EP2849374A1 - Secure communications system and method - Google Patents

Secure communications system and method Download PDF

Info

Publication number
EP2849374A1
EP2849374A1 EP13290221.4A EP13290221A EP2849374A1 EP 2849374 A1 EP2849374 A1 EP 2849374A1 EP 13290221 A EP13290221 A EP 13290221A EP 2849374 A1 EP2849374 A1 EP 2849374A1
Authority
EP
European Patent Office
Prior art keywords
transmitter
pilot pattern
communications
electronic message
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP13290221.4A
Other languages
German (de)
French (fr)
Inventor
Yejian Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent SAS filed Critical Alcatel Lucent SAS
Priority to EP13290221.4A priority Critical patent/EP2849374A1/en
Publication of EP2849374A1 publication Critical patent/EP2849374A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/02Secret communication by adding a second signal to make the desired signal unintelligible

Definitions

  • the present invention relates to secure communication and in particular to secure communication without use of encryption.
  • M2M Machine-to-Machine
  • MTC Machine Type Communications
  • MIMO Multiple-Input Multiple-Output
  • a secure communications scheme is provided with superimposed pilots.
  • Embodiments of the invention are based on introduction of superimposed pilots on the communications channel that is used by transmitter and intended recipient, i.e. the user of interest, so as to create artificial noise on the channel.
  • the pilots are known to the transmitter as well as to the intended recipient of the message. Consequently, the intended recipient is enabled to entirely filter out the known artificial noise on the channel and extract the disguised message as clear data.
  • the superimposed pilot is a kind of noise that has to be eliminated.
  • the eavesdropper will have to employ standard noise filtering methods. Standard noise filtering methods however are limited in their ability to remove spurious signals and extract the clear message. If the channel becomes too noisy it is no longer possible to extract the message with standard noise filters.
  • Embodiments of the invention relate to a system concept enabling secure communications by introducing superimposed pilots.
  • the superimposed pilots can be exploited in a trellis-based joint channel tracker and data detector by the intended recipient. Further, the intended recipient can adjust the power ratio between the user data and the superimposed pilot, which yields the secure capacity region. It allows the intended recipient to appropriately select the Forward Error Correction (FEC) code rate, so that the eavesdropper will not be able to decode the corresponding data any more.
  • FEC Forward Error Correction
  • Embodiments of the invention are susceptible for application not only in a Single-Input Single-Output (SISO) system, but also Multiple-Input Single-Output (MISO) with Space-Time Coding (STC), and Multiple-Input Multiple-Output (MIMO) with Spatial Multiplexing (SMX).
  • SISO Single-Input Single-Output
  • STC Space-Time Coding
  • MIMO Multiple-Input Multiple-Output
  • SMX Spatial Multiplexing
  • a secure communications scheme is provided with superimposed pilots. This scheme can be exploited not only by Single-Input Single-Output (SISO), but also by Multiple-Input Single-Output (MISO), Multiple-Input Multiple-Output (MIMO) systems with Space-Time Coding (STC) and Spatial Multplexing (SMX), respectively.
  • the superimposed pilots serve as artificial noise and are known to an intended recipient but unknown to potential eavesdroppers.
  • Fig. 1 a basic model of a communications environment is represented for explaining the invention.
  • Part of the environment is a transmitter 1, an intended recipient 2 and a non-intended recipient 3, i.e. eavesdropper.
  • the transmitter 1 is a base station BS or relay station and the intended recipient 2 is a mobile terminal.
  • the conventional terminology is generally used with the transmitter 1 and the intended recipient 2 (user of interest) named Alice and Bob, respectively, and the potential eavesdropper 3 Eve.
  • An electronic message is to be conveyed from the transmitter 1 to the intended recipient 2 in a secure way, that is, no other party shall be able to intercept the transmitted signal and extract the actual message therefrom.
  • the mobile terminal 2 of Bob has several superimposed pilot patterns 4 and is registered in the system, i.e. a priori known to the transmitter 1.
  • the pilot patterns 4 may be implemented e.g. in hardware or stored in a memory as software code with Bob's mobile terminal 2.
  • the superimposed pilots are transmitted along with the actual message that is to be conveyed from the transmitter 1 to the intended recipient 2.
  • Fig. 2 represents the channel capacity over the ratio of Es/N0, where Es is the power of the overall transmitted signal and N0 is the power of noise on the channel.
  • the channel capacity is illustrated for BPSK, QPSK and 16QAM modulation schemes for an independent identically distributed (i.i.d.) Rayleigh fading channel.
  • the eavesdropper 3 Even if the eavesdropper 3 had the perfect Channel State Information (CSI) like the intended recipient 2, which although not a very strong prerequisite is almost inapplicable in practice, the eavesdropper 3 is only able to decode the intended recipient's 2 information that is encoded with a Forward Error Correction (FEC) code rate corresponding to the area below a horizontal line through the intersection points A, B, C, for 16QAM, QPSK and BPSK, respectively.
  • FEC Forward Error Correction
  • the intended recipient 2 is able to extract messages that are conveyed with an forward error correction rate below the respective BPSK bound, QPSK bound, 16 QAM bound limit yet still above the horizontal line through the intersection points A, B, and C.
  • These allowed and secure regions are marked in Fig. 2 as an upper obliquely hatched area 6 for 16 QAM modulation, a vertically hatched area 7 for QPSK modulation and a lower obliquely hatched area 8 for BPSK modulation. This shows from the view point of secure communications that an eavesdropper 3 Eve will not be able to decode information, if an FEC code is used with a sufficiently high code rate to encode the information.
  • Fig. 3 shows a flow diagram as an embodiment of a method for securely transmitting electronic messages. The flow diagram is based on the above analysis in Fig. 2 .
  • step 10 the intended recipient 2 Bob communicates with the transmitter 1 BS in a normal mode using a predetermined Modulation and Coding Scheme (MCS) in accordance with the current Signal to Interference plus Noise Ratio (SINR) on the channel and the respective Channel State Information (CSI).
  • MCS Modulation and Coding Scheme
  • SINR Signal to Interference plus Noise Ratio
  • step 11 it is queried whether or not a secure communication mode is intended. In the negative the method branches back to step 10. In the affirmative the method continues at step 12.
  • step 12 it is queried whether the request for secure communication comes from the intended recipient 2 himself. In the negative, it is assumed that the request originated from the transmitter 1 (branch labelled "No (DL aspect)”). Otherwise it is recognized that the request originates from the intended recipient 2 (branch labelled "Yes (UL aspect)”).
  • step 13 the transmitter determines the superimposed pilot pattern in accordance with the security level.
  • step 14 the transmitter selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS according to current SINR, CSI and security level.
  • the transmitter then sends the command in step 15 via Downlink (DL) and keeps the intended receiver informed of steps 13 and 14 above.
  • DL Downlink
  • the transmitter After receiving the acknowledgement from the intended recipient the transmitter starts the secure communication in step 16.
  • step 12 determines the superimposed pilot pattern according to the security level in step 17.
  • step 18 the intended recipient selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS in accordance with the current SINR, CSI and security level.
  • the intended recipient then sends the request via Uplink (UL) to the transmitter in step 19 and keeps the transmitter informed of steps 17 and 18 above.
  • UL Uplink
  • the intended recipient After receiving the acknowledgement from the transmitter the intended recipient starts the secure communication in step 20.
  • the method terminates, and in another query (not shown) it may be determined that the method leaves the secure communications mode and returns to the normal communications mode again.
  • Any communications method of this kind that is employed for securely transmitting an electronic message from at least one transmitter to at least one intended receiver over at least one public communications channel essentially comprises the following steps.
  • a predetermined pilot pattern is selected by a selecting means.
  • the selecting means may be located at the transmitter or at the intended recipient. After the pilot pattern has been determined said selecting means advises the remote party, i.e. the transmitter or the intended receiver of said selected pilot pattern.
  • a superimposed signal comprising of said electronic message and said selected pilot pattern is transmitted over said public communications channel by the transmitter.
  • the superimposed signal is received by the intended recipient, and potentially by an eavesdropper. Yet, only the intended recipient is able to extract the electronic message from the superimposed signal due to his knowledge of the selected pilot pattern.
  • the eavesdropper on the other hand, faces huge difficulties in his endeavours to extract the actual data from the "noisy" channel.
  • the communications method is applicable to a single transmitter and a single intended receiver (SISO) which both communicate over a public communications channel.
  • SISO single intended receiver
  • the communications system may also comprise multiple transmitters and a single intended receiver (MISO) which communicate over a public communications channel using Space-Time Coding (STC).
  • STC Space-Time Coding
  • MIMO multiple intended receivers
  • SMX Spatial Multiplexing
  • the embodiments of the invention are not limited to a particular input-output-system or type of modulation.
  • input-output-system and modulation types to which the invention is applicable.
  • a SISO system using BPSK and QPSK modulation is considered.
  • the secure region that is achievable with superimposed pilots is illustrated by oblique hatchings for BPSK modulation in an area 21 and by vertical hatchings for QPSK modulation in an area 22.
  • the Low-Density Parity-Check (LDPC) code - as a linear error correcting code - is deployed to verify the achievable secure capacity region. Both of them coincide to each other very well.
  • LDPC Low-Density Parity-Check
  • a MISO-STC system and a MIMO-SMX system are considered.
  • the achievable secure region is illustrated by oblique hatchings for STC modulation in an area 23 and by vertical hatchings for SMX modulation in an area 24.
  • an eavesdropper Eve manages to intercept and decode the information, as soon as the FEC code rate is selected slightly outside of the achievable secure capacity region. This is indicated by stars in the plot labelled as "successful eavesdropping".
  • program storage devices e.g., digital data storage media, which are machine or computer readable and encode machine executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods.
  • the program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
  • the embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.
  • processors may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software.
  • the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
  • explicit use of the term "processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • ROM read only memory
  • RAM random access memory
  • any switches shown in the FIGS. are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
  • any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention.
  • any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a communications method of securely transmitting an electronic message from at least one transmitter (1) to at least one intended receiver (2) over at least one public communications channel, comprising the steps of: selecting a predetermined pilot pattern (4) by a selecting means and advising said at least one transmitter (1) and said at least one intended receiver (2) of said selected pilot pattern;
transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel by said at least one transmitter;
receiving said superimposed signal and extracting said electronic message by at least one of said intended receivers (1) from said superimposed signal using said selected pilot pattern.

Description

  • The present invention relates to secure communication and in particular to secure communication without use of encryption.
  • Methods for communicating secret data are known. These methods mainly rely on the exchange of encryption keys between transmitter and intended recipient. Once the secret message is encrypted by use of the encryption key it is protected at least to a certain extent from being read by third parties while being transmitted. However, encryption key-based systems necessitate an exchange of encryption keys and are thus rather awkward to handle.
  • Nevertheless, as Machine-to-Machine (M2M) communications, or alternatively Machine Type Communications (MTC), is becoming a more and more important player in future wireless communications standards, it is recognized at the very beginning that new technologies have to be investigated to combat against the M2M/MTC related security threats.
  • In Wyner, A.D.; "The wire-tap channel," Bell Syst. Tech. J., Vol. 54, pp. 1355-1387, 1975, a wiretap channel is introduced and its secrecy capacity is analyzed, which is achievable even without a secret key. A more general (non-degraded) model of Wyner's wiretap channel was extended in Csiszár, I.; Körner, J.; "Broadcast Channel with Confidential Messages," IEEE Trans. Inf. Theory, Vol. 24, No. 3, pp. 339-348, May 1978.
  • In Foschini, G.J. and Gans, M.J.; "On limits of wireless communications in a fading environment when using multiple antennas," Wireless Personal Commun., Vol. 6, No. 3, pp. 311-335, Mar. 1998, and in Alamouti, S.M.; "A simple transmit diversity technique for wireless communications," IEEE J. Select. Areas Commun., Vol. 16, No. 8, pp. 1451-1458, Oct. 1998, Multiple-Input Multiple-Output (MIMO) technique is adopted as another key technology in current and future wireless standards, which allows a trade-off between high data throughput and high detection robustness. Hence, secure MIMO communications is another important issue. Further, many efforts were made to analytically investigate the secrecy capacity region of the MIMO wiretap channel. Also some practical solutions such as artificial noise, beamforming technique, precoding technique and secure downlink joint detection are investigated.
  • Other systems for securely transmitting messages through public channels are user-specific scrambling, user-specific precoding and generating artificial noise. However, the existing solutions generally require the channel information of the eavesdropper(s), which is not straightforwardly applicable in practice.
  • As a consequence, it is an object of the present invention to provide a method and a system for conveying secret messages without necessitating encryption.
  • This aim is achieved by the communications system according to claim 1, the communications method according to claim 8 and the computer program product according to claim 13. Preferred embodiments of the invention are subject of the respective dependent claims.
  • A secure communications scheme is provided with superimposed pilots. Embodiments of the invention are based on introduction of superimposed pilots on the communications channel that is used by transmitter and intended recipient, i.e. the user of interest, so as to create artificial noise on the channel. The pilots are known to the transmitter as well as to the intended recipient of the message. Consequently, the intended recipient is enabled to entirely filter out the known artificial noise on the channel and extract the disguised message as clear data. For an eavesdropper not being aware of the used pilot pattern that disguises the actual message, the superimposed pilot is a kind of noise that has to be eliminated. For this purpose the eavesdropper will have to employ standard noise filtering methods. Standard noise filtering methods however are limited in their ability to remove spurious signals and extract the clear message. If the channel becomes too noisy it is no longer possible to extract the message with standard noise filters.
  • Embodiments of the invention relate to a system concept enabling secure communications by introducing superimposed pilots. The superimposed pilots can be exploited in a trellis-based joint channel tracker and data detector by the intended recipient. Further, the intended recipient can adjust the power ratio between the user data and the superimposed pilot, which yields the secure capacity region. It allows the intended recipient to appropriately select the Forward Error Correction (FEC) code rate, so that the eavesdropper will not be able to decode the corresponding data any more.
  • Embodiments of the invention are susceptible for application not only in a Single-Input Single-Output (SISO) system, but also Multiple-Input Single-Output (MISO) with Space-Time Coding (STC), and Multiple-Input Multiple-Output (MIMO) with Spatial Multiplexing (SMX). The respective achievable secure capacity region is preferably determined in a Monte Carlo simulation.
  • Some embodiments of the system and/or method in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:
    • Fig. 1 schematically illustrates a model for secure communications with superimposed pilots according to the invention;
    • Fig. 2 shows in a schematic plot the secure capacity for SISO system for an i.i.d. Rayleigh channel according to the invention;
    • Fig. 3 is a flow diagram of a preferred embodiment of the method for securely transmitting an electronic message including security control mechanism according to the invention;
    • Fig. 4 schematically shows the achievable secure rate for SISO system for BPSK and QPSK modulation according to the invention; and
    • Fig. 5 schematically shows the achievable secure rate for MISO-STC and MIMO-SMX system for BPSK modulation according to the invention.
  • A secure communications scheme is provided with superimposed pilots. This scheme can be exploited not only by Single-Input Single-Output (SISO), but also by Multiple-Input Single-Output (MISO), Multiple-Input Multiple-Output (MIMO) systems with Space-Time Coding (STC) and Spatial Multplexing (SMX), respectively. The superimposed pilots serve as artificial noise and are known to an intended recipient but unknown to potential eavesdroppers.
  • In Fig. 1 a basic model of a communications environment is represented for explaining the invention. Part of the environment is a transmitter 1, an intended recipient 2 and a non-intended recipient 3, i.e. eavesdropper. As an example it is assumed that the transmitter 1 is a base station BS or relay station and the intended recipient 2 is a mobile terminal. In the rest of the description the conventional terminology is generally used with the transmitter 1 and the intended recipient 2 (user of interest) named Alice and Bob, respectively, and the potential eavesdropper 3 Eve.
  • An electronic message is to be conveyed from the transmitter 1 to the intended recipient 2 in a secure way, that is, no other party shall be able to intercept the transmitted signal and extract the actual message therefrom. The mobile terminal 2 of Bob has several superimposed pilot patterns 4 and is registered in the system, i.e. a priori known to the transmitter 1. The pilot patterns 4 may be implemented e.g. in hardware or stored in a memory as software code with Bob's mobile terminal 2. In a secure communication mode the superimposed pilots are transmitted along with the actual message that is to be conveyed from the transmitter 1 to the intended recipient 2. The message to be conveyed consists of information symbols 5. These information symbols 5 and the pilot symbols 4 are transmitted each with power Ed and power Ep for data symbols 5 and pilot symbols 4, respectively. Hence, the total energy per transmitted symbol Es is Es = Ed + Ep.
  • As an example Fig. 2 represents the channel capacity over the ratio of Es/N0, where Es is the power of the overall transmitted signal and N0 is the power of noise on the channel. In Fig. 2 the channel capacity is illustrated for BPSK, QPSK and 16QAM modulation schemes for an independent identically distributed (i.i.d.) Rayleigh fading channel.
  • It is assumed that the intended recipient 2 Bob is fully aware of the Channel State Information (CSI). On the other side an eavesdropper 3 Eve does not a priori know the superimposed pilot pattern and thus suffers from an artificial noise which may be quantified by the SNR value 10log(Ed / Ep). As an example it is assumed that Ep = 0.25 and Ed = 0.75. Hence, Eve suffers from an artificial noise 10log(Ed / Ep) ≈ 4.77 dB. Even if the eavesdropper 3 had the perfect Channel State Information (CSI) like the intended recipient 2, which although not a very strong prerequisite is almost inapplicable in practice, the eavesdropper 3 is only able to decode the intended recipient's 2 information that is encoded with a Forward Error Correction (FEC) code rate corresponding to the area below a horizontal line through the intersection points A, B, C, for 16QAM, QPSK and BPSK, respectively.
  • Hence, the intended recipient 2 is able to extract messages that are conveyed with an forward error correction rate below the respective BPSK bound, QPSK bound, 16 QAM bound limit yet still above the horizontal line through the intersection points A, B, and C. These allowed and secure regions are marked in Fig. 2 as an upper obliquely hatched area 6 for 16 QAM modulation, a vertically hatched area 7 for QPSK modulation and a lower obliquely hatched area 8 for BPSK modulation. This shows from the view point of secure communications that an eavesdropper 3 Eve will not be able to decode information, if an FEC code is used with a sufficiently high code rate to encode the information.
  • Fig. 3 shows a flow diagram as an embodiment of a method for securely transmitting electronic messages. The flow diagram is based on the above analysis in Fig. 2.
  • In step 10 the intended recipient 2 Bob communicates with the transmitter 1 BS in a normal mode using a predetermined Modulation and Coding Scheme (MCS) in accordance with the current Signal to Interference plus Noise Ratio (SINR) on the channel and the respective Channel State Information (CSI).
  • In step 11 it is queried whether or not a secure communication mode is intended. In the negative the method branches back to step 10. In the affirmative the method continues at step 12.
  • In step 12 it is queried whether the request for secure communication comes from the intended recipient 2 himself. In the negative, it is assumed that the request originated from the transmitter 1 (branch labelled "No (DL aspect)"). Otherwise it is recognized that the request originates from the intended recipient 2 (branch labelled "Yes (UL aspect)").
  • If the request originated from the transmitter 1 (label "No (DL aspect)"), the method continues at step 13.
  • In step 13 the transmitter determines the superimposed pilot pattern in accordance with the security level.
  • Subsequently, in step 14 the transmitter selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS according to current SINR, CSI and security level.
  • The transmitter then sends the command in step 15 via Downlink (DL) and keeps the intended receiver informed of steps 13 and 14 above.
  • After receiving the acknowledgement from the intended recipient the transmitter starts the secure communication in step 16.
  • On the other side, if in step 12 it has been recognized that the request for secure communication originated from the intended recipient himself, the method branches to step 17, labelled "Yes (UL aspect)", and the intended recipient determines the superimposed pilot pattern according to the security level in step 17.
  • In step 18 the intended recipient selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS in accordance with the current SINR, CSI and security level.
  • The intended recipient then sends the request via Uplink (UL) to the transmitter in step 19 and keeps the transmitter informed of steps 17 and 18 above.
  • After receiving the acknowledgement from the transmitter the intended recipient starts the secure communication in step 20.
  • After steps 16 and 20, respectively, the method terminates, and in another query (not shown) it may be determined that the method leaves the secure communications mode and returns to the normal communications mode again.
  • The method as represented in Fig. 3 and other embodiments on the same principle may be summarized as follows. Any communications method of this kind that is employed for securely transmitting an electronic message from at least one transmitter to at least one intended receiver over at least one public communications channel essentially comprises the following steps. A predetermined pilot pattern is selected by a selecting means. The selecting means may be located at the transmitter or at the intended recipient. After the pilot pattern has been determined said selecting means advises the remote party, i.e. the transmitter or the intended receiver of said selected pilot pattern. Once the pilot pattern has been acknowledged by all involved (intended) parties a superimposed signal comprising of said electronic message and said selected pilot pattern is transmitted over said public communications channel by the transmitter. The superimposed signal is received by the intended recipient, and potentially by an eavesdropper. Yet, only the intended recipient is able to extract the electronic message from the superimposed signal due to his knowledge of the selected pilot pattern. The eavesdropper, on the other hand, faces huge difficulties in his endeavours to extract the actual data from the "noisy" channel.
  • The communications method is applicable to a single transmitter and a single intended receiver (SISO) which both communicate over a public communications channel. Alternatively, instead of one transmitter only the communications system may also comprise multiple transmitters and a single intended receiver (MISO) which communicate over a public communications channel using Space-Time Coding (STC). And consequently, also multiple intended receivers (MIMO) may be involved which communicate with multiple transmitters over a public communications channel using Spatial Multiplexing (SMX).
  • As mentioned above, the embodiments of the invention are not limited to a particular input-output-system or type of modulation. In the following further examples will be given of input-output-system and modulation types to which the invention is applicable.
  • In Fig. 4 a SISO system using BPSK and QPSK modulation is considered. The secure region that is achievable with superimposed pilots is illustrated by oblique hatchings for BPSK modulation in an area 21 and by vertical hatchings for QPSK modulation in an area 22. Furthermore, the Low-Density Parity-Check (LDPC) code - as a linear error correcting code - is deployed to verify the achievable secure capacity region. Both of them coincide to each other very well.
  • Similarly, in Fig. 5 a MISO-STC system and a MIMO-SMX system, respectively, is considered. The achievable secure region is illustrated by oblique hatchings for STC modulation in an area 23 and by vertical hatchings for SMX modulation in an area 24. It becomes clear that an eavesdropper Eve manages to intercept and decode the information, as soon as the FEC code rate is selected slightly outside of the achievable secure capacity region. This is indicated by stars in the plot labelled as "successful eavesdropping".
  • A person of skill in the art would readily recognize that steps of various above described methods can be performed by programmed computers. Herein, some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. The embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.
  • The description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.
  • The functions of the various elements shown in the FIGs., including any functional blocks labeled as "processors", may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term "processor" or "controller" should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage. Other hardware, conventional and/or custom, may also be included. Similarly, any switches shown in the FIGS. are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
  • It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
  • The present inventions may be embodied in other specific apparatus and/or methods. The described embodiments are to be considered in all respects as only illustrative and not restrictive. In particular, the scope of the invention is indicated by the appended claims rather than by the description and figures herein. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims (13)

  1. Communications system for securely transmitting an electronic message from at least one transmitter (1) to at least one intended receiver (2) over at least one public communications channel, comprising:
    selecting means for selecting a predetermined pilot pattern (4) and advising said at least one transmitter (1) and said at least one intended receiver (2) of said selected pilot pattern;
    wherein at least one transmitter (1) is adapted to transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel;
    at least one of said intended receivers (2) is adapted to receiving said superimposed signal and extracting said electronic message from said superimposed signal using said selected pilot pattern.
  2. Communications system according to claim 1, wherein said selecting means is part of the transmitter (1).
  3. Communications system according to claim 1, wherein said selecting means is part of the intended receiver (2).
  4. Communications system according to any of the preceding claims, comprising a single transmitter and a single intended receiver (SISO) communicating over said at least one public communications channel.
  5. Communications system according to any of claims 1 to 3, comprising multiple transmitters and a single intended receiver (MISO) communicating over said at least one public communications channel using Space-Time Coding (STC).
  6. Communications system according to any of claims 1 to 3, comprising multiple transmitters and multiple intended receivers (MIMO) communicating over said at least one public communications channel using Spatial Multiplexing (SMX).
  7. Communications system according to any of the preceding claims, wherein at least one parameter out of a power ratio of said pilot pattern versus electronic message and a modulation and coding scheme (MCS) is determined as a function of at least one out of a signal to interference plus noise ration (SINR) and a channel state information (CSI).
  8. Communications method of securely transmitting an electronic message from at least one transmitter (1) to at least one intended receiver (2) over at least one public communications channel, comprising the steps of:
    selecting a predetermined pilot pattern (4) by a selecting means and advising said at least one transmitter (1) and said at least one intended receiver (2) of said selected pilot pattern;
    transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel by said at least one transmitter;
    receiving said superimposed signal and extracting said electronic message by at least one of said intended receivers (1) from said superimposed signal using said selected pilot pattern.
  9. Communications method according to claim 8, wherein a single transmitter and a single intended receiver (SISO) communicate over said at least one public communications channel.
  10. Communications method according to claim 8, wherein multiple transmitters and a single intended receiver (MISO) communicate over said at least one public communications channel using Space-Time Coding (STC).
  11. Communications method according to claim 8, wherein multiple transmitters and multiple intended receivers (MIMO) communicate over said at least one public communications channel using Spatial Multiplexing (SMX).
  12. Communications method according to any of claims 8 to 11, wherein at least one parameter out of a power ratio of said pilot pattern versus electronic message and a modulation and coding scheme (MCS) is determined as a function of at least one out of a signal to interference plus noise ration (SINR) and a channel state information (CSI).
  13. A computer program product comprising computer executable instructions to perform any of the steps as claimed in any of the above method claims.
EP13290221.4A 2013-09-16 2013-09-16 Secure communications system and method Withdrawn EP2849374A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP13290221.4A EP2849374A1 (en) 2013-09-16 2013-09-16 Secure communications system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP13290221.4A EP2849374A1 (en) 2013-09-16 2013-09-16 Secure communications system and method

Publications (1)

Publication Number Publication Date
EP2849374A1 true EP2849374A1 (en) 2015-03-18

Family

ID=50184711

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13290221.4A Withdrawn EP2849374A1 (en) 2013-09-16 2013-09-16 Secure communications system and method

Country Status (1)

Country Link
EP (1) EP2849374A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2418119A (en) * 1943-04-10 1947-04-01 Sperry Gyroscope Co Inc Secret communication
JPS5970039A (en) * 1982-10-13 1984-04-20 Fujitsu Ltd Ciphering transmission system
US20020114492A1 (en) * 1994-10-21 2002-08-22 Digimarc Corporation Encoding and decoding in accordance with steganographically-conveyed data
US20060210080A1 (en) * 2003-11-17 2006-09-21 Koninklijke Philips Electronics N.V. Key synchronization in a visual cryptographic system
US20130226586A1 (en) * 2012-02-24 2013-08-29 Pantech Co., Ltd. Device, system, and method for authenticating user using voice recognition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2418119A (en) * 1943-04-10 1947-04-01 Sperry Gyroscope Co Inc Secret communication
JPS5970039A (en) * 1982-10-13 1984-04-20 Fujitsu Ltd Ciphering transmission system
US20020114492A1 (en) * 1994-10-21 2002-08-22 Digimarc Corporation Encoding and decoding in accordance with steganographically-conveyed data
US20060210080A1 (en) * 2003-11-17 2006-09-21 Koninklijke Philips Electronics N.V. Key synchronization in a visual cryptographic system
US20130226586A1 (en) * 2012-02-24 2013-08-29 Pantech Co., Ltd. Device, system, and method for authenticating user using voice recognition

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ALAMOUTI, S.M.: "A simple transmit diversity technique for wireless communications", IEEE J. SELECT. AREAS COMMUN., vol. 16, no. 8, October 1998 (1998-10-01), pages 1451 - 1458, XP002100058, DOI: doi:10.1109/49.730453
CSISZÅR, I.; KOMER, J.: "Broadcast Channel with Confidential Messages", IEEE TRANS. INF. THEORY, vol. 24, no. 3, May 1978 (1978-05-01), pages 339 - 348
FOSCHINI, G.J.; GANS, M.J.: "On limits of wireless communications in a fading environment when using multiple antennas", WIRELESS PERSONAL COMMUN., vol. 6, no. 3, March 1998 (1998-03-01), pages 311 - 335, XP000736946, DOI: doi:10.1023/A:1008889222784
WYNER, A.D.: "The wire-tap channel", BELL SYST. TECH. J., vol. 54, 1975, pages 1355 - 1387, XP011631496, DOI: doi:10.1002/j.1538-7305.1975.tb02040.x

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450507A (en) * 2018-12-03 2019-03-08 华侨大学 Man made noise and self-interference zero forcing joint precoding full duplex transmission method
CN109450507B (en) * 2018-12-03 2021-05-11 华侨大学 Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method

Similar Documents

Publication Publication Date Title
Xu et al. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers
Tang et al. On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
Zhou et al. Cooperative jamming for secrecy in decentralized wireless networks
Choi et al. Artificial-noise-aided space–time line code for enhancing physical layer security of multiuser MIMO downlink transmission
Wang et al. Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks
Ahmed et al. Space time block coding aided physical layer security in Gaussian MIMO channels
WO2022104588A1 (en) Subband level constellation shaping
Cheng et al. MIMO-OFDM PHY integrated (MOPI) scheme for confidential wireless transmission
EP2849374A1 (en) Secure communications system and method
WO2023038780A1 (en) Reference signal security to combat eavesdropping and directional denial of service attacks
US12047144B2 (en) Techniques for channel state information based artificial noise injection
US11659383B2 (en) Method for physical layer secured message scrambling
Hu et al. A versatile secure transmission strategy in the presence of outdated CSI
EP4338389A1 (en) Control of scrambling sequence per symbol for digital post distortion
Nardelli et al. Maximising transmission capacity of ad hoc networks via transmission system design
EP2712103B1 (en) Apparatuses, methods and computer programs for a MIMO transmitter and decoder
Ebert et al. HashBeam: Enabling feedback through downlink beamforming in unsourced random access
US20240284168A1 (en) Physical layer security in wireless communications
Tang et al. A MIMO cross-layer precoding security communication system
US11722265B2 (en) Feedback design for network coding termination in broadcasting
WO2023097562A1 (en) Scrambling for probabilistic constellation schemes in wireless communications
US20230139023A1 (en) Adaptive rateless coding for sidelink communications
WO2023146718A1 (en) Security key derivation using decoded information blocks
Choi et al. Secrecy performance of two-level superposition transmission in untrusted multiuser wireless downlink systems
Kim et al. Secrecy Performance Analysis of Alamouti-STBC With Decision Feedback Detection in Time-Selective Fading Channels

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140718

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

17Q First examination report despatched

Effective date: 20161221

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170503