[go: up one dir, main page]

TWI308445B - Method and system for securing wireless communications - Google Patents

Method and system for securing wireless communications Download PDF

Info

Publication number
TWI308445B
TWI308445B TW94140854A TW94140854A TWI308445B TW I308445 B TWI308445 B TW I308445B TW 94140854 A TW94140854 A TW 94140854A TW 94140854 A TW94140854 A TW 94140854A TW I308445 B TWI308445 B TW I308445B
Authority
TW
Taiwan
Prior art keywords
wireless communication
wtru
distance
communication signal
wireless
Prior art date
Application number
TW94140854A
Other languages
Chinese (zh)
Other versions
TW200627890A (en
Inventor
Reznik Alexander
Gerald Carlton Alan
Charles Louis Briancon Alain
C Shah Yogendra
R Chitrapu Prabhakar
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of TW200627890A publication Critical patent/TW200627890A/en
Application granted granted Critical
Publication of TWI308445B publication Critical patent/TWI308445B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

1^08445 九、發明說明: μ l體而言關於無線通信。更㈣地說,本發 =種藉由策略性定位這些通信之來源及/或受者以麵此 專無線通信的方法及系統。 先前技術1^08445 IX, invention description: μ l body for wireless communication. Furthermore, it is said that the present invention is a method and system for strategically locating the source and/or recipient of these communications to communicate with the wireless communication. Prior art

Ik著無線連線活動日益普及並可靠,意料巾當今受到廣 =用的所有數位運算、資料存儲及媒體存儲裝置會 hoc無線通心網路的—部分。但此等網路易於在許多方 面有㈣安全性舉例來說,個別使用者直接相互通訊 而不使用中間網路#點的Ad_h()e網路對於使用者及網路 造出新的易受攻擊特性。 為降低無線網路的易受攻擊性,頃已開發出諸如連線等 效私密(WEP)、Wi-FH呆護存取(WPA)、可擴展認證協定 (ΕΑΡ)及GsM型加密等技術。雖然這些技術提供一些保 護作用,其對於多種信任、權利、身份、私密及安全性問題 依然脆弱。舉例來說,雖然一特定無線通信節點可能具有與 一無線使用者通訊的正確WEP金鑰,但該使用者可能不知 道該特定節點是否可信。 此外,使用此等金鑰之使用者的認證通常發生在通信堆 疊之較尚層。璩此’即使是在這些控制就定位之時,一舜、質 無線使用者或籁客可能對該通信堆疊有一些(有限的)存 取。此存取創造出弱點’譬如阻斷服務攻擊及其他。 無線訊號随距離退化的事實引發一種自然的保密措 1308445 4 t 施,因為要攔戴一訊號需要夠接近來源方能偵測到該訊號。 這對小型網路來說特別顯著,其傳輸功率通常為低而且通信 通常以最高速率且以一 Ad-hoc方式進行。在許多情況中, 實體鄰近距離對於一惡意攻擊者來說可能是最難達成的屬 性。事實上,僅可在發射器之一極短鄰近距離内被偵測到的 通信不怎麼需要非常完善的保護。 因此,會期望施行一種能夠利用無線訊號退化所提供之 自然保密效果之優點的無線網路保密系統。此外,會期望確 保要傳輸給一使用者之任何資訊僅可在該使用者所在位置 存取,致使一位於該使用者附近但不是在該使用者當前所在 位置處的'竊聽者〃無法接收到傳輸給該使用者的完整訊息。 發明内容 本發明關於一種用來確保無線通信之方法及系統。在一 實施例中,以一接收器與一發射器間之距離為基礎採取不同 保密措施,藉此使無線通信中的資料只有在特定信任區内被 收到方可被解調變。在另一實施例中,多個位元串流片段藉 由多個發射器傳輸到一位於該等發射器發出之傳輸型樣相 交之一區域内的接收器。另一選擇,接收器在發射器發出之 封包資料單元(PDUs)上執行一函數。在另一實施例中, 將一調變星座之主要調變點劃分成鄰近次要調變點之叢 集,其僅可由一在發射器之範圍内的接收器解調變。在另一 實施例中,傳輸一主波形,其用具有已編碼解擾密資訊的分 級調變(HM)疊加於一 QPSK訊號。 1308445 A. ft 實施方式 在本說明書中,術語無線傳輸/接收單元〃(WTRU) 非侷限性包含一使用者設備(UE )、一行動站、一固接或行 動用戶單元、一呼叫器、一站台(STA )或任何其他能夠在 一無線環境中運作的裝置類型。在本說明書中,術語v'存取 點β (AP)非侷限性包含一基地台、一 B節點、一網點控制 器或無線環境中之任何其他介接裝置類型。 本發明係奠基於大多數傳統通道碼(例如Turbo碼、低 密度同位碼(LDPC)、或類似物)在大多數實務架構中是接 近於香農極限(Shannon limit)運作的事實。在應用於無線 通信系統時,(忽略衰落效應),接收器解調變資料的能力幾 乎是接收器解碼器處之輸入的有效SNR之一二進制函數。 本發明之特徵可被併入一積體電路(1C)内或被建構在 一含有眾多互連組件的電路中。 第1圖是一示出有效解碼器輸入SNR與一解碼器輸出 BER間之一關係的曲線圖表現。存在一臨界SNR,致使在 實際有效SNR掉到該臨界SNR以下時,該解碼器完全失效 (亦即解碼器輸出BER是1 ),且一無線通信内的資料無法 被讀取。相反地,如果解碼器輸入處的實際有效SNR高於 該臨界SNR,則解碼器輸出處之誤差可能性極低且無線通 信内的資料有極高可能性被讀取。 由於其假設通道碼逼近香農極限,故可假設編碼作業係 以香農容量速率進行。此外,最好實際上是考量頻譜效率工 作,因為這使數字結果與帶寬無關。就一複數值相加高斯白 1308445 雜訊(AWGN)通道來說,香農容量速率為: R^log2(l + SNR) 方程式(1 ) 其中SNR係以Eb/N〇取向使用。一般認定對於高於此 速率的編碼率來說,可靠資訊解碼是不可能的,且對於低於 此速率的編碼率來說,本質上來說保證有可靠的資訊解碼。 事實上,在有大區塊長度碼譬如LDPC和Turbo碼的情況 下,這是現實可行的假設。Ik's wireless connection activities are becoming more and more popular and reliable, and all the digital computing, data storage and media storage devices that are used today are part of the hoc wireless network. However, these networks are easy to have in many ways. (4) Security For example, individual users directly communicate with each other without using the intermediate network #point Ad_h()e network to create new vulnerability to users and the Internet. Attack characteristics. To reduce the vulnerability of wireless networks, technologies such as Wired Equivalent Privacy (WEP), Wi-FH Protected Access (WPA), Extensible Authentication Protocol (ΕΑΡ), and GsM-type encryption have been developed. While these technologies provide some protection, they are still vulnerable to multiple trusts, rights, identities, privacy, and security issues. For example, although a particular wireless communication node may have the correct WEP key to communicate with a wireless user, the user may not know if the particular node is trusted. In addition, the authentication of users who use these keys typically occurs at the more layers of the communication stack. In this case, even when these controls are located, a wireless consumer or hacker may have some (limited) access to the communication stack. This access creates weaknesses such as blocking service attacks and others. The fact that the wireless signal degrades with distance triggers a natural secrecy measure, because a signal needs to be close enough to the source to detect the signal. This is especially significant for small networks where the transmission power is typically low and communication is typically done at the highest rate and in an Ad-hoc manner. In many cases, the physical proximity distance may be the most difficult property to achieve for a malicious attacker. In fact, communication that can only be detected within a very short proximity of one of the transmitters does not require very good protection. Therefore, it would be desirable to implement a wireless network security system that would take advantage of the natural security provided by wireless signal degradation. In addition, it would be desirable to ensure that any information to be transmitted to a user is only accessible at the location of the user, such that an 'eavesdropper' who is located near the user but not at the user's current location cannot receive it. The complete message transmitted to the user. SUMMARY OF THE INVENTION The present invention is directed to a method and system for securing wireless communications. In one embodiment, different security measures are employed based on the distance between a receiver and a transmitter, whereby the data in the wireless communication can be demodulated only by the recipient within a particular trust zone. In another embodiment, a plurality of bit stream segments are transmitted by a plurality of transmitters to a receiver located in an area of the transmission pattern transmission from the transmitters. Alternatively, the receiver performs a function on the Packet Data Units (PDUs) sent by the transmitter. In another embodiment, the primary modulation point of a modulated constellation is divided into clusters adjacent to the secondary modulation point, which can only be demodulated by a receiver within range of the transmitter. In another embodiment, a master waveform is transmitted that is superimposed on a QPSK signal with a graded modulation (HM) having encoded descrambling information. 1308445 A. ft. In this specification, the term WTRU non-limiting includes a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, and a Station (STA) or any other type of device that can operate in a wireless environment. In this specification, the term v' access point (AP) non-limiting includes a base station, a Node B, a network controller, or any other type of interface device in a wireless environment. The present invention is based on the fact that most conventional channel codes (e.g., Turbo code, low density parity code (LDPC), or the like) operate in close proximity to the Shannon limit in most practical architectures. When applied to a wireless communication system, (ignoring the fading effect), the receiver's ability to demodulate the variable data is almost a binary function of the effective SNR of the input at the receiver decoder. Features of the invention may be incorporated into an integrated circuit (1C) or constructed in a circuit containing a plurality of interconnected components. Figure 1 is a graph showing the relationship between the effective decoder input SNR and a decoder output BER. There is a critical SNR such that when the actual effective SNR falls below the critical SNR, the decoder is completely disabled (i.e., the decoder output BER is 1) and data within a wireless communication cannot be read. Conversely, if the actual effective SNR at the decoder input is above the critical SNR, the error probability at the decoder output is extremely low and the data within the wireless communication has a very high probability of being read. Since it is assumed that the channel code is approaching the Shannon limit, it can be assumed that the coding operation is performed at the Shannon capacity rate. In addition, it is best to actually consider spectral efficiency work because it makes the digital results independent of bandwidth. For a complex value plus a Gaussian 1308445 noise (AWGN) channel, the Shannon capacity rate is: R^log2(l + SNR) Equation (1) where SNR is used in Eb/N〇 orientation. It is generally accepted that for information rates above this rate, reliable information decoding is not possible, and for encoding rates below this rate, reliable information decoding is essentially guaranteed. In fact, this is a realistic assumption in the case of large block length codes such as LDPC and Turbo codes.

SNR基本上取決於發射器與接收器間之距離。SNR對 於離發射器之距離的相依性由下述一功率定律給出: SNR{d)=^r 方程式(2) a7 其中是一在1單位距離的標稱SNR。在開闊空間中, 指數T是2,但在實務無線網路中,指數γ是介於3和4之 間,視通道拓樸而定。 今以SNRC為選定編碼架構之臨界SNR。然後,用此臨 界SNR涵蓋的距離由下式決定: d = /I 方程式(3 ) \smc 且其可以dBs為單位被改寫如下: log - (log £ - log SNRC) = - (EdB - SNRcdB ) 方程式(4) 7 r 本發明使d為保密措施之一函數。藉由動態地選擇d, 一距離比d近之接收器可用一較鬆散的保密措施運作,而一 距離比d遠之接收器會需要一較嚴格保密措施。 在一傳統通信架構中,通道編碼架構是固定的,因為要 擁有用於完全不同編碼架構之 ''可程式化〃編碼器是相當昂 貴的。因此,SNRC是固定的。然後,從方程式(3 )和(4 ), 1308^45 d可藉由控制一通信系統中之E和r而受控。為了達到此目 標,這些控制之至少一者必須依一接收器可能有或沒有的外 在保密相關資訊而變動。 E被定義為在一單位距離的標稱SNR。在現實中,E是 希望給一特定接收器之每資訊位元的傳輸功率。標稱SNR 定義是必要的,因為方程式(2)之功率定律模型對於小d 值會崩潰且導出無限SNRs。因此,控制E意味著控制每資 訊位元之輸出功率。舉例來說,每資訊位元之輸出功率的控 § 制可由下列程序之任一者或組合完成: 1) 藉由直接控制施用於特定接收器資料的輸出功率; 2) 藉由以對傳送訊號添加一附加類噪訊訊號之方式 減低輸出SNR且因而減低接收器的接收SNR。其好處在於 維持恆定輸出功率同時調節對於個別接收器的SNR。 3) 藉由控制一調變架構(例如選擇QPSK/M正交調 幅(QAM)/M移相鍵控(PSK)/頻移鍵控(FSK),或類似架構); 4) 藉由調整一位元長度(例如用於UWB系統); • 5)藉由控制傳輸作業之顫動和定時; 6 ) 藉由控制一用於送交接收器之資料的有效編碼 率,此為本發明中一較佳架構。此方法提供在一 WLAN系 統中以一維持一系統中各APs間之一致規律格點間距而不 因波動傳輸功率位準影響CSMA系統效能的方式維持APs 與WTRU間之恒定功率位準的能力; 7) 藉由改變速率匹配規則以便引發符號暨有效位元 能量之擊穿或重複; •1308445 8)藉由控制一調變指標;及 9 )藉由控制接收器將經歷到的干擾量。 干擾,制非偈限性可由下述方式之一者或組合完成: 1) 藉由應用可變干擾管理技術,譬如_望接收誇訊 A及\或干擾接收器訊號作預等化處理並改變交叉干擾被去 除或導入的程度; 2) 藉由選擇功率控制(該功率控制可為—與保密措施 共同最佳化的程序); 3) 藉由時間/頻率/碼排程來控制潛在干擾者的數量; 4) 藉由動態干擾控制(例如接通和斷開);及 节二)藉由透過—第三方信標發信,而該信標隨後發出訊 就造成附加干擾型樣。 據接ΠΛΐ多個接收天線存在的情況中,E之值可為依 =妾收IM目對於發射器之角位置⑻作出(亦即e = 丄=因而d同樣可被作成㊀之一函數。此引發另-組 技制可此性,其非侷限性包含下述方式: 接收器);以方位角、俯仰角或二者將波束成形為朝向或遠離 2) 利用智慧天線技術進行干擾管理;及 3) 傳輸型樣之導入。 (D::7 ’ 7之值取決於接收訊號的都卜勒效應範圍 广—,其通常取決於接收器 = 來人為加大都卜歸範圍。由:射"可藉由内部訊號處理 應靶圍由於,之值取決於環境的地理 1308445 ‘ j 形勢,如果發射器配備多個天線,其可藉由以一適當方式瞄 準傳送訊號的方式某種程度地控制r。 接收器可用依據本發明之無線通道偵測一敵方主動干 擾。如果接收器透過輔助構件被告知該接收器應當能夠成功 地解調變資料串流,但事實上在夠多次嘗試之後還是沒辦法 這樣做,且因為該接收器之保密措施和通信控制被以一促能 資料串流解調變的方式設定,則該接收器可認定無線通道正 在被侵犯。 • 本發明較佳用一編碼率作為一相依於接收器保密措施 的參數。一般而言,接收器解調變一訊號的能力取決於地理 形勢(有效距離),其比一直線距離更複雜。若有需要,發 射器及接收器可藉由慢慢增加(或是慢慢減少)控制參數中 之一或多者並偵測出可靠資料解碼變得可能(或是不再可 能)之點來找出二者間的有效距離。 第2圖是一依據本發明含有一發射器110和一接收器 120之通信系統100的方塊圖。發射器110包括一協定堆疊 • 單元112、一通道編碼器114、一速率匹配單元115、一多 層安全位元(MLSB)擾密器116及一實體通道處理單元 118。接收器120包括一實體通道處理單元128、一 MLSB 解擾密器126、一速率解匹配單元125、一通道解碼器124 及一協定堆疊單元122。協定堆疊單元112和122、通道編 碼器114、速率匹配單元115、速率解匹配單元125、通道 解碼器124及實體通道處理單元118和128本質上與傳統發 射器及接收器所用為相同組件。協定堆疊單元112產生一資 13 1308445 訊串流且此資訊串流被通道編碼器114纟扁石 被實體通道處理單元118更進一步步、’’碼以防錯誤,然後 〆蜒理以供 道130 (亦即一特定空中介面)傳輪。此/、、、,二由一無線通 顛倒。 ^序在接收器120 /映射成一輪出通道 通道符號。該等通道 斤有付號都必須被擾 集並予擾密。接收器The SNR basically depends on the distance between the transmitter and the receiver. The dependence of the SNR on the distance from the transmitter is given by the following power law: SNR{d) = ^r Equation (2) a7 where is the nominal SNR at 1 unit distance. In open space, the index T is 2, but in a practice wireless network, the index γ is between 3 and 4, depending on the topology of the channel. Today, SNRC is the critical SNR of the chosen coding architecture. Then, the distance covered by this critical SNR is determined by: d = /I Equation (3) \smc and it can be rewritten as dBs as follows: log - (log £ - log SNRC) = - (EdB - SNRcdB ) Equation (4) 7 r The present invention makes d a function of one of the security measures. By dynamically selecting d, a receiver that is closer than d can operate with a looser security measure, and a receiver that is farther away than d will require a stricter security measure. In a traditional communication architecture, the channel coding architecture is fixed because it is quite expensive to have a ''programmable 〃 encoder for a completely different coding architecture. Therefore, the SNRC is fixed. Then, from equations (3) and (4), 1308^45d can be controlled by controlling E and r in a communication system. In order to achieve this goal, at least one of these controls must be subject to change based on external confidentiality information that may or may not be present at the receiver. E is defined as the nominal SNR at a unit distance. In reality, E is the transmission power of each information bit that is desired to be given to a particular receiver. The nominal SNR definition is necessary because the power law model of equation (2) collapses for small d values and derives infinite SNRs. Therefore, controlling E means controlling the output power of each of the information bits. For example, the control of the output power per information bit can be accomplished by any one or combination of the following: 1) by directly controlling the output power applied to a particular receiver data; 2) by transmitting the signal in pairs Adding an additional noise-like signal reduces the output SNR and thus the receiver's received SNR. This has the advantage of maintaining a constant output power while adjusting the SNR for individual receivers. 3) By controlling a modulation architecture (such as selecting QPSK/M Quadrature Amplitude Modulation (QAM) / M Phase Shift Keying (PSK) / Frequency Shift Keying (FSK), or similar architecture); 4) by adjusting one Bit length (for example for UWB systems); • 5) by controlling the jitter and timing of the transmission operation; 6) by controlling the effective coding rate of a data for delivery to the receiver, which is a comparison of the present invention Good architecture. The method provides the ability to maintain a constant power level between APs and WTRUs in a WLAN system in a manner that maintains a consistent regular grid spacing between APs in a system without affecting the performance of the CSMA system due to fluctuating transmission power levels; 7) by changing the rate matching rule to trigger the breakdown or repetition of the symbol and effective bit energy; • 1308445 8) by controlling a modulation indicator; and 9) by controlling the amount of interference that the receiver will experience. Interference, system non-limitation can be done by one or combination of the following methods: 1) By applying variable interference management techniques, such as receiving pre-communication A and / or interference receiver signals for pre-processing and changing The extent to which cross-interference is removed or imported; 2) by selecting power control (this power control can be a procedure that is optimized together with security measures); 3) controlling potential interferers by time/frequency/code scheduling The number of; 4) by dynamic interference control (such as on and off); and section 2) by sending a message through a third-party beacon, and the beacon is subsequently sent to cause additional interference patterns. In the case where multiple receiving antennas are present, the value of E can be made according to the angular position of the transmitter (8) (ie, e = 丄 = and thus d can also be made a function of one. Initiating another set of techniques may be non-limiting, including the following: Receiver); shaping the beam toward or away from the azimuth, elevation, or both 2) using smart antenna technology for interference management; 3) Import of transfer patterns. (The value of D::7 '7 depends on the wide range of Doppler effects of the received signal.) It usually depends on the receiver = to increase the range of the Dow. By: Shooting " can be processed by internal signal Because the value depends on the geography of the environment 1308445 'j situation, if the transmitter is equipped with multiple antennas, it can control r to some extent by aiming at transmitting signals in an appropriate manner. The receiver can be used in accordance with the present invention. The wireless channel detects an active interference of the enemy. If the receiver is informed through the auxiliary component that the receiver should be able to successfully demodulate the variable stream, in fact, after enough attempts, there is no way to do so, and because The receiver's security measures and communication control are set in a manner that facilitates data stream demodulation, and the receiver can determine that the wireless channel is being invaded. • The present invention preferably uses a coding rate as a dependent receiver. The parameters of the security measures. In general, the ability of the receiver to demodulate a signal depends on the geographical situation (effective distance), which is more complicated than the straight-line distance. If necessary, The transmitter and receiver can find out by slowly increasing (or slowly reducing) one or more of the control parameters and detecting the point at which reliable data decoding becomes possible (or is no longer possible). The effective distance between the two. Figure 2 is a block diagram of a communication system 100 including a transmitter 110 and a receiver 120 in accordance with the present invention. The transmitter 110 includes a protocol stack unit 112, a channel encoder 114, and a rate. The matching unit 115, a multi-layer security bit (MLSB) scrambler 116 and a physical channel processing unit 118. The receiver 120 includes a physical channel processing unit 128, an MLSB descrambler 126, and a rate dematching unit 125. a channel decoder 124 and a protocol stacking unit 122. The protocol stacking units 112 and 122, the channel encoder 114, the rate matching unit 115, the rate dematching unit 125, the channel decoder 124, and the physical channel processing units 118 and 128 are essentially The same components are used as the conventional transmitter and receiver. The protocol stacking unit 112 generates a 13 1338445 stream and the information stream is processed by the channel encoder 114 and the flat channel is processed by the physical channel. 118 further steps, ''code to prevent errors, and then handle the pass for channel 130 (that is, a specific empty intermediation plane). This /,,,, and two are reversed by a wireless pass. / Map into a round out channel channel symbol. These channels have to be scrambled and scrambled.

通道編碼器114將一輸入資料序 符號序列。MLSB擾密器116擾密該等 符號可為位元或較高階調變符號。並非 密。MLSB擾密器116可取符號之一子 應當知道有哪些符號部分被擾密。Channel encoder 114 will enter a sequence of data sequence symbols. The MLSB snubber 116 can confuse the symbols as bit or higher order modulating symbols. Not secret. One of the symbols of the MLSB scrambler 116 may know which symbols are partially disturbed.

數個保密層依據本發明被定義。—M LSB解擾疼 能夠解擾密的已擾密符號比例取決於保密層。促在器 解擾密器126能夠解擾密的任何符號, 都會予以處理。對於MLSB解擾密器126無法解= 何符號,MLSB解擾密器126對該符號插入—消除訊號 (erasure )(亦即〇的通道觀測)。任何習知解碼器均^能力 與消除訊號運作。因此,這不會對一當今系統造成問題% 依據本發明之保岔系統在那些無法解擾密所有符號之 接收器上的效用是編碼效率的提高及每資訊位元之有效 SNR的同步減低。編碼率提高及有效snr減低的特定量取 決於保密水準,此將在下文說明。 發射器110内的速率匹配單元115依據速率匹配規則運 作’該速率匹配規則可被改變以便引發符號暨有效位元能量 之擊穿或重複。使用一具有一編碼率R的通道。R得大於每 通道符號1位元且保密層η的有效率由下式給出: 14 .1308445 方程式(5) 其中Θ代表已擾密符號的比例且en是―具備一保密層 解擾密11 (亦即接收器12G内的速率解匹配單元125) 能約解擾密的符號比例。在所有情況中,e”剩、㈣…卜 純每資訊位元SNR (更精確地說為Eb/NQ)由Eq代表。保 搶層η的有效SNR由下式給出: Εη-Ε0[ι-Θ(ι~βη)] 方程式(6)Several privacy layers are defined in accordance with the present invention. —M LSB descrambling pain The proportion of disturbed symbols that can be descrambled depends on the privacy layer. Any symbol that the descrambler 126 can descramble will be processed. For the MLSB descrambler 126, the MLSB descrambler 126 inserts an erasure (ie, channel observation). Any conventional decoder has the ability to eliminate signal operation. Therefore, this does not cause problems for a current system. The utility of the security system according to the present invention on receivers that are unable to descramble all symbols is an improvement in coding efficiency and a synchronous reduction in the effective SNR per information bit. The specific amount of increase in coding rate and effective snr reduction depends on the level of confidentiality, which will be explained below. The rate matching unit 115 within the transmitter 110 operates in accordance with a rate matching rule. The rate matching rule can be changed to cause a breakdown or repetition of the symbol and effective bit energy. A channel having a coding rate R is used. R is greater than 1 symbol per channel and the efficiency of the privacy layer η is given by: 14.1308445 Equation (5) where Θ represents the proportion of the symbol being scrambled and en is “having a secret layer descrambling 11 (i.e., the rate dematching unit 125 within the receiver 12G) is capable of approximately deciphering the symbol scale. In all cases, e”, (4), etc., per information bit SNR (more precisely Eb/NQ) is represented by Eq. The effective SNR of the layer η is given by: Εη-Ε0[ι -Θ(ι~βη)] Equation (6)

^匕率及SNR —者單純地依未擾密已知位元之比例換 舁,此由下式給出: 、 巧,1-0(1-e”) 方程式(7) 。。因此足以唯獨就此量編定分析公式。SNR對於離發 射器之距離的相依性由方程式(2)給出。 ,據本發明,經判定已知未抹除符號(亦即接收器能夠 解擾德的符號)之—特定比例,即可決定能夠解調變資料的 發射器至接收器距離。方程式⑺被代人方程式⑺中且 解d以獲得下式: 方程式(8) d: ηΕ l2% 方程式(9) 接下來,假设符號之一百分比未被抹除,方程式(5 和(6 )被代入方程式(8 )中以獲得下式: d{n): 一特定保密水準^可達到之距_百分比可被表示为 全保密(β=ι)可達到之距離的百分比。此為NSpR,其初 定義如下:^匕 rate and SNR—there is simply a ratio of undisturbed known bits, which is given by: , Qiao, 1-0(1-e)) Equation (7). The analytical formula is programmed solely for this amount. The dependence of the SNR on the distance from the transmitter is given by equation (2). According to the invention, it is determined that the un-erased symbol is known (ie, the receiver is capable of descrambling the symbol) The specific ratio can determine the transmitter-to-receiver distance that can demodulate the data. Equation (7) is solved in equation (7) and d is obtained to obtain the following equation: Equation (8) d: ηΕ l2% Equation (9) Next, assuming that one of the symbols is not erased, equations (5 and (6) are substituted into equation (8) to obtain the following equation: d{n): a specific level of confidentiality ^ achievable distance _ percentage It is expressed as a percentage of the distance that can be reached by full confidentiality (β=ι). This is NSpR, which is initially defined as follows:

方程式(10) 15 1308445 該NSPR不相依於E,但其相依於標稱傳輸速率。作為 一實例,第3圖-6呈現4種不同架構之NSPR對上已知符號 百分比的標繪圖’這四種架構分別是:R=1、7 =2 ; R==i、 r -4 ’ R=i/2、γ =2 ’ R=l/2、7 =4。從模擬結果觀測到藉 由僅顯露通道符號之50%,位於比、、完全安全,傳輸半徑 之約60%更遠處的接收器可能無法解調變資訊。因此,如 果一接收器超出其保密參數的有效距離,其理論上來說被禁 止解碼具備一遠高於50%之BER的資料。 第7圖示出一包含多個WTRUs 705、710、715、720 和725之保密網路700,該等WTRUs在多個不重疊的信任 區730、740、750或一在該等信任區外之、、不信任區76〇 内運作。信任區730、740、750及、、不信任區760依下述 方式建立: 選擇傳輸參數譬如一編碼率架構、擊穿架構、功率架構 或類似物致使一在信任區750與、、不信任區,,760間之邊界 外侧的接收器(亦即一 WTRU)無法解碼傳輸訊號,就算該 接收器徹底知道所有傳輸參數亦如此。此外,選擇一(待由 MLSB子系統實施的)位元擾密架構致使在信任區73〇内側 的接收器能夠解調變資料,即使這些接收器不知道已擾密位 兀*之任一者亦如此。接收功率會高到足以讓成功解調變作業 得以發生,即使已擾密位元是單純地用來被擊穿亦如此。 k任區740内之接收器除非知道MLSB所施用之擾密 型樣的一些部分否則不再有能力解調變發送的資料。據此, 位於彳„任區740内之接收器會被迫要與發射器經過某種類 16 1308445 型_證程序使得《相之—些必要部分向其揭露。 U區75G内之接收$就算知道向信任區内之接收 器揭露的擾密序列部分(例如藉由偷聽側通信藉此使這些接 =器被鱗存取此序列)也沒有能力解調變㈣發射器。事 實上’ $些接收H被要求要請求有關擾密序列的額外資訊 (例如其可能必須知道完整序列),且因此其必須經過一獨 立於信任區74G内之接收H (很可能是f求更高)的認證程Equation (10) 15 1308445 The NSPR is not dependent on E, but it is dependent on the nominal transmission rate. As an example, Figure 3-6 presents a plot of the known symbol percentages for the NSPR pairs of four different architectures. These four architectures are: R = 1, 7 = 2; R == i, r -4 ' R=i/2, γ = 2 'R=l/2, 7=4. It is observed from the simulation results that the receiver may not be able to demodulate the information by only revealing 50% of the channel symbol, located at a ratio, and completely safe, about 60% of the transmission radius. Therefore, if a receiver exceeds the effective distance of its secret parameters, it is theoretically prohibited to decode data with a BER well above 50%. Figure 7 shows a secure network 700 comprising a plurality of WTRUs 705, 710, 715, 720 and 725, which are in a plurality of non-overlapping trusted areas 730, 740, 750 or one outside of the trusted areas. , and the zone of untrustworthy operation within 76. The trust zones 730, 740, 750 and the untrusted zone 760 are established in the following manner: selecting a transmission parameter such as a code rate architecture, a breakdown architecture, a power architecture or the like to cause a trust zone 750 and a do not trust zone , the receiver outside the boundary of 760 (ie, a WTRU) cannot decode the transmission signal, even if the receiver knows all transmission parameters thoroughly. In addition, selecting a bit-to-disturbance architecture (to be implemented by the MLSB subsystem) causes the receivers inside the trust zone 73〇 to demodulate the data, even if the receivers do not know any of the disturbed bits* The same is true. The received power will be high enough for a successful demodulation operation to occur even if the disturbed bit is simply used to be broken down. The receiver within k-area 740 is no longer capable of demodulating the transmitted data unless it knows some portions of the tamper-type pattern applied by the MLSB. Accordingly, the receiver located in the 740 任区区 740 will be forced to go through some sort of 16 1308445 type certificate procedure to expose the necessary parts to it. The receiving $ in the 75G area knows The portion of the scrambling sequence that is exposed to the receiver in the trust zone (for example, by eavesdropping side communication so that these receivers are scaled to access the sequence) also has no ability to demodulate the (four) transmitter. In fact, Receive H is required to request additional information about the scrambling sequence (eg, it may have to know the complete sequence), and therefore it must go through a certification process that is independent of the reception H (probably f is higher) within the trust zone 74G.

序。如前所述,區域?60内之接收器在任何情況下都無法解 調變發送的資料。 依據以上所述本發明之實施例,從一發射Wtru 705 到一接收WTRU的距離是保密措施之一函數。藉由動態選 擇距離d (例如50公尺),一距離比d近的接收WTRU 71〇 可用一較鬆散的保密措施運作,而距離超過d的接收WTRU 715、720和725會需要一較嚴保密措施。 第8圖示出一包含一 AP 805和一 WTRU 810的傳統網 路800。當AP 805傳輸一位元串流815給WTRU 810,一 在AP 805之範圍内的竊聽者820能夠接收完整位元串流譬 如 111000101 。 第9圖示出一依據本發明一實施例之網路900,其包含 多個存取點(APs) 905、910、915 及一 WTRU 920 及第 8 圖之竊聽者820。藉由使用多個APs 905、910、915而不像 第8圖之傳統網路800只用單個AP 805,位元串流815被 確保不被竊聽者820解密。WTRU 920被定位在APs 905、 910及915之傳輸型樣的交會區935,藉此WTRU 920會從 17 •1308445sequence. As mentioned earlier, the area? The receiver within 60 cannot demodulate the transmitted data under any circumstances. In accordance with an embodiment of the invention described above, the distance from a transmitting Wtru 705 to a receiving WTRU is a function of privacy measures. By dynamically selecting the distance d (e.g., 50 meters), a receiving WTRU 71 that is closer than d can operate with a looser security measure, while receiving WTRUs 715, 720, and 725 that are more than d will require a stricter security. Measures. Figure 8 shows a conventional network 800 including an AP 805 and a WTRU 810. When the AP 805 transmits a one-bit stream 815 to the WTRU 810, an eavesdropper 820 within range of the AP 805 can receive a full bit stream, such as 111000101. FIG. 9 illustrates a network 900 including a plurality of access points (APs) 905, 910, 915 and a WTRU 920 and an eavesdropper 820 of FIG. 8 in accordance with an embodiment of the present invention. By using multiple APs 905, 910, 915 instead of the legacy network 800 of Figure 8, using only a single AP 805, the bit stream 815 is guaranteed not to be decrypted by the eavesdropper 820. The WTRU 920 is located at the intersection 935 of the transmission pattern of the APs 905, 910, and 915, whereby the WTRU 920 will be from 17 • 1308445

AP 905收到位元串流815之一第一片段93〇α 、、ιη//,從 AP910收到位元串流815之一第二片段93〇b 、、〇〇〇//,且從 AP915收到位元串流815之一第三片段93〇c 、、1〇1//。每一 片段930A、930B、930c被稱為一 PDU,且原始位元串流 111000101〃被稱為—服務資料單元(SDu)。然後WTRU 920從;14三個PDUs 930A、930B、930C重組整個已加密SDU。 由於竊聽者820並未實質位於aps 905、910及915之傳輸 型樣的交會區935,致使所有片段93〇A、930B、930c相較於 肇 WTRU 920係在一錯誤率下被接收’竊聽者gw無法解譯整 個位元串流815 (即使知道一密鑰亦如此)。The AP 905 receives the first segment 93 〇 α , , ηη / / of the bit stream 815, and receives the second segment 93 〇 b , 〇〇〇 / / of the bit stream 815 from the AP 910, and receives from the AP 915 The third segment 93〇c , , 1〇1// of one of the bit stream 815. Each segment 930A, 930B, 930c is referred to as a PDU, and the original bit stream 111000101 is referred to as a Service Data Unit (SDu). The WTRU 920 then reassembles the entire encrypted SDU from the 14 PDUs 930A, 930B, 930C. Since the eavesdropper 820 is not physically located in the intersection 935 of the transmission patterns of aps 905, 910, and 915, all segments 93A, 930B, and 930c are received as an eavesdropper at an error rate compared to the 肇WTRU 920. Gw cannot interpret the entire bit stream 815 (even if one knows a key).

在第9圖之網路900内,被WTRU 920解譯出來的SDU 是 111000101,其中 PDUA=in、PDUb=000 且 PDUC=1(H。 如果竊聽者820勉強解譯出這三個PDUs當中兩個(例如000 和101 )’竊聽者820會勉強得到不完整但正;的部分資訊。 在一替代實施例中,竊聽者820確實接收到的任何 PDUs只要不完整就變成無意義的。舉例來說,網路9〇〇内 • 需要發送給WTRU 920的SDU是111000101。但是,由三 個不同APs 905、910和915發出的三個PDUs(例如PDm、 PDU2、PDU3)不像第9圖所示是片段的,而是經替代選擇 致使 SDU = PDU1 XOR PDU2 XOR PDU3,其中 PDU1 = 100110011、PDU2= 110000111 且 PDU3= 101110001,致使 SDU = 100110011 XOR 110000111 XOR 101110001 二 111000101,其中XOR是一互斥或函數。因此,假設WTRU 920位在APs 905、910及915之傳輸型樣的交會區935,則 18 1308445 WTRU 920能夠接收全部三個PDUs並且x〇r這些PDUs 以解譯SDU 111000101。如果竊聽者820捕捉到這三個pDUs 當中任兩者,這對於解譯該SDU來說完全無意義。x〇R以 外之替代機制亦屬可能,譬如以一除非成功接收所有傳輸否 則就無意義的方式擾密封包並且從不同發射器發出不同位 元。 在另一實施例中,一位置型認證機制可併入第9圖之網 路 900 内。WTRU 920 從 APs 905、910 及 915 接收傳輸, 且向APs 905、910及915每一者報告其位置。基於WTRU 920 及 APs 905、910 和 915 之報告位置,APs 905、910 及 915每一者可啟動一協定以一高於或低於每一相應AP 905、910及915與WTRU 920間之標稱距離之建議編碼率 高或低的變動有效編碼率發出一訊息序列,請求來自WTRU 920之一肯定確認接收訊號(ACK)或一否定確認接收訊號 (NACK)。因此,該協定建立一準貝ij ,其以WTRU 920之 位置相對於APs 905、910及915之位置為基礎指定該WTRU 是否可解碼從APs 905、910及915收到的傳輸。如果WTRU 920報告的位置被判定是正確的,則該協定會藉由處理 WTRU 920回應於該訊息序列而被收到之ACK/NACK訊息 來查驗WTRU 920之位置的可信度。 WTRU 920之可信度的查驗亦可被進行為致使WTRU 920 (或WTRU 920之使用者)與APs 905、910及915共享 一共同秘密。舉例來說,如果APs 905、910及915要求WTRU 920指出之位置要經認證,則APs 905、910及915經由多 19 1308445 麝 t 個PDUs(其可如前所述經分段或加密)發送一 挑戰問題' 致使該、、挑戰問題”只在WTRU 92〇位於其所述位置時方 能由WTRU 920解譯。因此,WTRU 92〇除非位於一可解譯 出该々挑戰問題”的位置否則就無法、'回答"該'、挑戰問題。In the network 900 of Figure 9, the SDU interpreted by the WTRU 920 is 111000101, where PDUA = in, PDUb = 000, and PDUC = 1 (H. If the eavesdropper 820 barely interprets two of the three PDUs (e.g., 000 and 101) 'Eavesdropper 820 will barely get incomplete but positive; partial information. In an alternate embodiment, any PDUs that eavesdropper 820 does receive become meaningless as long as it is incomplete. Said, within the network 9 • The SDU that needs to be sent to the WTRU 920 is 111000101. However, three PDUs (eg PDm, PDU2, PDU3) sent by three different APs 905, 910 and 915 are not like Figure 9. The representation is fragmented, but instead SDU = PDU1 XOR PDU2 XOR PDU3, where PDU1 = 100110011, PDU2 = 110000111 and PDU3 = 101110001, resulting in SDU = 100110011 XOR 110000111 XOR 101110001 2111000101, where XOR is a mutually exclusive or Thus, assuming that the WTRU 920 is in the intersection 935 of the transmission pattern of the APs 905, 910, and 915, the 18 1308445 WTRU 920 can receive all three PDUs and x 〇 these PDUs to interpret the SDU 111000101. If the eavesdropper 820 captured Any two of these three pDUs, which is completely meaningless for interpreting the SDU. Alternative mechanisms other than x〇R are also possible, such as disturbing the sealed package in a meaningless manner unless all transmissions are successfully received and Different bits are emitted from different transmitters. In another embodiment, a location type authentication mechanism can be incorporated into network 900 of Figure 9. WTRU 920 receives transmissions from APs 905, 910, and 915, and to APs 905, Each of 910 and 915 reports its location. Based on the reporting locations of WTRU 920 and APs 905, 910, and 915, each of APs 905, 910, and 915 can initiate a protocol to be higher or lower than each corresponding AP 905, A variable sequence of high or low recommended effective coding rates between 910 and 915 and the WTRU 920 sends a sequence of messages requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920. Thus, the agreement establishes a quasi-bay ij that specifies whether the WTRU can decode transmissions received from APs 905, 910, and 915 based on the location of the WTRU 920 relative to the locations of APs 905, 910, and 915. If the location reported by the WTRU 920 is determined to be correct, the agreement will verify the confidence of the location of the WTRU 920 by processing the ACK/NACK message received by the WTRU 920 in response to the sequence of messages. The verification of the WTRU 920's confidence may also be made to cause the WTRU 920 (or the user of the WTRU 920) to share a common secret with the APs 905, 910 and 915. For example, if APs 905, 910, and 915 require the location indicated by WTRU 920 to be authenticated, then APs 905, 910, and 915 are sent via multiple 19 1308445 PDUt PDUs (which may be segmented or encrypted as previously described) A challenge issue 'causes this, challenge issue' can only be interpreted by the WTRU 920 when the WTRU 92 is in its location. Therefore, the WTRU 92 will not be in a position to interpret the challenge issue. Can't, 'answer', 'this', challenge the problem.

第1〇圖示出—分級調變(HM)架構之一實例,其由主 要和—人要變#構(在本例中分別是和)之— 組合定義。眾所周知一 QPSK調變架構係由4個調變點定 ,這二》周I點同建構QpSK調變星座。該等調變點分別 王見7Γ/2 3ττ/2、_π/2及-3 7Γ/2的載波相位且分別代表一 個位元 00、01、10釦 η 士〇/ tL w w和11。相似地,眾所周知一 BPSK調變 架構係由2個㈣點定義,這些調變點—同建構BpsK調變 星座。該等調變點分別呈現W和·0度的載波相位且分別 =表個位元〇或i。然後,該服架構係由8個調變點定 義,從主要和次要調變星座建構。 „變點分別呈現⑴24)、“㈣)、(3;r/2 :/2+ 5 )、( - K /2- 6 )、( - 7Γ /2+ 5 )、(-3 7Γ /2- (5 )、(_ 的載波相位且分別代表三個位元_、謝、〇1〇 和U1。這8個調變點構成四個叢集 、”广3 一個小間隔調變點。舉例來說,載波相位(η 一益綠Έ :/2+5 )代表的調變會構成一叢集。發射器透纪 道從該ΗΜ星座取得的符號序列,該無糾 ㈣㈣越遠會㈣並污染該訊號。整體, 二:曾,射器的接收器會收到-具備較好訊號嶋 的訊號’使得其能準破地_載波相位及所屬 20 J308445 n 個位元。但-遠離發射器的接收器通常會收到—具備較 號強度及訊號品質的訊號’使得其就算能_斷傳送符號所 屬叢集為何也可^無法辨別每—叢集内之小間_變點1 此,此m能制主要調變但無法偵測:欠要調變 此,接收ϋ能制出資料之二個位元但偵測不出第三位元。The first diagram shows an example of a hierarchical modulation (HM) architecture, which is defined by a combination of the main and the human beings (in this case, respectively). It is well known that a QPSK modulation architecture is defined by four modulation points. These two "weeks" point together with the QpSK modulation constellation. The modulation points are respectively seen in the carrier phase of 7Γ/2 3ττ/2, _π/2, and -3 7Γ/2 and represent a bit 00, 01, 10, η 士 〇 / tL w w and 11, respectively. Similarly, it is well known that a BPSK modulation architecture is defined by two (four) points, which are the same as the BpsK modulation constellation. The modulation points respectively exhibit carrier phases of W and ·0 degrees and respectively = table bits 〇 or i. The service architecture is then defined by eight modulation points, constructed from primary and secondary modulation constellations. „Change points are (1)24), “(4)), (3;r/2 :/2+ 5 ), ( - K /2 6 ), ( - 7Γ /2+ 5 ), (-3 7Γ /2- (5), (the carrier phase of _ and represent three bits _, Xie, 〇1〇 and U1 respectively. These eight modulation points constitute four clusters, "Guang 3 a small interval modulation point. For example The modulation phase represented by the carrier phase (η一益绿Έ : /2+5 ) will constitute a cluster. The transmitter will pass through the sequence of symbols obtained from the constellation, and the farther away (4) (four) will (4) and pollute the signal. Overall, two: once, the receiver of the ejector will receive a signal with a better signal ' 'so that it can break the ground _ carrier phase and its associated 20 J308445 n bits. But - away from the transmitter receiver Usually, you will receive a signal with a stronger strength and signal quality, so that even if you can _ disconnect the cluster to which the symbol belongs, you can also identify the small space in each cluster _ change point 1, this m can make the main modulation However, it is impossible to detect: it is necessary to adjust this, and the receiving device can produce two bits of data but cannot detect the third bit.

本發明此實施例可被用來實施—保密或信任區。與主要 調變點相關之資料(亦即前頭2個位元)被用—密鑰編碼或 加密或擾密,且該密鑰本身經由—符號序列之第三位元傳 輸。因此,-信任區_接收器可_到該料且用其解碼 或解密或解擾密主要資料。1純㈣接收器_測到主 要資料但彳貞料_料’因而無法解碼或_或解擾密主 要資料。妇可調變架構皆可用作本發明之主要和次要調變架 構。實例包含 M-ary PSK、M_ary FSK、M_ary QAM、或類 似物。此外,只有主要調變星座内之選定調變點可被次要叢 集疊加。最後,可施加超過兩層的分級。舉例來說,QpSK 加BPSK加BPSK呈現三層的hm。 在另只施例中,可實施一分層HM架構。第10圖示 出一種簡單兩層式架構,其中主波形是一被疊以一雙移相鍵 控(BPSK) HM的QPSK訊號。當一接收器的SNR為高, 其有可能辨別所有星座點。隨著SNR減低,要區別bpsK 層級之點與標稱QPSK星座點變困難且因而遺失HM資料。 依據本發明,已擾密資料被以主波形調變,且解擾密資 afl被以HM編碼。當接收器位於一可認出該HM的區域内 時,解擾密資訊促成成功的接收。當接收器太遠且因此無法 21 1308445This embodiment of the invention can be used to implement a privacy or trust zone. The data associated with the primary modulation point (i.e., the first 2 bits) is encoded or encrypted or scrambled, and the key itself is transmitted via the third bit of the sequence of symbols. Thus, the -trust zone_receiver can go to the material and use it to decode or decrypt or descramble the primary material. 1 pure (four) receiver _ detected the main information but the data _ material 'can not decode or _ or descramble the main information. The variability architecture can be used as the primary and secondary modulation architecture of the present invention. Examples include M-ary PSK, M_ary FSK, M_ary QAM, or the like. In addition, only selected modulation points within the main modulation constellation can be superimposed by the secondary cluster. Finally, more than two layers of grading can be applied. For example, QpSK plus BPSK plus BPSK presents a three-layer hm. In another example, a layered HM architecture can be implemented. Figure 10 illustrates a simple two-layer architecture in which the main waveform is a QPSK signal that is stacked with a double phase shift keying (BPSK) HM. When the SNR of a receiver is high, it is possible to distinguish all constellation points. As the SNR decreases, it becomes difficult to distinguish the point of the bpsK level from the nominal QPSK constellation point and thus lose the HM data. According to the present invention, the scrambled data is modulated by the main waveform, and the descrambling key afl is encoded in HM. The descrambling information facilitates successful reception when the receiver is located in an area in which the HM can be recognized. When the receiver is too far and therefore cannot be 21 1308445

提取HM資料時,必須透過其他通道明確請求解擾密資訊。 藉由改變分配給HM波形的功率,範圍可為區域受控的。 雖然已就特定組合以較佳實施例說明本發明之特徵和 元素,每一特徵或元素可在沒有較佳實施例其他特徵和元素 的條件下或是在有或沒有本發明其他特徵和元素之多種組 合的條件下使用。 22 1308445 圖式簡單說明 以下以舉例方式並參照隨附圖式更詳細地說明本發 明’圖式中: ^ 1圖是一示出一接收器解碼器之有效輸入SNR與該 解碼,之輸出BER間之一關係的曲線圖表現; 第2圖是一無線通信系統的方塊圖,其包含依據本發明 用料保練通信之-發㈣及—接㈣;When extracting HM data, the descrambling information must be explicitly requested through other channels. By varying the power assigned to the HM waveform, the range can be area controlled. Although the features and elements of the present invention have been described in terms of a particular combination of the preferred embodiments, each of the features or elements may be used without or without other features and elements of the preferred embodiments. Used under a variety of combinations. 22 1308445 BRIEF DESCRIPTION OF THE DRAWINGS The following is a more detailed description of the present invention by way of example and with reference to the accompanying drawings in which: FIG. 1 is a diagram showing the effective input SNR of a receiver decoder and the output BER of the decoding FIG. 2 is a block diagram of a wireless communication system, including a (four) and a (four) connection for the communication of materials according to the present invention;

咏第3圖是一不出規格化安全近接半徑(NSPR)與已知 符號在R=卜r =2條件下之關係的曲線圖表現; 第4圖是一示出NSPR與已知符號在R=hy=4條件 下之關係的曲線圖表現; 第5圖是一示出NSPR與已知符號在R=1/2、y 條 件下之關係的曲線圖表現; 第6圖是一示出NSPR與已知符號在R=l/2、條 件下之關係的曲線圖表現; ” 7圖是一依據本發明一實施例具備多個用來確保無 線通信之信任區的保密網路的簡圖; 第8圖是-傳統網路,其中—竊聽者可截收—從_ 傳輸到一 WTRU的位元串流; 第9圖是一依據本發明另一實施例的網路,其中多個 APs之每一者傳輪PDUs給一位於該等Aps每—者之傳輸型 樣相交之一信任區内的WTRU以確保無線通信;且和 第1〇圖示出- QPSK調變星座,其例示如何依據 明另一實施例確保無線通信。 又 23 1308445 元件符 號說明 BER 解碼器輸出 SNR 有效解碼器輸入 100 通信系統 AP 存取點 WTRU 無線傳輸/接收單元Figure 3 is a graph showing the relationship between the normalized safety close-up radius (NSPR) and the known symbol at R = bu r = 2; Figure 4 is a diagram showing NSPR and known symbols in R Fig. 5 is a graph showing the relationship between NSPR and known symbols under the condition of R = 1/2, y; Fig. 6 is a graph showing NSPR A graph representation of the relationship of known symbols at R = 1 / 2; conditions; Figure 7 is a simplified diagram of a secure network having a plurality of trusted areas for ensuring wireless communication in accordance with an embodiment of the present invention; Figure 8 is a conventional network in which - an eavesdropper can intercept - a bit stream transmitted from _ to a WTRU; Figure 9 is a network in accordance with another embodiment of the present invention, wherein a plurality of APs Each of the transmitting PDUs gives a WTRU located in one of the trusted areas of the transmission pattern of the APS to ensure wireless communication; and FIG. 1 shows a - QPSK modulated constellation, the illustration of which is based on how Another embodiment ensures wireless communication. Further 23 1308445 Component Symbol Description BER Decoder Output SNR Valid Decoder Input 100 Communication system access point AP WTRU wireless transmit / receive unit

24twenty four

Claims (1)

1308445 十、申請專利範圍: .種確保無線通#系統内之無線通信的方法,該無 線通信系統包含絲發射及接收無線通信的多個無線傳輸/ 接收單元(WTRUs),該方法包括: ^建立與該等WTRUsi一特定WTRU相關的多個不重疊 fs任區;以及1308445 X. Patent Application Range: A method for ensuring wireless communication within a wireless communication system, the wireless communication system comprising a plurality of wireless transmission/reception units (WTRUs) for transmitting and receiving wireless communication, the method comprising: a plurality of non-overlapping fs areas associated with the WTRUsi-specific WTRU; 卞,該曰特①WTRU發出一包含已調變資料的無線通信訊 使得該無線通信訊號在該等信任區之一第一信任區内被 ^時可被解調變,但在該等信任區之—第二信任區内被接 收%不可被解調變。 其中該第一信任區 WTRU —第一距離 2.如申請專利範圍第1項之方法, 涵蓋一從該特定WTRU延伸到離該特定 的區域。 、、_ 3·如中凊專利範圍第2項之方法,其中該第二信任區 :盍一從該第一距離延伸到比該第一距離更遠離該特定 WTRU之-第二距離的區域。 味、」_料㈣圍第1項之方法,其㈣無線通信訊 :夺爻捃|在一擾密序列被判定時可在該第二信任區内被 · — ^ ---丹甲琢復谘乃 %眭::於该第二信任區内之一接收器相關的使用^ 證時提供。 β•如中Μ專利範圍第1項之方法,其中_與該無線通 δ關之保後、水準是接收該無線通信訊號之一裝置與 25 1308445 該特定WTRU的距離之一函數。 私…7.如申請專利範圍第1項之方法,其中-與該無線通 。减相關之保密水準是該無線通信訊m資 訊噪比(SNR)之一函數。 / 8.如申請專利範圍第1項之方法,其卜與該無線通 U號相關之保密水準是該無線通信訊號之功率位準之一The WTRU sends a wireless communication message containing modulated data such that the wireless communication signal can be demodulated in the first trust zone of one of the trusted zones, but in the trusted zone - The % received in the second trust zone cannot be demodulated. Wherein the first trust zone WTRU - the first distance 2. The method of claim 1 of the patent scope, including extending from the particular WTRU to the particular area. The method of claim 2, wherein the second trust zone extends from the first distance to an area further than the first distance from the second distance of the particular WTRU. (4) The method of the first item, (4) wireless communication: 爻捃 爻捃 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一 在一Consultant%眭: Provided at the receiver-related use certificate of one of the second trust zones. The method of claim 1, wherein the security level of the wireless communication device is a function of the distance between the device receiving the wireless communication signal and the specific WTRU of 25 1308445. Private... 7. The method of claim 1, wherein - with the wireless communication. The correlation level of the correlation is a function of the wireless communication signal-to-noise ratio (SNR). / 8. If the method of claim 1 is applied, the confidentiality level associated with the wireless communication U is one of the power levels of the wireless communication signal. 仁竹9./中請專利範圍第1項之方法,其中—與該無線通 。訊號相關之保密水準是與該無線通信訊號㈣之 率之一函數。 關申明專利&圍第1項之方法’其中一與該無線通 i#u相關之縣轉是與各料信㈣相關之-規格化 女全近接半徑(NSPR)之一函數。 11. -種確保無線通信之無線通信的方法益 系統包含用來發射及接收無線通信的多個無線傳… 接收早兀(WTRUs),該方法包括: 寸 ,立與該等WTRUs之一特定射肋相關的多個不重 任,以及 使不同保密水準與各該等信任區建立相關性,其中— 孩特疋WTRU發出之一無線通信訊 求依據與該裝置所在的信任區相關之—保密措施進^^ I2·如申請專利範圍第η項之方法,其中該等= 之第-信任區涵蓋-從該特定WTRU 離 WTRU —第一距離的區域。 甲至I離4特 26 1308445 X < 之一1 第申請專利範Μ 12項之方法,其中該等信任區 更遠:;二壬區涵蓋一從該第一距離延伸到比該第-距離 更退離5亥特定WTRU之一第二距離的區域。 14·如申請專利範圍帛U項之方法, 發出的無線通信訊號包含已調變資料;;^ 雜區之—綺在該通信裝置位於該第―信任^内 …亥無線通信訊號被解觀,但該第二信任區之絲措施不Renzhu 9./ Please refer to the method of item 1 of the patent scope, which - with the wireless communication. The signal-related confidentiality level is a function of the rate of the wireless communication signal (4). Guan Shenming's patent & method of the first item's one of the county-related turns associated with the wireless communication i#u is a function of the normalized female close-up radius (NSPR) associated with each letter (4). 11. A method for ensuring wireless communication for wireless communication. The system includes a plurality of wireless transmissions for transmitting and receiving wireless communications... receiving early WTRUs, the method comprising: ???, a specific shot with one of the WTRUs The ribs are related to multiple non-repetitions, and the different levels of confidentiality are associated with each of the trust zones, wherein the WTRU sends a wireless communication request based on the confidence zone associated with the device's trusted zone. ^^ I2. The method of claim n, wherein the first-trust zone covers an area from the WTRU to the first distance. A to I is 4 to 26 1308445 X < 1 The method of claim 12, wherein the trust zone is further away: the second zone covers a distance from the first distance to the first distance An area that is further separated from the second distance of one of the specific WTRUs. 14. If the method of applying for patent scope 帛U is applied, the wireless communication signal sent contains the modulated data;; ^ the miscellaneous area-绮 in the communication device is located in the first “trust”... the wireless communication signal is solved, But the wire of the second zone of trust is not 通輯纽於㈣二信純㈣該無線通信訊號 &如申料職㈣14項之枝,其巾該無線通作 訊號被擾密且在-擾密序列被判定時可在該第二信任; 被解擾密。 16.如申請專利_第15項之方法,其巾該擾密序列 在-與該通信裝置相關之❹者位於該第二信任 證時被提供給該通信裝置。 他 π.如申請專利範圍第η項之方法,其中—與該無線 通信訊號相關之保密水準是該通信裝置與該特定wtru的 距離之一函數。 ,18.如申請專利範圍第U項之方法,其中一與該無線 通信訊號相關之保密水準是該無線通信訊號的每資訊位元 訊噪比(SNR)之一函數。 19•如申請專利範圍第U項之方法,其中一與該無線 通信訊號相關之保密水準是該無線通信訊號之功率位準之 一函數。 27 1308445 2〇.如申請專利範圍第n項之方法 通信訊號相關之伴密7fcm 3 ,、该無線 碼率之-函數 水#疋與㈣線通信訊號相關之一編 21·如中請專·圍第n奴方法,其巾—料 之保密水準是與各該等信任區相關之一規格 化女王近接半徑(NSPR)之一函數。 確保無線通㈣助無線通信的方法,該無線(4) The second communication of the wireless communication signal & (4), if the wireless communication signal is spoofed and the second confederation is determined when the spoofing sequence is determined; Dispelled. 16. The method of claim 15, wherein the scrambling sequence is provided to the communication device when the subscriber associated with the communication device is located at the second trust. He π. The method of claim n, wherein the security level associated with the wireless communication signal is a function of the distance of the communication device from the particular wtru. 18. The method of claim U, wherein the security level associated with the wireless communication signal is a function of a per-information bit-to-noise ratio (SNR) of the wireless communication signal. 19 • The method of claim U, wherein a level of confidentiality associated with the wireless communication signal is a function of a power level of the wireless communication signal. 27 1308445 2〇.If the method of applying for the patent range is n, the communication signal is related to the 7fcm 3 , and the wireless code rate is the function of the water #疋 and (4) line communication signal. In the method of n n slaves, the confidentiality level of the towel is a function of one of the normalized queen close radii (NSPR) associated with each of these trust zones. Ways to ensure wireless communication (four) to help wireless communication, the wireless ^手=3多個存取點(APs)及至少—無線傳輸/接收單 凡’邊方法包括: 各該等APs向該WTRU發出一位元串流之一片段,並 ^該WTRU位在各該等Aps發出之一傳輸型樣 區 域内;以及 4 WTRU將該等片段重組成該位元串流。 犛A^3德如於申清專利範圍第22項之方法,其中不可能在該 專AP傳輸型樣相交之該區域外的—位置接收所有該等片 段0 24·如申請專利範圍第22項之方法,其中各該等位元 串流片段被併人-侧封包㈣單元(pDU)内,且該wtru 將該等個別PDUs重組成-服務資料單元(SDU)。 25.如申請專利範圍第22項之方法,其中該%丁尺1;向 各該等APs報告該WTRU的位置,且該等Aps以變動有效 編碼率料―請求來自Μ WTRU之—#定相接收訊號 j^CK)或一否定確認接收訊號(NACK)的訊息序列,使 得該等APs可判斷該WTRU之位置是否正確。 28 1308445 26·如申請專利範圍第25項之方法’其中該等Aps判 斷該WTRU是否能解碼由該等APs所發送的傳輪。 27.如中請專利範圍第25項之方法’其中該等透 過經由多個封包資料單元(PDUs)向該WTRu發送一挑戰 問題來查驗該WTRU之可信度,使得該挑戰問題口有在咳 wmu位於該WTRU賴告之㈣處日村_ W1;RU解^ 並回答。 • 28. -種用於確保無線通信之無線通信系統,該系統包 括· 一接收器;及 一無線傳輸/接收單元(WTRU),其被建構為藉由傳送 了含有θ已調變資料之無線通信訊號來建立多個不重疊信任 區’使得該無線通信訊號在該接收器位於該等信任區之一第 區内時可由該接收轉調變,但在該接"錄該等 k任區之一第二信任區内時不可被解調變。 及如申請專利範圍第28項之系統,其中該第一传任 :涵蓋-從該™J延伸到離該WTRU 一第一距_區 域0 申料利範圍第29項之系統,其中該第二信佐 TT —輯延伸取該第—轉更遠離該特定 WTRU之一第二距離的區域。 二”請專利範圍第28項之系統,其中該無線通信 被且在—擾密相制定時可在該第二信任區内 29^Hand = 3 multiple access points (APs) and at least - WTRU's method includes: each of the APs sends a segment of a one-bit stream to the WTRU, and the WTRU is located at each The Aps are transmitted within one of the transmission pattern areas; and the 4 WTRUs recompose the fragments into the bit stream.牦A^3 De as in the method of claim 22 of the patent scope, wherein it is impossible to receive all such segments in the position outside the region where the transmission pattern of the specific AP intersects. 24 24 as claimed in the patent application scope The method wherein each of the bit stream segments is within a unit-side packet (four) unit (pDU), and the wtru reassembles the individual PDUs into a service data unit (SDU). 25. The method of claim 22, wherein the % sizing rule 1; reporting the location of the WTRU to each of the APs, and the Aps is morphing with a variable effective coding rate - requesting from the WTRU The message sequence of receiving the signal j^CK) or a negative acknowledgement received signal (NACK) enables the APs to determine whether the location of the WTRU is correct. 28 1308445 26. The method of claim 25, wherein the Aps determines whether the WTRU can decode the transmission transmitted by the APs. 27. The method of claim 25, wherein the WTRU is authenticated by sending a challenge question to the WTRu via a plurality of packet data units (PDUs), such that the challenge has a cough Wmu is located in the WTRU's (4) branch of the village _ W1; RU solution ^ and answer. • 28. A wireless communication system for ensuring wireless communication, the system comprising: a receiver; and a wireless transmit/receive unit (WTRU) configured to transmit wireless data containing θ modulated data The communication signal is used to establish a plurality of non-overlapping trusted areas so that the wireless communication signal can be modulated by the receiving when the receiver is located in one of the trusted areas, but in the connection It cannot be demodulated when it is in a second trust zone. And the system of claim 28, wherein the first pass includes: a system extending from the TMJ to a first distance from the WTRU, an area 0 claiming range, wherein the second The singularity of the TT is extended to the area that is further away from the second distance of one of the particular WTRUs. [2] The system of claim 28, wherein the wireless communication is in the second trusted zone when the interference phase is established.
TW94140854A 2004-11-23 2005-11-21 Method and system for securing wireless communications TWI308445B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US63073004P 2004-11-23 2004-11-23
US66185605P 2005-03-15 2005-03-15
US68425705P 2005-05-25 2005-05-25

Publications (2)

Publication Number Publication Date
TW200627890A TW200627890A (en) 2006-08-01
TWI308445B true TWI308445B (en) 2009-04-01

Family

ID=44825041

Family Applications (4)

Application Number Title Priority Date Filing Date
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication
TW98106910A TWI459779B (en) 2004-11-23 2005-11-21 Node B used in ensuring wireless communication
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW94140854A TWI308445B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications

Family Applications Before (3)

Application Number Title Priority Date Filing Date
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication
TW98106910A TWI459779B (en) 2004-11-23 2005-11-21 Node B used in ensuring wireless communication
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications

Country Status (1)

Country Link
TW (4) TWI455543B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI733338B (en) * 2020-02-18 2021-07-11 瑞昱半導體股份有限公司 Communication device and method for adjusting transmitting parameter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030065738A1 (en) * 2001-10-01 2003-04-03 Thumb Logic, Inc. Wireless information systems and methods

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI733338B (en) * 2020-02-18 2021-07-11 瑞昱半導體股份有限公司 Communication device and method for adjusting transmitting parameter

Also Published As

Publication number Publication date
TW201507418A (en) 2015-02-16
TW201002011A (en) 2010-01-01
TW200627890A (en) 2006-08-01
TWI455543B (en) 2014-10-01
TW200715786A (en) 2007-04-16
TWI459779B (en) 2014-11-01

Similar Documents

Publication Publication Date Title
JP4616351B2 (en) Method and apparatus for securing wireless communication
US8621225B2 (en) Method and apparatus for enhancing security of wireless communications
US7929409B2 (en) Orthogonal frequency division multiplexing (OFDM) method and apparatus for protecting and authenticating wirelessly transmitted digital information
Xiong et al. MIO: Enhancing wireless communications security through physical layer multiple inter-symbol obfuscation
US20070053325A1 (en) Method and apparatus for securing wireless communications
Rahbari et al. Full frame encryption and modulation obfuscation using channel-independent preamble identifier
Borle et al. Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation
Bang et al. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems
Bonati et al. SteaLTE: Private 5G cellular connectivity as a service with full-stack wireless steganography
TWI308445B (en) Method and system for securing wireless communications
HK1115972A (en) Method and apparatus for securing wireless communications
CN101167382A (en) Method and system for ensuring wireless communication
Yamanaka et al. Distributed transmission for secure wireless links based on a secret-sharing method
Lebold Physical layer watermarking of binary phase-shift keyed signals using standard gnu radio blocks
Zentner Security Implications for Wireless Local Area Networks
ISAKO WIMAX AND IT'S STATE OF DEPLOYMENT USING AVAILABLE TECHNOLOGY
HK1112355A (en) Method and apparatus for enhancing security of wireless communications

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees