),其通常取決於接㈣相對於發射器之 速度及其環境的地理形勢。但發射器可藉由内部訊號處理來人 為加大都卜勒效應範圍。.由於7之值取決於環境的地理形勢, 如果發射器配備多個天線’其可藉由以一適當方式瞎準傳送訊 號的方式某種程度地控制T。 ° 9 201002011 接收蕃可用依據本發明之 擾。如果接收器透過輔助槿絲^ 1貝貝J敵方主動干 解調變資料串流,但事實上::接收器應當能狗成功地 做’且_接收器之保密措施 參數本-圭t編碼率作為一相依於接收器保密措施的 (有效距離),°其比解調變—訊號的能力取決於地理形勢 接收器可藉由慢㈣=離更_。若有需要,發射器及 者並•出可 出二者間的有效距離。 月b(或疋不再可能)之點來找 之通信系統100的發射器110和-接收請 —道編碼器元 兀(MLSB)擾密器116及— …夕曰女王位 120包括-實體通道處理單元128接收器 -速率解匹配單元125、—、s、、 紙兕紐岔益126、 122。協定堆疊單 W解碼器124及一協定堆疊單元 元115、速率解匹配單元、、通這編碼器114、速率匹配單 理單元⑽和128林上碼11 124及實體通道處 件。協定堆叠單元^以傳統發射錢接收器所用為相同組 --編二以被通道編 步處理以供破由通道處理早7^18更進-此程序在接==::這13。(亦即-特定空中介面)傳輪。 10 201002011 通道編碼11 114將—輸人資解顺射成-輪出通道符 號序列。MLSB擾密器116擾密該等通道符號。該等通: 可為位域較高階調變魏。並非所有符制必須被二 器丨16可取符號之一子集並予擾密。接收器應當知 道有哪些符號部分被擾密。The third-party beacon sends a message, and the beacon then sends a signal to create an additional interference pattern. In addition, in the case where there are multiple receiving antennas, the receiver of £ is made (ie, Ε) ',) relative to the angular position (θ) of the transmitter, and thus d can also be made into one of the numbers) And its non-touch contains the undergap: this triggers [group_energy, 1) = azimuth, elevation angle or both to shape the beam towards or away from reception u§ 2) using smart antenna technology for interference management; and 3 ) Import of transfer patterns. Regarding 7, the value of τ depends on the Doppler effect range (_erSprcad) of the received signal, which usually depends on the speed of the connection (4) relative to the transmitter and its environment. However, the transmitter can artificially increase the Doppler effect range by internal signal processing. Since the value of 7 depends on the geographical situation of the environment, if the transmitter is equipped with multiple antennas, it can control T to some extent by arranging the signals in a suitable manner. ° 9 201002011 Receiving can be used in accordance with the present invention. If the receiver transmits the data stream through the auxiliary 槿 ^ 贝 贝 贝 敌 敌 敌 敌 敌 , , , , , , , , , , , , , 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动The rate as a (effective distance) dependent on the receiver's security measures, ° its ability to demodulate the signal - depending on the geographical situation of the receiver can be slow (four) = away _. If necessary, the transmitter and the receiver can provide an effective distance between them. The transmitter 110 of the communication system 100 and the receiving-receiving encoder 兀 (MLSB) tamper 116 and the 曰 曰 位 120 120 include the physical channel at the point of the month b (or 疋 is no longer possible) Processing unit 128 receives receiver-rate dematching unit 125, —, s, and paper 兕 126, 122. The protocol stacking single W decoder 124 and a protocol stacking unit element 115, the rate dematching unit, the encoder 114, the rate matching unit (10) and the 128 forest code 11 124 and the physical channel device. The protocol stacking unit ^ is used by the traditional transmitting money receiver as the same group - the second is to be processed by the channel to be broken by the channel processing 7^18 further - this program is connected ==::13. (ie - specific air intermediaries) pass. 10 201002011 Channel Encoding 11 114 will pass the input and output solutions into a sequence of round-out channel symbols. The MLSB scrambler 116 confuses the channel symbols. The pass: can be a higher order modulation of the bit field. Not all tokens must be subdivided and distracted by a subset of the symbols. The receiver should know which symbols are partially disturbed.

數個保密層依據本發明被定義。_他犯解擾穷哭從 能夠解擾_已_符航例取決於絲層。對於 擾密器U6能夠纖密的任何符號,现纽解擾密哭i26都奋 予以處理。對於MLSB_U 126無法解_的任何符號曰, 趾纽解擾密器126對該符號插入一消除訊號(⑽㈣)(亦 即〇的通道觀測)。任何習知解碼科有能 作。因此,這不傾m统造賴題。 示鳩 依據本發明之絲纽在雜無法簡密財符號之接 收器上的效用是編碼效率的提高及每資訊位元之有效的 同步減低。編碼率提高及有效SNR減低的蚊量取決於保密 水準,此將在下文說明。 " 發射器110内的速率匹配單元m依據速率匹配規則運 1乍i該速率匹配規則可被改變以便引發符號暨有效位元能量之 ,穿或重複。使用—具有—編碼率R的通道。R得大於^通道 符號1位元且保密層η的有效率由下式給出: 方程式(5) ”其中β代表已擾密符號的比例且en是一具備一保密層n 的解擾密器(亦即接收器120内的速率解匹配 山二 解擾密的符號比例。在所有情況中,] 私生次一. L J e,=〇、〜=1。初 。母貝訊位元SNR (更精碟地說為_〇)由E〇代表。保密層 201002011 的有效SKR由下式給出 方程式(6) 比率及SNR二者草純地依未擾密已知位元之比例換算, 此由下式給出: η^ι~θ{\~βη) 方程式(7) 因此,足以唯獨就此量編定分析公式。SNR對於離發射 器之距離的相依性由方程式(2)給出。 ” ^據本發明,經判定已知未抹除符號(亦即接收器能夠 解,密的符號)之—特定比例,即可蚊能夠解調變資料的發 射态至接收态距離。方程式(2)被代入方程式(?)中且解廿 以獲得下式:Several privacy layers are defined in accordance with the present invention. _ He committed to disturbing the poor crying from being able to descramble _ already _ voyage depends on the silk layer. For any symbol that the smuggler U6 can be dense, the new confusing and crying i26 will be handled. For any symbol ML that MLSB_U 126 cannot resolve _, the toe turbulence 126 inserts a cancellation signal ((10)(4)) into the symbol (ie, the channel observation of 〇). Any conventional decoding section is available. Therefore, this does not make a difference. The utility of the wire according to the present invention on a receiver that is incapable of being a simple symbol is an improvement in coding efficiency and an effective simultaneous reduction of each information bit. The increase in coding rate and the reduction in effective SNR depends on the level of confidentiality, which will be explained below. " The rate matching unit m in the transmitter 110 operates according to the rate matching rule. The rate matching rule can be changed to cause the symbol and the effective bit energy to be worn or repeated. Use - a channel with a coding rate R. R is greater than ^ channel symbol 1 bit and the efficiency of the secret layer η is given by: Equation (5) "where β represents the proportion of the scrambled symbol and en is a descrambler with a privacy layer n (That is, the rate in the receiver 120 matches the symbol ratio of the second de-scrambling. In all cases, the illegitimate one is. LJ e, =〇, ~=1. Initial. Mother-bein SNR ( The more refined disk is _〇) represented by E〇. The effective SKR of the security layer 201002011 is given by the following equation (6). The ratio and SNR are purely converted according to the ratio of the undisturbed known bits. It is given by: η^ι~θ{\~βη) Equation (7) Therefore, it is sufficient to formulate an analytical formula for this quantity alone. The dependence of SNR on the distance from the emitter is given by equation (2). According to the present invention, it is determined that the specific ratio of the un-erased symbols (i.e., the symbols that the receiver can solve, the dense symbols) is known, so that the mosquito can demodulate the emission state of the variable data to the receiving state distance. Equation (2) is substituted into the equation (?) and solved to obtain the following formula:

E d 丨2λ 方程式(8) ηΕ 接下來,假设符號之一百分比々未被抹除,方程式(5) 和(6)被代入方程式(8)中以獲得下式: 方程式(9) 保穷r特^保②水準77可達狀距細百分比可被表示為全 〜·( 77=1)可達到之距離的百分比。此為NSPR,其被定義 如下· 咖)=絮=權'程式(1。) 該NSPR不相〒夜於E,但其相依於標 =以圖W種不同架構之NSpR對上已^八 ,.如_構㈣是:R=1、㈤㈣、= 1/2 ^ γ —2 > R=] /〇 道符號之50%,㈣擬結飾靡1鳩由僅顯露通 :比兀王安全〃傳輸半徑之約6〇%更遠 201002011 處的接收ϋ可能無法解調變資訊。因此, 保密參數的有效距離,其理論上來說被禁止解碼具備於 50%之BER的資料。 第7圖示出一包含多個WTRUs 7〇5、71〇、715、72〇和 725之保密網路7〇〇,該# WTRUs在多個不重疊的信任區 730、740、750或一在該等信任區外之、、不信任夕區760内運 作。信任區730、740、750及、、不信任„區·依下述方式建 立:E d 丨2λ Equation (8) ηΕ Next, assuming that one of the symbols 々 is not erased, equations (5) and (6) are substituted into equation (8) to obtain the following equation: Equation (9) Poor r The percentage of the fineness of the 2nd level can be expressed as a percentage of the distance that can be reached by ~(77=1). This is NSPR, which is defined as follows: 咖) = 絮 = right 'program (1.) The NSPR does not stay up all night, but it depends on the standard = NSpR on the different architectures of the figure W. For example, _ structure (four) is: R = 1, (5) (four), = 1/2 ^ γ -2 > R =] / 50% of the martial symbol, (4) 结 靡 靡 鸠 鸠 鸠 鸠 : : : : : : : : : : ϋ The transmission radius is about 6〇% farther than the reception at 201002011. The information may not be demodulated. Therefore, the effective distance of the secret parameter is theoretically prohibited from decoding data with a BER of 50%. Figure 7 shows a secure network 7 comprising a plurality of WTRUs 7〇5, 71〇, 715, 72〇 and 725, the #WTRUs being in a plurality of non-overlapping trusted areas 730, 740, 750 or one It operates outside the zone of trust and outside of the zone of trust 760. Trust zones 730, 740, 750 and, do not trust „zone·established in the following ways:

、選擇傳輸參數譬如-編碼率雜、擊穿架構、功率架構 _似物致使-在信任區75〇與、信任區,間之邊界外 侧,接收W亦即-WTRU)紐_傳輸賊,就算該接 收器徹底知道财傳輸參數亦如此。此外,選擇—(待由见犯 ,系統貫施的)位TL擾密架構致使在信任區73〇内側的接收器 能夠解調冑龍’即使這些紐財知道已猶位元之任一者 亦如此。接收功轉高到足以讓成功解調變作業得以發生,即 使已擾密位元是單純地用來被擊穿亦如此。 信任區740内之接收器除非知道1§]8所施用之擾密型 I的-些部分否則不再有能力解調變發送的資料。據此 ,位於 L任區740内之接收器會被迫要與發射器經過某種類型的認 證程序使得擾密序列之一些必要部分向其揭露。 任區750内之接收器就算知道向信任區74〇内之接收 益揭露的擾密序列部分(例如翻偷聽側通信藉此使這些接收 益被允許存取此序列)也沒有能力解調變資料發射器。事實 上,這些接收器被要求要請求有關擾密序列的額外資訊(例如 其可能必須知道完整序列)’且因此其必須經過一獨立於信任 201002011 區740内之接收器(很可能是需求更高)的認證程序。如前所 述’區域760内之接收器在任何情況下都無法解調變發送的資 料。 依據以上所述本發明之實施例,從一發射WTRU 7〇5到 一接收WTRU的距離是保密措施之一函數。藉由動態選擇距 離d (例如50公尺),一距離比d近的接收WTRU710可用一 較鬆散的保密措施運作’而距離超過d的接收WTRU 715、720 和725會需要一較嚴保密措施。 第8圖示出一包含一 AP 805和一 WTRU 810的傳統網路 800。當AP 805傳輸一位元串流815給WTRU 810, 一在AP 805 之範圍内的竊聽者820能夠接收完整位元串流譬如 111000101 〇 第9圖示出一依據本發明一實施例之網路900,其包含多 個存取點(APs) 905、910、915及一 WTRU 920及第8圖之 竊聽者820。藉由使用多個APs905、910、915而不像第8圖 之傳統網路800只用單個AP 805,位元串流815被確保不被 竊聽者820解密。WTRU 920被定位在APs 905、910及915 之傳輸型樣的交會區935,藉此WTRU 920會從AP 905收到 位元串流815之一第一片段930Α、、11Γ,從AP 910收到位元 串流815之一第二片段930β '、000’’,且從AP 915收到位元 串流815之一第三片段930c ''10Γ。每一片段930A、930B、 930c被稱為一 PDU,且原始位元串流、'ιιι〇〇〇ι〇ι〃被稱為— 服務資料單元(SDU )。然後WTRU 920從這三個PDUs 930A、 930b、930c重組整個已加密SDU。由於竊聽者820並未實質 位於APs 905、910及915之傳輸型樣的交會區935,致使所 14 201002011 有片段930A、930B、930c相較於WTRU 920係在一錯誤率下 被接收,竊聽者820無法解譯整個位元串流815 (即使知道一 密錄亦如此)。Selecting transmission parameters such as - coding rate miscellaneous, breakdown architecture, power architecture - like causing - outside the boundary between the trust zone 75 and the trust zone, receiving W, ie, the WTRU) The receiver knows exactly what the financial transmission parameters are. In addition, the choice of - (to be seen by the system, the system is implemented) bit TL scrambling architecture enables the receiver inside the trust zone 73〇 to demodulate the dragon's even if these New Zealand knows that any of the elements are still in this way. The receive power is turned high enough for a successful demodulation operation to occur, even if the victim bit is simply used to be broken down. The receiver within the trust zone 740 will no longer be able to demodulate the transmitted data unless it knows that the portions of the tamper type I applied by 1 § 8 are no longer available. Accordingly, the receiver located in the L-Rent 740 is forced to pass the transmitter with some type of authentication procedure to expose some of the necessary portions of the scrambling sequence. The receiver within the zone 750 does not have the ability to demodulate even if it knows the portion of the scrambling sequence that is exposed to the receiving benefit within the zone of trust 74 (e.g., sneaking the communication so that the receiving benefits are allowed to access the sequence) Data transmitter. In fact, these receivers are required to request additional information about the scrambling sequence (eg, they may have to know the complete sequence)' and therefore they must go through a receiver that is independent of trust 201002011 Zone 740 (probably more demanding) ) the certification process. The receiver in the 'area 760' as described above cannot demodulate the transmitted data under any circumstances. In accordance with an embodiment of the invention described above, the distance from a transmitting WTRU 7〇5 to a receiving WTRU is a function of privacy measures. By dynamically selecting the distance d (e.g., 50 meters), a receiving WTRU 710 that is closer than d can operate with a looser security measure' and receiving WTRUs 715, 720, and 725 that are more than d would require a stricter security measure. Figure 8 shows a conventional network 800 including an AP 805 and a WTRU 810. When the AP 805 transmits a one-bit stream 815 to the WTRU 810, an eavesdropper 820 within range of the AP 805 can receive a full bit stream, such as 111000101. FIG. 9 illustrates a network in accordance with an embodiment of the present invention. 900, which includes a plurality of access points (APs) 905, 910, 915 and a WTRU 920 and an eavesdropper 820 of FIG. By using multiple APs 905, 910, 915 instead of the conventional network 800 of Figure 8, only a single AP 805 is used, the bit stream 815 is guaranteed not to be decrypted by the eavesdropper 820. The WTRU 920 is located at the rendezvous zone 935 of the transmission pattern of the APs 905, 910, and 915, whereby the WTRU 920 receives a first segment 930 Α, 11 之一 of the bit stream 815 from the AP 905, and receives the bit from the AP 910. A second segment 930β ', 000'' of stream 815 is received, and a third segment 930c ''10Γ of one of bit stream 815 is received from AP 915. Each segment 930A, 930B, 930c is referred to as a PDU, and the original bit stream, 'ιιι〇〇〇ι〇ι〃 is referred to as a Service Data Unit (SDU). The WTRU 920 then reassembles the entire encrypted SDU from the three PDUs 930A, 930b, 930c. Since the eavesdropper 820 is not physically located in the intersection 935 of the transmission patterns of the APs 905, 910, and 915, the segments 930A, 930B, and 930c are received at an error rate compared to the WTRU 920, the eavesdropper 820 cannot interpret the entire bit stream 815 (even if you know a secret note).

在第9圖之網路900内,被WTRU920解譯出來的SDU 是 111000101,其中 PDUA=111、PDUB=000 且 PDUC=10卜如 果竊聽者820勉強解譯出這三個PDUs當中兩個(例如〇〇〇和 1〇1 )’竊聽者820會勉強得到不完整但正確的部分資訊。 在一替代實施例中,竊聽者820讀實接收到的任何pj)Us 只要不完整就變成無意義的。舉例來說,網路900内需要發送 給WTRU 920的SDU是111000101。但是,由三個不同 905、910 和 915 發出的三個 PDUs(例如 PDU1、PDU2、PDU3 ;) 不像第9圖所示是片段的,而是經替代選擇致使sdu=PDU1 XOR PDU2 XOR PDU3,其中 PDU1 = 100110011、PDU2 = 110000111 且 PDU3 = 101110001,致使 SDU= 100110011 110000111 XOR 1〇111〇〇〇1 = 111〇〇〇101,其中 x〇R 是一互斥 或函數。因此’假設WTRU 920位在APs 905、910及915之 傳輸型樣的交會區935,則WTRU 920能夠接收全部三個PDUs 並且XOR這些PDUs以解譯SDU 111000101。如果竊聽者82〇 捕捉到這三個PDUs當中任兩者,這對於解譯該SDXJ來說完 全無思義。XOR以外之替代機制亦屬可能,譬如以一除非成 功接收所有傳輸否則就無意義的方式擾密封包並且從不同發 射器發出不同位元。 在另一實施例中,一位置型認證機制可併入第9圖之網 路900内。WTEU 920從APs 905、910及915接收傳輸,且 向APs 905、910及915每一者報告其位置。基於WTRU 92〇 15 201002011 及APs 905、910和915之報告位置,人ps 905、910及915每 一者可啟動一協定以一高於或低於每一相應Ap 905、910及 915與WTRU 920間之標稱距離之建議編碼率高或低的變動有 效編碼率發出一訊息序列,請求來自WTRU 920之一肯定確 認接收訊號(ACK)或一否定確認接收訊號(NACK)。因此, 該協定建立一準則,其以WTRU920之位置相對於APs905、 910及915之位置為基礎指定該WTRU是否可解碼從APs 905、910及915收到的傳輸。如果WTRU 92〇報告的位置被 判定是正確的,則該協定會藉由處理WTRU 92〇回應於該訊 息序列而被收到之ACK/N ACK訊息來查驗WTRU 920之位置 的可信度。In the network 900 of FIG. 9, the SDU interpreted by the WTRU 920 is 111000101, where PDUA=111, PDUB=000, and PDUC=10 if the eavesdropper 820 barely interprets two of the three PDUs (eg, 〇〇〇和1〇1) 'Eavesdropper 820 will barely get incomplete but correct part of the information. In an alternate embodiment, the eavesdropper 820 reads any pj)Us that are received as long as they are incomplete and become meaningless. For example, the SDU that needs to be sent to the WTRU 920 within the network 900 is 111000101. However, three PDUs (eg, PDU1, PDU2, PDU3;) issued by three different 905, 910, and 915 are not fragmented as shown in FIG. 9, but instead caused sdu=PDU1 XOR PDU2 XOR PDU3 by alternative selection, Where PDU1 = 100110011, PDU2 = 110000111 and PDU3 = 101110001, causing SDU = 100110011 110000111 XOR 1〇111〇〇〇1 = 111〇〇〇101, where x〇R is a mutually exclusive or function. Thus, assuming that the WTRU 920 is at the intersection 935 of the transmission pattern of APs 905, 910, and 915, the WTRU 920 can receive all three PDUs and XOR these PDUs to interpret the SDU 111000101. If the eavesdropper 82〇 captures either of these three PDUs, this is completely unthinkable for interpreting the SDXJ. Alternative mechanisms other than XOR are also possible, such as disturbing the sealed packet and issuing different bits from different transmitters in a meaningless manner unless all transmissions are successfully received. In another embodiment, a location type authentication mechanism can be incorporated into the network 900 of Figure 9. WTEU 920 receives transmissions from APs 905, 910, and 915 and reports its location to each of APs 905, 910, and 915. Based on the reporting locations of the WTRUs 92〇15 201002011 and APs 905, 910, and 915, each of the people ps 905, 910, and 915 can initiate an agreement to be higher or lower than each respective Ap 905, 910, and 915 and WTRU 920. The variable effective coding rate with a high or low recommended coding rate between the nominal distances sends a sequence of messages requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920. Accordingly, the protocol establishes a criterion that specifies whether the WTRU can decode transmissions received from APs 905, 910, and 915 based on the location of the WTRU 920 relative to the locations of APs 905, 910, and 915. If the location reported by the WTRU 92 is determined to be correct, the agreement will verify the confidence of the location of the WTRU 920 by processing the ACK/N ACK message received by the WTRU 92 in response to the sequence of messages.

WTRU 920之可信度的查驗亦可被進行為致使WTRU 920 (或WTRU 920之使用者)與aps 905、910及915共享一 共同秘密。舉例來說,如果APs 905、910及915要求WTRU 920 才曰出之位置要經§忍5登’則APs 905、910及915經由多個PDUs (其可如前所述經分段或加密)發送一、、挑戰問題〃,致使該 挑戰問題〃只在WTRU 920位於其所述位置時方能由WTRU 920解譯。因此,WTRU 920除非位於一可解譯出該、、挑戰問 題的位置否則就無法、、回答該、、挑戰問題。 第10圖示出一分級調變(ΗΜ)架構之一實例,其由主 要和次要調變架構(在本例中分別是qPSK和BPSK)之一組 合又義。眾所周知一 QPSK調變架構係由4個調變點定義,這 些調變點一同建構QPSK調變星座。該等調變點分別呈現冗 /2、3 ΤΓ/2、- π /2及-3 π /2的載波相位且分別代表二個位元〇〇、 01、10和11。相似地,眾所周知一 BPSK調變架構係由2個 16 201002011 =點ΐ義’這些調變點一同建構BPSK^變星座。該等調變 呈現十占和^强度的載波相位且分別代表一個位元0或 一後’該ΗΜ架構係由8個調變點定義,從主要和次要 戔星座建構。 繼调變點分別呈現(π/2-5 )、( ;τ/2+(5 )、(3ττ/2-(5 )、 )'(-ττ/2+(5 )'(-3^/2-(5 )>(-3 7γ/2+ 的载波相彳 1L且分別代表三個位元◦⑻、⑻1、_、OH、 1〇〇、101、Π 0 去? ” 1 〜The verification of the WTRU 920's confidence may also be made to cause the WTRU 920 (or the user of the WTRU 920) to share a common secret with the aps 905, 910 and 915. For example, if APs 905, 910, and 915 require the location of the WTRU 920 to be hacked, then APs 905, 910, and 915 are via multiple PDUs (which may be segmented or encrypted as previously described). Sending a challenge question causes the challenge issue to be interpreted by the WTRU 920 only when the WTRU 920 is in its location. Therefore, the WTRU 920 cannot answer, challenge, or challenge the problem unless it is located at a location that can resolve the problem. Figure 10 shows an example of a hierarchical modulation (ΗΜ) architecture that is combined with one of the primary and secondary modulation architectures (qPSK and BPSK in this example, respectively). It is well known that a QPSK modulation architecture is defined by four modulation points, which together construct a QPSK modulation constellation. The modulation points respectively represent carrier phases of redundancy / 2, 3 ΤΓ / 2, - π /2, and -3 π /2 and represent two bits 〇〇, 01, 10, and 11, respectively. Similarly, it is well known that a BPSK modulation architecture constructs a BPSK^ constellation together with two modulation points of two 16 201002011 = point ’. The modulations represent carrier phases of ten tens and tens of intensity and represent one bit 0 or one respectively. The ΗΜ architecture is defined by eight modulation points, constructed from primary and secondary 戋 constellations. Following the modulation point, respectively, (π/2-5 ), ( ;τ/2+(5 ), (3ττ/2-(5 ), )'(-ττ/2+(5 )'(-3^/ 2-(5)>(-3 7γ/2+ carrier phase 彳1L and represents three bits ◦(8), (8)1, _, OH, 1〇〇, 101, Π 0 go? ” 1 〜

隹- 和in。這8個調變點構成四個叢集,每一叢 木包S _個小間隔調變點。舉例來說,載波相位⑴^ )'( π 代表的機㈣成—㈣。發透過—無線通道發 U =該HM星座取得的符號序列,該無線通道隨訊號走得離 發射η。越%會衰減並污染該訊號。整體而言,—較接近發射器 的接收器會制-具備較好訊號強度及職品f魏號,使得 其能準確地細載波她及關3個位元。但—雜發射器的 ,收器通f會收到—具備較低訊號強度及訊號品質的訊號,使 得其就算能夠判斷傳送符號所屬叢集為何也可能無法辨別每 一叢集内之小間隔調變點。gj此,此—接收器能制主要調變 但無法躺次要調變。據此,接收器能制出資料之二個位元 但偵測不出第三位元。 本發明此實施例可被用纟實施一保密或信任區。與主要 ,變點相關之資料(亦即前頭2個位元)被用一密餘編碼或加 密或擾密’且該密鑰本身經由一符號序列之第三位元傳輸。因 此’一信任區内的接收器可偵測到該密鑰且用其解碼或解密或 解擾雄主要資料。-信任區外的接收II能彳貞湖主要資料但镇 測不到該密錄’因而無法解瑪或解密或解擾密主要資料。任何 17 201002011 调變木構έ可用作本發明之主要和次要調變架構。實例包含 M-ary PSK、M-aiy FSK、QAM、或類似物。此外,只 有主要調變星助之選定調㈣可被次要叢集疊加。最後,可 施加超過兩層的分級。舉絲說,QpSK加BpsK加BpsK呈 現三層的HM。 在另-實施例中’可實施—分層簡架構。第1Q圖示出 -種簡單觸式_,射主波形是—被私—雙移相鍵控 (BPSK) HM的qPSK訊號。當一接收器的娜為高,其有 可月b辨別所有生座點。隨著SNR減低,要區別册张層級之 點與標稱QPSK星座點變困難且因而遺失_資料。曰、 依據本發明’ 6擾密資料被以主波形調變,且解擾穷資 HM編碼。當接收器位於—可認出該胞的區域内I 解擾密資贿成成功的接收。當接❹太遠且因絲法 腿資料時’必須透過其他通道明確請求解擾密資訊[藉 變分配給HM波形的功率,範圍可為區域受控的。 —雖然已就特定組合啸佳實施例綱本發明之特徵 一特徵或元素可在沒有較佳實施例其他舰和元素的條 在有或沒有本發明其他特徵和元素之多種組合的條 【圖式簡單說明】 圖式^下以舉例方式並參照隨_式更詳細地說明本發明, 第〗圖是一示出一接收器解碼器之有效輸入§他盘 馬态之輸出BER間之一關係的曲線圖表現; 、鮮 第2圖是-無線通信系統的方塊圖,其包含依據本發明 201002011 用來確保無線通信之一發射器及—接收器; ,在【'圖疋規格化安全近接半徑(nspr)與已知符 说在r=卜r =2條件下之關係的曲線圖表現; 第4圖是一示出姻视與已知符號在R二卜r =4條件 下之關係的曲線圖表現; 〃 第5圖是-示出NSPR與已知符號在r=i/ 件下之關係的曲線圖表現; 7 2條隹- and in. These 8 modulation points form four clusters, and each cluster is S__ small interval modulation points. For example, the carrier phase (1)^)' (the π represents the machine (4) into - (4). The transmission through the wireless channel sends U = the sequence of symbols obtained by the HM constellation, the wireless channel goes with the signal η away from the signal. Attenuates and pollutes the signal. Overall, the receiver closer to the transmitter will have a better signal strength and a job number, so that it can accurately pin her and turn off 3 bits. For a multi-transmitter, the receiver will receive a signal with a lower signal strength and signal quality, so that even if it can determine the cluster to which the transmitted symbol belongs, it may not be able to distinguish the small interval modulation points in each cluster. Therefore, the receiver can be mainly modulated but cannot be placed in a secondary modulation. Accordingly, the receiver can produce two bits of data but cannot detect the third bit. This embodiment of the present invention can be Implementing a secret or zone of trust with the primary, change-related material (ie, the first 2 bits) is encoded or encrypted or scrambled with a secret and the key itself is passed through a sequence of symbols Bit transfer. So 'receiver in a trusted zone The key is detected and used to decode or decrypt or descramble the primary data. - Receive II outside the zone of trust can do the main data of the lake but the town cannot detect the secret record' and thus cannot solve the problem or decrypt or descramble The main data. Any 17 201002011 modulated wood structure can be used as the primary and secondary modulation architecture of the present invention. Examples include M-ary PSK, M-aiy FSK, QAM, or the like. In addition, only the main modulation star The selected tuning (4) can be superimposed by the secondary cluster. Finally, more than two layers can be applied. In other words, QpSK plus BpsK plus BpsK presents a three-layer HM. In another embodiment, it can be implemented - layered. Architecture. The 1Q diagram shows a simple touch _, the main waveform is the qPSK signal of the private-double phase shift keying (BPSK) HM. When the receiver's Na is high, it can be distinguished by the monthly b. With the SNR reduced, it is difficult to distinguish the point of the booklet level from the nominal QPSK constellation point and thus lose the data. 曰 According to the invention, the 6-disturbance data is modulated by the main waveform, and the solution Disturbing the HM code. When the receiver is located in the area where the cell can be recognized, I will disturb the bribe. Receiving of the work. When the connection is too far and the wire method is used, the data must be explicitly requested through other channels. [The power allocated to the HM waveform can be borrowed. The range can be controlled by the area. - Although it is specific Combination of features and features of the invention may be in the absence of preferred embodiments of other ships and elements in a strip with or without other combinations of other features and elements of the invention [simplified illustration] The present invention will be described in more detail by way of example and with reference to the accompanying drawings, which is a graph showing a relationship between the effective input of a receiver decoder and the output BER of the disc state. Figure 2 is a block diagram of a wireless communication system including one of the transmitters and receivers for ensuring wireless communication in accordance with the present invention 201002011; in ['Figure normalized safety proximity radius (nspr) and known The graph shows the relationship of the relationship under the condition of r=br=2; Fig. 4 is a graph showing the relationship between the illuminance and the known symbol under the condition of R 二卜r=4; 〃 5th Figure is - shows NSPR with known symbols at r=i /Characteristics of the relationship between / pieces; 7 2

第6圖是一示出·R與已知符號在 件下之關係的曲線圖表現; 餘 第7圖是-依據本發明一實施例具備多個用來確保無線 通仏之信任區的保密網路的簡圖; 、、’ 第8暇-傳統網路,其中_竊聽者可截收 輸到一 WTRU的位元串流; 处傳 t圖是-依據本發明另-實施例的網路,其中多個奶 之母一者傳輸PDUs給一位γ 交之-作F m 母一者之傳輸型樣相 又之/。任£内的WTRU以確保無線通信;且 另示出—QPS_變星座’其例示如何依據本發日月 另一K施例確保無線通信。 嘴乃 【主要元件符號說明】 BER 解螞器輸出 SNR 有效解碼器輸入 100 通信系統 ^ 存取點 WTRU無線傳輪/接收單元 19Figure 6 is a graph showing the relationship between · R and known symbols under the components; the remaining Figure 7 is a privacy net having a plurality of trusted areas for ensuring wireless communication according to an embodiment of the present invention. A schematic diagram of the road; , '8th 传统-traditional network, where the _ eavesdropper can intercept the bit stream that is input to a WTRU; the t-picture is - a network according to another embodiment of the present invention, Among them, one of the mothers of the milk transmits PDUs to a γ-crossing--the transmission type of the Fm mother. The WTRU within the lease ensures wireless communication; and the other shows - QPS_converted yoke, which illustrates how to ensure wireless communication in accordance with another K embodiment of the present day and month. Mouth [Major component symbol description] BER decoder output SNR effective decoder input 100 communication system ^ access point WTRU wireless transmission/receiver unit 19

Claims (1)

201002011 七、申請專利範圍: 1. 在一無線傳輸/接收單元(WTRU)中使用的裝置,該裝置包含. 接收包含一經調變之符號序列的一訊號;及 使用選自基於一主要調變星座和一次要調變星座的一分级調 變(HM)星座的一調變點來解調變所述符號序列,以使該H]v[星 座中的調變點座落於緊鄰叢集中。 2. 如申請專利範圍第1項所述之方法,其中該主要調變星座包括 四個主要調變點,每一主要調變點由二資料位元所定義。 3. 如申請專利範圍第2項所述之方法,其中該丽星座包括八個 調變點’每-叢集巾各有二個,其中每—調變點由三資料位元所 定義。 4. 如申請專利範圍第丨項所述之方法,其中該主要調變星座是一 移相鍵控(PSK)星座。 5. 如申請專利範圍第!項所述之方法,其中該主要調變星座是一 頻移鍵控(FSK)星座。 6. =申請專利範圍第丨項所述之方法,其中該主要輕星座是一 正交調幅(QAM)星座。 7. 如申請專利範圍第1項所述之方法,其中該次要調變星座是一 移相鍵控(PSK)星座。 8·如申請專利範圍第1項所述之方法,其中該次要調變星座是一 頻移鍵控(FSK)星座。 •=申请專利祀圍第1項所述之方法,其中該次要調變星座是一 正交調幅(QAM)星座。 10· —種無線傳輸/接收單元(WTRu),包含: 201002011 -接收器’配置以接收包含—經機之符號序列的一訊號; 及 _ 一解调變态,配置以使用選自基於一主要調變星座和一次要 調I:生座的一分級調變(HM)星座的一調變點來解調變所述符號 序列,以使該HM星座中的調變點座落於緊鄰叢集中。 11·如申請專利範圍第川項所述2WTRU,其中該主要調變星座 包括四個主要調變點,每一主要調變點由二資料位元所定義。 12·如申請專利範圍第11項所述之WTRU,其中該HM星座包括 八個調變點,每一叢集中各有二個,其中每一調變點由三資料位 元所定義。 13. 如申請專利範圍第10項所述之WTRU,其中該主要調變星座 是一移相鍵控星座。 14. 如申請專利範圍第10項所述之WTRU,其中該主要調變星座 疋〜頻移鍵控星座。 15. 如申請專利範圍第10項所述之WTRU,其中該主要調變星座 r 是一正交調幅星座。 16. 如申請專利範圍第項所述之WTRU,其中每一次要調變點 是由移相鍵控星座所產生。 17. 如申請專利範圍第10項所述之WTRU,其中該次要調變星座 是一頻移鍵控星座。 18. 如申請專利範圍第10項所述之WTRU,其中該次要調變星座 疋一正交調幅星座。 21201002011 VII. Patent Application Range: 1. A device for use in a WTRU, the device comprising: receiving a signal comprising a sequence of modulated symbols; and using a selected one based on a dominant modulation constellation And demodulating the symbol sequence with a modulation point of a hierarchical modulation (HM) constellation of a constellation to be modulated such that the modulation point in the constellation is located in the immediate cluster. 2. The method of claim 1, wherein the main modulation constellation comprises four main modulation points, each of the main modulation points being defined by two data bits. 3. The method of claim 2, wherein the constellation includes eight modulation points, each of which has two, each of which has a modulation point defined by three data bits. 4. The method of claim 2, wherein the primary modulation constellation is a phase shift keying (PSK) constellation. 5. If you apply for a patent scope! The method of clause wherein the primary modulated constellation is a frequency shift keying (FSK) constellation. 6. The method of claim 2, wherein the primary light constellation is a quadrature amplitude modulation (QAM) constellation. 7. The method of claim 1, wherein the secondary modulated constellation is a phase shift keying (PSK) constellation. 8. The method of claim 1, wherein the secondary modulated constellation is a frequency shift keying (FSK) constellation. • The method of claim 1, wherein the secondary modulated constellation is a quadrature amplitude modulation (QAM) constellation. a wireless transmission/reception unit (WTRu) comprising: 201002011 - a receiver configured to receive a signal containing a sequence of symbols of the machine; and a demodulation metamorphosis configured to be selected based on a primary Modulating the constellation and demodulating the symbol sequence by a modulation point of a hierarchical modulation (HM) constellation of the living plane, such that the modulation point in the HM constellation is located in the immediate cluster . 11. The 2 WTRU as claimed in claim 2, wherein the primary modulated constellation comprises four primary modulation points, each primary modulation point being defined by two data bits. 12. The WTRU as claimed in claim 11, wherein the HM constellation comprises eight modulation points, two in each cluster, wherein each modulation point is defined by three data bits. 13. The WTRU as claimed in claim 10, wherein the primary modulated constellation is a phase shift keyed constellation. 14. The WTRU as claimed in claim 10, wherein the primary modulated constellation 疋~frequency shift keying constellation. 15. The WTRU as claimed in claim 10, wherein the primary modulation constellation r is a quadrature amplitude modulation constellation. 16. The WTRU as claimed in claim 1, wherein each modulation point is generated by a phase shift keying constellation. 17. The WTRU as claimed in claim 10, wherein the secondary modulated constellation is a frequency shift keyed constellation. 18. The WTRU as claimed in claim 10, wherein the secondary modulation constellation is a quadrature amplitude modulation constellation. twenty one
TW98106910A 2004-11-23 2005-11-21 Node B used in ensuring wireless communication TWI459779B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US63073004P 2004-11-23 2004-11-23
US66185605P 2005-03-15 2005-03-15
US68425705P 2005-05-25 2005-05-25

Publications (2)

Publication Number Publication Date
TW201002011A true TW201002011A (en) 2010-01-01
TWI459779B TWI459779B (en) 2014-11-01

Family

ID=44825041

Family Applications (4)

Application Number Title Priority Date Filing Date
TW94140854A TWI308445B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW98106910A TWI459779B (en) 2004-11-23 2005-11-21 Node B used in ensuring wireless communication

Family Applications Before (3)

Application Number Title Priority Date Filing Date
TW94140854A TWI308445B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications

Country Status (1)

Country Link
TW (4) TWI308445B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI733338B (en) * 2020-02-18 2021-07-11 瑞昱半導體股份有限公司 Communication device and method for adjusting transmitting parameter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030065738A1 (en) * 2001-10-01 2003-04-03 Thumb Logic, Inc. Wireless information systems and methods

Also Published As

Publication number Publication date
TWI459779B (en) 2014-11-01
TW200715786A (en) 2007-04-16
TWI455543B (en) 2014-10-01
TW201507418A (en) 2015-02-16
TW200627890A (en) 2006-08-01
TWI308445B (en) 2009-04-01

Similar Documents

Publication Publication Date Title
US8843743B2 (en) Method and system for securing wireless communications
TWI333772B (en) Method and apparatus for enhancing security of wireless communication
Čapkun et al. Integrity codes: Message integrity protection and authentication over insecure channels
CN101068143B (en) A network device authentication method
CN109600222A (en) A kind of key generation method based on channel characteristics
Borle et al. Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation
TW201002011A (en) Method and system for securing wireless communications
CN101167382A (en) Method and system for ensuring wireless communication
Lebold Physical layer watermarking of binary phase-shift keyed signals using standard gnu radio blocks
HK1115972A (en) Method and apparatus for securing wireless communications
TWI330486B (en) Method and apparatus for securing wireless communications
Alsadi Physical Layer Security of the Internet of Things: Modeling and Analysis
Aziz et al. Data Encapsulation To Prevent Jamming Attacks In Wireless Networks
WO2017139915A1 (en) Information transmission method, device and communication system suitable for non-orthogonal multiple access
Wilhelm Feasibility and applications of a wireless firewall
Tsigkogiannis et al. Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
CN103209058A (en) Terminal, base station and communication data transmission method
Xiong Symbol-level information extraction: from bits to symbols in wireless network cross-layer design
CN110233659A (en) A kind of communication means controlling satellite communication terminal
Zentner Security Implications for Wireless Local Area Networks

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees