US20060133338A1 - Method and system for securing wireless communications - Google Patents

Method and system for securing wireless communications Download PDF

Info

Publication number
US20060133338A1
US20060133338A1 US11/283,017 US28301705A US2006133338A1 US 20060133338 A1 US20060133338 A1 US 20060133338A1 US 28301705 A US28301705 A US 28301705A US 2006133338 A1 US2006133338 A1 US 2006133338A1
Authority
US
United States
Prior art keywords
wtru
wireless communication
receiver
communication signal
aps
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/283,017
Inventor
Alexander Reznik
Alan Carlton
Alain Briancon
Yogendra Shah
Prabhakar Chitrapu
Rajat Mukherjee
Marian Rudolf
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
InterDigital Technology Corp
Original Assignee
InterDigital Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by InterDigital Technology Corp filed Critical InterDigital Technology Corp
Priority to US11/283,017 priority Critical patent/US20060133338A1/en
Priority to CN201110041416.4A priority patent/CN102098670B/en
Priority to CA2587735A priority patent/CA2587735C/en
Priority to EP05858494A priority patent/EP1815699A4/en
Priority to JP2007543310A priority patent/JP4616351B2/en
Priority to MX2007006167A priority patent/MX2007006167A/en
Priority to KR1020077014344A priority patent/KR100913560B1/en
Priority to EP10150667A priority patent/EP2173122A3/en
Priority to PCT/US2005/041976 priority patent/WO2007011416A2/en
Priority to KR1020077017160A priority patent/KR20070087220A/en
Assigned to INTERDIGITAL TECHNOLOGY CORPORATION reassignment INTERDIGITAL TECHNOLOGY CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRIANCON, ALAIN CHARLES LOUIS, CARLTON, ALAN GERALD, REZNIK, ALEXANDER, RUDOLF, MARIAN, CHITRAPU, PRABHAKAR R., MUKHERJEE, RAJAT PRITAM, SHAH, YOGENDRA
Publication of US20060133338A1 publication Critical patent/US20060133338A1/en
Priority to NO20073117A priority patent/NO20073117L/en
Priority to US12/649,151 priority patent/US8843743B2/en
Priority to US14/314,983 priority patent/US20140307875A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • H04L27/345Modifications of the signal space to allow the transmission of additional information
    • H04L27/3461Modifications of the signal space to allow the transmission of additional information in order to transmit a subchannel
    • H04L27/3477Modifications of the signal space to allow the transmission of additional information in order to transmit a subchannel by using the outer points of the constellation or of the constituent two-dimensional constellations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • H04W16/30Special cell shapes, e.g. doughnuts or ring cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present invention relates generally to wireless communications. More specifically, the present invention is related to a method and system for securing such wireless communications by strategically positioning the source and/or the recipient of the communications.
  • Ad-hoc wireless communication networks As wireless connectivity becomes more pervasive and reliable, it is expected that all the digital computing, data storage and media storage devices that are in widespread use today will become part of Ad-hoc wireless communication networks.
  • Ad-hoc networks where individual users communicate with each other directly without using intermediary network nodes, create new susceptibilities to the users and networks.
  • WEP wired equivalent privacy
  • WPA Wi-Fi protected access
  • EAP extensible authentication protocol
  • GSM-based encryption GSM-based encryption
  • any information transmitted to a user is accessible only at the location of the user, such that a “eavesdropper” located in the general proximity of the user, but not at the user's immediate location, is prevented from receiving complete messages transmitted to the user.
  • the present invention is related to a method and system for securing wireless communications.
  • different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones.
  • a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect.
  • the receiver performs a function on packet data units (PDUs) transmitted by the transmitters.
  • PDUs packet data units
  • primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter.
  • a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
  • HM hierarchical modulation
  • FIG. 1 is a graphical representation showing a relationship between effective input SNR of a receiver's decoder and the decoder's output BER;
  • FIG. 2 is a block diagram of a wireless communication system including a transmitter and a receiver used to secure wireless communications in accordance with the present invention
  • FIG. 7 is a diagram of a security network with multiple trust zones used to secure wireless communications in accordance with one embodiment of the present invention.
  • FIG. 8 is a conventional network in which an eavesdropper may intersect a bit stream transmitted from an AP to a WTRU;
  • FIG. 9 is a network in which each of a plurality of APs transmits PDUs to a WTRU located in a trust zone intersected by the transmission patterns of each of the APs to secure wireless communications in accordance with another embodiment of the present invention.
  • FIG. 10 shows a QPSK modulation constellation which illustrates how wireless communications are secured in accordance with yet another embodiment of the present invention.
  • wireless transmit/receive unit includes but is not limited to a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a station (STA) or any other type of device capable of operating in a wireless environment.
  • UE user equipment
  • STA station
  • access point includes but is not limited to a base station, a Node-B, a site controller or any other type of interfacing device in a wireless environment.
  • the present invention is based on the fact that most conventional channel codes, (e.g., Turbo codes, low density parity check (LDPC) codes, or the like), are operating close to the Shannon limit in most practical scenarios.
  • channel codes e.g., Turbo codes, low density parity check (LDPC) codes, or the like
  • LDPC low density parity check
  • the features of the present invention may be incorporated into an integrated circuit (IC) or be configured in a circuit comprising a multitude of interconnecting components.
  • IC integrated circuit
  • FIG. 1 is a graphical representation showing a relationship between effective decoder input SNR and a decoder output BER.
  • a critical SNR exists such that if the actual effective SNR falls below the critical SNR, the decoder fails completely, (i.e., the decoder's output BER effectively 1), and data in a wireless communication cannot be read. Conversely, if the actual effective SNR at the decoder input is above the critical SNR, the probability of error at the decoder output is extremely low and the data in the wireless communication can be read with very high probability.
  • the channel code approaches the Shannon limit, it can be assumed that the coding is performed at the Shannon capacity rate. Moreover, it is convenient to actually work in terms of spectral efficiency, since this makes the numeric results independent of the bandwidth.
  • the SNR basically depends on the distance between the transmitter and the receiver.
  • E is a nominal SNR at a distance of 1 unit.
  • the exponent ⁇ is 2, but in practical wireless networks, the exponent ⁇ is somewhere between 3 and 4, depending on the channel topology.
  • the present invention makes d a function of security policy.
  • d a function of security policy.
  • Equation (3) the channel coding scheme is fixed since it is quite expensive to have “programmable” decoders for completely different coding schemes.
  • SNR c is fixed.
  • d can be controlled by controlling E and ⁇ in a communication system. In order to achieve this goal, at least one of these controls must vary depending on extrinsic security-related information that a receiver may or may not possess.
  • controlling E means controlling the output power per information bit.
  • the control of the output power per information bit may be accomplished in any one or combination of the following processes:
  • a modulation scheme e.g., selecting QPSK/M-quadrature amplitude modulation (QAM)/M-phase-shift keying (PSK)/frequency-shift keying (FSK), or the like;
  • bit length (e.g. for UWB systems);
  • This method offers the ability, in a WLAN system, to maintain constant power level between the APs and WTRU in such a way as to maintain a uniform and regular grid spacing between the various APs in a system without affecting the performance of the CSMA system from fluctuating transmit power levels;
  • the interference control can be accomplished by one or combination of the following ways, but is not limited to:
  • variable interference management techniques such as pre-equalization to the desired receiver's signal and/or the interfering receiver's signal and varying the degree to which cross-interference is removed or introduced;
  • the value of ⁇ depends on Doppler spread of the received signal, which generally depends on the relative velocity of the receiver with respect to the transmitter and the geography of their environment.
  • the transmitter can artificially increase the Doppler spread by internal signal processing. Since the value of ⁇ depends on the geography of the environment, if the transmitter is equipped with a plurality of antennas, it can control ⁇ to some extent by aiming the transmitted signal in an appropriate fashion.
  • the receiver may detect the presence of an adversary actively tampering with the wireless channel in accordance with the present invention. If the receiver is informed through auxiliary means that the receiver should be able to successfully demodulate the data stream, but is in fact unable to do so after a sufficiently large number of attempts, and since the security policy and the communication controls of the receiver are set in such a way as to enable the demodulation of the data stream, the receiver can then assume that the wireless channel is being tampered with.
  • the present invention preferably utilizes a code rate as a parameter depending on the security policy of the receiver.
  • the ability of the receiver to demodulate a signal depends on geography, (the effective distance), which is more complex than a straight-line distance. If necessary, the transmitter and the receiver can discover the effective distance between them by slowly increasing, (or alternatively decreasing), one or more of the control parameters and detecting the point at which reliable data decoding becomes possible, (or alternatively is no longer possible).
  • FIG. 2 is a block diagram of a communication system 100 including a transmitter 110 and a receiver 120 in accordance with the present invention.
  • the transmitter 110 comprises a protocol stack unit 112 , a channel encoder 114 , a rate matching unit 115 , a multi-layer secure bit (MLSB) scrambler 116 and a physical channel processing unit 118 .
  • the receiver 120 comprises a physical channel processing unit 128 , an MLSB descrambler 126 , a rate de-matching unit 125 , a channel decoder 124 and a protocol stack unit 122 .
  • MLSB multi-layer secure bit
  • the protocol stack units 112 , 122 , the channel encoder 114 , the rate matching unit 115 , the rate de-matching unit 125 , the channel decoder 124 and the physical channel processing units 118 , 128 are essentially the same components as used in conventional transmitters and receivers.
  • the protocol stack unit 112 generates an information stream and this information stream is encoded for error protection by the channel encoder 114 , and then is further processed to be transmitted via a wireless channel 130 , (i.e., a particular air interface), by the physical channel processing unit 118 . This process is reversed at the receiver 120 .
  • the channel encoder 114 maps a sequence of input data to a sequence of output channel symbols.
  • the MLSB scrambler 116 scrambles the channel symbols.
  • the channel symbols may be bits or higher-order modulation symbols. Not all the symbols need to be scrambled.
  • the MLSB scrambler 116 may take a subset of symbols and scrambles them. Receivers should be aware of which symbol positions are scrambled.
  • MLSB descrambler 126 Several security layers are defined in accordance with the present invention.
  • the proportion of the scrambled symbols that a MLSB descrambler 126 can descramble depends on the security layer. For any symbol that the MLSB descrambler 126 can descramble, the MLSB descrambler 126 does so. For any symbol that the MLSB descrambler 126 cannot descramble, the MLSB descrambler 126 inserts an erasure, (i.e., a channel observation of 0), for that symbol. Any conventional channel decoder is capable of operating with erasures. Therefore, this does not present a problem to a current system.
  • an erasure i.e., a channel observation of 0
  • the effect of the security system in accordance with the present invention on those receivers which are not able to descramble all symbols is an increase in the code rate and a simultaneous reduction in the effective SNR per information bit.
  • the specific amount of code-rate increase and effective SNR reduction depends on the security level, which will be explained hereinafter.
  • the rate matching unit 115 in the transmitter 110 operates in accordance with rate matching rules, which may be changed so as to introduce puncturing or repetition of symbols and hence the effective bit energy.
  • a channel with a code rate R is utilized.
  • R can be greater than 1 bit per channel symbol and the effective rate for security layer n is given by:
  • R n R 1 - ⁇ ⁇ ⁇ ( 1 - e n ) ; Equation ⁇ ⁇ ( 5 ) where ⁇ denotes the proportion of the scrambled symbols and e n is the proportion of symbols that a descrambler, (i.e., the rate de-matching unit 125 in the receiver 120 ), with a security layer n can descramble.
  • E n E 0 (1 ⁇ (1 ⁇ e n )). Equation (6)
  • Equation (2) The SNR dependence on the distance from the transmitter is given by Equation (2).
  • the NSPR does not depend on E, although it does depend on the nominal transmission rate.
  • FIG. 7 shows a security network 700 including a plurality of WTRUs 705 , 710 , 715 , 720 and 725 which operate in a plurality of non-overlapping trust zones 730 , 740 , 750 or a “no trust zone” area 760 external to the trust zones.
  • the trust zones 730 , 740 , 750 and the “no trust zone” 760 are established as follows:
  • Transmission parameters such as a code rate scheme, puncturing scheme, power scheme or the like, are chosen such that a receiver, (i.e., a WTRU), outside of the boundary between the trust zone 750 and the “no trust zone” 760 is not capable of decoding the transmission signal, even if the receiver is fully aware of all transmission parameters.
  • a bit scrambling scheme (to be implemented by the MLSB sub-system), is chosen such that receivers inside the trust zone 730 are able to demodulate the data, even if the receivers do not know any of the scrambled bits. The received power will be high enough such that successful demodulation can occur, even if the scrambled bits are simply taken to be punctured.
  • Receivers in the trust zone 740 are no longer able to demodulate the sent data unless they are aware of some of the scrambling pattern applied by the MLSB. Accordingly, receivers located in trust zone 740 will be forced to go through some kind of authentication procedure with the transmitter so that some necessary portion of the scrambling sequence is revealed to them.
  • Receivers in the trust zone 750 are not able to demodulate the data transmitter, even if they are aware of the portion of the scrambling sequence revealed to the receiver in the trust zone 740 , (e.g., by overhearing the side communication whereby those receivers were allowed access to this sequence). Instead, they are required to request additional information about the scrambling sequence, (e.g., they may need to know the full sequence), and thus must go through a separate, (potentially more demanding), authentication process then receivers in the trust zone 740 . As mentioned before, receivers in the area 760 cannot demodulate the sent data under any circumstances.
  • the distance from a transmitting WTRU 705 to a receiving WTRU is a function of security policy.
  • d e.g. 50 meters
  • a receiving WTRU 710 at a distance closer than d can operate with a looser security policy, while receiving WTRU 715 , 720 and 725 with a distance beyond d will require a stricter security policy.
  • FIG. 8 shows a conventional network 800 which includes an AP 805 and a WTRU 810 .
  • the AP 805 transmits a bit stream 815 to the WTRU 810
  • an eavesdropper 820 within range of the AP 805 is able to receive the entire bit stream, e.g., 111000101.
  • FIG. 9 shows a network 900 including a plurality of access points (APs) 905 , 910 , 915 , a WTRU 920 and the eavesdropper 820 of FIG. 8 in accordance with one embodiment of the present invention.
  • APs access points
  • FIG. 9 shows a network 900 including a plurality of access points (APs) 905 , 910 , 915 , a WTRU 920 and the eavesdropper 820 of FIG. 8 in accordance with one embodiment of the present invention.
  • APs access points
  • the WTRU 920 is located at the intersection 935 of the transmission patterns of the APs 905 , 910 and 915 , whereby the WTRU 920 will receive a first fragment 930 A of the bit stream 815 , “111”, from the AP 905 , a second fragment 930 B of the bit stream 815 , “000”, from the AP 910 , and a third fragment 930 C of the bit stream 815 , “101”, from the AP 915 .
  • Each fragment 930 A , 930 B , 930 C is referred to as a PDU and the original bit stream “111000101” is referred to as a service data unit (SDU).
  • SDU service data unit
  • the WTRU 920 then reassembles the entire encrypted SDU from the three PDUs 930 A , 930 B and 930 C . Since the eavesdropper 820 is not physically located at the intersection 935 of the transmission patterns of the APs 905 , 910 and 915 such that all of the fragments 930 A , 930 B , 930 C are received at an error rate comparable to that of the WTRU 920 , the eavesdropper 820 is unable to decipher the entire bit stream 815 , (even with knowledge of a secret key).
  • any PDUs that the eavesdropper 820 does receive are rendered meaningless if incomplete.
  • the SDU that needs to be sent to the WTRU 920 in the network 900 is 111000101.
  • three PDUs that are sent by three different APs 905 , 910 and 915 are not fragments, as illustrated by FIG.
  • the eavesdropper 820 captures even two of these three PDUs, they are completely meaningless with respect to deciphering the SDU.
  • Alternative mechanisms other than XOR are also possible such as scrambling the packet and sending different bits from different transmitters in such a manner as to render meaningless the transmissions, unless all transmissions are received successfully.
  • a location-based authentication mechanism may be incorporated in the network 900 of FIG. 9 .
  • the WTRU 920 receives transmissions from the APs 905 , 910 and 915 , and reports its location to each of the APs 905 , 910 and 915 .
  • each of the APs 905 , 910 and 915 may launch a protocol which transmits a sequence of messages, requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920 , at varying effective coding rates higher and lower than the coding rate suggested by the nominal distance between each respective AP 905 , 910 , 915 and the WTRU 920 .
  • ACK positive acknowledgement
  • NACK negative acknowledgement
  • the protocol establishes a criteria which dictates, based on location of the WTRU 920 with respect to the locations of the APs 905 , 910 and 915 , whether the WTRU may decode transmissions received from the APs 905 , 910 and 915 . If the location reported by the WTRU 920 is determined to be correct, the protocol will then verify the authenticity of the location of the WTRU 920 by processing ACK/NACK messages received from the WTRU 920 in response to the sequence of messages.
  • Verification of the authenticity of the WTRU 920 may also be performed such that the WTRU 920 , (or a user of the WTRU 920 ), and the APs 905 , 910 and 915 share a common secret. For example, if APs 905 , 910 and 915 require the location indicated by the WTRU 920 to be authenticated, the APs 905 , 910 and 915 send a “challenge question” via a plurality of PDUs, which may be fragmented or encrypted as described above, such that the “challenge question” would be decipherable by the WTRU 920 only if the WTRU 920 is located as indicated. Thus, the WTRU 920 would not be able to “answer” the “challenge question” unless it was located at a position where the “challenge question” could be deciphered.
  • FIG. 10 shows an example of a hierarchical modulation (HM) scheme, defined by a combination of primary and secondary modulation schemes, which, in this case, are QPSK and BPSK respectively.
  • HM hierarchical modulation
  • a QPSK modulation scheme is defined by 4 modulation points, which together constitute the QPSK modulation constellation.
  • the modulation points represent carrier phases of ⁇ /2, 3 ⁇ /2, ⁇ /2 and ⁇ 3 ⁇ /2 and denote two bits 00 , 01 , 10 and 11 respectively.
  • a BPSK modulation scheme is defined by 2 modulation points, which together constitute the BPSK modulation constellation.
  • the modulation points represent carrier phases of + ⁇ and ⁇ radians, and denote one bit 0 or 1 respectively.
  • the HM scheme is defined by 8 modulation points, constructed from the primary and secondary modulation constellations.
  • the HM modulation points represent carrier phases of ( ⁇ /2 ⁇ ), ( ⁇ /2+ ⁇ ), (3 ⁇ /2 ⁇ ), (3 ⁇ /2+ ⁇ ), ( ⁇ /2 ⁇ ), ( ⁇ /2+ ⁇ ), ( ⁇ 3 ⁇ /2 ⁇ ), ( ⁇ 3 ⁇ /2+ ⁇ ) and denote three bits 000 , 001 , 010 , 011 , 100 , 101 , 110 and 111 respectively.
  • These 8 modulation points constitute four (4) clusters, each including two (2) closely spaced modulation points.
  • the modulation represented by the carrier phases ( ⁇ /2 ⁇ ), ( ⁇ /2+ ⁇ ) would constitute a cluster.
  • the transmitter sends a sequence of symbols taken from the HM constellation over a wireless channel, which attenuates and contaminates the signal as it travels farther from the transmitter.
  • a receiver which is close to the transmitter will, in general, receive a signal with good signal strength and signal quality, so that it can detect the carrier phase and hence the 3 bits accurately.
  • a receiver which is far from the transmitter will, in general, receive a signal with lower signal strength and signal quality, so that it may not be able to discriminate between the closely spaced modulation points in each cluster, although it can determine which cluster the transmitted symbols belongs to.
  • a receiver can detect the primary modulation but not the secondary modulation. Accordingly, the receiver can detect two bits of data but not the third bit.
  • This embodiment of the present invention may be used for implementing a security or trust zone.
  • the data associated with the primary modulation points that is the first 2 bits, is encoded or encrypted or scrambled with a secret key and the secret key itself is transmitted via the 3 rd bit of a sequence of symbols.
  • a receiver within the trust zone can detect the key and use it to decode or decrypt or descramble the primary data.
  • a receiver outside of the trust zone can detect the primary data but not the secret key, and thus cannot decode or decrypt or descramble the primary data.
  • Any modulation scheme may be used for the primary and the secondary modulation schemes of the present invention. Examples include M-ary PSK, M-ary FSK, M-ary QAM, or the like.
  • only selected modulation points in the primary modulation constellation may be superimposed with secondary clusters.
  • more than two levels of hierarchy may be imposed. For example, QPSK on BPSK on BPSK represents a three-level HM.
  • FIG. 10 shows a simple two-level scheme where the main waveform is a QPSK signal overlaid with a biphase shift keying (BPSK) HM.
  • BPSK biphase shift keying
  • scrambled data is modulated in the main waveform and descrambling information is encoded in the HM.
  • the descrambling information enables successful reception.
  • the receiver is too far away and hence unable to extract the HM data, the descrambling information has to be explicitly requested through other channels.

Abstract

A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application Nos. 60/630,730 filed Nov. 23, 2004, 60/661,856 filed Mar. 15, 2005 and 60/684,257 filed May 25, 2005, which are incorporated by reference as if fully set forth.
  • FIELD OF INVENTION
  • The present invention relates generally to wireless communications. More specifically, the present invention is related to a method and system for securing such wireless communications by strategically positioning the source and/or the recipient of the communications.
  • BACKGROUND
  • As wireless connectivity becomes more pervasive and reliable, it is expected that all the digital computing, data storage and media storage devices that are in widespread use today will become part of Ad-hoc wireless communication networks. However, such networks are susceptible to data security breaches in many respects. For example, Ad-hoc networks, where individual users communicate with each other directly without using intermediary network nodes, create new susceptibilities to the users and networks.
  • To reduce the susceptibility of wireless networks, techniques such as wired equivalent privacy (WEP), Wi-Fi protected access (WPA), extensible authentication protocol (EAP) and GSM-based encryption have been developed. Although these techniques provide some protection, they are still susceptible to various trusts, rights, identity, privacy and security issues. For example, although a particular wireless communication node may have the correct WEP keys to communicate with a wireless user, that user may not know whether the particular node can be trusted.
  • Additionally, authentication of the user using these keys typically occurs at higher layers of the communication stack. Accordingly, even when these controls are in place, a rogue wireless user or hacker may have some (although limited) access to the communication stack. This access creates vulnerabilities, such as denial of service attacks, among others.
  • The fact that wireless signals degrade with distance introduces a natural measure of security since intercepting a signal requires one to be sufficiently close to the source to detect it. This is particularly true in small networks, where the transmit power is typically low and communications typically occur at highest rates and in an Ad-hoc fashion. In many situations, physical proximity may be the most difficult attribute for a malicious attacker to attain. In fact communication which can only be detected within a very short proximity of the transmitter may not need to be very well protected.
  • Accordingly, it would be desirable to implement a security system for wireless networks which can take advantage of the natural security offered by degradation of wireless signals. Furthermore, it would be desirable to ensure that any information transmitted to a user is accessible only at the location of the user, such that a “eavesdropper” located in the general proximity of the user, but not at the user's immediate location, is prevented from receiving complete messages transmitted to the user.
  • SUMMARY
  • The present invention is related to a method and system for securing wireless communications. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A more detailed understanding of the invention may be had from the following description, given by way of example and to be understood in conjunction with the accompanying drawings wherein:
  • FIG. 1 is a graphical representation showing a relationship between effective input SNR of a receiver's decoder and the decoder's output BER;
  • FIG. 2 is a block diagram of a wireless communication system including a transmitter and a receiver used to secure wireless communications in accordance with the present invention;
  • FIG. 3 is a graphical representation showing a relationship between normalized secure proximity radius (NSPR) and known symbols for R=1, γ=2;
  • FIG. 4 is a graphical representation showing a relationship between NSPR and known symbols for, R=1, γ=4;
  • FIG. 5 is a graphical representation showing a relationship between NSPR and known symbols for R=½, γ=2;
  • FIG. 6 is a graphical representation showing a relationship between NSPR and known symbols for and R=½, γ=4;
  • FIG. 7 is a diagram of a security network with multiple trust zones used to secure wireless communications in accordance with one embodiment of the present invention;
  • FIG. 8 is a conventional network in which an eavesdropper may intersect a bit stream transmitted from an AP to a WTRU;
  • FIG. 9 is a network in which each of a plurality of APs transmits PDUs to a WTRU located in a trust zone intersected by the transmission patterns of each of the APs to secure wireless communications in accordance with another embodiment of the present invention; and
  • FIG. 10 shows a QPSK modulation constellation which illustrates how wireless communications are secured in accordance with yet another embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Hereafter, the terminology “wireless transmit/receive unit” (WTRU) includes but is not limited to a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a station (STA) or any other type of device capable of operating in a wireless environment. When referred to hereafter, the terminology “access point” (AP) includes but is not limited to a base station, a Node-B, a site controller or any other type of interfacing device in a wireless environment.
  • The present invention is based on the fact that most conventional channel codes, (e.g., Turbo codes, low density parity check (LDPC) codes, or the like), are operating close to the Shannon limit in most practical scenarios. As applied to wireless communication systems, (ignoring the effect of fading), the receiver's ability to demodulate data is almost a binary function of the effective SNR at the input to the receiver's decoder.
  • The features of the present invention may be incorporated into an integrated circuit (IC) or be configured in a circuit comprising a multitude of interconnecting components.
  • FIG. 1 is a graphical representation showing a relationship between effective decoder input SNR and a decoder output BER. A critical SNR exists such that if the actual effective SNR falls below the critical SNR, the decoder fails completely, (i.e., the decoder's output BER effectively 1), and data in a wireless communication cannot be read. Conversely, if the actual effective SNR at the decoder input is above the critical SNR, the probability of error at the decoder output is extremely low and the data in the wireless communication can be read with very high probability.
  • Since it is assumed that the channel code approaches the Shannon limit, it can be assumed that the coding is performed at the Shannon capacity rate. Moreover, it is convenient to actually work in terms of spectral efficiency, since this makes the numeric results independent of the bandwidth. For a complex-valued additive white Gaussian noise (AWGN) channel, the Shannon capacity rate is given by:
    R=log2(1+SNR);  Equation (1)
    where SNR is used in the Eb/No sense. It is assumed that for coding rates above this rate, reliable information decoding is not possible and for coding rates below this rate, reliable information decoding is essentially guaranteed. In fact, with large-block length codes, such as LDPC and Turbo codes, this is a realistic assumption.
  • The SNR basically depends on the distance between the transmitter and the receiver. The SNR dependency on the distance from the transmitter is given by a power law as follows: SNR ( d ) = E d γ ; Equation ( 2 )
    where E is a nominal SNR at a distance of 1 unit. In free space, the exponent γ is 2, but in practical wireless networks, the exponent γ is somewhere between 3 and 4, depending on the channel topology.
  • Let SNRc be the critical SNR for the chosen coding scheme. Then, the distance covered with this critical SNR is determined as follows: d = E SNR c γ ; Equation ( 3 )
    and it can be rewritten in dBs as follows: log d = 1 γ ( log E - log SNR c ) = 1 γ ( E dB - SNR c dB ) . Equation ( 4 )
  • The present invention makes d a function of security policy. By dynamically choosing d, a receiver at a distance closer than d can operate with a looser security policy, while a receiver with a distance beyond d will require a stricter security policy.
  • In a typical communication scheme, the channel coding scheme is fixed since it is quite expensive to have “programmable” decoders for completely different coding schemes. Thus, SNRc is fixed. Then, from Equations (3) and (4), d can be controlled by controlling E and γ in a communication system. In order to achieve this goal, at least one of these controls must vary depending on extrinsic security-related information that a receiver may or may not possess.
  • E is defined as a nominal SNR at a unit distance. In reality, E is a transmit power per information bit intended to a particular receiver. The nominal SNR definition is necessary since the power law model of Equation (2) breaks down for small values of d and leads to infinite SNRs. Thus, controlling E means controlling the output power per information bit. For example, the control of the output power per information bit may be accomplished in any one or combination of the following processes:
  • 1) by directly controlling the output power applied to the particular receiver's data;
  • 2) by reducing the output SNR and hence the receiver's receive SNR by adding an additional noise like signal to the transmitted signal. This has the advantage of maintaining constant output power whilst regulating the SNR to individual receivers.
  • 3) by controlling a modulation scheme, (e.g., selecting QPSK/M-quadrature amplitude modulation (QAM)/M-phase-shift keying (PSK)/frequency-shift keying (FSK), or the like);
  • 4) by adjusting a bit length (e.g. for UWB systems);
  • 5) by controlling jitter and timing of transmission;
  • 6) by controlling an effective coding rate for the data to the receiver, which is a preferred one in the present invention. This method offers the ability, in a WLAN system, to maintain constant power level between the APs and WTRU in such a way as to maintain a uniform and regular grid spacing between the various APs in a system without affecting the performance of the CSMA system from fluctuating transmit power levels;
  • 7) by changing the rate matching rules so as to introduce puncturing or repetition of symbols and hence the effective bit energy;
  • 8) by controlling a modulation index; and
  • 9) by controlling the amount of interference the receiver will experience.
  • The interference control can be accomplished by one or combination of the following ways, but is not limited to:
  • 1) by applying variable interference management techniques, such as pre-equalization to the desired receiver's signal and/or the interfering receiver's signal and varying the degree to which cross-interference is removed or introduced;
  • 2) by selective power control, (the power control could be a jointly optimized process with the security policy);
  • 3) by time/frequency/code scheduling to control the number of potential interferers;
  • 4) by dynamic interference control, (e.g., turned on and off); and
  • 5) by signaling through a third party beacon which in turn transmits signals creating additional interference pattern.
  • Additionally, in the presence of multiple receive antennae, the value of E can be made dependent on the angular location of the receiver with respect to the transmitter (Θ), (i.e., E=E(Θ), and consequently d can be made as a function of Θ as well. This introduces another set of control possibilities, which include, but not limited to, the following ways:
  • 1) beamforming towards or away from the receiver in azimuth, elevation or both;
  • 2) interference management using smart antenna techniques; and
  • 3) introduction of transmission patterns.
  • With respect to γ, the value of γ depends on Doppler spread of the received signal, which generally depends on the relative velocity of the receiver with respect to the transmitter and the geography of their environment. However, the transmitter can artificially increase the Doppler spread by internal signal processing. Since the value of γ depends on the geography of the environment, if the transmitter is equipped with a plurality of antennas, it can control γ to some extent by aiming the transmitted signal in an appropriate fashion.
  • The receiver may detect the presence of an adversary actively tampering with the wireless channel in accordance with the present invention. If the receiver is informed through auxiliary means that the receiver should be able to successfully demodulate the data stream, but is in fact unable to do so after a sufficiently large number of attempts, and since the security policy and the communication controls of the receiver are set in such a way as to enable the demodulation of the data stream, the receiver can then assume that the wireless channel is being tampered with.
  • The present invention preferably utilizes a code rate as a parameter depending on the security policy of the receiver. Typically, the ability of the receiver to demodulate a signal depends on geography, (the effective distance), which is more complex than a straight-line distance. If necessary, the transmitter and the receiver can discover the effective distance between them by slowly increasing, (or alternatively decreasing), one or more of the control parameters and detecting the point at which reliable data decoding becomes possible, (or alternatively is no longer possible).
  • FIG. 2 is a block diagram of a communication system 100 including a transmitter 110 and a receiver 120 in accordance with the present invention. The transmitter 110 comprises a protocol stack unit 112, a channel encoder 114, a rate matching unit 115, a multi-layer secure bit (MLSB) scrambler 116 and a physical channel processing unit 118. The receiver 120 comprises a physical channel processing unit 128, an MLSB descrambler 126, a rate de-matching unit 125, a channel decoder 124 and a protocol stack unit 122. The protocol stack units 112, 122, the channel encoder 114, the rate matching unit 115, the rate de-matching unit 125, the channel decoder 124 and the physical channel processing units 118, 128 are essentially the same components as used in conventional transmitters and receivers. The protocol stack unit 112 generates an information stream and this information stream is encoded for error protection by the channel encoder 114, and then is further processed to be transmitted via a wireless channel 130, (i.e., a particular air interface), by the physical channel processing unit 118. This process is reversed at the receiver 120.
  • The channel encoder 114 maps a sequence of input data to a sequence of output channel symbols. The MLSB scrambler 116 scrambles the channel symbols. The channel symbols may be bits or higher-order modulation symbols. Not all the symbols need to be scrambled. The MLSB scrambler 116 may take a subset of symbols and scrambles them. Receivers should be aware of which symbol positions are scrambled.
  • Several security layers are defined in accordance with the present invention. The proportion of the scrambled symbols that a MLSB descrambler 126 can descramble depends on the security layer. For any symbol that the MLSB descrambler 126 can descramble, the MLSB descrambler 126 does so. For any symbol that the MLSB descrambler 126 cannot descramble, the MLSB descrambler 126 inserts an erasure, (i.e., a channel observation of 0), for that symbol. Any conventional channel decoder is capable of operating with erasures. Therefore, this does not present a problem to a current system.
  • The effect of the security system in accordance with the present invention on those receivers which are not able to descramble all symbols is an increase in the code rate and a simultaneous reduction in the effective SNR per information bit. The specific amount of code-rate increase and effective SNR reduction depends on the security level, which will be explained hereinafter.
  • The rate matching unit 115 in the transmitter 110 operates in accordance with rate matching rules, which may be changed so as to introduce puncturing or repetition of symbols and hence the effective bit energy. A channel with a code rate R is utilized. R can be greater than 1 bit per channel symbol and the effective rate for security layer n is given by: R n = R 1 - θ ( 1 - e n ) ; Equation ( 5 )
    where θ denotes the proportion of the scrambled symbols and en is the proportion of symbols that a descrambler, (i.e., the rate de-matching unit 125 in the receiver 120), with a security layer n can descramble. In all cases, enε[0,1], e1=0, eN=1. The initial SNR per information bit, (more precisely Eb/No), is denoted by E0. The effective SNR for security layer n is given by:
    E n =E 0(1−θ(1−e n)).  Equation (6)
  • Both the rate and the SNR are simply scaled by the proportion of non-scrambled known bits, which is given by:
    ηn=1−θ(1−e n).  Equation (7)
    Therefore, it is sufficient to formulate the analysis exclusively in terms of this quantity. The SNR dependence on the distance from the transmitter is given by Equation (2).
  • In accordance with the present invention, it is determined that given a certain proportion of non-erased symbols, (i.e., symbols that the receiver is able to unscramble), the distance from the transmitter to the receiver, in order to be able to demodulate the data can be determined. Equation (2) is substituted into Equation (7) and solved for d to obtain the following equation: d = E 2 R - 1 γ . Equation ( 8 )
  • Next, given that a percentage η of the symbols are not erased, Equations (5) and (6) are substituted into Equation (9) to obtain the following equation: d ( η ) = η E 2 R / η - 1 γ . Equation ( 9 )
  • The percentage of distance achievable with a particular security level η can be expressed as a percentage of distance achievable with full security (η=1). This is the NSPR which is defined as follows: d _ ( η ) = ( η ) ( 1 ) η ( 2 R - 1 ) 2 R / η - 1 γ . Equation ( 10 )
  • The NSPR does not depend on E, although it does depend on the nominal transmission rate. As an example, FIGS. 3-6 present plots of NSPR versus percentage of known symbols for 4 different scenarios: R=1, γ=2; R=1, γ=4; R=½, γ=2; and R=½, γ=4, respectively. From the simulation results, it is observed that by revealing only 50% of the channel symbols, receivers located farther than about 60% of the “fully secure” transmission radius can be prevented from demodulating the information. Thus, if a receiver is beyond the effective distance for its security parameter, it is theoretically prohibited from decoding the data with a BER much better then 50%.
  • FIG. 7 shows a security network 700 including a plurality of WTRUs 705, 710, 715, 720 and 725 which operate in a plurality of non-overlapping trust zones 730, 740, 750 or a “no trust zone” area 760 external to the trust zones. The trust zones 730, 740, 750 and the “no trust zone” 760 are established as follows:
  • Transmission parameters, such as a code rate scheme, puncturing scheme, power scheme or the like, are chosen such that a receiver, (i.e., a WTRU), outside of the boundary between the trust zone 750 and the “no trust zone” 760 is not capable of decoding the transmission signal, even if the receiver is fully aware of all transmission parameters. Furthermore, a bit scrambling scheme, (to be implemented by the MLSB sub-system), is chosen such that receivers inside the trust zone 730 are able to demodulate the data, even if the receivers do not know any of the scrambled bits. The received power will be high enough such that successful demodulation can occur, even if the scrambled bits are simply taken to be punctured.
  • Receivers in the trust zone 740 are no longer able to demodulate the sent data unless they are aware of some of the scrambling pattern applied by the MLSB. Accordingly, receivers located in trust zone 740 will be forced to go through some kind of authentication procedure with the transmitter so that some necessary portion of the scrambling sequence is revealed to them.
  • Receivers in the trust zone 750 are not able to demodulate the data transmitter, even if they are aware of the portion of the scrambling sequence revealed to the receiver in the trust zone 740, (e.g., by overhearing the side communication whereby those receivers were allowed access to this sequence). Instead, they are required to request additional information about the scrambling sequence, (e.g., they may need to know the full sequence), and thus must go through a separate, (potentially more demanding), authentication process then receivers in the trust zone 740. As mentioned before, receivers in the area 760 cannot demodulate the sent data under any circumstances.
  • In accordance with the embodiment of the present invention described above, the distance from a transmitting WTRU 705 to a receiving WTRU is a function of security policy. By dynamically choosing the distance d, (e.g., 50 meters), a receiving WTRU 710 at a distance closer than d can operate with a looser security policy, while receiving WTRU 715, 720 and 725 with a distance beyond d will require a stricter security policy.
  • FIG. 8 shows a conventional network 800 which includes an AP 805 and a WTRU 810. When the AP 805 transmits a bit stream 815 to the WTRU 810, an eavesdropper 820 within range of the AP 805 is able to receive the entire bit stream, e.g., 111000101.
  • FIG. 9 shows a network 900 including a plurality of access points (APs) 905, 910, 915, a WTRU 920 and the eavesdropper 820 of FIG. 8 in accordance with one embodiment of the present invention. By using a plurality of APs 905, 910, 915, rather than only the sole AP 805 in the conventional network 800 of FIG. 8, the bit stream 815 is secured from being decrypted by the eavesdropper 820. The WTRU 920 is located at the intersection 935 of the transmission patterns of the APs 905, 910 and 915, whereby the WTRU 920 will receive a first fragment 930 A of the bit stream 815, “111”, from the AP 905, a second fragment 930 B of the bit stream 815, “000”, from the AP 910, and a third fragment 930 C of the bit stream 815, “101”, from the AP 915. Each fragment 930 A, 930 B, 930 C is referred to as a PDU and the original bit stream “111000101” is referred to as a service data unit (SDU). The WTRU 920 then reassembles the entire encrypted SDU from the three PDUs 930 A, 930 B and 930 C. Since the eavesdropper 820 is not physically located at the intersection 935 of the transmission patterns of the APs 905, 910 and 915 such that all of the fragments 930 A, 930 B, 930 C are received at an error rate comparable to that of the WTRU 920, the eavesdropper 820 is unable to decipher the entire bit stream 815, (even with knowledge of a secret key).
  • In the network 900 of FIG. 9, the SDU that is deciphered by the WTRU 920 is 111000101, where PDUA=111, PDUB=000 and PDUC=101. If the eavesdropper 820 manages to decipher two out of the three PDUs, (e.g., 000 and 101), the eavesdropper 820 will have managed to obtain some information which is incomplete but correct.
  • In an alternative embodiment, any PDUs that the eavesdropper 820 does receive are rendered meaningless if incomplete. For example, the SDU that needs to be sent to the WTRU 920 in the network 900 is 111000101. However, three PDUs that are sent by three different APs 905, 910 and 915, (e.g., PDU1, PDU2, PDU3), are not fragments, as illustrated by FIG. 9, but are instead selected such that the SDU=PDU1 XOR PDU2 XOR PDU3 where PDU1=100110011, PDU2=110000111 and PDU 3=101110001, such that the SDU=100110011XOR110000111XOR101110001=111000101, where XOR is an exclusive-or function. Thus, assuming that the WTRU 920 is located at the intersection 935 of the transmission patterns of the APs 905, 910 and 915, the WTRU 935 is able to receive all three PDUs and XOR the PDUs together to decipher the SDU 111000101. If the eavesdropper 820 captures even two of these three PDUs, they are completely meaningless with respect to deciphering the SDU. Alternative mechanisms other than XOR are also possible such as scrambling the packet and sending different bits from different transmitters in such a manner as to render meaningless the transmissions, unless all transmissions are received successfully.
  • In another embodiment, a location-based authentication mechanism may be incorporated in the network 900 of FIG. 9. The WTRU 920 receives transmissions from the APs 905, 910 and 915, and reports its location to each of the APs 905, 910 and 915. Based upon the reported locations of the WTRU 920 and the APs 905, 910 and 915, each of the APs 905, 910 and 915 may launch a protocol which transmits a sequence of messages, requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920, at varying effective coding rates higher and lower than the coding rate suggested by the nominal distance between each respective AP 905, 910, 915 and the WTRU 920. Thus, the protocol establishes a criteria which dictates, based on location of the WTRU 920 with respect to the locations of the APs 905, 910 and 915, whether the WTRU may decode transmissions received from the APs 905, 910 and 915. If the location reported by the WTRU 920 is determined to be correct, the protocol will then verify the authenticity of the location of the WTRU 920 by processing ACK/NACK messages received from the WTRU 920 in response to the sequence of messages.
  • Verification of the authenticity of the WTRU 920 may also be performed such that the WTRU 920, (or a user of the WTRU 920), and the APs 905, 910 and 915 share a common secret. For example, if APs 905, 910 and 915 require the location indicated by the WTRU 920 to be authenticated, the APs 905, 910 and 915 send a “challenge question” via a plurality of PDUs, which may be fragmented or encrypted as described above, such that the “challenge question” would be decipherable by the WTRU 920 only if the WTRU 920 is located as indicated. Thus, the WTRU 920 would not be able to “answer” the “challenge question” unless it was located at a position where the “challenge question” could be deciphered.
  • FIG. 10 shows an example of a hierarchical modulation (HM) scheme, defined by a combination of primary and secondary modulation schemes, which, in this case, are QPSK and BPSK respectively. It is well known that a QPSK modulation scheme is defined by 4 modulation points, which together constitute the QPSK modulation constellation. The modulation points represent carrier phases of π/2, 3π/2, −π/2 and −3π/2 and denote two bits 00, 01, 10 and 11 respectively. Similarly, it is well known that a BPSK modulation scheme is defined by 2 modulation points, which together constitute the BPSK modulation constellation. The modulation points represent carrier phases of +δ and −δ radians, and denote one bit 0 or 1 respectively. In turn, the HM scheme is defined by 8 modulation points, constructed from the primary and secondary modulation constellations.
  • The HM modulation points represent carrier phases of (π/2−δ), (π/2+δ), (3π/2−δ), (3π/2+δ), (−π/2−δ), (−π/2+δ), (−3π/2−δ), (−3π/2+δ) and denote three bits 000, 001, 010, 011, 100, 101, 110 and 111 respectively. These 8 modulation points constitute four (4) clusters, each including two (2) closely spaced modulation points. For example, the modulation represented by the carrier phases (π/2−δ), (π/2+δ) would constitute a cluster. The transmitter sends a sequence of symbols taken from the HM constellation over a wireless channel, which attenuates and contaminates the signal as it travels farther from the transmitter. A receiver which is close to the transmitter will, in general, receive a signal with good signal strength and signal quality, so that it can detect the carrier phase and hence the 3 bits accurately. However, a receiver which is far from the transmitter will, in general, receive a signal with lower signal strength and signal quality, so that it may not be able to discriminate between the closely spaced modulation points in each cluster, although it can determine which cluster the transmitted symbols belongs to. Thus, such a receiver can detect the primary modulation but not the secondary modulation. Accordingly, the receiver can detect two bits of data but not the third bit.
  • This embodiment of the present invention may be used for implementing a security or trust zone. The data associated with the primary modulation points, that is the first 2 bits, is encoded or encrypted or scrambled with a secret key and the secret key itself is transmitted via the 3rd bit of a sequence of symbols. Thus, a receiver within the trust zone can detect the key and use it to decode or decrypt or descramble the primary data. A receiver outside of the trust zone can detect the primary data but not the secret key, and thus cannot decode or decrypt or descramble the primary data. Any modulation scheme may be used for the primary and the secondary modulation schemes of the present invention. Examples include M-ary PSK, M-ary FSK, M-ary QAM, or the like. Furthermore, only selected modulation points in the primary modulation constellation may be superimposed with secondary clusters. Finally, more than two levels of hierarchy may be imposed. For example, QPSK on BPSK on BPSK represents a three-level HM.
  • In another embodiment, a layered HM scheme may be implemented. FIG. 10 shows a simple two-level scheme where the main waveform is a QPSK signal overlaid with a biphase shift keying (BPSK) HM. When a receiver's SNR is high, it is possible to distinguish all constellation points. As the SNR decreases, it becomes difficult to distinguish the points of the BPSK hierarchy from the nominal QPSK constellation points and hence the HM data is lost.
  • In accordance with the present invention, scrambled data is modulated in the main waveform and descrambling information is encoded in the HM. When the receiver is located within a zone where the HM is discernable, the descrambling information enables successful reception. When the receiver is too far away and hence unable to extract the HM data, the descrambling information has to be explicitly requested through other channels. By varying the power allocated to the HM waveform, the range can be zone controlled.
  • Although the features and elements of the present invention are described in the preferred embodiments in particular combinations, each feature or element can be used alone without the other features and elements of the preferred embodiments or in various combinations with or without other features and elements of the present invention.

Claims (79)

1. In a wireless communication system including a plurality of wireless transmit/receive units (WTRUs) used to transmit and receive wireless communications, a method for securing the wireless communications comprising:
establishing a plurality of non-overlapping trust zones associated with a particular one of the WTRUs; and
the particular WTRU transmitting a wireless communication signal including modulated data such that the wireless communication signal can be demodulated if received in a first one of the trust zones but cannot be demodulated if received in a second one of the trust zones.
2. The method of claim 1 wherein the first trust zone covers an area which extends from the particular WTRU to a first distance from the particular WTRU.
3. The method of claim 2 wherein the second trust zone covers an area which extends from the first distance to a second distance that is further away from the particular WTRU than the first distance.
4. The method of claim 1 wherein the wireless communication signal is scrambled and can be descrambled in the second trust zone if a scrambling sequence is determined.
5. The method of claim 4 wherein the scrambling sequence is provided if a user associated with a receiver located in the second trust zone is authenticated.
6. The method of claim 1 wherein a security level associated with the wireless communication signal is a function of the distance of a device that receives the wireless communication signal from the particular WTRU.
7. The method of claim 1 wherein a security level associated with the wireless communication signal is a function of a signal-to-noise ratio (SNR) per information bit of the wireless communication signal.
8. The method of claim 1 wherein a security level associated with the wireless communication signal is a function of the power level of the wireless communication signal.
9. The method of claim 1 wherein a security level associated with the wireless communication signal is a function of a code rate associated with the wireless communication signal.
10. The method of claim 1 wherein a security level associated with the wireless communication signal is a function of a normalized security proximity radius (NSPR) associated with each of the trust zones.
11. In a wireless communication system including a plurality of wireless transmit/receive units (WTRUs) used to transmit and receive wireless communications, a method for securing the wireless communications comprising:
establishing a plurality of non-overlapping trust zones associated with a particular one of the WTRUs; and
associating different security levels with each of the trust zones, wherein a communication device that receives a wireless communication signal transmitted by the particular WTRU is required to operate in accordance with a security policy associated with the trust zone in which the device is located.
12. The method of claim 11 wherein a first one of the trust zones covers an area which extends from the particular WTRU to a first distance from the particular WTRU.
13. The method of claim 12 wherein a second one of the trust zones covers an area which extends from the first distance to a second distance that is further away from the particular WTRU than the first distance.
14. The method of claim 11 wherein the wireless communication signal transmitted by the particular WTRU includes modulated data such that the security policy of the first trust zone allows the wireless communication signal to be demodulated if the communication device is located in the first trust zone, but the security policy of the second trust zone does not allow the wireless communication signal to be demodulated if the communication device is located in the second trust zone.
15. The method of claim 14 wherein the wireless communication signal is scrambled and can be descrambled in the second trust zone if a scrambling sequence is determined.
16. The method of claim 15 wherein the scrambling sequence is provided to the communication device if a user associated with the communication device is authenticated when located in the second trust zone.
17. The method of claim 11 wherein a security level associated with the wireless communication signal is a function of the distance of the communication device from the particular WTRU.
18. The method of claim 11 wherein a security level associated with the wireless communication signal is a function of a signal-to-noise ratio (SNR) per information bit of the wireless communication signal.
19. The method of claim 11 wherein a security level associated with the wireless communication signal is a function of the power level of the wireless communication signal.
20. The method of claim 11 wherein a security level associated with the wireless communication signal is a function of a code rate associated with the wireless communication signal.
21. The method of claim 11 wherein a security level associated with the wireless communication signal is a function of a normalized security proximity radius (NSPR) associated with each of the trust zones.
22. In a wireless communication system including a plurality of access points (APs) and at least one wireless transmit/receive unit, a method of securing wireless communications comprising:
each of the APs transmitting a fragment of a bit stream to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the APs intersect; and
the WTRU reassembling the fragments into the bit stream.
23. The method of claim 22 wherein it is not possible to receive all of the fragments at a location outside of the area where the AP transmission patterns intersect.
24. The method of claim 22 wherein each of the bit stream fragments is incorporated in a respective packet data unit (PDU), and the WTRU reassembles the respective PDUs into a service data unit (SDU).
25. The method of claim 22 wherein the WTRU reports the location of the WTRU to each of the APs and the APs transmit a sequence of messages at varying effective coding rates which request a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU, such that the APs can determine whether the location of the WTRU is correct.
26. The method of claim 25 wherein the APs determine whether the WTRU can decode transmissions sent by the APs.
27. The method of claim 25 wherein the APs verify the authenticity of the WTRU by sending a challenge question via a plurality of packet data units (PDUs) to the WTRU such that the challenge question would be decipherable by the WTRU and answered by the WTRU only if the WTRU is located at the location reported by the WTRU.
28. A wireless communication system for securing wireless communications, the system comprising:
a receiver; and
a wireless transmit/receive unit (WTRU) configured to establish a plurality of non-overlapping trust zones by transmitting a wireless communication signal that includes modulated data such that the wireless communication signal can be demodulated by the receiver if the receiver is located in a first one of the trust zones but cannot be demodulated if the receiver is located in a second one of the trust zones.
29. The system of claim 28 wherein the first trust zone covers an area which extends from the WTRU to a first distance from the WTRU.
30. The system of claim 29 wherein the second trust zone covers an area which extends from the first distance to a second distance that is further away from the particular WTRU than the first distance.
31. The system of claim 28 wherein the wireless communication signal is scrambled and can be descrambled in the second trust zone if a scrambling sequence is determined.
32. The system of claim 31 wherein the scrambling sequence is provided to the receiver if a user associated with a receiver located in the second trust zone is authenticated.
33. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of the distance of the receiver from the WTRU.
34. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of the Doppler spread of the wireless communication signal.
35. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of a signal-to-noise ratio (SNR) per information bit of the wireless communication signal.
36. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of the power level of the wireless communication signal.
37. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of a code rate associated with the wireless communication signal.
38. The system of claim 28 wherein a security level associated with the wireless communication signal is a function of a normalized security proximity radius (NSPR) associated with each of the trust zones.
39. A wireless communication system for securing wireless communications, the system comprising:
a wireless transmit/receive unit (WTRU);
a first access point (AP) for transmitting a first portion of a bit stream to the WTRU; and
a second AP for transmitting a second portion of the bit stream to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the first and second APs intersect, and the WTRU reassembles the first and second portions into the bit stream.
40. The system of claim 39 wherein it is not possible to receive both of the portions of the bit stream at a location outside of the area where transmission patterns of the first and second APs intersect.
41. The system of claim 39 wherein the first portion of the bit stream is incorporated in a first packet data unit (PDU), the second portion of the bit stream is incorporated in a second PDU and the WTRU reassembles the first and second PDUs into a service data unit (SDU).
42. The system of claim 39 wherein the WTRU reports the location of the WTRU to each of the APs and the APs transmit a sequence of messages at varying effective coding rates which request a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU, such that the APs can determine whether the location of the WTRU is correct.
43. The system of claim 42 wherein the APs determine whether the WTRU can decode transmissions sent by the APs.
44. The system of claim 42 wherein the APs verify the authenticity of the WTRU by sending a challenge question via a plurality of packet data units (PDUs) to the WTRU such that the challenge question would be decipherable by the WTRU and answered by the WTRU only if the WTRU is located at the location reported by the WTRU.
45. A wireless communication system for securing wireless communications, the system comprising:
a wireless transmit/receive unit (WTRU);
a first access point (AP) for transmitting a first packet data unit (PDU) to the WTRU; and
a second AP for transmitting a second PDU to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the first and second APs intersect, and the WTRU performs a function on the first and second PDUs to derive a service data unit (SDU).
46. The system of claim 45 wherein it is not possible to receive both of the first and second PDUs at a location outside of the area where transmission patterns of the first and second APs intersect.
47. The system of claim 45 wherein the function is an exclusive-or (XOR) function.
48. The system of claim 45 wherein the WTRU reports the location of the WTRU to each of the APs and the APs transmit a sequence of messages at varying effective coding rates which request a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU, such that the APs can determine whether the location of the WTRU is correct.
49. The system of claim 48 wherein the APs determine whether the WTRU can decode transmissions sent by the APs.
50. The system of claim 48 wherein the APs verify the authenticity of the WTRU by sending a challenge question via a plurality of packet data units (PDUs) to the WTRU such that the challenge question would be decipherable by the WTRU and answered by the WTRU only if the WTRU is located at the location reported by the WTRU.
51. In a wireless communication system in which a transmitter sends wireless communications to a receiver, wherein the wireless communications include a sequence of symbols represented by a plurality of primary modulation points of a modulation constellation, a method for securing the wireless communications comprising:
(a) replacing each primary modulation point with a cluster of secondary modulation points located in close proximity to one another;
(b) the receiver discriminating between the secondary modulation points in the cluster; and
(c) the receiver demodulating the secondary modulation points to decipher the symbols.
52. The method of claim 51 wherein there are four primary modulation points in the modulation constellation, each of which is defined by two data bits.
53. The method of claim 52 wherein there are a total of eight secondary modulation points in the modulation constellation, two in each cluster, each of which is defined by three data bits.
54. The method of claim 51 wherein each primary modulation point is generated by phase-shift keying (PSK).
55. The method of claim 51 wherein each primary modulation point is generated by frequency-shift keying (FSK).
56. The method of claim 51 wherein each primary modulation point is generated by quadrature amplitude modulation (QAM).
57. The method of claim 51 wherein each secondary modulation point is generated by phase-shift keying (PSK).
58. The method of claim 51 wherein each secondary modulation point is generated by frequency-shift keying (FSK).
59. The method of claim 51 wherein each secondary modulation point is generated by quadrature amplitude modulation (QAM).
60. A wireless communication system for securing wireless communications, the system comprising:
(a) a receiver; and
(a) a transmitter for transmitting to the receiver wireless communications which include a sequence of symbols represented by a plurality of primary modulation points of a modulation constellation, wherein the transmitter replaces each primary modulation point with a cluster of secondary modulation points located in close proximity to one another, the receiver discriminates between the secondary modulation points in the cluster, and the receiver demodulates the secondary modulation points to decipher the symbols.
61. The system of claim 60 wherein there are four primary modulation points in the modulation constellation, each of which is defined by two data bits.
62. The system of claim 61 wherein there are a total of eight secondary modulation points in the modulation constellation, two in each cluster, each of which is defined by three data bits.
63. The system of claim 60 wherein each primary modulation point is generated by phase-shift keying (PSK).
64. The system of claim 60 wherein each primary modulation point is generated by frequency-shift keying (FSK).
65. The system of claim 60 wherein each primary modulation point is generated by quadrature amplitude modulation (QAM).
66. The system of claim 60 wherein each secondary modulation point is generated by phase-shift keying (PSK).
67. The system of claim 60 wherein each secondary modulation point is generated by frequency-shift keying (FSK).
68. The system of claim 60 wherein each secondary modulation point is generated by quadrature amplitude modulation (QAM).
69. In a wireless communication system including a transmitter and a receiver, the transmitter being configured to transmit wireless communications to the receiver, a method for securing the wireless communications comprising:
(a) the transmitter transmitting a main waveform which overlays a quadrature phase shift keying (QPSK) signal with hierarchical modulation (HM);
(b) the transmitter modulating scrambled data in the main waveform;
(c) the transmitter encoding descrambling information in the HM; and
(d) the receiver extracting the descrambling information in the HM and demodulating the scrambled data when the distance between the receiver and the transmitter does not exceed a particular threshold.
70. The method of claim 69 wherein the HM is biphase shift keying (BPSK) HM.
71. The method of claim 69 further comprising:
(e) the transmitter varying power allocated to the HM waveform to adjust the particular threshold.
72. A wireless communication system for securing wireless communications comprising:
a receiver; and
a transmitter configured to transmit a main waveform which overlays a quadrature phase shift keying (QPSK) signal with hierarchical modulation (HM), modulates scrambled data in the main waveform and encodes descrambling information in the HM, wherein the receiver extracts the descrambling information in the HM and demodulates the scrambled data when the receiver is in the vicinity of the transmitter.
73. The system of claim 72 wherein the HM is biphase shift keying (BPSK) HM.
74. The system of claim 72 wherein the transmitter varies power allocated to the HM waveform.
75. A wireless communication system for securing wireless communications, the system comprising:
a transmitter comprising:
a first protocol stack unit for generating an information stream;
a channel encoder for encoding the information stream for error protection;
a rate matching unit for rate matching the information stream;
a multi-layer secure bit (MLSB) scrambler for scrambling channel symbols; and
a first physical channel processing unit for transmitting wireless communications including the scrambled channel symbols over a wireless channel; and
a receiver comprising:
a second physical channel processing unit for receiving the wireless communications;
a MLSB descrambler for descrambling the channel symbols of the wireless communications;
a rate de-matching unit for de-matching the rate of the wireless communications;
a channel decoder for decoding the information stream; and
a second protocol stack unit for processing the decoded information stream.
76. The system of claim 75 wherein if the receiver is informed through auxiliary means that the receiver should be able to successfully demodulate the information stream, but is in fact unable to do so after a sufficiently large number of attempts, the receiver assumes that the wireless channel is being tampered with.
77. In a transmitter, a first integrated circuit (IC) for securing wireless communications transmitted over a wireless channel, the first IC comprising:
a first protocol stack unit for generating an information stream;
a channel encoder for encoding the information stream for error protection;
a rate matching unit;
a multi-layer secure bit (MLSB) scrambler for scrambling channel symbols; and
a first physical channel processing unit.
78. In a receiver which communicates with the transmitter of claim 77, a second integrated circuit (IC) for securing wireless communications received over a wireless channel, the second IC comprising:
a second physical channel processing unit for receiving the wireless communications;
a MLSB descrambler for descrambling channel symbols of the wireless communications;
a rate de-matching unit for rate matching an information stream in the wireless communications;
a channel decoder for decoding the information stream; and
a second protocol stack unit for processing the decoded information stream.
79. The second IC of claim 78 wherein if the receiver is informed through auxiliary means that the receiver should be able to successfully demodulate the information stream, but is in fact unable to do so after a sufficiently large number of attempts, the receiver assumes that the wireless channel is being tampered with.
US11/283,017 2004-11-23 2005-11-18 Method and system for securing wireless communications Abandoned US20060133338A1 (en)

Priority Applications (13)

Application Number Priority Date Filing Date Title
US11/283,017 US20060133338A1 (en) 2004-11-23 2005-11-18 Method and system for securing wireless communications
EP10150667A EP2173122A3 (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
PCT/US2005/041976 WO2007011416A2 (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
EP05858494A EP1815699A4 (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
JP2007543310A JP4616351B2 (en) 2004-11-23 2005-11-21 Method and apparatus for securing wireless communication
MX2007006167A MX2007006167A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications.
KR1020077014344A KR100913560B1 (en) 2004-11-23 2005-11-21 Method and apparatus for securing wireless communications
CN201110041416.4A CN102098670B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
CA2587735A CA2587735C (en) 2004-11-23 2005-11-21 Method and apparatus for securing wireless communications
KR1020077017160A KR20070087220A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
NO20073117A NO20073117L (en) 2004-11-23 2007-06-18 Procedure and system for securing wireless communications
US12/649,151 US8843743B2 (en) 2004-11-23 2009-12-29 Method and system for securing wireless communications
US14/314,983 US20140307875A1 (en) 2004-11-23 2014-06-25 Method and system for securing wireless communications

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US63073004P 2004-11-23 2004-11-23
US66185605P 2005-03-15 2005-03-15
US68425705P 2005-05-25 2005-05-25
US11/283,017 US20060133338A1 (en) 2004-11-23 2005-11-18 Method and system for securing wireless communications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/649,151 Division US8843743B2 (en) 2004-11-23 2009-12-29 Method and system for securing wireless communications

Publications (1)

Publication Number Publication Date
US20060133338A1 true US20060133338A1 (en) 2006-06-22

Family

ID=36595627

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/283,017 Abandoned US20060133338A1 (en) 2004-11-23 2005-11-18 Method and system for securing wireless communications
US12/649,151 Expired - Fee Related US8843743B2 (en) 2004-11-23 2009-12-29 Method and system for securing wireless communications
US14/314,983 Abandoned US20140307875A1 (en) 2004-11-23 2014-06-25 Method and system for securing wireless communications

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/649,151 Expired - Fee Related US8843743B2 (en) 2004-11-23 2009-12-29 Method and system for securing wireless communications
US14/314,983 Abandoned US20140307875A1 (en) 2004-11-23 2014-06-25 Method and system for securing wireless communications

Country Status (9)

Country Link
US (3) US20060133338A1 (en)
EP (2) EP2173122A3 (en)
JP (1) JP4616351B2 (en)
KR (2) KR100913560B1 (en)
CN (1) CN102098670B (en)
CA (1) CA2587735C (en)
MX (1) MX2007006167A (en)
NO (1) NO20073117L (en)
WO (1) WO2007011416A2 (en)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070124395A1 (en) * 2005-09-22 2007-05-31 Stephen Edge Geography-based filtering of broadcasts
US20070230385A1 (en) * 2006-03-29 2007-10-04 Stephen Gaw Location-based communication control system
US20070259632A1 (en) * 2006-05-04 2007-11-08 California Institute Of Technology Transmitter architecture based on antenna parasitic switching
US20090093259A1 (en) * 2007-10-05 2009-04-09 Qualcomm Incorporated Location and time based filtering of broadcast information
US20100050240A1 (en) * 2005-02-07 2010-02-25 Juniper Networks, Inc. Wireless network having multiple security interfaces
US20100151882A1 (en) * 2008-12-15 2010-06-17 Qualcomm Incorporated Location logging and location and time based filtering
US20100260236A1 (en) * 2009-04-14 2010-10-14 Texas Instruments Incorporated Phy layer ppdu construction for body area network (ban) devices
CN101951581A (en) * 2010-09-15 2011-01-19 苏州恩巨网络有限公司 Signaling information transmission method
US20110034147A1 (en) * 2009-08-05 2011-02-10 Oto Technologies, Llc Routing mobile users to secure locations based on transaction type
US20120121089A1 (en) * 2009-08-07 2012-05-17 Sony Corporation Information processing apparatus, information processing method, operation terminal, and information processing system
US20120148046A1 (en) * 2010-12-10 2012-06-14 Chunjie Duan Secure Wireless Communication Using Rate-Adaptive Codes
US20130322630A1 (en) * 2009-11-06 2013-12-05 Microsoft Corporation Location proofs
US20140177753A1 (en) * 2012-12-20 2014-06-26 The University Of Western Ontario Asymmetrical transmitter-receiver system for short range communications
US9042809B2 (en) 2013-03-19 2015-05-26 Delphi Technologies, Inc. Satellite communication having distinct low priority information broadcast into adjacent sub-regions
EP2732580A4 (en) * 2011-07-11 2015-06-17 Ricoh Co Ltd Wireless communication system and terminal-device authentication method in wireless communication system
WO2015171422A1 (en) * 2014-05-07 2015-11-12 Qualcomm Incorporated Non-orthogonal multiple access and interference cancellation
US20160112453A1 (en) * 2008-06-19 2016-04-21 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US9344534B2 (en) * 2011-08-23 2016-05-17 Tencent Technology (Shenzhen) Company Limited Method and apparatus for performing data processing and data transmission by 3G AE and 3G RE
US9451401B2 (en) 2011-05-27 2016-09-20 Qualcomm Incorporated Application transport level location filtering of internet protocol multicast content delivery
US9485108B2 (en) 2011-03-14 2016-11-01 Qualcomm Incorporated System and apparatus for using multichannel file delivery over unidirectional transport (“FLUTE”) protocol for delivering different classes of files in a broadcast network
US9489647B2 (en) 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US9538569B2 (en) 2008-12-23 2017-01-03 Interdigital Patent Holdings, Inc. Data transfer between wireless devices
US20170093919A1 (en) * 2015-09-29 2017-03-30 SysTools Software Private Limited System and method for providing location based security controls on mobile devices
US9658868B2 (en) 2008-06-19 2017-05-23 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US10098324B2 (en) * 2015-04-09 2018-10-16 Jonathan O. Baize Herd control method and system
US10244438B2 (en) * 2015-04-28 2019-03-26 Time Warner Cable Enterprises Llc Neighbor list management and connection control in a network environment
EP3477905A1 (en) * 2017-10-26 2019-05-01 Nxp B.V. Secure adaptive wireless communications
US10320953B2 (en) * 2014-06-25 2019-06-11 Nettention Co., Ltd. User datagram protocol networking method for stability improvement
US10411975B2 (en) 2013-03-15 2019-09-10 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with multi-tier deployment policy
US20200260492A1 (en) * 2011-03-09 2020-08-13 Board Of Regents, The University Of Texas System Network routing system, method, and computer program product
US10959241B2 (en) 2010-07-30 2021-03-23 Board Of Regents, The University Of Texas System Distributed rate allocation and collision detection in wireless networks
US20230155719A1 (en) * 2021-11-17 2023-05-18 Qualcomm Incorporated Transmission puncturing schemes for rateless coding

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2428808C2 (en) 2007-01-26 2011-09-10 Интердиджитал Текнолоджи Корпорейшн Method and device to arrange protection of location information and to control access with application of location information
KR100916254B1 (en) 2007-08-28 2009-09-10 현대자동차주식회사 Auxiliary Floor Mat for A Vehicle
US8755363B2 (en) * 2009-09-15 2014-06-17 Qualcomm Incorporated Physical layer signaling of control parameters
WO2013166616A1 (en) 2012-05-11 2013-11-14 Universidad Austral De Chile Biomaterial comprising chitosan and at least glycosaminoglycan
CN104066099B (en) * 2013-03-19 2017-10-10 北京邮电大学 A kind of relaying dispositions method of wireless communication networks
US9386585B2 (en) * 2013-07-15 2016-07-05 Qualcomm Incorporated Systems and methods for a data scrambling procedure
CN106294449B (en) 2015-05-28 2020-01-03 华为技术有限公司 Data processing method and device
WO2017167369A1 (en) * 2016-03-31 2017-10-05 Huawei Technologies Co., Ltd. An apparatus and method for controlling the secure transmission of a message from a transmitter to a receiver

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5134633A (en) * 1990-11-30 1992-07-28 At&T Bell Laboratories Digital communications synchronization scheme
US5819000A (en) * 1992-03-26 1998-10-06 Matsushita Electric Industrial Co., Ltd. Magnetic recording and playback apparatus
US6160855A (en) * 1997-02-06 2000-12-12 Mitsubishi Materials Corporation Digital modulation method and digital communication system
US6351498B1 (en) * 1997-11-20 2002-02-26 Ntt Mobile Communications Network Inc. Robust digital modulation and demodulation scheme for radio communications involving fading
US6381261B1 (en) * 1997-11-27 2002-04-30 G.D.S. Co., Ltd. Random pulse type radar apparatus
US20030099362A1 (en) * 2001-11-27 2003-05-29 Doug Rollins Method and apparatus for WEP key management and propagation in a wireless system
US20040066844A1 (en) * 2002-10-03 2004-04-08 Ntt Docomo, Inc Modulation and demodulation based on hierarchical modulation
US20040103275A1 (en) * 2002-11-25 2004-05-27 Fujitsu Limited Methods and apparatus for secure, portable, wireless and multi-hop data networking
US20040114692A1 (en) * 2002-12-12 2004-06-17 Nec Corporation Wireless apparatus employing multi-level QAM and method for estimating threshold value
US20040150510A1 (en) * 2002-03-28 2004-08-05 Brother Kogyo Kabushiki Kaisha Interrogator and tag of wireless communication system
US20040166901A1 (en) * 2003-02-17 2004-08-26 Ntt Docomo, Inc. Radio communication method and base station
US20040236939A1 (en) * 2003-02-20 2004-11-25 Docomo Communications Laboratories Usa, Inc. Wireless network handoff key
US20050141627A1 (en) * 2003-11-26 2005-06-30 Walker Glenn A. Method to create hierarchical modulation in OFDM
US20050164740A1 (en) * 2002-07-05 2005-07-28 Isamu Yoshii Radio communication base station device, radio communication mobile station device, and radio communication method
US7043210B2 (en) * 2001-06-05 2006-05-09 Nortel Networks Limited Adaptive coding and modulation
US7073116B1 (en) * 1999-11-23 2006-07-04 Thomson Licensing Error detection/correction coding for hierarchical QAM transmission systems
US20080170640A1 (en) * 2003-08-20 2008-07-17 Thomson Licensing Methods and Apparatus For Hierarchical Modulation Using Radial Constellation
US20080298505A1 (en) * 2002-07-01 2008-12-04 The Directv Group, Inc. Hierarchical 8psk performance
US7471640B2 (en) * 2003-11-06 2008-12-30 Industrial Technology Research Institute Scalable QAM system and method

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1295700C (en) * 1988-06-10 1992-02-11 Paul Alan Kennard Method of quadrature-phase amplitude modulation
JP3359927B2 (en) * 1991-10-17 2002-12-24 株式会社東芝 Demodulator for quadrature amplitude modulation digital radio equipment.
US5438591A (en) * 1991-07-31 1995-08-01 Kabushiki Kaisha Toshiba Quadrature amplitude modulation type digital radio communication device and method for preventing abnormal synchronization in demodulation system
US6097771A (en) 1996-07-01 2000-08-01 Lucent Technologies Inc. Wireless communications system having a layered space-time architecture employing multi-element antennas
JP3239880B2 (en) * 1998-11-02 2001-12-17 日本電気株式会社 Rate matching method and digital communication system
CN1157092C (en) * 1999-09-17 2004-07-07 艾利森公司 Safe zones for portable electronic device
US7308575B2 (en) * 2000-03-30 2007-12-11 Arris Group, Inc. Data scrambling system for a shared transmission media
TW465199B (en) 2000-04-06 2001-11-21 Yau-Geng Jau The transmitter diversity combination with phase modulation and amplitude modulation using feedback information from the receiver, as well as one-bit and two-bit representation methods of the feedback information
US6391261B1 (en) * 2000-04-14 2002-05-21 Lifepoint, Inc. Device for detecting analytes related to sample pH
TW480464B (en) 2000-10-16 2002-03-21 Jeen-Chorng Liou Community cooperation announcing system and method using radio device
US7143289B2 (en) * 2000-10-30 2006-11-28 Geocodex Llc System and method for delivering encrypted information in a communication network using location identity and key tables
US7313825B2 (en) * 2000-11-13 2007-12-25 Digital Doors, Inc. Data security system and method for portable device
GB2371947B (en) * 2001-02-01 2005-02-23 Fujitsu Ltd Communications systems
TW536892B (en) 2001-11-30 2003-06-11 Hit Inc Wireless transmission device capable of selecting transmission of different information
US20030103554A1 (en) * 2001-12-05 2003-06-05 Yunxin Li Providing a partially encrypted data packet in a spread spectrum signal
EP2375689A3 (en) * 2002-03-01 2012-01-11 Enterasys Networks, Inc. Location discovery in a data network
EP1502439B1 (en) * 2002-04-30 2007-06-20 Koninklijke Philips Electronics N.V. Backward compatible dvb-s standard transmission system
US7272714B2 (en) * 2002-05-31 2007-09-18 International Business Machines Corporation Method, apparatus, and program for automated trust zone partitioning
US7403773B2 (en) * 2002-06-27 2008-07-22 Avaya Technology Corp. Location-based access control for wireless local area networks
US6985498B2 (en) 2002-08-26 2006-01-10 Flarion Technologies, Inc. Beacon signaling in a wireless system
TW569562B (en) 2002-10-17 2004-01-01 Inventec Appliances Corp Method for receiving radio signals with an access point
KR100542119B1 (en) * 2002-12-12 2006-01-11 한국전자통신연구원 Method for Automatically Searching Wireless LAN Access Point and Terminal for Processing The Same
US7680278B2 (en) * 2004-02-04 2010-03-16 Microsoft Corporation Domino scheme for wireless cryptographic communication and communication method incorporating same
US7073210B2 (en) * 2004-04-23 2006-07-11 Jin Shan Jiang Toilet seat device for disabled person

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5134633A (en) * 1990-11-30 1992-07-28 At&T Bell Laboratories Digital communications synchronization scheme
US5819000A (en) * 1992-03-26 1998-10-06 Matsushita Electric Industrial Co., Ltd. Magnetic recording and playback apparatus
US6160855A (en) * 1997-02-06 2000-12-12 Mitsubishi Materials Corporation Digital modulation method and digital communication system
US6351498B1 (en) * 1997-11-20 2002-02-26 Ntt Mobile Communications Network Inc. Robust digital modulation and demodulation scheme for radio communications involving fading
US6381261B1 (en) * 1997-11-27 2002-04-30 G.D.S. Co., Ltd. Random pulse type radar apparatus
US7073116B1 (en) * 1999-11-23 2006-07-04 Thomson Licensing Error detection/correction coding for hierarchical QAM transmission systems
US7043210B2 (en) * 2001-06-05 2006-05-09 Nortel Networks Limited Adaptive coding and modulation
US20030099362A1 (en) * 2001-11-27 2003-05-29 Doug Rollins Method and apparatus for WEP key management and propagation in a wireless system
US20040150510A1 (en) * 2002-03-28 2004-08-05 Brother Kogyo Kabushiki Kaisha Interrogator and tag of wireless communication system
US20080298505A1 (en) * 2002-07-01 2008-12-04 The Directv Group, Inc. Hierarchical 8psk performance
US20050164740A1 (en) * 2002-07-05 2005-07-28 Isamu Yoshii Radio communication base station device, radio communication mobile station device, and radio communication method
US20040066844A1 (en) * 2002-10-03 2004-04-08 Ntt Docomo, Inc Modulation and demodulation based on hierarchical modulation
US20040103275A1 (en) * 2002-11-25 2004-05-27 Fujitsu Limited Methods and apparatus for secure, portable, wireless and multi-hop data networking
US20040114692A1 (en) * 2002-12-12 2004-06-17 Nec Corporation Wireless apparatus employing multi-level QAM and method for estimating threshold value
US20040166901A1 (en) * 2003-02-17 2004-08-26 Ntt Docomo, Inc. Radio communication method and base station
US20040236939A1 (en) * 2003-02-20 2004-11-25 Docomo Communications Laboratories Usa, Inc. Wireless network handoff key
US20080170640A1 (en) * 2003-08-20 2008-07-17 Thomson Licensing Methods and Apparatus For Hierarchical Modulation Using Radial Constellation
US7471640B2 (en) * 2003-11-06 2008-12-30 Industrial Technology Research Institute Scalable QAM system and method
US20050141627A1 (en) * 2003-11-26 2005-06-30 Walker Glenn A. Method to create hierarchical modulation in OFDM

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100050240A1 (en) * 2005-02-07 2010-02-25 Juniper Networks, Inc. Wireless network having multiple security interfaces
US8799991B2 (en) 2005-02-07 2014-08-05 Juniper Networks, Inc. Wireless network having multiple security interfaces
US8280058B2 (en) * 2005-02-07 2012-10-02 Juniper Networks, Inc. Wireless network having multiple security interfaces
US20070124395A1 (en) * 2005-09-22 2007-05-31 Stephen Edge Geography-based filtering of broadcasts
US20070230385A1 (en) * 2006-03-29 2007-10-04 Stephen Gaw Location-based communication control system
US7672678B2 (en) * 2006-03-29 2010-03-02 Qualcomm Incorporated Location-based communication system
US8073392B2 (en) * 2006-05-04 2011-12-06 California Institute Of Technology Transmitter architecture based on antenna parasitic switching
US20070259632A1 (en) * 2006-05-04 2007-11-08 California Institute Of Technology Transmitter architecture based on antenna parasitic switching
US10027432B2 (en) 2007-10-05 2018-07-17 Qualcomm Incorporated Location and time based filtering of broadcast information
US9312970B2 (en) 2007-10-05 2016-04-12 Qualcomm Incorporated Location and time based filtering of broadcast information
US20090093259A1 (en) * 2007-10-05 2009-04-09 Qualcomm Incorporated Location and time based filtering of broadcast information
US8849183B2 (en) 2007-10-05 2014-09-30 Qualcomm Incorporated Location and time based filtering of broadcast information
US9489647B2 (en) 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US10880189B2 (en) 2008-06-19 2020-12-29 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US9973474B2 (en) 2008-06-19 2018-05-15 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US20190245888A1 (en) * 2008-06-19 2019-08-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US9658868B2 (en) 2008-06-19 2017-05-23 Csc Agility Platform, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US20160112453A1 (en) * 2008-06-19 2016-04-21 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US20210014275A1 (en) * 2008-06-19 2021-01-14 Csc Agility Platform, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US9280778B2 (en) 2008-12-15 2016-03-08 Qualcomm Incorporated Location logging and location and time based filtering
US10158970B2 (en) 2008-12-15 2018-12-18 Qualcomm Incorporated Location logging and location and time based filtering
US20100151882A1 (en) * 2008-12-15 2010-06-17 Qualcomm Incorporated Location logging and location and time based filtering
US9538569B2 (en) 2008-12-23 2017-01-03 Interdigital Patent Holdings, Inc. Data transfer between wireless devices
US8391228B2 (en) * 2009-04-14 2013-03-05 Texas Instruments Incorporated PHY layer PPDU construction for body area network (BAN) devices
US20100260236A1 (en) * 2009-04-14 2010-10-14 Texas Instruments Incorporated Phy layer ppdu construction for body area network (ban) devices
US20110034147A1 (en) * 2009-08-05 2011-02-10 Oto Technologies, Llc Routing mobile users to secure locations based on transaction type
US8116732B2 (en) 2009-08-05 2012-02-14 Oto Technologies, Llc Routing mobile users to secure locations based on transaction type
US8611538B2 (en) * 2009-08-07 2013-12-17 Sony Corporation Information processing apparatus, information processing method, operation terminal, and information processing system
US9204297B2 (en) 2009-08-07 2015-12-01 Sony Corporation Information processing apparatus, information processing method, operation terminal, and information processing system
US20120121089A1 (en) * 2009-08-07 2012-05-17 Sony Corporation Information processing apparatus, information processing method, operation terminal, and information processing system
US9332427B2 (en) * 2009-11-06 2016-05-03 Microsoft Technology Licensing, Llc Location proofs
US20130322630A1 (en) * 2009-11-06 2013-12-05 Microsoft Corporation Location proofs
US10959241B2 (en) 2010-07-30 2021-03-23 Board Of Regents, The University Of Texas System Distributed rate allocation and collision detection in wireless networks
CN101951581A (en) * 2010-09-15 2011-01-19 苏州恩巨网络有限公司 Signaling information transmission method
US20120148046A1 (en) * 2010-12-10 2012-06-14 Chunjie Duan Secure Wireless Communication Using Rate-Adaptive Codes
US9088888B2 (en) * 2010-12-10 2015-07-21 Mitsubishi Electric Research Laboratories, Inc. Secure wireless communication using rate-adaptive codes
US20200260492A1 (en) * 2011-03-09 2020-08-13 Board Of Regents, The University Of Texas System Network routing system, method, and computer program product
US11240844B2 (en) * 2011-03-09 2022-02-01 Board Of Regents, The University Of Texas System Network routing system, method, and computer program product
US10952254B2 (en) 2011-03-09 2021-03-16 Board Of Regents, The University Of Texas System Network routing system, method, and computer program product
US9485108B2 (en) 2011-03-14 2016-11-01 Qualcomm Incorporated System and apparatus for using multichannel file delivery over unidirectional transport (“FLUTE”) protocol for delivering different classes of files in a broadcast network
US9451401B2 (en) 2011-05-27 2016-09-20 Qualcomm Incorporated Application transport level location filtering of internet protocol multicast content delivery
US9094826B2 (en) 2011-07-11 2015-07-28 Ricoh Company, Limited Wireless communication system and terminal-device authentication method in wireless communication system
EP2732580A4 (en) * 2011-07-11 2015-06-17 Ricoh Co Ltd Wireless communication system and terminal-device authentication method in wireless communication system
US9344534B2 (en) * 2011-08-23 2016-05-17 Tencent Technology (Shenzhen) Company Limited Method and apparatus for performing data processing and data transmission by 3G AE and 3G RE
US20140177753A1 (en) * 2012-12-20 2014-06-26 The University Of Western Ontario Asymmetrical transmitter-receiver system for short range communications
US9425836B2 (en) * 2012-12-20 2016-08-23 The University Of Western Ontario Asymmetrical transmitter-receiver system for short range communications
US10411975B2 (en) 2013-03-15 2019-09-10 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with multi-tier deployment policy
US9042809B2 (en) 2013-03-19 2015-05-26 Delphi Technologies, Inc. Satellite communication having distinct low priority information broadcast into adjacent sub-regions
JP2017521885A (en) * 2014-05-07 2017-08-03 クゥアルコム・インコーポレイテッドQualcomm Incorporated Non-orthogonal multiple access and interference cancellation
WO2015171422A1 (en) * 2014-05-07 2015-11-12 Qualcomm Incorporated Non-orthogonal multiple access and interference cancellation
US9942013B2 (en) 2014-05-07 2018-04-10 Qualcomm Incorporated Non-orthogonal multiple access and interference cancellation
US10320953B2 (en) * 2014-06-25 2019-06-11 Nettention Co., Ltd. User datagram protocol networking method for stability improvement
US10098324B2 (en) * 2015-04-09 2018-10-16 Jonathan O. Baize Herd control method and system
US10681596B2 (en) 2015-04-28 2020-06-09 Time Warner Cable Enterprises Llc Neighbor list management and connection control in a network environment
US10244438B2 (en) * 2015-04-28 2019-03-26 Time Warner Cable Enterprises Llc Neighbor list management and connection control in a network environment
US20170093919A1 (en) * 2015-09-29 2017-03-30 SysTools Software Private Limited System and method for providing location based security controls on mobile devices
US9930036B2 (en) * 2015-09-29 2018-03-27 SysTools Software Private Limited System and method for providing location based security controls on mobile devices
EP3477905A1 (en) * 2017-10-26 2019-05-01 Nxp B.V. Secure adaptive wireless communications
CN109714768A (en) * 2017-10-26 2019-05-03 恩智浦有限公司 Safe adaptive wireless communication
US11050759B2 (en) 2017-10-26 2021-06-29 Nxp B.V. Secure adaptive wireless communications
US20190132331A1 (en) * 2017-10-26 2019-05-02 Nxp B.V. Secure adaptive wireless communications
US20230155719A1 (en) * 2021-11-17 2023-05-18 Qualcomm Incorporated Transmission puncturing schemes for rateless coding
US11742980B2 (en) * 2021-11-17 2023-08-29 Qualcomm Incorporated Transmission puncturing schemes for rateless coding

Also Published As

Publication number Publication date
US20100318796A1 (en) 2010-12-16
CN102098670A (en) 2011-06-15
EP2173122A3 (en) 2011-01-05
EP1815699A4 (en) 2008-09-03
CA2587735C (en) 2014-09-02
US20140307875A1 (en) 2014-10-16
KR20070086596A (en) 2007-08-27
JP2008521361A (en) 2008-06-19
US8843743B2 (en) 2014-09-23
MX2007006167A (en) 2007-06-14
WO2007011416A2 (en) 2007-01-25
NO20073117L (en) 2007-06-18
EP2173122A2 (en) 2010-04-07
KR100913560B1 (en) 2009-08-21
KR20070087220A (en) 2007-08-27
JP4616351B2 (en) 2011-01-19
WO2007011416A3 (en) 2007-10-25
CA2587735A1 (en) 2007-01-25
EP1815699A2 (en) 2007-08-08
CN102098670B (en) 2014-08-06

Similar Documents

Publication Publication Date Title
US8843743B2 (en) Method and system for securing wireless communications
US8621225B2 (en) Method and apparatus for enhancing security of wireless communications
US7929409B2 (en) Orthogonal frequency division multiplexing (OFDM) method and apparatus for protecting and authenticating wirelessly transmitted digital information
US20050220322A1 (en) Watermarks/signatures for wireless communications
US20070121939A1 (en) Watermarks for wireless communications
Borle et al. Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation
US20070053325A1 (en) Method and apparatus for securing wireless communications
D’Oro et al. Hiding data in plain sight: Undetectable wireless communications through pseudo-noise asymmetric shift keying
Xiong et al. MIO: Enhancing wireless communications security through physical layer multiple inter-symbol obfuscation
Rahbari et al. Full frame encryption and modulation obfuscation using channel-independent preamble identifier
Subraman et al. Demonstrating and mitigating the risk of an FEC-based hardware trojan in wireless networks
Bonati et al. SteaLTE: Private 5G cellular connectivity as a service with full-stack wireless steganography
Bang et al. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems
TWI459779B (en) Node B used in ensuring wireless communication
Zhang et al. Secure and optimized unauthorized secondary user detection in dynamic spectrum access
CN101167382A (en) Method and system for securing wireless communications
Lebold Physical layer watermarking of binary phase-shift keyed signals using standard gnu radio blocks
Li et al. A Wireless Covert Communication System: Antenna Coding and Achievable Rate Analysis

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERDIGITAL TECHNOLOGY CORPORATION, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REZNIK, ALEXANDER;CARLTON, ALAN GERALD;BRIANCON, ALAIN CHARLES LOUIS;AND OTHERS;REEL/FRAME:017653/0257;SIGNING DATES FROM 20060125 TO 20060320

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION