EP2849374A1 - Secure communications system and method - Google Patents
Secure communications system and method Download PDFInfo
- Publication number
- EP2849374A1 EP2849374A1 EP13290221.4A EP13290221A EP2849374A1 EP 2849374 A1 EP2849374 A1 EP 2849374A1 EP 13290221 A EP13290221 A EP 13290221A EP 2849374 A1 EP2849374 A1 EP 2849374A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- transmitter
- pilot pattern
- communications
- electronic message
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/02—Secret communication by adding a second signal to make the desired signal unintelligible
Definitions
- the present invention relates to secure communication and in particular to secure communication without use of encryption.
- M2M Machine-to-Machine
- MTC Machine Type Communications
- MIMO Multiple-Input Multiple-Output
- a secure communications scheme is provided with superimposed pilots.
- Embodiments of the invention are based on introduction of superimposed pilots on the communications channel that is used by transmitter and intended recipient, i.e. the user of interest, so as to create artificial noise on the channel.
- the pilots are known to the transmitter as well as to the intended recipient of the message. Consequently, the intended recipient is enabled to entirely filter out the known artificial noise on the channel and extract the disguised message as clear data.
- the superimposed pilot is a kind of noise that has to be eliminated.
- the eavesdropper will have to employ standard noise filtering methods. Standard noise filtering methods however are limited in their ability to remove spurious signals and extract the clear message. If the channel becomes too noisy it is no longer possible to extract the message with standard noise filters.
- Embodiments of the invention relate to a system concept enabling secure communications by introducing superimposed pilots.
- the superimposed pilots can be exploited in a trellis-based joint channel tracker and data detector by the intended recipient. Further, the intended recipient can adjust the power ratio between the user data and the superimposed pilot, which yields the secure capacity region. It allows the intended recipient to appropriately select the Forward Error Correction (FEC) code rate, so that the eavesdropper will not be able to decode the corresponding data any more.
- FEC Forward Error Correction
- Embodiments of the invention are susceptible for application not only in a Single-Input Single-Output (SISO) system, but also Multiple-Input Single-Output (MISO) with Space-Time Coding (STC), and Multiple-Input Multiple-Output (MIMO) with Spatial Multiplexing (SMX).
- SISO Single-Input Single-Output
- STC Space-Time Coding
- MIMO Multiple-Input Multiple-Output
- SMX Spatial Multiplexing
- a secure communications scheme is provided with superimposed pilots. This scheme can be exploited not only by Single-Input Single-Output (SISO), but also by Multiple-Input Single-Output (MISO), Multiple-Input Multiple-Output (MIMO) systems with Space-Time Coding (STC) and Spatial Multplexing (SMX), respectively.
- the superimposed pilots serve as artificial noise and are known to an intended recipient but unknown to potential eavesdroppers.
- Fig. 1 a basic model of a communications environment is represented for explaining the invention.
- Part of the environment is a transmitter 1, an intended recipient 2 and a non-intended recipient 3, i.e. eavesdropper.
- the transmitter 1 is a base station BS or relay station and the intended recipient 2 is a mobile terminal.
- the conventional terminology is generally used with the transmitter 1 and the intended recipient 2 (user of interest) named Alice and Bob, respectively, and the potential eavesdropper 3 Eve.
- An electronic message is to be conveyed from the transmitter 1 to the intended recipient 2 in a secure way, that is, no other party shall be able to intercept the transmitted signal and extract the actual message therefrom.
- the mobile terminal 2 of Bob has several superimposed pilot patterns 4 and is registered in the system, i.e. a priori known to the transmitter 1.
- the pilot patterns 4 may be implemented e.g. in hardware or stored in a memory as software code with Bob's mobile terminal 2.
- the superimposed pilots are transmitted along with the actual message that is to be conveyed from the transmitter 1 to the intended recipient 2.
- Fig. 2 represents the channel capacity over the ratio of Es/N0, where Es is the power of the overall transmitted signal and N0 is the power of noise on the channel.
- the channel capacity is illustrated for BPSK, QPSK and 16QAM modulation schemes for an independent identically distributed (i.i.d.) Rayleigh fading channel.
- the eavesdropper 3 Even if the eavesdropper 3 had the perfect Channel State Information (CSI) like the intended recipient 2, which although not a very strong prerequisite is almost inapplicable in practice, the eavesdropper 3 is only able to decode the intended recipient's 2 information that is encoded with a Forward Error Correction (FEC) code rate corresponding to the area below a horizontal line through the intersection points A, B, C, for 16QAM, QPSK and BPSK, respectively.
- FEC Forward Error Correction
- the intended recipient 2 is able to extract messages that are conveyed with an forward error correction rate below the respective BPSK bound, QPSK bound, 16 QAM bound limit yet still above the horizontal line through the intersection points A, B, and C.
- These allowed and secure regions are marked in Fig. 2 as an upper obliquely hatched area 6 for 16 QAM modulation, a vertically hatched area 7 for QPSK modulation and a lower obliquely hatched area 8 for BPSK modulation. This shows from the view point of secure communications that an eavesdropper 3 Eve will not be able to decode information, if an FEC code is used with a sufficiently high code rate to encode the information.
- Fig. 3 shows a flow diagram as an embodiment of a method for securely transmitting electronic messages. The flow diagram is based on the above analysis in Fig. 2 .
- step 10 the intended recipient 2 Bob communicates with the transmitter 1 BS in a normal mode using a predetermined Modulation and Coding Scheme (MCS) in accordance with the current Signal to Interference plus Noise Ratio (SINR) on the channel and the respective Channel State Information (CSI).
- MCS Modulation and Coding Scheme
- SINR Signal to Interference plus Noise Ratio
- step 11 it is queried whether or not a secure communication mode is intended. In the negative the method branches back to step 10. In the affirmative the method continues at step 12.
- step 12 it is queried whether the request for secure communication comes from the intended recipient 2 himself. In the negative, it is assumed that the request originated from the transmitter 1 (branch labelled "No (DL aspect)”). Otherwise it is recognized that the request originates from the intended recipient 2 (branch labelled "Yes (UL aspect)”).
- step 13 the transmitter determines the superimposed pilot pattern in accordance with the security level.
- step 14 the transmitter selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS according to current SINR, CSI and security level.
- the transmitter then sends the command in step 15 via Downlink (DL) and keeps the intended receiver informed of steps 13 and 14 above.
- DL Downlink
- the transmitter After receiving the acknowledgement from the intended recipient the transmitter starts the secure communication in step 16.
- step 12 determines the superimposed pilot pattern according to the security level in step 17.
- step 18 the intended recipient selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS in accordance with the current SINR, CSI and security level.
- the intended recipient then sends the request via Uplink (UL) to the transmitter in step 19 and keeps the transmitter informed of steps 17 and 18 above.
- UL Uplink
- the intended recipient After receiving the acknowledgement from the transmitter the intended recipient starts the secure communication in step 20.
- the method terminates, and in another query (not shown) it may be determined that the method leaves the secure communications mode and returns to the normal communications mode again.
- Any communications method of this kind that is employed for securely transmitting an electronic message from at least one transmitter to at least one intended receiver over at least one public communications channel essentially comprises the following steps.
- a predetermined pilot pattern is selected by a selecting means.
- the selecting means may be located at the transmitter or at the intended recipient. After the pilot pattern has been determined said selecting means advises the remote party, i.e. the transmitter or the intended receiver of said selected pilot pattern.
- a superimposed signal comprising of said electronic message and said selected pilot pattern is transmitted over said public communications channel by the transmitter.
- the superimposed signal is received by the intended recipient, and potentially by an eavesdropper. Yet, only the intended recipient is able to extract the electronic message from the superimposed signal due to his knowledge of the selected pilot pattern.
- the eavesdropper on the other hand, faces huge difficulties in his endeavours to extract the actual data from the "noisy" channel.
- the communications method is applicable to a single transmitter and a single intended receiver (SISO) which both communicate over a public communications channel.
- SISO single intended receiver
- the communications system may also comprise multiple transmitters and a single intended receiver (MISO) which communicate over a public communications channel using Space-Time Coding (STC).
- STC Space-Time Coding
- MIMO multiple intended receivers
- SMX Spatial Multiplexing
- the embodiments of the invention are not limited to a particular input-output-system or type of modulation.
- input-output-system and modulation types to which the invention is applicable.
- a SISO system using BPSK and QPSK modulation is considered.
- the secure region that is achievable with superimposed pilots is illustrated by oblique hatchings for BPSK modulation in an area 21 and by vertical hatchings for QPSK modulation in an area 22.
- the Low-Density Parity-Check (LDPC) code - as a linear error correcting code - is deployed to verify the achievable secure capacity region. Both of them coincide to each other very well.
- LDPC Low-Density Parity-Check
- a MISO-STC system and a MIMO-SMX system are considered.
- the achievable secure region is illustrated by oblique hatchings for STC modulation in an area 23 and by vertical hatchings for SMX modulation in an area 24.
- an eavesdropper Eve manages to intercept and decode the information, as soon as the FEC code rate is selected slightly outside of the achievable secure capacity region. This is indicated by stars in the plot labelled as "successful eavesdropping".
- program storage devices e.g., digital data storage media, which are machine or computer readable and encode machine executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods.
- the program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
- the embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.
- processors may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software.
- the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
- explicit use of the term "processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- ROM read only memory
- RAM random access memory
- any switches shown in the FIGS. are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
- any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention.
- any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel by said at least one transmitter;
receiving said superimposed signal and extracting said electronic message by at least one of said intended receivers (1) from said superimposed signal using said selected pilot pattern.
Description
- The present invention relates to secure communication and in particular to secure communication without use of encryption.
- Methods for communicating secret data are known. These methods mainly rely on the exchange of encryption keys between transmitter and intended recipient. Once the secret message is encrypted by use of the encryption key it is protected at least to a certain extent from being read by third parties while being transmitted. However, encryption key-based systems necessitate an exchange of encryption keys and are thus rather awkward to handle.
- Nevertheless, as Machine-to-Machine (M2M) communications, or alternatively Machine Type Communications (MTC), is becoming a more and more important player in future wireless communications standards, it is recognized at the very beginning that new technologies have to be investigated to combat against the M2M/MTC related security threats.
- In Wyner, A.D.; "The wire-tap channel," Bell Syst. Tech. J., Vol. 54, pp. 1355-1387, 1975, a wiretap channel is introduced and its secrecy capacity is analyzed, which is achievable even without a secret key. A more general (non-degraded) model of Wyner's wiretap channel was extended in Csiszár, I.; Körner, J.; "Broadcast Channel with Confidential Messages," IEEE Trans. Inf. Theory, Vol. 24, No. 3, pp. 339-348, May 1978.
- In Foschini, G.J. and Gans, M.J.; "On limits of wireless communications in a fading environment when using multiple antennas," Wireless Personal Commun., Vol. 6, No. 3, pp. 311-335, Mar. 1998, and in Alamouti, S.M.; "A simple transmit diversity technique for wireless communications," IEEE J. Select. Areas Commun., Vol. 16, No. 8, pp. 1451-1458, Oct. 1998, Multiple-Input Multiple-Output (MIMO) technique is adopted as another key technology in current and future wireless standards, which allows a trade-off between high data throughput and high detection robustness. Hence, secure MIMO communications is another important issue. Further, many efforts were made to analytically investigate the secrecy capacity region of the MIMO wiretap channel. Also some practical solutions such as artificial noise, beamforming technique, precoding technique and secure downlink joint detection are investigated.
- Other systems for securely transmitting messages through public channels are user-specific scrambling, user-specific precoding and generating artificial noise. However, the existing solutions generally require the channel information of the eavesdropper(s), which is not straightforwardly applicable in practice.
- As a consequence, it is an object of the present invention to provide a method and a system for conveying secret messages without necessitating encryption.
- This aim is achieved by the communications system according to
claim 1, the communications method according toclaim 8 and the computer program product according toclaim 13. Preferred embodiments of the invention are subject of the respective dependent claims. - A secure communications scheme is provided with superimposed pilots. Embodiments of the invention are based on introduction of superimposed pilots on the communications channel that is used by transmitter and intended recipient, i.e. the user of interest, so as to create artificial noise on the channel. The pilots are known to the transmitter as well as to the intended recipient of the message. Consequently, the intended recipient is enabled to entirely filter out the known artificial noise on the channel and extract the disguised message as clear data. For an eavesdropper not being aware of the used pilot pattern that disguises the actual message, the superimposed pilot is a kind of noise that has to be eliminated. For this purpose the eavesdropper will have to employ standard noise filtering methods. Standard noise filtering methods however are limited in their ability to remove spurious signals and extract the clear message. If the channel becomes too noisy it is no longer possible to extract the message with standard noise filters.
- Embodiments of the invention relate to a system concept enabling secure communications by introducing superimposed pilots. The superimposed pilots can be exploited in a trellis-based joint channel tracker and data detector by the intended recipient. Further, the intended recipient can adjust the power ratio between the user data and the superimposed pilot, which yields the secure capacity region. It allows the intended recipient to appropriately select the Forward Error Correction (FEC) code rate, so that the eavesdropper will not be able to decode the corresponding data any more.
- Embodiments of the invention are susceptible for application not only in a Single-Input Single-Output (SISO) system, but also Multiple-Input Single-Output (MISO) with Space-Time Coding (STC), and Multiple-Input Multiple-Output (MIMO) with Spatial Multiplexing (SMX). The respective achievable secure capacity region is preferably determined in a Monte Carlo simulation.
- Some embodiments of the system and/or method in accordance with embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings, in which:
-
Fig. 1 schematically illustrates a model for secure communications with superimposed pilots according to the invention; -
Fig. 2 shows in a schematic plot the secure capacity for SISO system for an i.i.d. Rayleigh channel according to the invention; -
Fig. 3 is a flow diagram of a preferred embodiment of the method for securely transmitting an electronic message including security control mechanism according to the invention; -
Fig. 4 schematically shows the achievable secure rate for SISO system for BPSK and QPSK modulation according to the invention; and -
Fig. 5 schematically shows the achievable secure rate for MISO-STC and MIMO-SMX system for BPSK modulation according to the invention. - A secure communications scheme is provided with superimposed pilots. This scheme can be exploited not only by Single-Input Single-Output (SISO), but also by Multiple-Input Single-Output (MISO), Multiple-Input Multiple-Output (MIMO) systems with Space-Time Coding (STC) and Spatial Multplexing (SMX), respectively. The superimposed pilots serve as artificial noise and are known to an intended recipient but unknown to potential eavesdroppers.
- In
Fig. 1 a basic model of a communications environment is represented for explaining the invention. Part of the environment is atransmitter 1, an intendedrecipient 2 and anon-intended recipient 3, i.e. eavesdropper. As an example it is assumed that thetransmitter 1 is a base station BS or relay station and the intendedrecipient 2 is a mobile terminal. In the rest of the description the conventional terminology is generally used with thetransmitter 1 and the intended recipient 2 (user of interest) named Alice and Bob, respectively, and thepotential eavesdropper 3 Eve. - An electronic message is to be conveyed from the
transmitter 1 to the intendedrecipient 2 in a secure way, that is, no other party shall be able to intercept the transmitted signal and extract the actual message therefrom. Themobile terminal 2 of Bob has severalsuperimposed pilot patterns 4 and is registered in the system, i.e. a priori known to thetransmitter 1. Thepilot patterns 4 may be implemented e.g. in hardware or stored in a memory as software code with Bob'smobile terminal 2. In a secure communication mode the superimposed pilots are transmitted along with the actual message that is to be conveyed from thetransmitter 1 to the intendedrecipient 2. The message to be conveyed consists ofinformation symbols 5. Theseinformation symbols 5 and thepilot symbols 4 are transmitted each with power Ed and power Ep fordata symbols 5 andpilot symbols 4, respectively. Hence, the total energy per transmitted symbol Es is Es = Ed + Ep. - As an example
Fig. 2 represents the channel capacity over the ratio of Es/N0, where Es is the power of the overall transmitted signal and N0 is the power of noise on the channel. InFig. 2 the channel capacity is illustrated for BPSK, QPSK and 16QAM modulation schemes for an independent identically distributed (i.i.d.) Rayleigh fading channel. - It is assumed that the intended
recipient 2 Bob is fully aware of the Channel State Information (CSI). On the other side aneavesdropper 3 Eve does not a priori know the superimposed pilot pattern and thus suffers from an artificial noise which may be quantified by the SNR value 10log(Ed / Ep). As an example it is assumed that Ep = 0.25 and Ed = 0.75. Hence, Eve suffers from an artificial noise 10log(Ed / Ep) ≈ 4.77 dB. Even if theeavesdropper 3 had the perfect Channel State Information (CSI) like the intendedrecipient 2, which although not a very strong prerequisite is almost inapplicable in practice, theeavesdropper 3 is only able to decode the intended recipient's 2 information that is encoded with a Forward Error Correction (FEC) code rate corresponding to the area below a horizontal line through the intersection points A, B, C, for 16QAM, QPSK and BPSK, respectively. - Hence, the intended
recipient 2 is able to extract messages that are conveyed with an forward error correction rate below the respective BPSK bound, QPSK bound, 16 QAM bound limit yet still above the horizontal line through the intersection points A, B, and C. These allowed and secure regions are marked inFig. 2 as an upper obliquely hatchedarea 6 for 16 QAM modulation, a vertically hatchedarea 7 for QPSK modulation and a lower obliquely hatchedarea 8 for BPSK modulation. This shows from the view point of secure communications that aneavesdropper 3 Eve will not be able to decode information, if an FEC code is used with a sufficiently high code rate to encode the information. -
Fig. 3 shows a flow diagram as an embodiment of a method for securely transmitting electronic messages. The flow diagram is based on the above analysis inFig. 2 . - In
step 10 the intendedrecipient 2 Bob communicates with thetransmitter 1 BS in a normal mode using a predetermined Modulation and Coding Scheme (MCS) in accordance with the current Signal to Interference plus Noise Ratio (SINR) on the channel and the respective Channel State Information (CSI). - In
step 11 it is queried whether or not a secure communication mode is intended. In the negative the method branches back to step 10. In the affirmative the method continues atstep 12. - In
step 12 it is queried whether the request for secure communication comes from the intendedrecipient 2 himself. In the negative, it is assumed that the request originated from the transmitter 1 (branch labelled "No (DL aspect)"). Otherwise it is recognized that the request originates from the intended recipient 2 (branch labelled "Yes (UL aspect)"). - If the request originated from the transmitter 1 (label "No (DL aspect)"), the method continues at
step 13. - In
step 13 the transmitter determines the superimposed pilot pattern in accordance with the security level. - Subsequently, in
step 14 the transmitter selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS according to current SINR, CSI and security level. - The transmitter then sends the command in
step 15 via Downlink (DL) and keeps the intended receiver informed ofsteps - After receiving the acknowledgement from the intended recipient the transmitter starts the secure communication in
step 16. - On the other side, if in
step 12 it has been recognized that the request for secure communication originated from the intended recipient himself, the method branches to step 17, labelled "Yes (UL aspect)", and the intended recipient determines the superimposed pilot pattern according to the security level instep 17. - In
step 18 the intended recipient selects the power ratio between data and pilot, namely Ed / Ep, and adjusts the MCS in accordance with the current SINR, CSI and security level. - The intended recipient then sends the request via Uplink (UL) to the transmitter in
step 19 and keeps the transmitter informed ofsteps - After receiving the acknowledgement from the transmitter the intended recipient starts the secure communication in
step 20. - After
steps - The method as represented in
Fig. 3 and other embodiments on the same principle may be summarized as follows. Any communications method of this kind that is employed for securely transmitting an electronic message from at least one transmitter to at least one intended receiver over at least one public communications channel essentially comprises the following steps. A predetermined pilot pattern is selected by a selecting means. The selecting means may be located at the transmitter or at the intended recipient. After the pilot pattern has been determined said selecting means advises the remote party, i.e. the transmitter or the intended receiver of said selected pilot pattern. Once the pilot pattern has been acknowledged by all involved (intended) parties a superimposed signal comprising of said electronic message and said selected pilot pattern is transmitted over said public communications channel by the transmitter. The superimposed signal is received by the intended recipient, and potentially by an eavesdropper. Yet, only the intended recipient is able to extract the electronic message from the superimposed signal due to his knowledge of the selected pilot pattern. The eavesdropper, on the other hand, faces huge difficulties in his endeavours to extract the actual data from the "noisy" channel. - The communications method is applicable to a single transmitter and a single intended receiver (SISO) which both communicate over a public communications channel. Alternatively, instead of one transmitter only the communications system may also comprise multiple transmitters and a single intended receiver (MISO) which communicate over a public communications channel using Space-Time Coding (STC). And consequently, also multiple intended receivers (MIMO) may be involved which communicate with multiple transmitters over a public communications channel using Spatial Multiplexing (SMX).
- As mentioned above, the embodiments of the invention are not limited to a particular input-output-system or type of modulation. In the following further examples will be given of input-output-system and modulation types to which the invention is applicable.
- In
Fig. 4 a SISO system using BPSK and QPSK modulation is considered. The secure region that is achievable with superimposed pilots is illustrated by oblique hatchings for BPSK modulation in anarea 21 and by vertical hatchings for QPSK modulation in anarea 22. Furthermore, the Low-Density Parity-Check (LDPC) code - as a linear error correcting code - is deployed to verify the achievable secure capacity region. Both of them coincide to each other very well. - Similarly, in
Fig. 5 a MISO-STC system and a MIMO-SMX system, respectively, is considered. The achievable secure region is illustrated by oblique hatchings for STC modulation in anarea 23 and by vertical hatchings for SMX modulation in anarea 24. It becomes clear that an eavesdropper Eve manages to intercept and decode the information, as soon as the FEC code rate is selected slightly outside of the achievable secure capacity region. This is indicated by stars in the plot labelled as "successful eavesdropping". - A person of skill in the art would readily recognize that steps of various above described methods can be performed by programmed computers. Herein, some embodiments are also intended to cover program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. The embodiments are also intended to cover computers programmed to perform said steps of the above-described methods.
- The description and drawings merely illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical purposes to aid the reader in understanding the principles of the invention and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.
- The functions of the various elements shown in the FIGs., including any functional blocks labeled as "processors", may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term "processor" or "controller" should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), and non volatile storage. Other hardware, conventional and/or custom, may also be included. Similarly, any switches shown in the FIGS. are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
- It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative circuitry embodying the principles of the invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
- The present inventions may be embodied in other specific apparatus and/or methods. The described embodiments are to be considered in all respects as only illustrative and not restrictive. In particular, the scope of the invention is indicated by the appended claims rather than by the description and figures herein. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (13)
- Communications system for securely transmitting an electronic message from at least one transmitter (1) to at least one intended receiver (2) over at least one public communications channel, comprising:selecting means for selecting a predetermined pilot pattern (4) and advising said at least one transmitter (1) and said at least one intended receiver (2) of said selected pilot pattern;wherein at least one transmitter (1) is adapted to transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel;at least one of said intended receivers (2) is adapted to receiving said superimposed signal and extracting said electronic message from said superimposed signal using said selected pilot pattern.
- Communications system according to claim 1, wherein said selecting means is part of the transmitter (1).
- Communications system according to claim 1, wherein said selecting means is part of the intended receiver (2).
- Communications system according to any of the preceding claims, comprising a single transmitter and a single intended receiver (SISO) communicating over said at least one public communications channel.
- Communications system according to any of claims 1 to 3, comprising multiple transmitters and a single intended receiver (MISO) communicating over said at least one public communications channel using Space-Time Coding (STC).
- Communications system according to any of claims 1 to 3, comprising multiple transmitters and multiple intended receivers (MIMO) communicating over said at least one public communications channel using Spatial Multiplexing (SMX).
- Communications system according to any of the preceding claims, wherein at least one parameter out of a power ratio of said pilot pattern versus electronic message and a modulation and coding scheme (MCS) is determined as a function of at least one out of a signal to interference plus noise ration (SINR) and a channel state information (CSI).
- Communications method of securely transmitting an electronic message from at least one transmitter (1) to at least one intended receiver (2) over at least one public communications channel, comprising the steps of:selecting a predetermined pilot pattern (4) by a selecting means and advising said at least one transmitter (1) and said at least one intended receiver (2) of said selected pilot pattern;transmitting a superimposed signal comprising of said electronic message (5) and said selected pilot pattern (4) over said at least one public communications channel by said at least one transmitter;receiving said superimposed signal and extracting said electronic message by at least one of said intended receivers (1) from said superimposed signal using said selected pilot pattern.
- Communications method according to claim 8, wherein a single transmitter and a single intended receiver (SISO) communicate over said at least one public communications channel.
- Communications method according to claim 8, wherein multiple transmitters and a single intended receiver (MISO) communicate over said at least one public communications channel using Space-Time Coding (STC).
- Communications method according to claim 8, wherein multiple transmitters and multiple intended receivers (MIMO) communicate over said at least one public communications channel using Spatial Multiplexing (SMX).
- Communications method according to any of claims 8 to 11, wherein at least one parameter out of a power ratio of said pilot pattern versus electronic message and a modulation and coding scheme (MCS) is determined as a function of at least one out of a signal to interference plus noise ration (SINR) and a channel state information (CSI).
- A computer program product comprising computer executable instructions to perform any of the steps as claimed in any of the above method claims.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13290221.4A EP2849374A1 (en) | 2013-09-16 | 2013-09-16 | Secure communications system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13290221.4A EP2849374A1 (en) | 2013-09-16 | 2013-09-16 | Secure communications system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2849374A1 true EP2849374A1 (en) | 2015-03-18 |
Family
ID=50184711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13290221.4A Withdrawn EP2849374A1 (en) | 2013-09-16 | 2013-09-16 | Secure communications system and method |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP2849374A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2418119A (en) * | 1943-04-10 | 1947-04-01 | Sperry Gyroscope Co Inc | Secret communication |
JPS5970039A (en) * | 1982-10-13 | 1984-04-20 | Fujitsu Ltd | Ciphering transmission system |
US20020114492A1 (en) * | 1994-10-21 | 2002-08-22 | Digimarc Corporation | Encoding and decoding in accordance with steganographically-conveyed data |
US20060210080A1 (en) * | 2003-11-17 | 2006-09-21 | Koninklijke Philips Electronics N.V. | Key synchronization in a visual cryptographic system |
US20130226586A1 (en) * | 2012-02-24 | 2013-08-29 | Pantech Co., Ltd. | Device, system, and method for authenticating user using voice recognition |
-
2013
- 2013-09-16 EP EP13290221.4A patent/EP2849374A1/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2418119A (en) * | 1943-04-10 | 1947-04-01 | Sperry Gyroscope Co Inc | Secret communication |
JPS5970039A (en) * | 1982-10-13 | 1984-04-20 | Fujitsu Ltd | Ciphering transmission system |
US20020114492A1 (en) * | 1994-10-21 | 2002-08-22 | Digimarc Corporation | Encoding and decoding in accordance with steganographically-conveyed data |
US20060210080A1 (en) * | 2003-11-17 | 2006-09-21 | Koninklijke Philips Electronics N.V. | Key synchronization in a visual cryptographic system |
US20130226586A1 (en) * | 2012-02-24 | 2013-08-29 | Pantech Co., Ltd. | Device, system, and method for authenticating user using voice recognition |
Non-Patent Citations (4)
Title |
---|
ALAMOUTI, S.M.: "A simple transmit diversity technique for wireless communications", IEEE J. SELECT. AREAS COMMUN., vol. 16, no. 8, October 1998 (1998-10-01), pages 1451 - 1458, XP002100058, DOI: doi:10.1109/49.730453 |
CSISZÅR, I.; KOMER, J.: "Broadcast Channel with Confidential Messages", IEEE TRANS. INF. THEORY, vol. 24, no. 3, May 1978 (1978-05-01), pages 339 - 348 |
FOSCHINI, G.J.; GANS, M.J.: "On limits of wireless communications in a fading environment when using multiple antennas", WIRELESS PERSONAL COMMUN., vol. 6, no. 3, March 1998 (1998-03-01), pages 311 - 335, XP000736946, DOI: doi:10.1023/A:1008889222784 |
WYNER, A.D.: "The wire-tap channel", BELL SYST. TECH. J., vol. 54, 1975, pages 1355 - 1387, XP011631496, DOI: doi:10.1002/j.1538-7305.1975.tb02040.x |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450507A (en) * | 2018-12-03 | 2019-03-08 | 华侨大学 | Man made noise and self-interference zero forcing joint precoding full duplex transmission method |
CN109450507B (en) * | 2018-12-03 | 2021-05-11 | 华侨大学 | Artificial noise and self-interference zero-forcing joint precoding full duplex transmission method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers | |
Tang et al. | On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels | |
Zhou et al. | Cooperative jamming for secrecy in decentralized wireless networks | |
Choi et al. | Artificial-noise-aided space–time line code for enhancing physical layer security of multiuser MIMO downlink transmission | |
Wang et al. | Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks | |
Ahmed et al. | Space time block coding aided physical layer security in Gaussian MIMO channels | |
WO2022104588A1 (en) | Subband level constellation shaping | |
Cheng et al. | MIMO-OFDM PHY integrated (MOPI) scheme for confidential wireless transmission | |
EP2849374A1 (en) | Secure communications system and method | |
WO2023038780A1 (en) | Reference signal security to combat eavesdropping and directional denial of service attacks | |
US12047144B2 (en) | Techniques for channel state information based artificial noise injection | |
US11659383B2 (en) | Method for physical layer secured message scrambling | |
Hu et al. | A versatile secure transmission strategy in the presence of outdated CSI | |
EP4338389A1 (en) | Control of scrambling sequence per symbol for digital post distortion | |
Nardelli et al. | Maximising transmission capacity of ad hoc networks via transmission system design | |
EP2712103B1 (en) | Apparatuses, methods and computer programs for a MIMO transmitter and decoder | |
Ebert et al. | HashBeam: Enabling feedback through downlink beamforming in unsourced random access | |
US20240284168A1 (en) | Physical layer security in wireless communications | |
Tang et al. | A MIMO cross-layer precoding security communication system | |
US11722265B2 (en) | Feedback design for network coding termination in broadcasting | |
WO2023097562A1 (en) | Scrambling for probabilistic constellation schemes in wireless communications | |
US20230139023A1 (en) | Adaptive rateless coding for sidelink communications | |
WO2023146718A1 (en) | Security key derivation using decoded information blocks | |
Choi et al. | Secrecy performance of two-level superposition transmission in untrusted multiuser wireless downlink systems | |
Kim et al. | Secrecy Performance Analysis of Alamouti-STBC With Decision Feedback Detection in Time-Selective Fading Channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20140718 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
17Q | First examination report despatched |
Effective date: 20161221 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170503 |