TWI308445B - Method and system for securing wireless communications - Google Patents
Method and system for securing wireless communications Download PDFInfo
- Publication number
- TWI308445B TWI308445B TW94140854A TW94140854A TWI308445B TW I308445 B TWI308445 B TW I308445B TW 94140854 A TW94140854 A TW 94140854A TW 94140854 A TW94140854 A TW 94140854A TW I308445 B TWI308445 B TW I308445B
- Authority
- TW
- Taiwan
- Prior art keywords
- wireless communication
- wtru
- distance
- communication signal
- wireless
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims description 69
- 238000000034 method Methods 0.000 title claims description 37
- 230000005540 biological transmission Effects 0.000 claims description 23
- 206010011224 Cough Diseases 0.000 claims 1
- 239000012634 fragment Substances 0.000 claims 1
- 238000004513 sizing Methods 0.000 claims 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 6
- 230000015556 catabolic process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 241000282414 Homo sapiens Species 0.000 description 1
- 101100172132 Mus musculus Eif3a gene Proteins 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Description
1^08445 九、發明說明: μ l體而言關於無線通信。更㈣地說,本發 =種藉由策略性定位這些通信之來源及/或受者以麵此 專無線通信的方法及系統。 先前技術1^08445 IX, invention description: μ l body for wireless communication. Furthermore, it is said that the present invention is a method and system for strategically locating the source and/or recipient of these communications to communicate with the wireless communication. Prior art
Ik著無線連線活動日益普及並可靠,意料巾當今受到廣 =用的所有數位運算、資料存儲及媒體存儲裝置會 hoc無線通心網路的—部分。但此等網路易於在許多方 面有㈣安全性舉例來說,個別使用者直接相互通訊 而不使用中間網路#點的Ad_h()e網路對於使用者及網路 造出新的易受攻擊特性。 為降低無線網路的易受攻擊性,頃已開發出諸如連線等 效私密(WEP)、Wi-FH呆護存取(WPA)、可擴展認證協定 (ΕΑΡ)及GsM型加密等技術。雖然這些技術提供一些保 護作用,其對於多種信任、權利、身份、私密及安全性問題 依然脆弱。舉例來說,雖然一特定無線通信節點可能具有與 一無線使用者通訊的正確WEP金鑰,但該使用者可能不知 道該特定節點是否可信。 此外,使用此等金鑰之使用者的認證通常發生在通信堆 疊之較尚層。璩此’即使是在這些控制就定位之時,一舜、質 無線使用者或籁客可能對該通信堆疊有一些(有限的)存 取。此存取創造出弱點’譬如阻斷服務攻擊及其他。 無線訊號随距離退化的事實引發一種自然的保密措 1308445 4 t 施,因為要攔戴一訊號需要夠接近來源方能偵測到該訊號。 這對小型網路來說特別顯著,其傳輸功率通常為低而且通信 通常以最高速率且以一 Ad-hoc方式進行。在許多情況中, 實體鄰近距離對於一惡意攻擊者來說可能是最難達成的屬 性。事實上,僅可在發射器之一極短鄰近距離内被偵測到的 通信不怎麼需要非常完善的保護。 因此,會期望施行一種能夠利用無線訊號退化所提供之 自然保密效果之優點的無線網路保密系統。此外,會期望確 保要傳輸給一使用者之任何資訊僅可在該使用者所在位置 存取,致使一位於該使用者附近但不是在該使用者當前所在 位置處的'竊聽者〃無法接收到傳輸給該使用者的完整訊息。 發明内容 本發明關於一種用來確保無線通信之方法及系統。在一 實施例中,以一接收器與一發射器間之距離為基礎採取不同 保密措施,藉此使無線通信中的資料只有在特定信任區内被 收到方可被解調變。在另一實施例中,多個位元串流片段藉 由多個發射器傳輸到一位於該等發射器發出之傳輸型樣相 交之一區域内的接收器。另一選擇,接收器在發射器發出之 封包資料單元(PDUs)上執行一函數。在另一實施例中, 將一調變星座之主要調變點劃分成鄰近次要調變點之叢 集,其僅可由一在發射器之範圍内的接收器解調變。在另一 實施例中,傳輸一主波形,其用具有已編碼解擾密資訊的分 級調變(HM)疊加於一 QPSK訊號。 1308445 A. ft 實施方式 在本說明書中,術語無線傳輸/接收單元〃(WTRU) 非侷限性包含一使用者設備(UE )、一行動站、一固接或行 動用戶單元、一呼叫器、一站台(STA )或任何其他能夠在 一無線環境中運作的裝置類型。在本說明書中,術語v'存取 點β (AP)非侷限性包含一基地台、一 B節點、一網點控制 器或無線環境中之任何其他介接裝置類型。 本發明係奠基於大多數傳統通道碼(例如Turbo碼、低 密度同位碼(LDPC)、或類似物)在大多數實務架構中是接 近於香農極限(Shannon limit)運作的事實。在應用於無線 通信系統時,(忽略衰落效應),接收器解調變資料的能力幾 乎是接收器解碼器處之輸入的有效SNR之一二進制函數。 本發明之特徵可被併入一積體電路(1C)内或被建構在 一含有眾多互連組件的電路中。 第1圖是一示出有效解碼器輸入SNR與一解碼器輸出 BER間之一關係的曲線圖表現。存在一臨界SNR,致使在 實際有效SNR掉到該臨界SNR以下時,該解碼器完全失效 (亦即解碼器輸出BER是1 ),且一無線通信内的資料無法 被讀取。相反地,如果解碼器輸入處的實際有效SNR高於 該臨界SNR,則解碼器輸出處之誤差可能性極低且無線通 信内的資料有極高可能性被讀取。 由於其假設通道碼逼近香農極限,故可假設編碼作業係 以香農容量速率進行。此外,最好實際上是考量頻譜效率工 作,因為這使數字結果與帶寬無關。就一複數值相加高斯白 1308445 雜訊(AWGN)通道來說,香農容量速率為: R^log2(l + SNR) 方程式(1 ) 其中SNR係以Eb/N〇取向使用。一般認定對於高於此 速率的編碼率來說,可靠資訊解碼是不可能的,且對於低於 此速率的編碼率來說,本質上來說保證有可靠的資訊解碼。 事實上,在有大區塊長度碼譬如LDPC和Turbo碼的情況 下,這是現實可行的假設。Ik's wireless connection activities are becoming more and more popular and reliable, and all the digital computing, data storage and media storage devices that are used today are part of the hoc wireless network. However, these networks are easy to have in many ways. (4) Security For example, individual users directly communicate with each other without using the intermediate network #point Ad_h()e network to create new vulnerability to users and the Internet. Attack characteristics. To reduce the vulnerability of wireless networks, technologies such as Wired Equivalent Privacy (WEP), Wi-FH Protected Access (WPA), Extensible Authentication Protocol (ΕΑΡ), and GsM-type encryption have been developed. While these technologies provide some protection, they are still vulnerable to multiple trusts, rights, identities, privacy, and security issues. For example, although a particular wireless communication node may have the correct WEP key to communicate with a wireless user, the user may not know if the particular node is trusted. In addition, the authentication of users who use these keys typically occurs at the more layers of the communication stack. In this case, even when these controls are located, a wireless consumer or hacker may have some (limited) access to the communication stack. This access creates weaknesses such as blocking service attacks and others. The fact that the wireless signal degrades with distance triggers a natural secrecy measure, because a signal needs to be close enough to the source to detect the signal. This is especially significant for small networks where the transmission power is typically low and communication is typically done at the highest rate and in an Ad-hoc manner. In many cases, the physical proximity distance may be the most difficult property to achieve for a malicious attacker. In fact, communication that can only be detected within a very short proximity of one of the transmitters does not require very good protection. Therefore, it would be desirable to implement a wireless network security system that would take advantage of the natural security provided by wireless signal degradation. In addition, it would be desirable to ensure that any information to be transmitted to a user is only accessible at the location of the user, such that an 'eavesdropper' who is located near the user but not at the user's current location cannot receive it. The complete message transmitted to the user. SUMMARY OF THE INVENTION The present invention is directed to a method and system for securing wireless communications. In one embodiment, different security measures are employed based on the distance between a receiver and a transmitter, whereby the data in the wireless communication can be demodulated only by the recipient within a particular trust zone. In another embodiment, a plurality of bit stream segments are transmitted by a plurality of transmitters to a receiver located in an area of the transmission pattern transmission from the transmitters. Alternatively, the receiver performs a function on the Packet Data Units (PDUs) sent by the transmitter. In another embodiment, the primary modulation point of a modulated constellation is divided into clusters adjacent to the secondary modulation point, which can only be demodulated by a receiver within range of the transmitter. In another embodiment, a master waveform is transmitted that is superimposed on a QPSK signal with a graded modulation (HM) having encoded descrambling information. 1308445 A. ft. In this specification, the term WTRU non-limiting includes a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, and a Station (STA) or any other type of device that can operate in a wireless environment. In this specification, the term v' access point (AP) non-limiting includes a base station, a Node B, a network controller, or any other type of interface device in a wireless environment. The present invention is based on the fact that most conventional channel codes (e.g., Turbo code, low density parity code (LDPC), or the like) operate in close proximity to the Shannon limit in most practical architectures. When applied to a wireless communication system, (ignoring the fading effect), the receiver's ability to demodulate the variable data is almost a binary function of the effective SNR of the input at the receiver decoder. Features of the invention may be incorporated into an integrated circuit (1C) or constructed in a circuit containing a plurality of interconnected components. Figure 1 is a graph showing the relationship between the effective decoder input SNR and a decoder output BER. There is a critical SNR such that when the actual effective SNR falls below the critical SNR, the decoder is completely disabled (i.e., the decoder output BER is 1) and data within a wireless communication cannot be read. Conversely, if the actual effective SNR at the decoder input is above the critical SNR, the error probability at the decoder output is extremely low and the data within the wireless communication has a very high probability of being read. Since it is assumed that the channel code is approaching the Shannon limit, it can be assumed that the coding operation is performed at the Shannon capacity rate. In addition, it is best to actually consider spectral efficiency work because it makes the digital results independent of bandwidth. For a complex value plus a Gaussian 1308445 noise (AWGN) channel, the Shannon capacity rate is: R^log2(l + SNR) Equation (1) where SNR is used in Eb/N〇 orientation. It is generally accepted that for information rates above this rate, reliable information decoding is not possible, and for encoding rates below this rate, reliable information decoding is essentially guaranteed. In fact, this is a realistic assumption in the case of large block length codes such as LDPC and Turbo codes.
SNR基本上取決於發射器與接收器間之距離。SNR對 於離發射器之距離的相依性由下述一功率定律給出: SNR{d)=^r 方程式(2) a7 其中是一在1單位距離的標稱SNR。在開闊空間中, 指數T是2,但在實務無線網路中,指數γ是介於3和4之 間,視通道拓樸而定。 今以SNRC為選定編碼架構之臨界SNR。然後,用此臨 界SNR涵蓋的距離由下式決定: d = /I 方程式(3 ) \smc 且其可以dBs為單位被改寫如下: log - (log £ - log SNRC) = - (EdB - SNRcdB ) 方程式(4) 7 r 本發明使d為保密措施之一函數。藉由動態地選擇d, 一距離比d近之接收器可用一較鬆散的保密措施運作,而一 距離比d遠之接收器會需要一較嚴格保密措施。 在一傳統通信架構中,通道編碼架構是固定的,因為要 擁有用於完全不同編碼架構之 ''可程式化〃編碼器是相當昂 貴的。因此,SNRC是固定的。然後,從方程式(3 )和(4 ), 1308^45 d可藉由控制一通信系統中之E和r而受控。為了達到此目 標,這些控制之至少一者必須依一接收器可能有或沒有的外 在保密相關資訊而變動。 E被定義為在一單位距離的標稱SNR。在現實中,E是 希望給一特定接收器之每資訊位元的傳輸功率。標稱SNR 定義是必要的,因為方程式(2)之功率定律模型對於小d 值會崩潰且導出無限SNRs。因此,控制E意味著控制每資 訊位元之輸出功率。舉例來說,每資訊位元之輸出功率的控 § 制可由下列程序之任一者或組合完成: 1) 藉由直接控制施用於特定接收器資料的輸出功率; 2) 藉由以對傳送訊號添加一附加類噪訊訊號之方式 減低輸出SNR且因而減低接收器的接收SNR。其好處在於 維持恆定輸出功率同時調節對於個別接收器的SNR。 3) 藉由控制一調變架構(例如選擇QPSK/M正交調 幅(QAM)/M移相鍵控(PSK)/頻移鍵控(FSK),或類似架構); 4) 藉由調整一位元長度(例如用於UWB系統); • 5)藉由控制傳輸作業之顫動和定時; 6 ) 藉由控制一用於送交接收器之資料的有效編碼 率,此為本發明中一較佳架構。此方法提供在一 WLAN系 統中以一維持一系統中各APs間之一致規律格點間距而不 因波動傳輸功率位準影響CSMA系統效能的方式維持APs 與WTRU間之恒定功率位準的能力; 7) 藉由改變速率匹配規則以便引發符號暨有效位元 能量之擊穿或重複; •1308445 8)藉由控制一調變指標;及 9 )藉由控制接收器將經歷到的干擾量。 干擾,制非偈限性可由下述方式之一者或組合完成: 1) 藉由應用可變干擾管理技術,譬如_望接收誇訊 A及\或干擾接收器訊號作預等化處理並改變交叉干擾被去 除或導入的程度; 2) 藉由選擇功率控制(該功率控制可為—與保密措施 共同最佳化的程序); 3) 藉由時間/頻率/碼排程來控制潛在干擾者的數量; 4) 藉由動態干擾控制(例如接通和斷開);及 节二)藉由透過—第三方信標發信,而該信標隨後發出訊 就造成附加干擾型樣。 據接ΠΛΐ多個接收天線存在的情況中,E之值可為依 =妾收IM目對於發射器之角位置⑻作出(亦即e = 丄=因而d同樣可被作成㊀之一函數。此引發另-組 技制可此性,其非侷限性包含下述方式: 接收器);以方位角、俯仰角或二者將波束成形為朝向或遠離 2) 利用智慧天線技術進行干擾管理;及 3) 傳輸型樣之導入。 (D::7 ’ 7之值取決於接收訊號的都卜勒效應範圍 广—,其通常取決於接收器 = 來人為加大都卜歸範圍。由:射"可藉由内部訊號處理 應靶圍由於,之值取決於環境的地理 1308445 ‘ j 形勢,如果發射器配備多個天線,其可藉由以一適當方式瞄 準傳送訊號的方式某種程度地控制r。 接收器可用依據本發明之無線通道偵測一敵方主動干 擾。如果接收器透過輔助構件被告知該接收器應當能夠成功 地解調變資料串流,但事實上在夠多次嘗試之後還是沒辦法 這樣做,且因為該接收器之保密措施和通信控制被以一促能 資料串流解調變的方式設定,則該接收器可認定無線通道正 在被侵犯。 • 本發明較佳用一編碼率作為一相依於接收器保密措施 的參數。一般而言,接收器解調變一訊號的能力取決於地理 形勢(有效距離),其比一直線距離更複雜。若有需要,發 射器及接收器可藉由慢慢增加(或是慢慢減少)控制參數中 之一或多者並偵測出可靠資料解碼變得可能(或是不再可 能)之點來找出二者間的有效距離。 第2圖是一依據本發明含有一發射器110和一接收器 120之通信系統100的方塊圖。發射器110包括一協定堆疊 • 單元112、一通道編碼器114、一速率匹配單元115、一多 層安全位元(MLSB)擾密器116及一實體通道處理單元 118。接收器120包括一實體通道處理單元128、一 MLSB 解擾密器126、一速率解匹配單元125、一通道解碼器124 及一協定堆疊單元122。協定堆疊單元112和122、通道編 碼器114、速率匹配單元115、速率解匹配單元125、通道 解碼器124及實體通道處理單元118和128本質上與傳統發 射器及接收器所用為相同組件。協定堆疊單元112產生一資 13 1308445 訊串流且此資訊串流被通道編碼器114纟扁石 被實體通道處理單元118更進一步步、’’碼以防錯誤,然後 〆蜒理以供 道130 (亦即一特定空中介面)傳輪。此/、、、,二由一無線通 顛倒。 ^序在接收器120 /映射成一輪出通道 通道符號。該等通道 斤有付號都必須被擾 集並予擾密。接收器The SNR basically depends on the distance between the transmitter and the receiver. The dependence of the SNR on the distance from the transmitter is given by the following power law: SNR{d) = ^r Equation (2) a7 where is the nominal SNR at 1 unit distance. In open space, the index T is 2, but in a practice wireless network, the index γ is between 3 and 4, depending on the topology of the channel. Today, SNRC is the critical SNR of the chosen coding architecture. Then, the distance covered by this critical SNR is determined by: d = /I Equation (3) \smc and it can be rewritten as dBs as follows: log - (log £ - log SNRC) = - (EdB - SNRcdB ) Equation (4) 7 r The present invention makes d a function of one of the security measures. By dynamically selecting d, a receiver that is closer than d can operate with a looser security measure, and a receiver that is farther away than d will require a stricter security measure. In a traditional communication architecture, the channel coding architecture is fixed because it is quite expensive to have a ''programmable 〃 encoder for a completely different coding architecture. Therefore, the SNRC is fixed. Then, from equations (3) and (4), 1308^45d can be controlled by controlling E and r in a communication system. In order to achieve this goal, at least one of these controls must be subject to change based on external confidentiality information that may or may not be present at the receiver. E is defined as the nominal SNR at a unit distance. In reality, E is the transmission power of each information bit that is desired to be given to a particular receiver. The nominal SNR definition is necessary because the power law model of equation (2) collapses for small d values and derives infinite SNRs. Therefore, controlling E means controlling the output power of each of the information bits. For example, the control of the output power per information bit can be accomplished by any one or combination of the following: 1) by directly controlling the output power applied to a particular receiver data; 2) by transmitting the signal in pairs Adding an additional noise-like signal reduces the output SNR and thus the receiver's received SNR. This has the advantage of maintaining a constant output power while adjusting the SNR for individual receivers. 3) By controlling a modulation architecture (such as selecting QPSK/M Quadrature Amplitude Modulation (QAM) / M Phase Shift Keying (PSK) / Frequency Shift Keying (FSK), or similar architecture); 4) by adjusting one Bit length (for example for UWB systems); • 5) by controlling the jitter and timing of the transmission operation; 6) by controlling the effective coding rate of a data for delivery to the receiver, which is a comparison of the present invention Good architecture. The method provides the ability to maintain a constant power level between APs and WTRUs in a WLAN system in a manner that maintains a consistent regular grid spacing between APs in a system without affecting the performance of the CSMA system due to fluctuating transmission power levels; 7) by changing the rate matching rule to trigger the breakdown or repetition of the symbol and effective bit energy; • 1308445 8) by controlling a modulation indicator; and 9) by controlling the amount of interference that the receiver will experience. Interference, system non-limitation can be done by one or combination of the following methods: 1) By applying variable interference management techniques, such as receiving pre-communication A and / or interference receiver signals for pre-processing and changing The extent to which cross-interference is removed or imported; 2) by selecting power control (this power control can be a procedure that is optimized together with security measures); 3) controlling potential interferers by time/frequency/code scheduling The number of; 4) by dynamic interference control (such as on and off); and section 2) by sending a message through a third-party beacon, and the beacon is subsequently sent to cause additional interference patterns. In the case where multiple receiving antennas are present, the value of E can be made according to the angular position of the transmitter (8) (ie, e = 丄 = and thus d can also be made a function of one. Initiating another set of techniques may be non-limiting, including the following: Receiver); shaping the beam toward or away from the azimuth, elevation, or both 2) using smart antenna technology for interference management; 3) Import of transfer patterns. (The value of D::7 '7 depends on the wide range of Doppler effects of the received signal.) It usually depends on the receiver = to increase the range of the Dow. By: Shooting " can be processed by internal signal Because the value depends on the geography of the environment 1308445 'j situation, if the transmitter is equipped with multiple antennas, it can control r to some extent by aiming at transmitting signals in an appropriate manner. The receiver can be used in accordance with the present invention. The wireless channel detects an active interference of the enemy. If the receiver is informed through the auxiliary component that the receiver should be able to successfully demodulate the variable stream, in fact, after enough attempts, there is no way to do so, and because The receiver's security measures and communication control are set in a manner that facilitates data stream demodulation, and the receiver can determine that the wireless channel is being invaded. • The present invention preferably uses a coding rate as a dependent receiver. The parameters of the security measures. In general, the ability of the receiver to demodulate a signal depends on the geographical situation (effective distance), which is more complicated than the straight-line distance. If necessary, The transmitter and receiver can find out by slowly increasing (or slowly reducing) one or more of the control parameters and detecting the point at which reliable data decoding becomes possible (or is no longer possible). The effective distance between the two. Figure 2 is a block diagram of a communication system 100 including a transmitter 110 and a receiver 120 in accordance with the present invention. The transmitter 110 includes a protocol stack unit 112, a channel encoder 114, and a rate. The matching unit 115, a multi-layer security bit (MLSB) scrambler 116 and a physical channel processing unit 118. The receiver 120 includes a physical channel processing unit 128, an MLSB descrambler 126, and a rate dematching unit 125. a channel decoder 124 and a protocol stacking unit 122. The protocol stacking units 112 and 122, the channel encoder 114, the rate matching unit 115, the rate dematching unit 125, the channel decoder 124, and the physical channel processing units 118 and 128 are essentially The same components are used as the conventional transmitter and receiver. The protocol stacking unit 112 generates a 13 1338445 stream and the information stream is processed by the channel encoder 114 and the flat channel is processed by the physical channel. 118 further steps, ''code to prevent errors, and then handle the pass for channel 130 (that is, a specific empty intermediation plane). This /,,,, and two are reversed by a wireless pass. / Map into a round out channel channel symbol. These channels have to be scrambled and scrambled.
通道編碼器114將一輸入資料序 符號序列。MLSB擾密器116擾密該等 符號可為位元或較高階調變符號。並非 密。MLSB擾密器116可取符號之一子 應當知道有哪些符號部分被擾密。Channel encoder 114 will enter a sequence of data sequence symbols. The MLSB snubber 116 can confuse the symbols as bit or higher order modulating symbols. Not secret. One of the symbols of the MLSB scrambler 116 may know which symbols are partially disturbed.
數個保密層依據本發明被定義。—M LSB解擾疼 能夠解擾密的已擾密符號比例取決於保密層。促在器 解擾密器126能夠解擾密的任何符號, 都會予以處理。對於MLSB解擾密器126無法解= 何符號,MLSB解擾密器126對該符號插入—消除訊號 (erasure )(亦即〇的通道觀測)。任何習知解碼器均^能力 與消除訊號運作。因此,這不會對一當今系統造成問題% 依據本發明之保岔系統在那些無法解擾密所有符號之 接收器上的效用是編碼效率的提高及每資訊位元之有效 SNR的同步減低。編碼率提高及有效snr減低的特定量取 決於保密水準,此將在下文說明。 發射器110内的速率匹配單元115依據速率匹配規則運 作’該速率匹配規則可被改變以便引發符號暨有效位元能量 之擊穿或重複。使用一具有一編碼率R的通道。R得大於每 通道符號1位元且保密層η的有效率由下式給出: 14 .1308445 方程式(5) 其中Θ代表已擾密符號的比例且en是―具備一保密層 解擾密11 (亦即接收器12G内的速率解匹配單元125) 能約解擾密的符號比例。在所有情況中,e”剩、㈣…卜 純每資訊位元SNR (更精確地說為Eb/NQ)由Eq代表。保 搶層η的有效SNR由下式給出: Εη-Ε0[ι-Θ(ι~βη)] 方程式(6)Several privacy layers are defined in accordance with the present invention. —M LSB descrambling pain The proportion of disturbed symbols that can be descrambled depends on the privacy layer. Any symbol that the descrambler 126 can descramble will be processed. For the MLSB descrambler 126, the MLSB descrambler 126 inserts an erasure (ie, channel observation). Any conventional decoder has the ability to eliminate signal operation. Therefore, this does not cause problems for a current system. The utility of the security system according to the present invention on receivers that are unable to descramble all symbols is an improvement in coding efficiency and a synchronous reduction in the effective SNR per information bit. The specific amount of increase in coding rate and effective snr reduction depends on the level of confidentiality, which will be explained below. The rate matching unit 115 within the transmitter 110 operates in accordance with a rate matching rule. The rate matching rule can be changed to cause a breakdown or repetition of the symbol and effective bit energy. A channel having a coding rate R is used. R is greater than 1 symbol per channel and the efficiency of the privacy layer η is given by: 14.1308445 Equation (5) where Θ represents the proportion of the symbol being scrambled and en is “having a secret layer descrambling 11 (i.e., the rate dematching unit 125 within the receiver 12G) is capable of approximately deciphering the symbol scale. In all cases, e”, (4), etc., per information bit SNR (more precisely Eb/NQ) is represented by Eq. The effective SNR of the layer η is given by: Εη-Ε0[ι -Θ(ι~βη)] Equation (6)
^匕率及SNR —者單純地依未擾密已知位元之比例換 舁,此由下式給出: 、 巧,1-0(1-e”) 方程式(7) 。。因此足以唯獨就此量編定分析公式。SNR對於離發 射器之距離的相依性由方程式(2)給出。 ,據本發明,經判定已知未抹除符號(亦即接收器能夠 解擾德的符號)之—特定比例,即可決定能夠解調變資料的 發射器至接收器距離。方程式⑺被代人方程式⑺中且 解d以獲得下式: 方程式(8) d: ηΕ l2% 方程式(9) 接下來,假设符號之一百分比未被抹除,方程式(5 和(6 )被代入方程式(8 )中以獲得下式: d{n): 一特定保密水準^可達到之距_百分比可被表示为 全保密(β=ι)可達到之距離的百分比。此為NSpR,其初 定義如下:^匕 rate and SNR—there is simply a ratio of undisturbed known bits, which is given by: , Qiao, 1-0(1-e)) Equation (7). The analytical formula is programmed solely for this amount. The dependence of the SNR on the distance from the transmitter is given by equation (2). According to the invention, it is determined that the un-erased symbol is known (ie, the receiver is capable of descrambling the symbol) The specific ratio can determine the transmitter-to-receiver distance that can demodulate the data. Equation (7) is solved in equation (7) and d is obtained to obtain the following equation: Equation (8) d: ηΕ l2% Equation (9) Next, assuming that one of the symbols is not erased, equations (5 and (6) are substituted into equation (8) to obtain the following equation: d{n): a specific level of confidentiality ^ achievable distance _ percentage It is expressed as a percentage of the distance that can be reached by full confidentiality (β=ι). This is NSpR, which is initially defined as follows:
方程式(10) 15 1308445 該NSPR不相依於E,但其相依於標稱傳輸速率。作為 一實例,第3圖-6呈現4種不同架構之NSPR對上已知符號 百分比的標繪圖’這四種架構分別是:R=1、7 =2 ; R==i、 r -4 ’ R=i/2、γ =2 ’ R=l/2、7 =4。從模擬結果觀測到藉 由僅顯露通道符號之50%,位於比、、完全安全,傳輸半徑 之約60%更遠處的接收器可能無法解調變資訊。因此,如 果一接收器超出其保密參數的有效距離,其理論上來說被禁 止解碼具備一遠高於50%之BER的資料。 第7圖示出一包含多個WTRUs 705、710、715、720 和725之保密網路700,該等WTRUs在多個不重疊的信任 區730、740、750或一在該等信任區外之、、不信任區76〇 内運作。信任區730、740、750及、、不信任區760依下述 方式建立: 選擇傳輸參數譬如一編碼率架構、擊穿架構、功率架構 或類似物致使一在信任區750與、、不信任區,,760間之邊界 外侧的接收器(亦即一 WTRU)無法解碼傳輸訊號,就算該 接收器徹底知道所有傳輸參數亦如此。此外,選擇一(待由 MLSB子系統實施的)位元擾密架構致使在信任區73〇内側 的接收器能夠解調變資料,即使這些接收器不知道已擾密位 兀*之任一者亦如此。接收功率會高到足以讓成功解調變作業 得以發生,即使已擾密位元是單純地用來被擊穿亦如此。 k任區740内之接收器除非知道MLSB所施用之擾密 型樣的一些部分否則不再有能力解調變發送的資料。據此, 位於彳„任區740内之接收器會被迫要與發射器經過某種類 16 1308445 型_證程序使得《相之—些必要部分向其揭露。 U區75G内之接收$就算知道向信任區内之接收 器揭露的擾密序列部分(例如藉由偷聽側通信藉此使這些接 =器被鱗存取此序列)也沒有能力解調變㈣發射器。事 實上’ $些接收H被要求要請求有關擾密序列的額外資訊 (例如其可能必須知道完整序列),且因此其必須經過一獨 立於信任區74G内之接收H (很可能是f求更高)的認證程Equation (10) 15 1308445 The NSPR is not dependent on E, but it is dependent on the nominal transmission rate. As an example, Figure 3-6 presents a plot of the known symbol percentages for the NSPR pairs of four different architectures. These four architectures are: R = 1, 7 = 2; R == i, r -4 ' R=i/2, γ = 2 'R=l/2, 7=4. It is observed from the simulation results that the receiver may not be able to demodulate the information by only revealing 50% of the channel symbol, located at a ratio, and completely safe, about 60% of the transmission radius. Therefore, if a receiver exceeds the effective distance of its secret parameters, it is theoretically prohibited to decode data with a BER well above 50%. Figure 7 shows a secure network 700 comprising a plurality of WTRUs 705, 710, 715, 720 and 725, which are in a plurality of non-overlapping trusted areas 730, 740, 750 or one outside of the trusted areas. , and the zone of untrustworthy operation within 76. The trust zones 730, 740, 750 and the untrusted zone 760 are established in the following manner: selecting a transmission parameter such as a code rate architecture, a breakdown architecture, a power architecture or the like to cause a trust zone 750 and a do not trust zone , the receiver outside the boundary of 760 (ie, a WTRU) cannot decode the transmission signal, even if the receiver knows all transmission parameters thoroughly. In addition, selecting a bit-to-disturbance architecture (to be implemented by the MLSB subsystem) causes the receivers inside the trust zone 73〇 to demodulate the data, even if the receivers do not know any of the disturbed bits* The same is true. The received power will be high enough for a successful demodulation operation to occur even if the disturbed bit is simply used to be broken down. The receiver within k-area 740 is no longer capable of demodulating the transmitted data unless it knows some portions of the tamper-type pattern applied by the MLSB. Accordingly, the receiver located in the 740 任区区 740 will be forced to go through some sort of 16 1308445 type certificate procedure to expose the necessary parts to it. The receiving $ in the 75G area knows The portion of the scrambling sequence that is exposed to the receiver in the trust zone (for example, by eavesdropping side communication so that these receivers are scaled to access the sequence) also has no ability to demodulate the (four) transmitter. In fact, Receive H is required to request additional information about the scrambling sequence (eg, it may have to know the complete sequence), and therefore it must go through a certification process that is independent of the reception H (probably f is higher) within the trust zone 74G.
序。如前所述,區域?60内之接收器在任何情況下都無法解 調變發送的資料。 依據以上所述本發明之實施例,從一發射Wtru 705 到一接收WTRU的距離是保密措施之一函數。藉由動態選 擇距離d (例如50公尺),一距離比d近的接收WTRU 71〇 可用一較鬆散的保密措施運作,而距離超過d的接收WTRU 715、720和725會需要一較嚴保密措施。 第8圖示出一包含一 AP 805和一 WTRU 810的傳統網 路800。當AP 805傳輸一位元串流815給WTRU 810,一 在AP 805之範圍内的竊聽者820能夠接收完整位元串流譬 如 111000101 。 第9圖示出一依據本發明一實施例之網路900,其包含 多個存取點(APs) 905、910、915 及一 WTRU 920 及第 8 圖之竊聽者820。藉由使用多個APs 905、910、915而不像 第8圖之傳統網路800只用單個AP 805,位元串流815被 確保不被竊聽者820解密。WTRU 920被定位在APs 905、 910及915之傳輸型樣的交會區935,藉此WTRU 920會從 17 •1308445sequence. As mentioned earlier, the area? The receiver within 60 cannot demodulate the transmitted data under any circumstances. In accordance with an embodiment of the invention described above, the distance from a transmitting Wtru 705 to a receiving WTRU is a function of privacy measures. By dynamically selecting the distance d (e.g., 50 meters), a receiving WTRU 71 that is closer than d can operate with a looser security measure, while receiving WTRUs 715, 720, and 725 that are more than d will require a stricter security. Measures. Figure 8 shows a conventional network 800 including an AP 805 and a WTRU 810. When the AP 805 transmits a one-bit stream 815 to the WTRU 810, an eavesdropper 820 within range of the AP 805 can receive a full bit stream, such as 111000101. FIG. 9 illustrates a network 900 including a plurality of access points (APs) 905, 910, 915 and a WTRU 920 and an eavesdropper 820 of FIG. 8 in accordance with an embodiment of the present invention. By using multiple APs 905, 910, 915 instead of the legacy network 800 of Figure 8, using only a single AP 805, the bit stream 815 is guaranteed not to be decrypted by the eavesdropper 820. The WTRU 920 is located at the intersection 935 of the transmission pattern of the APs 905, 910, and 915, whereby the WTRU 920 will be from 17 • 1308445
AP 905收到位元串流815之一第一片段93〇α 、、ιη//,從 AP910收到位元串流815之一第二片段93〇b 、、〇〇〇//,且從 AP915收到位元串流815之一第三片段93〇c 、、1〇1//。每一 片段930A、930B、930c被稱為一 PDU,且原始位元串流 111000101〃被稱為—服務資料單元(SDu)。然後WTRU 920從;14三個PDUs 930A、930B、930C重組整個已加密SDU。 由於竊聽者820並未實質位於aps 905、910及915之傳輸 型樣的交會區935,致使所有片段93〇A、930B、930c相較於 肇 WTRU 920係在一錯誤率下被接收’竊聽者gw無法解譯整 個位元串流815 (即使知道一密鑰亦如此)。The AP 905 receives the first segment 93 〇 α , , ηη / / of the bit stream 815, and receives the second segment 93 〇 b , 〇〇〇 / / of the bit stream 815 from the AP 910, and receives from the AP 915 The third segment 93〇c , , 1〇1// of one of the bit stream 815. Each segment 930A, 930B, 930c is referred to as a PDU, and the original bit stream 111000101 is referred to as a Service Data Unit (SDu). The WTRU 920 then reassembles the entire encrypted SDU from the 14 PDUs 930A, 930B, 930C. Since the eavesdropper 820 is not physically located in the intersection 935 of the transmission patterns of aps 905, 910, and 915, all segments 93A, 930B, and 930c are received as an eavesdropper at an error rate compared to the 肇WTRU 920. Gw cannot interpret the entire bit stream 815 (even if one knows a key).
在第9圖之網路900内,被WTRU 920解譯出來的SDU 是 111000101,其中 PDUA=in、PDUb=000 且 PDUC=1(H。 如果竊聽者820勉強解譯出這三個PDUs當中兩個(例如000 和101 )’竊聽者820會勉強得到不完整但正;的部分資訊。 在一替代實施例中,竊聽者820確實接收到的任何 PDUs只要不完整就變成無意義的。舉例來說,網路9〇〇内 • 需要發送給WTRU 920的SDU是111000101。但是,由三 個不同APs 905、910和915發出的三個PDUs(例如PDm、 PDU2、PDU3)不像第9圖所示是片段的,而是經替代選擇 致使 SDU = PDU1 XOR PDU2 XOR PDU3,其中 PDU1 = 100110011、PDU2= 110000111 且 PDU3= 101110001,致使 SDU = 100110011 XOR 110000111 XOR 101110001 二 111000101,其中XOR是一互斥或函數。因此,假設WTRU 920位在APs 905、910及915之傳輸型樣的交會區935,則 18 1308445 WTRU 920能夠接收全部三個PDUs並且x〇r這些PDUs 以解譯SDU 111000101。如果竊聽者820捕捉到這三個pDUs 當中任兩者,這對於解譯該SDU來說完全無意義。x〇R以 外之替代機制亦屬可能,譬如以一除非成功接收所有傳輸否 則就無意義的方式擾密封包並且從不同發射器發出不同位 元。 在另一實施例中,一位置型認證機制可併入第9圖之網 路 900 内。WTRU 920 從 APs 905、910 及 915 接收傳輸, 且向APs 905、910及915每一者報告其位置。基於WTRU 920 及 APs 905、910 和 915 之報告位置,APs 905、910 及 915每一者可啟動一協定以一高於或低於每一相應AP 905、910及915與WTRU 920間之標稱距離之建議編碼率 高或低的變動有效編碼率發出一訊息序列,請求來自WTRU 920之一肯定確認接收訊號(ACK)或一否定確認接收訊號 (NACK)。因此,該協定建立一準貝ij ,其以WTRU 920之 位置相對於APs 905、910及915之位置為基礎指定該WTRU 是否可解碼從APs 905、910及915收到的傳輸。如果WTRU 920報告的位置被判定是正確的,則該協定會藉由處理 WTRU 920回應於該訊息序列而被收到之ACK/NACK訊息 來查驗WTRU 920之位置的可信度。 WTRU 920之可信度的查驗亦可被進行為致使WTRU 920 (或WTRU 920之使用者)與APs 905、910及915共享 一共同秘密。舉例來說,如果APs 905、910及915要求WTRU 920指出之位置要經認證,則APs 905、910及915經由多 19 1308445 麝 t 個PDUs(其可如前所述經分段或加密)發送一 挑戰問題' 致使該、、挑戰問題”只在WTRU 92〇位於其所述位置時方 能由WTRU 920解譯。因此,WTRU 92〇除非位於一可解譯 出该々挑戰問題”的位置否則就無法、'回答"該'、挑戰問題。In the network 900 of Figure 9, the SDU interpreted by the WTRU 920 is 111000101, where PDUA = in, PDUb = 000, and PDUC = 1 (H. If the eavesdropper 820 barely interprets two of the three PDUs (e.g., 000 and 101) 'Eavesdropper 820 will barely get incomplete but positive; partial information. In an alternate embodiment, any PDUs that eavesdropper 820 does receive become meaningless as long as it is incomplete. Said, within the network 9 • The SDU that needs to be sent to the WTRU 920 is 111000101. However, three PDUs (eg PDm, PDU2, PDU3) sent by three different APs 905, 910 and 915 are not like Figure 9. The representation is fragmented, but instead SDU = PDU1 XOR PDU2 XOR PDU3, where PDU1 = 100110011, PDU2 = 110000111 and PDU3 = 101110001, resulting in SDU = 100110011 XOR 110000111 XOR 101110001 2111000101, where XOR is a mutually exclusive or Thus, assuming that the WTRU 920 is in the intersection 935 of the transmission pattern of the APs 905, 910, and 915, the 18 1308445 WTRU 920 can receive all three PDUs and x 〇 these PDUs to interpret the SDU 111000101. If the eavesdropper 820 captured Any two of these three pDUs, which is completely meaningless for interpreting the SDU. Alternative mechanisms other than x〇R are also possible, such as disturbing the sealed package in a meaningless manner unless all transmissions are successfully received and Different bits are emitted from different transmitters. In another embodiment, a location type authentication mechanism can be incorporated into network 900 of Figure 9. WTRU 920 receives transmissions from APs 905, 910, and 915, and to APs 905, Each of 910 and 915 reports its location. Based on the reporting locations of WTRU 920 and APs 905, 910, and 915, each of APs 905, 910, and 915 can initiate a protocol to be higher or lower than each corresponding AP 905, A variable sequence of high or low recommended effective coding rates between 910 and 915 and the WTRU 920 sends a sequence of messages requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920. Thus, the agreement establishes a quasi-bay ij that specifies whether the WTRU can decode transmissions received from APs 905, 910, and 915 based on the location of the WTRU 920 relative to the locations of APs 905, 910, and 915. If the location reported by the WTRU 920 is determined to be correct, the agreement will verify the confidence of the location of the WTRU 920 by processing the ACK/NACK message received by the WTRU 920 in response to the sequence of messages. The verification of the WTRU 920's confidence may also be made to cause the WTRU 920 (or the user of the WTRU 920) to share a common secret with the APs 905, 910 and 915. For example, if APs 905, 910, and 915 require the location indicated by WTRU 920 to be authenticated, then APs 905, 910, and 915 are sent via multiple 19 1308445 PDUt PDUs (which may be segmented or encrypted as previously described) A challenge issue 'causes this, challenge issue' can only be interpreted by the WTRU 920 when the WTRU 92 is in its location. Therefore, the WTRU 92 will not be in a position to interpret the challenge issue. Can't, 'answer', 'this', challenge the problem.
第1〇圖示出—分級調變(HM)架構之一實例,其由主 要和—人要變#構(在本例中分別是和)之— 組合定義。眾所周知一 QPSK調變架構係由4個調變點定 ,這二》周I點同建構QpSK調變星座。該等調變點分別 王見7Γ/2 3ττ/2、_π/2及-3 7Γ/2的載波相位且分別代表一 個位元 00、01、10釦 η 士〇/ tL w w和11。相似地,眾所周知一 BPSK調變 架構係由2個㈣點定義,這些調變點—同建構BpsK調變 星座。該等調變點分別呈現W和·0度的載波相位且分別 =表個位元〇或i。然後,該服架構係由8個調變點定 義,從主要和次要調變星座建構。 „變點分別呈現⑴24)、“㈣)、(3;r/2 :/2+ 5 )、( - K /2- 6 )、( - 7Γ /2+ 5 )、(-3 7Γ /2- (5 )、(_ 的載波相位且分別代表三個位元_、謝、〇1〇 和U1。這8個調變點構成四個叢集 、”广3 一個小間隔調變點。舉例來說,載波相位(η 一益綠Έ :/2+5 )代表的調變會構成一叢集。發射器透纪 道從該ΗΜ星座取得的符號序列,該無糾 ㈣㈣越遠會㈣並污染該訊號。整體, 二:曾,射器的接收器會收到-具備較好訊號嶋 的訊號’使得其能準破地_載波相位及所屬 20 J308445 n 個位元。但-遠離發射器的接收器通常會收到—具備較 號強度及訊號品質的訊號’使得其就算能_斷傳送符號所 屬叢集為何也可^無法辨別每—叢集内之小間_變點1 此,此m能制主要調變但無法偵測:欠要調變 此,接收ϋ能制出資料之二個位元但偵測不出第三位元。The first diagram shows an example of a hierarchical modulation (HM) architecture, which is defined by a combination of the main and the human beings (in this case, respectively). It is well known that a QPSK modulation architecture is defined by four modulation points. These two "weeks" point together with the QpSK modulation constellation. The modulation points are respectively seen in the carrier phase of 7Γ/2 3ττ/2, _π/2, and -3 7Γ/2 and represent a bit 00, 01, 10, η 士 〇 / tL w w and 11, respectively. Similarly, it is well known that a BPSK modulation architecture is defined by two (four) points, which are the same as the BpsK modulation constellation. The modulation points respectively exhibit carrier phases of W and ·0 degrees and respectively = table bits 〇 or i. The service architecture is then defined by eight modulation points, constructed from primary and secondary modulation constellations. „Change points are (1)24), “(4)), (3;r/2 :/2+ 5 ), ( - K /2 6 ), ( - 7Γ /2+ 5 ), (-3 7Γ /2- (5), (the carrier phase of _ and represent three bits _, Xie, 〇1〇 and U1 respectively. These eight modulation points constitute four clusters, "Guang 3 a small interval modulation point. For example The modulation phase represented by the carrier phase (η一益绿Έ : /2+5 ) will constitute a cluster. The transmitter will pass through the sequence of symbols obtained from the constellation, and the farther away (4) (four) will (4) and pollute the signal. Overall, two: once, the receiver of the ejector will receive a signal with a better signal ' 'so that it can break the ground _ carrier phase and its associated 20 J308445 n bits. But - away from the transmitter receiver Usually, you will receive a signal with a stronger strength and signal quality, so that even if you can _ disconnect the cluster to which the symbol belongs, you can also identify the small space in each cluster _ change point 1, this m can make the main modulation However, it is impossible to detect: it is necessary to adjust this, and the receiving device can produce two bits of data but cannot detect the third bit.
本發明此實施例可被用來實施—保密或信任區。與主要 調變點相關之資料(亦即前頭2個位元)被用—密鑰編碼或 加密或擾密,且該密鑰本身經由—符號序列之第三位元傳 輸。因此,-信任區_接收器可_到該料且用其解碼 或解密或解擾密主要資料。1純㈣接收器_測到主 要資料但彳貞料_料’因而無法解碼或_或解擾密主 要資料。妇可調變架構皆可用作本發明之主要和次要調變架 構。實例包含 M-ary PSK、M_ary FSK、M_ary QAM、或類 似物。此外,只有主要調變星座内之選定調變點可被次要叢 集疊加。最後,可施加超過兩層的分級。舉例來說,QpSK 加BPSK加BPSK呈現三層的hm。 在另只施例中,可實施一分層HM架構。第10圖示 出一種簡單兩層式架構,其中主波形是一被疊以一雙移相鍵 控(BPSK) HM的QPSK訊號。當一接收器的SNR為高, 其有可能辨別所有星座點。隨著SNR減低,要區別bpsK 層級之點與標稱QPSK星座點變困難且因而遺失HM資料。 依據本發明,已擾密資料被以主波形調變,且解擾密資 afl被以HM編碼。當接收器位於一可認出該HM的區域内 時,解擾密資訊促成成功的接收。當接收器太遠且因此無法 21 1308445This embodiment of the invention can be used to implement a privacy or trust zone. The data associated with the primary modulation point (i.e., the first 2 bits) is encoded or encrypted or scrambled, and the key itself is transmitted via the third bit of the sequence of symbols. Thus, the -trust zone_receiver can go to the material and use it to decode or decrypt or descramble the primary material. 1 pure (four) receiver _ detected the main information but the data _ material 'can not decode or _ or descramble the main information. The variability architecture can be used as the primary and secondary modulation architecture of the present invention. Examples include M-ary PSK, M_ary FSK, M_ary QAM, or the like. In addition, only selected modulation points within the main modulation constellation can be superimposed by the secondary cluster. Finally, more than two layers of grading can be applied. For example, QpSK plus BPSK plus BPSK presents a three-layer hm. In another example, a layered HM architecture can be implemented. Figure 10 illustrates a simple two-layer architecture in which the main waveform is a QPSK signal that is stacked with a double phase shift keying (BPSK) HM. When the SNR of a receiver is high, it is possible to distinguish all constellation points. As the SNR decreases, it becomes difficult to distinguish the point of the bpsK level from the nominal QPSK constellation point and thus lose the HM data. According to the present invention, the scrambled data is modulated by the main waveform, and the descrambling key afl is encoded in HM. The descrambling information facilitates successful reception when the receiver is located in an area in which the HM can be recognized. When the receiver is too far and therefore cannot be 21 1308445
提取HM資料時,必須透過其他通道明確請求解擾密資訊。 藉由改變分配給HM波形的功率,範圍可為區域受控的。 雖然已就特定組合以較佳實施例說明本發明之特徵和 元素,每一特徵或元素可在沒有較佳實施例其他特徵和元素 的條件下或是在有或沒有本發明其他特徵和元素之多種組 合的條件下使用。 22 1308445 圖式簡單說明 以下以舉例方式並參照隨附圖式更詳細地說明本發 明’圖式中: ^ 1圖是一示出一接收器解碼器之有效輸入SNR與該 解碼,之輸出BER間之一關係的曲線圖表現; 第2圖是一無線通信系統的方塊圖,其包含依據本發明 用料保練通信之-發㈣及—接㈣;When extracting HM data, the descrambling information must be explicitly requested through other channels. By varying the power assigned to the HM waveform, the range can be area controlled. Although the features and elements of the present invention have been described in terms of a particular combination of the preferred embodiments, each of the features or elements may be used without or without other features and elements of the preferred embodiments. Used under a variety of combinations. 22 1308445 BRIEF DESCRIPTION OF THE DRAWINGS The following is a more detailed description of the present invention by way of example and with reference to the accompanying drawings in which: FIG. 1 is a diagram showing the effective input SNR of a receiver decoder and the output BER of the decoding FIG. 2 is a block diagram of a wireless communication system, including a (four) and a (four) connection for the communication of materials according to the present invention;
咏第3圖是一不出規格化安全近接半徑(NSPR)與已知 符號在R=卜r =2條件下之關係的曲線圖表現; 第4圖是一示出NSPR與已知符號在R=hy=4條件 下之關係的曲線圖表現; 第5圖是一示出NSPR與已知符號在R=1/2、y 條 件下之關係的曲線圖表現; 第6圖是一示出NSPR與已知符號在R=l/2、條 件下之關係的曲線圖表現; ” 7圖是一依據本發明一實施例具備多個用來確保無 線通信之信任區的保密網路的簡圖; 第8圖是-傳統網路,其中—竊聽者可截收—從_ 傳輸到一 WTRU的位元串流; 第9圖是一依據本發明另一實施例的網路,其中多個 APs之每一者傳輪PDUs給一位於該等Aps每—者之傳輸型 樣相交之一信任區内的WTRU以確保無線通信;且和 第1〇圖示出- QPSK調變星座,其例示如何依據 明另一實施例確保無線通信。 又 23 1308445 元件符 號說明 BER 解碼器輸出 SNR 有效解碼器輸入 100 通信系統 AP 存取點 WTRU 無線傳輸/接收單元Figure 3 is a graph showing the relationship between the normalized safety close-up radius (NSPR) and the known symbol at R = bu r = 2; Figure 4 is a diagram showing NSPR and known symbols in R Fig. 5 is a graph showing the relationship between NSPR and known symbols under the condition of R = 1/2, y; Fig. 6 is a graph showing NSPR A graph representation of the relationship of known symbols at R = 1 / 2; conditions; Figure 7 is a simplified diagram of a secure network having a plurality of trusted areas for ensuring wireless communication in accordance with an embodiment of the present invention; Figure 8 is a conventional network in which - an eavesdropper can intercept - a bit stream transmitted from _ to a WTRU; Figure 9 is a network in accordance with another embodiment of the present invention, wherein a plurality of APs Each of the transmitting PDUs gives a WTRU located in one of the trusted areas of the transmission pattern of the APS to ensure wireless communication; and FIG. 1 shows a - QPSK modulated constellation, the illustration of which is based on how Another embodiment ensures wireless communication. Further 23 1308445 Component Symbol Description BER Decoder Output SNR Valid Decoder Input 100 Communication system access point AP WTRU wireless transmit / receive unit
24twenty four
Claims (1)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63073004P | 2004-11-23 | 2004-11-23 | |
US66185605P | 2005-03-15 | 2005-03-15 | |
US68425705P | 2005-05-25 | 2005-05-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
TW200627890A TW200627890A (en) | 2006-08-01 |
TWI308445B true TWI308445B (en) | 2009-04-01 |
Family
ID=44825041
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW095120112A TWI455543B (en) | 2004-11-23 | 2005-11-21 | Method and device for ensuring wireless communication |
TW98106910A TWI459779B (en) | 2004-11-23 | 2005-11-21 | Node B used in ensuring wireless communication |
TW103122744A TW201507418A (en) | 2004-11-23 | 2005-11-21 | Method and system for securing wireless communications |
TW94140854A TWI308445B (en) | 2004-11-23 | 2005-11-21 | Method and system for securing wireless communications |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW095120112A TWI455543B (en) | 2004-11-23 | 2005-11-21 | Method and device for ensuring wireless communication |
TW98106910A TWI459779B (en) | 2004-11-23 | 2005-11-21 | Node B used in ensuring wireless communication |
TW103122744A TW201507418A (en) | 2004-11-23 | 2005-11-21 | Method and system for securing wireless communications |
Country Status (1)
Country | Link |
---|---|
TW (4) | TWI455543B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI733338B (en) * | 2020-02-18 | 2021-07-11 | 瑞昱半導體股份有限公司 | Communication device and method for adjusting transmitting parameter |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030065738A1 (en) * | 2001-10-01 | 2003-04-03 | Thumb Logic, Inc. | Wireless information systems and methods |
-
2005
- 2005-11-21 TW TW095120112A patent/TWI455543B/en not_active IP Right Cessation
- 2005-11-21 TW TW98106910A patent/TWI459779B/en not_active IP Right Cessation
- 2005-11-21 TW TW103122744A patent/TW201507418A/en unknown
- 2005-11-21 TW TW94140854A patent/TWI308445B/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI733338B (en) * | 2020-02-18 | 2021-07-11 | 瑞昱半導體股份有限公司 | Communication device and method for adjusting transmitting parameter |
Also Published As
Publication number | Publication date |
---|---|
TW201507418A (en) | 2015-02-16 |
TW201002011A (en) | 2010-01-01 |
TW200627890A (en) | 2006-08-01 |
TWI455543B (en) | 2014-10-01 |
TW200715786A (en) | 2007-04-16 |
TWI459779B (en) | 2014-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4616351B2 (en) | Method and apparatus for securing wireless communication | |
US8621225B2 (en) | Method and apparatus for enhancing security of wireless communications | |
US7929409B2 (en) | Orthogonal frequency division multiplexing (OFDM) method and apparatus for protecting and authenticating wirelessly transmitted digital information | |
Xiong et al. | MIO: Enhancing wireless communications security through physical layer multiple inter-symbol obfuscation | |
US20070053325A1 (en) | Method and apparatus for securing wireless communications | |
Rahbari et al. | Full frame encryption and modulation obfuscation using channel-independent preamble identifier | |
Borle et al. | Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation | |
Bang et al. | Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems | |
Bonati et al. | SteaLTE: Private 5G cellular connectivity as a service with full-stack wireless steganography | |
TWI308445B (en) | Method and system for securing wireless communications | |
HK1115972A (en) | Method and apparatus for securing wireless communications | |
CN101167382A (en) | Method and system for ensuring wireless communication | |
Yamanaka et al. | Distributed transmission for secure wireless links based on a secret-sharing method | |
Lebold | Physical layer watermarking of binary phase-shift keyed signals using standard gnu radio blocks | |
Zentner | Security Implications for Wireless Local Area Networks | |
ISAKO | WIMAX AND IT'S STATE OF DEPLOYMENT USING AVAILABLE TECHNOLOGY | |
HK1112355A (en) | Method and apparatus for enhancing security of wireless communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |