EP2002585A1 - Vertrauliche übertragung von daten durch änderung der frequenz in einem telekommunikationsnetz - Google Patents
Vertrauliche übertragung von daten durch änderung der frequenz in einem telekommunikationsnetzInfo
- Publication number
- EP2002585A1 EP2002585A1 EP07731760A EP07731760A EP2002585A1 EP 2002585 A1 EP2002585 A1 EP 2002585A1 EP 07731760 A EP07731760 A EP 07731760A EP 07731760 A EP07731760 A EP 07731760A EP 2002585 A1 EP2002585 A1 EP 2002585A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- transmission
- terminal
- frequencies
- data
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/7136—Arrangements for generation of hop frequencies, e.g. using a bank of frequency sources, using continuous tuning or using a transform
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/003—Secret communication by varying carrier frequency at or within predetermined or random intervals
Definitions
- the present invention relates to the field of telecommunications, and more particularly the confidentiality of data transmissions in telecommunications networks.
- some of these methods use noise data transmission in transmission channels that are not covered by the receiving terminal. Assuming that a receiver of an attacking potential receives at least a portion of the transmission channels, not covered by the receiving terminal and carrying noise data, it follows that the data picked up by the attacker is noisy and do not allow to find the transmitted signal.
- the document "Secret Communication using Artificial” is thus known.
- Document US 2,292,387 describes another method for protecting the confidentiality of a transmission by using a distribution of the data to be transmitted over a plurality of predetermined successive transmission frequencies.
- the moments when one has to go from one frequency to another are chosen before the beginning of the communication.
- the transmitter and the receiver are for example synchronized by means of two identical strips of perforated paper, one used by the transmitter and the other by the receiver. But such a method is only suitable if the transmission frequencies used are permanently available for this transmitter and receiver (we speak of "availability" of a transmission frequency to signify that there is no other signal of telecommunications carried on this frequency, at a given time and in a given geographical location).
- the present invention aims to overcome the aforementioned drawbacks.
- a first aspect of the present invention provides a method of transmitting data, from a first terminal to a second terminal, in a telecommunications network adapted to transmit packet data, wherein the data is to be transmitted within a network. a plurality of sets of data packets. The method comprises the following steps:
- Such an allocation rule makes it possible to generate a list of transmission frequencies for two terminals by taking frequencies among those which are present in the list of available frequencies relative to these terminals.
- transmitting a first set of data packets on a first frequency then a second set of data packets on a second frequency different from the first, and so on.
- it is required to capture the different data packets corresponding to the data transmitted over several different transmission frequencies.
- the transmission frequencies on which the data can be sent, separately, are advantageously determined according to information collected with respect to the first and / or second terminal, this information being able to be collected at any time in the network. These transmission frequencies are determined so as to optimize the use of the frequencies of a given frequency band. Thus, such a list of frequencies can be updated dynamically during the transmission according to the modifications of the use of the band in question.
- the invention is therefore particularly advantageous in the case where the frequency band that can be used by the terminals according to the invention is also used, according to their needs, by third-party terminals which have priority over this band (for example, it can be act from a band reserved for television signals); indeed, the method according to the invention makes it possible to transmit data on a frequency of this "reserved" band at a time when no priority terminal is transmitting or receiving on this frequency.
- such a method has the advantage of not inducing disturbances on the transmissions potentially carried out on transmission frequencies close to those used for the transmission considered between the first and second terminals, contrary to the methods intended to protect the transmission of transmission. data by introducing noise on neighboring transmission frequencies.
- the present invention allows a protection of the transmitted data while reducing the amount of resources used for the processing of these data, particularly with respect to cryptographic processing.
- Such a transmission method also reduces the processing time of the data.
- the first and second terminals share the knowledge, synchronously, of the different transmission frequencies used during the given data transmission.
- the first and the second terminal thus know the transmission frequency on which each data packet is transmitted, therefore transmitted and received respectively.
- This sharing of knowledge can be obtained by means of a list of transmission frequencies common to the two terminals that exchange data, as well as a rule for selecting a transmission frequency in this common list.
- the present invention finds an advantageous application in a network based on a network architecture in which the terminals communicate directly with each other without their communication being processed by a centralized network entity, as is the case in cell-type networks for example.
- the present invention is described in its application to a centralized architecture in which a frequency determination function is able to determine and transmit the transmission frequency list and the transmission frequency selection rule to the first and second terminals to synchronize these two terminals.
- each change in transmission frequency requires processing at the transmitter and receiver terminals, which may in particular have an impact on the bit rate of the transmission considered.
- a compromise between the number of transmission frequencies during the transmission of data and the processing cost required for such frequency changes can be advantageously determined as a function, for example, of the capabilities of the terminals used and as a function of the level. to protect the confidentiality of the data sought.
- the number of frequencies contained in the list of available frequencies relative to the first and second terminals is equal to the product of the number of frequencies contained in the list of transmission frequencies common to the first and second terminals generated according to the allocation rule by a number k determined according to a desired level of confidentiality for the transmission of the set of data packets.
- this number k determines the number of confidentiality in the transmission of the data to be performed.
- the larger this number k the more the data to be transmitted are distributed over a large number of distinct frequencies, and because of this, the more complex it is to violate the confidentiality of the transmission.
- this list of transmission frequencies is secret, such data transmission according to one embodiment of the present invention has a high level of protection against potential attackers.
- the number of sets of data packets can be determined according to a desired level of confidentiality for the data to be transmitted.
- the number of packets of the plurality is greater than in the case where the level of confidentiality sought is lower.
- a high level of confidentiality may thus imply that, on average, each set of data packets contains fewer data packets than sets of data packets determined for a lower level of confidentiality.
- the present invention is described, by way of illustration but without any limitation, in its application to the spectrum of transmission frequencies dedicated to the transmission of television programs.
- the first and second terminals are adapted to transmit, respectively receive, in the spectrum of frequencies dedicated to television. Moreover, at a given time and for a given geographical location, only part of the frequency spectrum considered is used for the transmission of television programs while the other party remains available. Thus, an embodiment of the present invention takes advantage of this observation.
- the different sets of data packets are separately sent successively to the different selected transmission frequencies.
- all or part of the sets of data packets can be sent simultaneously on the different transmission frequencies.
- the determination function centralizes frequency availability information of the spectrum it receives from different points of the telecommunications network. From this availability information, the determination function is able to determine a list of frequencies adapted for transmission between a first and a second terminal. Then, it can then advantageously send this list of transmission frequencies to the first and second terminals so as to synchronize these terminals with each other.
- the method may further comprise the following steps: IM collecting from at least the first terminal, respectively from the second terminal, availability information of the transmission frequencies of a given transmission frequency spectrum, said availability information being relating to the first terminal, respectively to the second terminal;
- a transmission frequency list which includes transmission frequencies available at both the first and second terminals; / 3 / informing said first and second terminals of said transmission frequency list thus determined.
- a map of the available frequencies can be obtained and thus an allocation of a list of frequencies relevant and adapted to a transmission between these first and second terminals can advantageously be generated.
- the list of frequencies of transmission can be updated upon receipt of new availability information transmission frequencies received from at least the first or second terminal.
- the terminals communicate with each other on the basis of updated information, which makes it possible to avoid disturbing frequencies of the spectrum considered that are used at the time of updating.
- the update according to the invention can be performed before and / or during and / or after the communication between the first and the second terminal.
- This update can advantageously be performed dynamically: indeed, for a transmission that requires a long period of time, it is possible that the available frequency map evolves and that certain frequencies that were available at the beginning of the transmission, c. that is, when the frequency list has been generated, are no longer available while the transmission is in progress; thus, in this case, one is able to avoid any nuisance on other transmissions, effectively and easily.
- the centralized function in the telecommunications network can send the transmission frequency list in encrypted form to the first and second terminals.
- provision may furthermore be made for the centralized function in the telecommunications network to send the selection rule in encrypted form to the first and second terminals.
- the transmission frequency selection rule may indicate, on the one hand, an order in which the transmission frequencies of the list are successively selected for the respective sets of packets and, on the other hand, a triggering condition of change of transmission frequency for different sets of packets.
- the terminals are able to decide when to change the transmission frequency for a given set of packets and which frequency to select.
- the frequency change trigger condition may be a condition among the group comprising a number of packets transmitted on the same transmission frequency, a period of time and a reference. schedule.
- the frequency list includes frequencies adapted both for transmitting data from the first terminal to the second terminal, and for transmitting data from the second terminal to the first terminal.
- a second aspect of the present invention provides a terminal adapted to transmit packet data in a telecommunications network to another terminal, said data being intended to be transmitted within a plurality of sets of data packets.
- This terminal includes:
- a storage unit adapted to store on the one hand a list of secret transmission frequencies and, on the other hand, a frequency selection rule in said list of frequencies;
- a selection unit adapted to select transmission frequencies among the transmission frequencies of said frequency list according to said selection rule
- this terminal may further comprise a second interface unit adapted to receive said frequency list and / or said selection rule from said centralized function.
- a third aspect of the present invention provides a central entity in a telecommunications network adapted to transmit packet data from a first terminal to a second terminal, said data being intended to be transmitted within a plurality of sets of data packets.
- This central entity comprises: - a storage unit adapted to collect from the telecommunications network availability information transmission frequencies relating to the first terminal and the second terminal and maintain a list of available frequencies relative to the first and second terminals; an allocation unit adapted to determine, based on said collected availability information, a list of transmission frequencies which includes transmission frequencies available at both the first and second terminals; an interface unit adapted to transmit to said first and second terminals said list of transmission frequencies.
- the transmission frequency list may be updated upon receipt of new transmission rate availability information received from the first or second terminal, or other equipment in the network.
- This entity may further comprise a cryptographic unit adapted to encrypt the list of transmission frequencies to be sent to the first and second terminals.
- a fourth aspect of the present invention provides a data transmission system, said transmission being performed between a first terminal and a second terminal according to the second aspect of the present invention.
- This system may further include a central entity according to the third aspect of the present invention.
- a fifth aspect of the present invention provides a computer program for installation in a terminal of a telecommunications network, comprising instructions capable of implementing a method according to the first aspect of the present invention, in a executing the program by terminal processing means according to the second aspect of the present invention.
- a sixth aspect of the present invention provides a computer program for installation in a central entity of a telecommunication network, comprising instructions capable of implementing a method according to the first aspect of the present invention, when program execution by central entity processing means according to the third aspect of the present invention.
- a seventh aspect of the present invention provides a computer readable recording medium on which the computer program according to the fifth or sixth aspect of the present invention is recorded.
- FIG. 1 illustrates the main steps of a transmission method according to an embodiment of the present invention
- FIG. 2 illustrates a telecommunications radio network according to one embodiment of the present invention
- FIG. 3 illustrates data packet formats according to an embodiment of the present invention
- FIG. 4 illustrates a step of managing and sending a list of frequencies according to one embodiment of the present invention.
- Figure 1 illustrates the main steps of a data transmission method according to an embodiment of the present invention.
- a first terminal 11 and a second terminal 12 belong to a telecommunications radio network 10.
- the terminals 11 and 12 obtain synchronization information, respectively in steps 17 and 18.
- this synchronization information corresponds to a secret list of transmission frequencies on which the terminals 1 1 and 12 can communicate, and a rule for selecting one or more transmission frequencies in the list.
- the list of transmission frequencies can be sent to both terminals, or sent by a terminal to the other terminal, in encrypted form.
- the terminals 1 1 and 12 can thus be synchronized to the same transmission frequency or frequencies; the data packets to be transmitted between the terminals 1 1 and 12 can then be transmitted in the clear without using cryptographic methods.
- the selection rule indicates, on the one hand, to select a transmission frequency in the order in which the transmission frequencies are listed in the list and, on the other hand, to change the frequency transmission after sending, respectively receiving, a fixed number of packets.
- the order of the transmission frequencies in the transmission frequency list is determined by the allocation rule of the transmission frequency list.
- the present invention can easily be applied when the selection rule is different. It can in fact be provided in particular that a new transmission frequency is selected periodically after a determined period of time, or that a new transmission frequency is selected at time references determined by the selection rule shared by the two terminals. Certain types of transmission frequency synchronization according to the selection rule may therefore require a time synchronization of the terminals 1 1 and 12.
- the list of transmission frequencies is not ordered and the frequency selection rule is to use each of the transmission frequencies of the rule in ascending order of transmission frequency values. .
- the frequency selection rule indicates to select the transmission frequencies of the list of transmission frequencies in their decreasing order of values.
- the data to be transmitted is divided into at least two sets of data packets to be transmitted according to an embodiment of the invention separately.
- a first set of data packets is transmitted on a first transmission frequency U, selected from the list according to the selection rule, in a transmission 15, and a second set of data packets is transmitted on a second frequency transmission f 2 , selected in the list according to the selection rule, in a transmission 16, the transmission frequency f 2 being different from the transmission frequency U-
- FIG. 2 illustrates a telecommunications network 10 according to one embodiment of the present invention.
- Such a network comprises the first 11 and second 12 terminals and a central entity or base station 13.
- Such a network may include a larger number of terminals.
- the terminals of this network analyze the state of the TV frequency spectrum and inform the base station by sending it frequency availability information.
- the latter stores all this information and from these selects a list of available communication frequencies and adapted for the first and second terminals. It may be advantageous that only terminals that are not in communication analyze the TV frequency spectrum.
- the terminal 11 when the terminal 11 wishes to transmit data to the terminal 12, it sends the base station 13 a transmission request 21.
- This request can advantageously indicate that a transmission is required between the terminal 1 and the terminal 12. It can also indicate the amount of data to be transmitted.
- the base station can rely on this indication to determine the number of frequencies to be inserted in the list of frequencies to be sent to the terminals 11 and 12. For example, when a level of protection of confidentiality sought requires a frequency change every N transmitted data packets, the base station can easily determine the number of frequencies to be inserted in the list of frequencies.
- the terminal 11 can directly indicate the number of frequencies desired for transmitting the data to the terminal 12 in a secure manner, for example in the transmission request 21.
- the data to be transmitted from the terminal 11 to the terminal 12 is a data stream whose quantity is not known in advance, it can be decided the number of frequencies of the list only according to the level of confidentiality sought.
- this number of frequencies in the list is determined at the level of the terminal 11 or at the level of the central entity 13, it can advantageously be determined from a parameter which indicates a number of packets per frequency.
- a parameter which indicates a number of packets per frequency.
- the base station can recover a desired level of confidentiality from the terminal 11, and in this case for example this level can be indicated in the request 21, or the base station can also obtain this level of confidentiality. by any other means. Then, from this level of confidentiality, it can determine the number of frequencies to be inserted in the list of frequencies to be sent. The base station can also obtain, either from the terminal 1 1, or by any other means, a desired transmission rate value. It can then advantageously also determine the number of frequencies of the list of frequencies as a function, on the one hand, of the level of confidentiality and, on the other hand, of the desired bit rate value, so as to obtain the best possible compromise between security and transmission rate.
- the base station determines the list of frequencies to be sent to the terminals 1 1 and 12, that is to say a list of frequencies among those which are detected as being available relative to the terminals 11 and 12. Then, it sends this list of transmission frequencies to the terminal 11 via an allocation message 22 and to the terminal 12 via an allocation message 23.
- any method may be implemented in the context of the present invention.
- the transmission frequency list in an architecture that is not centralized, for example by providing that the first and second terminals exchange directly with each other the availability information available to them.
- one of the two terminals can maintain the list of frequencies and transmit it to the other terminal so as to agree on the transmission frequencies.
- One embodiment of the present invention implements a cognitive radio method that aims at determining transmission frequencies available in a given transmission frequency spectrum within a radio communications network. Such methods are known to those skilled in the art.
- the terminals or the base station when they are not in communication, they scan a determined spectrum of frequencies.
- a terminal or the base station detects a change, it informs the base station by sending it availability information. This availability information varies over time and geographically, so it is appropriate to schedule a regular update.
- the base station collects information from the different terminals of the network. On the basis of this collected availability information, the station builds a frequency availability map which can advantageously be estimated in real time.
- This card makes it possible to determine a plurality of transmission frequencies common to at least two terminals wishing to exchange data, at a given instant.
- This card changes over time and is therefore preferably advantageously regularly updated on the basis of the availability information of the different frequencies that are used by the different terminals of the network.
- the list of transmission frequencies adapted for communication between two terminals is likely to change as well.
- the considered telecommunications network includes other equipment than the terminals which are adapted to go back to the central entity 13 of the frequency availability information.
- These allocation messages 22 and 23 may also indicate a frequency selection rule common to the terminals 1 1 and 12. However, this frequency selection rule can be obtained at the terminals 11 and 12 by any other means. . Thus, in one variant, the selection rule can be known and previously shared by the two terminals 1 1 and 12.
- only the list of frequencies sent in the allocation messages 22 and 23 is encrypted using an encryption key so as to limit the knowledge of this list to the terminals 1 and 12.
- the frequency selection rule is inserted in each of the terminals 1 1 and 12 secretly, at the factory during their manufacture, for example.
- a secure transmission 24 can then be performed from the terminal 11 to the terminal 12.
- the terminal 11 is then able to transmit a set of data packets on a frequency selected in the list according to the selection rule and the terminal 12 is able to receive this set of data packets on said frequency which it has selected for its part by applying the same selection rule on the same list of frequencies, the sets of packets composing the data to be transmitted being transmitted on different frequencies selected in the list according to the selection rule.
- the base station may generate a frequency list set to day and send it to the terminals 1 1 and 12.
- This update can be accompanied by a change of frequency selection rule or not. It is also possible that such an update is performed by sending only the frequency or frequencies to be modified, so as to avoid sending a complete list that includes frequencies already sent.
- a method according to an embodiment of the present invention allows a protection of the confidentiality of the transmissions while avoiding disturbing neighboring frequencies used.
- the present invention makes it possible to use the entire spectrum in question, but limiting itself to the available frequencies of the spectrum temporarily, so as not to disturb neighboring transmissions.
- the number of available frequencies is greater than the product of the number of frequencies to be inserted in the list, as defined above, and of a specific parameter k of the system.
- This specific parameter advantageously makes it possible to regulate the desired level of confidentiality: one will choose a value of k high when one demands a high level of confidentiality (and one will prohibit them eventually communications when the number of available frequencies is too low to satisfy this value of k).
- one or more "hacker" equipment would jam a multitude of frequencies leaving only a few frequencies available, and thus reducing the number of available frequencies, potential attackers could intercept all data packets and reconstruct the transmitted data.
- the terminal 1 1 sends the data to the terminal 12, in the form of N packets by frequency and in the order of frequencies of the list.
- the terminal 12 knows the information that allows it to correctly receive these sets of N packets. The terminal 12 therefore switches from one frequency to the next in the list of common frequencies, all N packets per frequency.
- the terminal 1 1 transmits to the terminal 12, transmitting a set of N packets by frequency and in the order of the frequencies of the list, cyclically if necessary if the quantity of the data to be transmitted and the number of frequencies in the list requires it. But in such a case, a lower level of confidentiality can then be achieved. It can be provided that the terminal 11 informs the end of the transmission the terminal 12. Thus, after receiving an end of transmission signal, the terminal 12 which wishes to respond to the terminal 1 1 requests the base station to receive a new list of frequencies. All the steps described above in Referring to FIG. 2 for the terminal 1 1, respectively for the terminal 12, then apply to the terminal 12, respectively to the terminal 11.
- the terminal 12 When the terminal 12, as receiver, receives nothing during a given time interval T, the terminal 12 can send the terminal 1 1 a signaling message on a determined signaling frequency available between the two terminals 1 1 and 12. On transmission of this signaling message, respectively on reception of this message, the terminal 1 1, respectively the terminal 12 is re-synchronized, and they can thus restart the process for example by starting at the first frequency selected in the list following the selection rule, to send the remaining sets of packets.
- the terminal 11 may issue a new message 21 requesting a new frequency list from the central entity.
- the current transmission can then continue on the basis of a new list of frequencies received in response to this last request.
- the terminal 1 1 may be able to detect in advance that the number of frequencies in the received frequency list is insufficient to ensure a certain level of security of the transmission. It may then be advantageous to anticipate this frequency deficiency by transmitting again to the base station a request for frequency allocation, while continuing to manage the transmission of data according to an embodiment of the present invention.
- This period of time may be determined according to an estimated period of time to violate the confidentiality of the encryption key or keys used to encrypt the list of frequencies, in the case where this list is sent in encrypted form by the radio station. based.
- the base station can itself handle the triggering of the regular sending of a new list of frequencies.
- the frequency list is encrypted according to a DES encryption algorithm (initials of the English words "Data Encryption Standard” meaning “Data Encryption Standard”)
- a period of time of the order of 2 hours is required to "break" a secret key DES having a size of 56 bits.
- the terminals 1 1 and 12 can safely communicate on the frequencies of the list received from the base station.
- Frequency list sending is performed after a certain period of time, the new list sent is then encrypted, preferably, using a secret key different from the previous key that could have been determined during this period of time.
- FIG. 3 illustrates a clear data packet format 31, i.e. unencrypted, and an encrypted data packet format 32, according to an embodiment of the present invention.
- the size of the packets is preferably identical for the transmitted packets.
- Each packet comprises a header field 33-34, corresponding to a synchronization field, having a size of 8 bytes. This field makes it possible to synchronize the transmitting terminal 11 and the receiving terminal 12.
- a packet comprises a field 35-36, indicating an identifier of the receiving terminal, or 'dest' for destination and an identifier of the transmitting terminal, or 'src for source.
- This field 35-36 can have a size of 2 bytes.
- This packet further includes a field indicating a type of packet 37-38.
- a field indicating the end of the packet, 39-39 ' is positioned at the end of the packet.
- the size of this last packet can be 1 byte.
- the transmitted data may be partially positioned between the field indicating the type 37-38 and the end-of-packet field 39-39 ', in a data field 301 in the data packet 31 or else 302 in the encrypted data packet 32
- This last field 302 comprises a random data portion 303 and a ciphered data portion 304.
- the encrypted data packet format can be used for the transmitting, from the central entity to the terminals, the list of frequencies to be used for secure transmission according to an embodiment of the present invention.
- the encryption is performed by means of a session key calculated according to a secret key that can be specific to each terminal.
- the secret keys of the terminals may for example be symmetric keys of fixed size of 16 bytes.
- the encryption and decryption algorithm may be an AES (Advanced Encryption Standard) algorithm, so that, advantageously, encryption and decryption can be implemented Moreover, it has a high level of security against possible attacks.
- the base station having a computing capacity and memory greater than the terminals, it is capable in particular of storing the secret keys of all the terminals of the network. telecommunications 10.
- Figure 4 details the sending of the list of frequencies from the base station 13 to the terminals 11 and 12.
- the list is coded on 16 bytes
- a frequency is coded on 2 bytes
- a Encrypted data packet may include a list of 8 frequencies
- the base station 13 comprises a storage unit 43 adapted to collect from the telecommunications network information of availability of the transmission frequencies relating to terminals and maintain a list of available frequencies relative to these terminals.
- This storage unit 13 comprises a database in which a list of available frequencies is maintained relative to the considered terminals obtained on the basis of the availability information of the frequencies collected. Furthermore, this database stores the secret keys of the terminals of the network 10.
- the base station 13 also comprises an allocation unit 41 adapted to generate, as detailed above, a list of frequencies adapted for a transmission made by the terminal 1 1 to the terminal 12. It also comprises a cryptographic unit 42 adapted to encrypt data, a random value generation unit 46 and an interface unit 47 adapted to communicate with the different terminals of the network 10.
- the base wishes to allocate frequencies to the terminal 1 1 for example, on the one hand the secret key of the terminal 1 1 is recovered 44 in the database and supplied to the cryptographic unit 42, and secondly, a list of frequencies is provided 45 from the allocation unit to the cryptographic unit.
- the generation unit 46 provides a random value on the one hand to the cryptographic unit 42 and on the other hand to the interface unit 47.
- the cryptographic unit 42 encrypts the frequency list using a session key that is generated from the random value and the secret key of the terminal 11, and provides the list of frequencies allocated to the terminal. 11, in encrypted form.
- the interface unit 47 is then able to transmit to the terminal 1 1, the random value and this list of encrypted frequencies, respectively in the fields 303 and 304 according to the format of the encrypted data packet 302.
- the terminal 11 determines the value of the session key from the random value and its own secret key, and decrypts the list of frequencies by means of this session key.
- the terminal 11 thus comprises a storage unit 402 adapted to store on the one hand a list of transmission frequencies and on the other hand a frequency selection rule in the frequency list. It further comprises a selection unit 401 adapted to select transmission frequencies respectively for sets of data packets, among the frequencies of the frequency list according to the selection rule. It also includes a first interface unit 403 adapted to transmit the sets of data packets respectively on the selected transmission frequencies.
- the terminal 12 includes a similar interface for receiving the sets of data packets respectively on the selected transmission frequencies.
- the network 10 corresponds to a network of home terminals in a home that are connected to a home gateway that is in charge of operations similar to those described above for the base station. .
- Each terminal of the network 10 comprises a sensor provided with a radio interface.
- the terminals exchange information from which actuators can be remotely controlled.
- Some communications between the terminals may require a high level of security, when it is critical information such as an access code to enter the house or a code to activate or deactivate a home alarm.
- the size of the critical information to be transmitted is relatively small, and the level of security required is relatively high. It may then be advantageous to change the frequency of each packet of data transmitted.
- the specific parameter k as defined above is preferably chosen with a relatively high value so as to increase the level of security of the transmission.
- the period of time after which a new frequency list is generated and sent to the terminals as defined above is chosen with a relatively small value in order to avoid at best any interception of the transmitted data possible on the basis of the violation of the secret of the encryption key used.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0602818 | 2006-03-31 | ||
PCT/FR2007/050944 WO2007113418A1 (fr) | 2006-03-31 | 2007-03-19 | Transmission de donnees confidentielle par changement de frequence dans un reseau de telecommunications |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2002585A1 true EP2002585A1 (de) | 2008-12-17 |
Family
ID=37309756
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07731760A Withdrawn EP2002585A1 (de) | 2006-03-31 | 2007-03-19 | Vertrauliche übertragung von daten durch änderung der frequenz in einem telekommunikationsnetz |
Country Status (3)
Country | Link |
---|---|
US (1) | US8121141B2 (de) |
EP (1) | EP2002585A1 (de) |
WO (1) | WO2007113418A1 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107211261A (zh) * | 2015-02-04 | 2017-09-26 | 瑞典爱立信有限公司 | 用于无线通信网络中的连接建立的方法和装置 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6641615B2 (ja) * | 2015-08-26 | 2020-02-05 | 日本無線株式会社 | 送信波生成装置および統合受信装置 |
US10484935B2 (en) * | 2017-06-12 | 2019-11-19 | Qualcomm Incorporated | Discovery for spectrum renting |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5130987A (en) * | 1990-03-23 | 1992-07-14 | Metricom, Inc. | Method for synchronizing a wide area network without global synchronizing |
US5442659A (en) | 1993-10-22 | 1995-08-15 | International Business Machines Corporation | Radio communications system with fault tolerant frequency hopping synchronization |
US5912918A (en) * | 1996-10-10 | 1999-06-15 | International Business Machines Corporation | Method and an apparatus for attachment of a remote station to a base station in a multicellular communications network |
US6115407A (en) * | 1998-04-03 | 2000-09-05 | Butterfly Vsli Ltd. | Frequency hopping communication method and apparatus for modifying frequency hopping sequence in accordance with counted errors |
GB9918250D0 (en) * | 1999-08-04 | 1999-10-06 | Koninkl Philips Electronics Nv | Generating a cyclic sequence of frequencies |
US7433683B2 (en) * | 2000-12-28 | 2008-10-07 | Northstar Acquisitions, Llc | System for fast macrodiversity switching in mobile wireless networks |
-
2007
- 2007-03-19 EP EP07731760A patent/EP2002585A1/de not_active Withdrawn
- 2007-03-19 WO PCT/FR2007/050944 patent/WO2007113418A1/fr active Application Filing
- 2007-03-19 US US12/294,977 patent/US8121141B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
Title |
---|
See references of WO2007113418A1 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107211261A (zh) * | 2015-02-04 | 2017-09-26 | 瑞典爱立信有限公司 | 用于无线通信网络中的连接建立的方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
US8121141B2 (en) | 2012-02-21 |
WO2007113418A1 (fr) | 2007-10-11 |
US20100177782A1 (en) | 2010-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2052539B1 (de) | Verfahren für den widerruf von sicherheitsmodulen zur sicherung von rundfunknachrichten | |
EP2830360B1 (de) | Verfahren zum sicheren Austausch von Daten in einem Ad-hoc-Netz, bei dem ein Xcast-Sendedienst verwendet wird, und entsprechender Knoten | |
EP0618736A1 (de) | Verfahren und Vorrichtung zur Ver- und Entschlüsselung bestimmte Fernsehsendungen | |
US20030099360A1 (en) | Time-based encryption key | |
EP2294850B1 (de) | Verfahren zur sicherung von austauschprozessen zwischen einem sendeknoten und empfangsknoten | |
KR20090085688A (ko) | 브로드캐스트된 무작위 잡음을 이용하여 무선 장치의 암호 능력을 향상시키는 방법 및 시스템 | |
US8509433B2 (en) | Method and apparatus of generating encryption key for broadcast encryption | |
EP1501237A1 (de) | Verschlüsseltes kommunikationssystem, schlüsselablieferungs-server dafür, endgeräteeinrichtung und schlüssel-sharing-verfahren | |
EP2186252A2 (de) | Verfahren zur verteilung kryptografischer schlüssel in einem kommunikationsnetz | |
EP3185468B1 (de) | Datenübertragungsverfahren, datenempfangsverfahren, entsprechende vorrichtungen und programme | |
EP2002585A1 (de) | Vertrauliche übertragung von daten durch änderung der frequenz in einem telekommunikationsnetz | |
EP3035583A1 (de) | Kommunikationsvorrichtung und -system, Datenverarbeitungsverfahren und Methode zum gesicherten Datenaustausch | |
EP3732819B1 (de) | Verfahren zur herstellung einer sicheren verbindung zum austausch von infomration zwischen einem ersten und einem zweiten endgerät | |
WO2004045184A1 (fr) | Procede de renouvellement de cles symetriques dans un reseau numerique | |
FR3109255A1 (fr) | Procédé mis en œuvre par une entité intermédiaire pour gérer une communication entre deux dispositifs de communication | |
EP2665224A1 (de) | Verfahren zur Verteilung eines digitalen Chiffrierschlüssels an Telekommunikations-Endgeräte | |
EP3850808B1 (de) | Kommunikationsverfahren | |
FR3047138A1 (fr) | Methode de generation de pseudonymes dans un reseau de capteurs sans fil et methode de routage associee | |
WO2022238644A1 (fr) | Procede de defense contre une tentative de deconnexion entre deux entites, systeme associe | |
WO2007042664A1 (fr) | Vérification d'un message reçu en mode de multidiffusion dans un réseau de communications | |
FR3133511A1 (fr) | Procédé de gestion de chiffrement par une entité émettrice dans un réseau 3GPP MCS | |
FR2900776A1 (fr) | Procede de securisation de donnees | |
WO2011023881A1 (fr) | Technique pour evaluer une collaboration entre des noeuds d'un reseau de communication | |
FR2888432A1 (fr) | Procedes de protection des trames de gestion echangees entre deux equipements sans fil, de reception et d'emission de telles trames, programmes d'ordinateur et supports de donnees contenant ces programmes d'ordinateur | |
EP2955878A1 (de) | Steuerverfahren eines privaten virtuellen kommunikationskanals zwischen einem endgerät und einem server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080916 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: GERMAIN, FLORENCE Inventor name: JARBOUI, TAHAR Inventor name: MARX, FRANCOIS |
|
17Q | First examination report despatched |
Effective date: 20100708 |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20151001 |