TWI459779B - Node B used in ensuring wireless communication - Google Patents

Node B used in ensuring wireless communication Download PDF

Info

Publication number
TWI459779B
TWI459779B TW98106910A TW98106910A TWI459779B TW I459779 B TWI459779 B TW I459779B TW 98106910 A TW98106910 A TW 98106910A TW 98106910 A TW98106910 A TW 98106910A TW I459779 B TWI459779 B TW I459779B
Authority
TW
Taiwan
Prior art keywords
node
receiver
wtru
message
zone
Prior art date
Application number
TW98106910A
Other languages
Chinese (zh)
Other versions
TW201002011A (en
Inventor
Alexander Reznik
Alan Gerald Carlton
Alain Charles Louis Briancon
Yogendra C Shah
Prabhakar R Chitrapu
Rajat Pritam Mukherjee
Marian Rudolf
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of TW201002011A publication Critical patent/TW201002011A/en
Application granted granted Critical
Publication of TWI459779B publication Critical patent/TWI459779B/en

Links

Description

在確保無線通信中使用的B節點Node B used in ensuring wireless communication

本發明整體而言關於無線通信。更明確地說,本發明關於一種藉由策略性定位這些通信之來源及/或受者以確保此等無線通信的方法及系統。The present invention relates generally to wireless communications. More specifically, the present invention relates to a method and system for securing such wireless communications by strategically locating the sources and/or recipients of such communications.

隨著無線連線活動日益普及並可靠,意料中當今受到廣泛使用的所有數位運算、資料存儲及媒體存儲裝置會變成Ad-hoc無線通信網路的一部分。但此等網路易於在許多方面有資料安全性漏洞。舉例來說,個別使用者直接相互通訊而不使用中間網路節點的Ad-hoc網路對於使用者及網路創造出新的易受攻擊特性。As wireless connectivity becomes increasingly popular and reliable, it is expected that all of the digital computing, data storage and media storage devices that are widely used today will become part of the Ad-hoc wireless communication network. However, these networks are vulnerable to data security vulnerabilities in many ways. For example, Ad-hoc networks where individual users communicate directly with each other without using intermediate network nodes create new and vulnerable features for users and the Internet.

為降低無線網路的易受攻擊性,頃已開發出諸如連線等效私密(WEP)、Wi-Fi保護存取(WPA)、可擴展認證協定(EAP)及GSM型加密等技術。雖然這些技術提供一些保護作用,其對於多種信任、權利、身份、私密及安全性問題依然脆弱。舉例來說,雖然一特定無線通信節點可能具有與一無線使用者通訊的正確WEP金鑰,但該使用者可能不知道該特定節點是否可信。To reduce the vulnerability of wireless networks, technologies such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Extensible Authentication Protocol (EAP), and GSM-type encryption have been developed. While these technologies provide some protection, they remain vulnerable to multiple trusts, rights, identities, privacy, and security issues. For example, although a particular wireless communication node may have the correct WEP key to communicate with a wireless user, the user may not know if the particular node is trusted.

此外,使用此等金鑰之使用者的認證通常發生在通信堆疊之較高層。據此,即使是在這些控制就定位之時,一惡質無線使用者或駭客可能對該通信堆疊有一些(有限的)存取。此存取創造出弱點,譬如阻斷服務攻擊及其他。In addition, authentication of users using such keys typically occurs at a higher level of the communication stack. Accordingly, a malicious wireless user or hacker may have some (limited) access to the communication stack even when these controls are located. This access creates weaknesses such as blocking service attacks and others.

無線訊號隨距離退化的事實引發一種自然的保密措施,因為要攔截一訊號需要夠接近來源方能偵測到該訊號。這對小型網路來說特別顯著,其傳輸功率通常為低而且通信通常以最高速率且以一Ad-hoc方式進行。在許多情況中,實體鄰近距離對於一惡意攻擊者來說可能是最難達成的屬性。事實上,僅可在發射器之一極短鄰近距離內被偵測到的通信不怎麼需要非常完善的保護。The fact that the wireless signal degrades with distance triggers a natural security measure, because intercepting a signal requires close proximity to the source to detect the signal. This is especially significant for small networks where the transmission power is typically low and communication is typically done at the highest rate and in an Ad-hoc manner. In many cases, the physical proximity distance may be the most difficult attribute to achieve for a malicious attacker. In fact, communication that can only be detected within a very short proximity of one of the transmitters does not require very good protection.

因此,會期望施行一種能夠利用無線訊號退化所提供之自然保密效果之優點的無線網路保密系統。此外,會期望確保要傳輸給一使用者之任何資訊僅可在該使用者所在位置存取,致使一位於該使用者附近但不是在該使用者當前所在位置處的〝竊聽者〞無法接收到傳輸給該使用者的完整訊息。Therefore, it would be desirable to implement a wireless network security system that would take advantage of the natural security provided by wireless signal degradation. In addition, it would be desirable to ensure that any information to be transmitted to a user is only accessible at the location of the user, such that an eavesdropper located near the user but not at the user's current location cannot receive it. The complete message transmitted to the user.

本發明關於一種用來確保無線通信之方法及系統。在一實施例中,以一接收器與一發射器間之距離為基礎採取不同保密措施,藉此使無線通信中的資料只有在特定信任區內被收到方可被解調變。在另一實施例中,多個位元串流片段藉由多個發射器傳輸到一位於該等發射器發出之傳輸型樣相交之一區域內的接收器。另一選擇,接收器在發射器發出之封包資料單元(PDUs)上執行一函數。在另一實施例中,將一調變星座之主要調變點劃分成鄰近次要調變點之叢集,其僅可由一在發射器之範圍內的接收器解調變。在另一實施例中,傳輸一主波形,其用具有已編碼解擾密資訊的分級調變(HM)疊加於一QPSK訊號。The present invention relates to a method and system for ensuring wireless communication. In one embodiment, different security measures are employed based on the distance between a receiver and a transmitter, whereby the data in the wireless communication can be demodulated only by the recipient within the particular trust zone. In another embodiment, a plurality of bit stream segments are transmitted by a plurality of transmitters to a receiver located in a region of the transmission pattern of the transmitters. Alternatively, the receiver performs a function on the Packet Data Units (PDUs) sent by the transmitter. In another embodiment, the primary modulation point of a modulated constellation is divided into clusters adjacent to the secondary modulation point, which can only be demodulated by a receiver within range of the transmitter. In another embodiment, a master waveform is transmitted that is superimposed on a QPSK signal with a hierarchical modulation (HM) having encoded descrambling information.

在本說明書中,術語〝無線傳輸/接收單元〞(WTRU)非侷限性包含一使用者設備(UE)、一行動站、一固接或行動用戶單元、一呼叫器、一站台(STA)或任何其他能夠在一無線環境中運作的裝置類型。在本說明書中,術語〝存取點〞(AP)非侷限性包含一基地台、一B節點、一網點控制器或無線環境中之任何其他介接裝置類型。In this specification, the term wireless carrier/receiver unit (WTRU) non-limiting includes a user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a station (STA) or Any other type of device that can operate in a wireless environment. In this specification, the term 〝 access point (AP) non-limiting includes a base station, a Node B, a network controller, or any other type of interface device in a wireless environment.

本發明係奠基於大多數傳統通道碼(例如Turbo碼、低密度同位碼(LDPC)、或類似物)在大多數實務架構中是接近於香農極限(Shannon limit)運作的事實。在應用於無線通信系統時,(忽略衰落效應),接收器解調變資料的能力幾乎是接收器解碼器處之輸入的有效SNR之一二進制函數。The present invention is based on the fact that most conventional channel codes (e.g., Turbo codes, low density parity codes (LDPC), or the like) operate close to the Shannon limit in most practical architectures. When applied to a wireless communication system, (ignoring the fading effect), the ability of the receiver to demodulate the variable data is almost a binary function of the effective SNR of the input at the receiver decoder.

本發明之特徵可被併入一積體電路(IC)內或被建構在一含有眾多互連組件的電路中。Features of the invention may be incorporated into an integrated circuit (IC) or constructed in a circuit that includes numerous interconnect components.

第1圖是一示出有效解碼器輸入SNR與一解碼器輸出BER間之一關係的曲線圖表現。存在一臨界SNR,致使在實際有效SNR掉到該臨界SNR以下時,該解碼器完全失效(亦即解碼器輸出BER是1),且一無線通信內的資料無法被讀取。相反地,如果解碼器輸入處的實際有效SNR高於該臨界SNR,則解碼器輸出處之誤差可能性極低且無線通信內的資料有極高可能性被讀取。Figure 1 is a graph showing the relationship between the effective decoder input SNR and a decoder output BER. There is a critical SNR such that when the actual effective SNR falls below the critical SNR, the decoder is completely disabled (i.e., the decoder output BER is 1) and data within a wireless communication cannot be read. Conversely, if the actual effective SNR at the decoder input is above the critical SNR, the error probability at the decoder output is extremely low and the data within the wireless communication has a very high probability of being read.

由於其假設通道碼逼近香農極限,故可假設編碼作業係以香農容量速率進行。此外,最好實際上是考量頻譜效率工作,因為這使數字結果與帶寬無關。就一複數值相加高斯白雜訊(AWGN)通道來說,香農容量速率為:R =log2 (1+SNR ) 方程式(1)Since it is assumed that the channel code is approaching the Shannon limit, it can be assumed that the coding operation is performed at the Shannon capacity rate. In addition, it is best to actually consider spectral efficiency work because it makes the digital results independent of bandwidth. For a complex value plus Gaussian white noise (AWGN) channel, the Shannon capacity rate is: R = log 2 (1 + SNR ) Equation (1)

其中SNR係以Eb /N0 取向使用。一般認定對於高於此速率的編碼率來說,可靠資訊解碼是不可能的,且對於低於此速率的編碼率來說,本質上來說保證有可靠的資訊解碼。事實上,在有大區塊長度碼譬如LDPC和Turbo碼的情況下,這是現實可行的假設。Wherein SNR is used in the E b /N 0 orientation. It is generally accepted that for information rates above this rate, reliable information decoding is not possible, and for encoding rates below this rate, reliable information decoding is essentially guaranteed. In fact, this is a realistic assumption in the case of large block length codes such as LDPC and Turbo codes.

SNR基本上取決於發射器與接收器間之距離。SNR對於離發射器之距離的相依性由下述一功率定律給出: The SNR basically depends on the distance between the transmitter and the receiver. The dependence of SNR on the distance from the transmitter is given by the following power law:

其中是一在1單位距離的標稱SNR。在開闊空間中,指數γ是2,但在實務無線網路中,指數γ是介於3和4之間,視通道拓樸而定。Where is a nominal SNR at 1 unit distance. In open space, the exponent γ is 2, but in a practice wireless network, the exponent γ is between 3 and 4, depending on the topology of the channel.

今以SNRc 為選定編碼架構之臨界SNR。然後,用此臨界SNR涵蓋的距離由下式決定: 且其可以dBs為單位被改寫如下: Today, SNR c is the critical SNR of the selected coding architecture. Then, the distance covered by this critical SNR is determined by: And it can be rewritten as follows in dBs:

本發明使d為保密措施之一函數。藉由動態地選擇d,一距離比d近之接收器可用一較鬆散的保密措施運作,而一距離比d遠之接收器會需要一較嚴格保密措施。The present invention makes d a function of one of the security measures. By dynamically selecting d, a receiver that is closer than d can operate with a looser security measure, and a receiver that is farther than d will require a stricter security measure.

在一傳統通信架構中,通道編碼架構是固定的,因為要擁有用於完全不同編碼架構之〝可程式化〞編碼器是相當昂貴的。因此,SNRc 是固定的。然後,從方程式(3)和(4),d可藉由控制一通信系統中之E和γ而受控。為了達到此目標,這些控制之至少一者必須依一接收器可能有或沒有的外在保密相關資訊而變動。In a traditional communication architecture, the channel coding architecture is fixed because it is quite expensive to have a programmable 〞 encoder for a completely different coding architecture. Therefore, the SNR c is fixed. Then, from equations (3) and (4), d can be controlled by controlling E and γ in a communication system. In order to achieve this goal, at least one of these controls must be changed in accordance with external confidentiality related information that may or may not be present at the receiver.

E被定義為在一單位距離的標稱SNR。在現實中,E是希望給一特定接收器之每資訊位元的傳輸功率。標稱SNR定義是必要的,因為方程式(2)之功率定律模型對於小d值會崩潰且導出無限SNRs。因此,控制E意味著控制每資訊位元之輸出功率。舉例來說,每資訊位元之輸出功率的控制可由下列程序之任一者或組合完成:1)藉由直接控制施用於特定接收器資料的輸出功率;2)藉由以對傳送訊號添加一附加類噪訊訊號之方式減低輸出SNR且因而減低接收器的接收SNR。其好處在於維持恆定輸出功率同時調節對於個別接收器的SNR。E is defined as the nominal SNR at a unit distance. In reality, E is the transmission power of each information bit that is desired to be given to a particular receiver. The nominal SNR definition is necessary because the power law model of equation (2) collapses for small d values and derives infinite SNRs. Therefore, controlling E means controlling the output power per information bit. For example, control of the output power per information bit can be accomplished by any one or combination of the following: 1) by directly controlling the output power applied to a particular receiver data; 2) by adding a signal to the transmitted signal The addition of a noise-like signal reduces the output SNR and thus the receiver's received SNR. This has the benefit of maintaining a constant output power while adjusting the SNR for individual receivers.

3)藉由控制一調變架構(例如選擇QPSK/M正交調幅(QAM)/M移相鍵控(PSK)/頻移鍵控(FSK),或類似架構);4)藉由調整一位元長度(例如用於UWB系統);5)藉由控制傳輸作業之顫動和定時;6)藉由控制一用於送交接收器之資料的有效編碼率,此為本發明中一較佳架構。此方法提供在一WLAN系統中以一維持一系統中各APs間之一致規律格點間距而不因波動傳輸功率位準影響CSMA系統效能的方式維持APs與WTRU間之恆定功率位準的能力;7)藉由改變速率匹配規則以便引發符號暨有效位元能量之擊穿或重複;8)藉由控制一調變指標;及9)藉由控制接收器將經歷到的干擾量。3) by controlling a modulation architecture (such as selecting QPSK/M Quadrature Amplitude Modulation (QAM) / M Phase Shift Keying (PSK) / Frequency Shift Keying (FSK), or similar architecture); 4) by adjusting one Bit length (for example for UWB systems); 5) by controlling the jitter and timing of the transmission operation; 6) by controlling the effective coding rate of a data for delivery to the receiver, which is a preferred embodiment of the present invention Architecture. The method provides the ability to maintain a constant power level between APs and WTRUs in a WLAN system in a manner that maintains a consistent regular grid spacing between APs in a system without affecting the performance of the CSMA system due to fluctuating transmission power levels; 7) by changing the rate matching rule to induce breakdown or repetition of the symbol and effective bit energy; 8) by controlling a modulation index; and 9) by controlling the amount of interference that the receiver will experience.

干擾控制非侷限性可由下述方式之一者或組合完成:1)藉由應用可變干擾管理技術,譬如對期望接收器訊號及/或干擾接收器訊號作預等化處理並改變交叉干擾被去除或導入的程度;2)藉由選擇功率控制(該功率控制可為一與保密措施共同最佳化的程序);3)藉由時間/頻率/碼排程來控制潛在干擾者的數量;4)藉由動態干擾控制(例如接通和斷開);及5)藉由透過一第三方信標發信,而該信標隨後發出訊號造成附加干擾型樣。Non-limiting interference control can be accomplished by one or a combination of the following: 1) by applying variable interference management techniques, such as pre-processing the desired receiver signal and/or interfering receiver signals and changing the cross-talk. The degree of removal or introduction; 2) by selecting power control (this power control can be a procedure that is optimized together with security measures); 3) controlling the number of potential interferers by time/frequency/code scheduling; 4) by dynamic interference control (e.g., on and off); and 5) by transmitting a message through a third party beacon, which then signals the additional interference pattern.

此外,在有多個接收天線存在的情況中,E之值可為依據接收器相對於發射器之角位置(θ)作出(亦即E=E(θ)),且因而d同樣可被作成θ之一函數。此引發另一組控制可能性,其非侷限性包含下述方式:1)以方位角、俯仰角或二者將波束成形為朝向或遠離接收器;2)利用智慧天線技術進行干擾管理;及3)傳輸型樣之導入。In addition, in the case where there are multiple receiving antennas, the value of E can be made according to the angular position (θ) of the receiver relative to the transmitter (ie, E=E(θ)), and thus d can also be made. A function of θ. This triggers another set of control possibilities, the non-limiting aspects of which include: 1) shaping the beam towards or away from the receiver with azimuth, elevation or both; 2) using smart antenna technology for interference management; 3) Import of transfer patterns.

有關γ,γ之值取決於接收訊號的都卜勒效應範圍(Doppler spread),其通常取決於接收器相對於發射器之相對速度及其環境的地理形勢。但發射器可藉由內部訊號處理來人為加大都卜勒效應範圍。由於γ之值取決於環境的地理形勢,如果發射器配備多個天線,其可藉由以一適當方式瞄準傳送訊號的方式某種程度地控制γ。Regarding the value of γ, γ depends on the Doppler spread of the received signal, which usually depends on the relative speed of the receiver relative to the transmitter and the geographical situation of its environment. However, the transmitter can artificially increase the Doppler effect range by internal signal processing. Since the value of gamma depends on the geographical situation of the environment, if the transmitter is equipped with multiple antennas, it can control gamma to some extent by aiming at transmitting signals in an appropriate manner.

接收器可用依據本發明之無線通道偵測一敵方主動干擾。如果接收器透過輔助構件被告知該接收器應當能夠成功地解調變資料串流,但事實上在夠多次嘗試之後還是沒辦法這樣做,且因為該接收器之保密措施和通信控制被以一促能資料串流解調變的方式設定,則該接收器可認定無線通道正在被侵犯。The receiver can detect an active interference of the enemy by the wireless channel according to the present invention. If the receiver is informed through the auxiliary component that the receiver should be able to successfully demodulate the variable stream, in fact, after enough attempts, there is no way to do so, and because the receiver's security measures and communication control are When the data stream demodulation mode is set, the receiver can determine that the wireless channel is being violated.

本發明較佳用一編碼率作為一相依於接收器保密措施的參數。一般而言,接收器解調變一訊號的能力取決於地理形勢(有效距離),其比一直線距離更複雜。若有需要,發射器及接收器可藉由慢慢增加(或是慢慢減少)控制參數中之一或多者並偵測出可靠資料解碼變得可能(或是不再可能)之點來找出二者間的有效距離。The present invention preferably uses a coding rate as a parameter dependent on the receiver security measure. In general, the ability of a receiver to demodulate a signal depends on the geographic situation (effective distance), which is more complex than the straight-line distance. If necessary, the transmitter and receiver can slowly (or slowly reduce) one or more of the control parameters and detect that reliable data decoding becomes possible (or is no longer possible). Find the effective distance between the two.

第2圖是一依據本發明含有一發射器110和一接收器120之通信系統100的方塊圖。發射器110包括一協定堆疊單元112、一通道編碼器114、一速率匹配單元115、一多層安全位元(MLSB)擾密器116及一實體通道處理單元118。接收器120包括一實體通道處理單元128、一MLSB解擾密器126、一速率解匹配單元125、一通道解碼器124及一協定堆疊單元122。協定堆疊單元112和122、通道編碼器114、速率匹配單元115、速率解匹配單元125、通道解碼器124及實體通道處理單元118和128本質上與傳統發射器及接收器所用為相同組件。協定堆疊單元112產生一資訊串流且此資訊串流被通道編碼器114編碼以防錯誤,然後被實體通道處理單元118更進一步處理以供經由一無線通道130(亦即一特定空中介面)傳輸。此程序在接收器120顛倒。2 is a block diagram of a communication system 100 including a transmitter 110 and a receiver 120 in accordance with the present invention. The transmitter 110 includes a protocol stacking unit 112, a channel encoder 114, a rate matching unit 115, a multi-layer security bit (MLSB) scrambler 116, and a physical channel processing unit 118. The receiver 120 includes a physical channel processing unit 128, an MLSB descrambler 126, a rate dematching unit 125, a channel decoder 124, and a protocol stacking unit 122. Protocol stacking units 112 and 122, channel encoder 114, rate matching unit 115, rate dematching unit 125, channel decoder 124, and physical channel processing units 118 and 128 are essentially the same components used by conventional transmitters and receivers. The protocol stacking unit 112 generates an information stream and the information stream is encoded by the channel encoder 114 to prevent errors, and then further processed by the physical channel processing unit 118 for transmission via a wireless channel 130 (i.e., a specific empty interfacing plane). . This program is reversed at the receiver 120.

通道編碼器114將一輸入資料序列映射成一輸出通道符號序列。MLSB擾密器116擾密該等通道符號。該等通道符號可為位元或較高階調變符號。並非所有符號都必須被擾密。MLSB擾密器116可取符號之一子集並予擾密。接收器應當知道有哪些符號部分被擾密。Channel encoder 114 maps an input data sequence into an output channel symbol sequence. The MLSB scrambler 116 confuses the channel symbols. The channel symbols can be bit or higher order modulation symbols. Not all symbols must be hacked. The MLSB scrambler 116 may take a subset of the symbols and prioritize them. The receiver should know which symbols are partially disturbed.

數個保密層依據本發明被定義。一MLSB解擾密器126能夠解擾密的已擾密符號比例取決於保密層。對於MLSB解擾密器126能夠解擾密的任何符號,MLSB解擾密器126都會予以處理。對於MLSB解擾密器126無法解擾密的任何符號,MLSB解擾密器126對該符號插入一消除訊號(erasure)(亦即0的通道觀測)。任何習知解碼器均有能力與消除訊號運作。因此,這不會對一當今系統造成問題。Several privacy layers are defined in accordance with the present invention. The proportion of a disturbed symbol that a MLSB descrambler 126 can descramble depends on the privacy layer. For any symbol that the MLSB descrambler 126 can descramble, the MLSB descrambler 126 will process it. For any symbol that the MLSB descrambler 126 cannot descramble, the MLSB descrambler 126 inserts an erasure (i.e., channel observation of 0) for the symbol. Any conventional decoder has the ability to eliminate signal operation. Therefore, this will not cause problems for a system of today.

依據本發明之保密系統在那些無法解擾密所有符號之接收器上的效用是編碼效率的提高及每資訊位元之有效SNR的同步減低。編碼率提高及有效SNR減低的特定量取決於保密水準,此將在下文說明。The utility of the security system in accordance with the present invention on receivers that are unable to descramble all symbols is an increase in coding efficiency and a simultaneous reduction in the effective SNR per information bit. The specific amount of increase in coding rate and effective SNR reduction depends on the level of confidentiality, which will be explained below.

發射器110內的速率匹配單元115依據速率匹配規則運作,該速率匹配規則可被改變以便引發符號暨有效位元能量之擊穿或重複。使用一具有一編碼率R的通道。R得大於每通道符號1位元且保密層n的有效率由下式給出: The rate matching unit 115 within the transmitter 110 operates in accordance with a rate matching rule that can be changed to cause a breakdown or repetition of the symbol and effective bit energy. A channel having a coding rate R is used. R is greater than 1 bit per channel symbol and the efficiency of the privacy layer n is given by:

其中θ代表已擾密符號的比例且en 是一具備一保密層n的解擾密器(亦即接收器120內的速率解匹配單元125)能夠解擾密的符號比例。在所有情況中,e n [0,1]、e l =0、e N =1。初始每貴訊位元SNR(更精確地說為Eb N0 )由E0 代表。保密層n的有效SNR由下式給出:E n =E 0 [1-θ(1-e n )] 方程式(6)Where θ represents the proportion of the victim symbol and e n is a descrambler having a privacy layer n (ie, the rate dematching unit 125 in the receiver 120) is capable of descrambling the symbol scale. In all cases, e n [0,1], e l =0, e N =1. The initial per-bit bit SNR (more precisely E b N 0 ) is represented by E 0 . The effective SNR of the privacy layer n is given by: E n = E 0 [1-θ(1- e n )] Equation (6)

比率及SNR二者單純地依未擾密已知位元之比例換算,此由下式給出:ηn =1-θ(1-e n ) 方程式(7)Both the ratio and the SNR are simply converted by the ratio of undisturbed known bits, which is given by: η n =1 - θ(1- e n ) Equation (7)

因此,足以唯獨就此量編定分析公式。SNR對於離發射器之距離的相依性由方程式(2)給出。Therefore, it is sufficient to formulate an analytical formula for this quantity alone. The dependence of the SNR on the distance from the emitter is given by equation (2).

依據本發明,經判定已知未抹除符號(亦即接收器能夠解擾密的符號)之一特定比例,即可決定能夠解調變資料的發射器至接收器距離。方程式(2)被代入方程式(7)中且解d以獲得下式: In accordance with the present invention, a transmitter-to-receiver distance capable of demodulating data can be determined by determining that a particular ratio of known un-erased symbols (i.e., symbols that the receiver can descramble) is determined. Equation (2) is substituted into equation (7) and solution d is obtained to obtain the following equation:

接下來,假設符號之一百分比η未被抹除,方程式(5)和(6)被代入方程式(8)中以獲得下式: Next, assuming that one of the symbols η is not erased, equations (5) and (6) are substituted into equation (8) to obtain the following equation:

一特定保密水準η可達到之距離的百分比可被表示為全保密(η=1)可達到之距離的百分比。此為NSPR,其被定義如下: The percentage of distance that a particular level of privacy η can reach can be expressed as a percentage of the distance that can be reached by full privacy (η = 1). This is NSPR, which is defined as follows:

該NSPR不相依於E,但其相依於標稱傳輸速率。作為一實例,第3圖-6呈現4種不同架構之NSPR對上已知符號百分比的標繪圖,這四種架構分別是:R=1、γ=2;R=1、γ=4;R=1/2、γ=2;R=1/2、γ=4。從模擬結果觀測到藉由僅顯露通道符號之50%,位於比〝完全安全〞傳輸半徑之約60%更遠處的接收器可能無法解調變資訊。因此,如果一接收器超出其保密參數的有效距離,其理論上來說被禁止解碼具備一遠高於50%之BER的資料。The NSPR is not dependent on E, but it is dependent on the nominal transmission rate. As an example, Figure 3-6 presents a plot of the percentage of known symbols on the NSPR pairs of four different architectures: R = 1, γ = 2; R = 1, γ = 4; = 1/2, γ = 2; R = 1/2, γ = 4. From the simulation results, it is observed that by only revealing 50% of the channel symbol, the receiver located at a distance farther than about 60% of the completely safe transmission radius may not be able to demodulate the information. Therefore, if a receiver exceeds the effective distance of its secret parameters, it is theoretically prohibited from decoding data with a BER well above 50%.

第7圖示出一包含多個WTRUs 705、710、715、720和725之保密網路700,該等WTRUs在多個不重疊的信任區730、740、750或一在該等信任區外之〝不信任〞區760內運作。信任區730、740、750及〝不信任〞區760依下述方式建立:選擇傳輸參數譬如一編碼率架構、擊穿架構、功率架構或類似物致使一在信任區750與〝不信任區〞760間之邊界外側的接收器(亦即一WTRU)無法解碼傳輸訊號,就算該接收器徹底知道所有傳輸參數亦如此。此外,選擇一(待由MLSB子系統實施的)位元擾密架構致使在信任區730內側的接收器能夠解調變資料,即使這些接收器不知道已擾密位元之任一者亦如此。接收功率會高到足以讓成功解調變作業得以發生,即使已擾密位元是單純地用來被擊穿亦如此。Figure 7 shows a secure network 700 comprising a plurality of WTRUs 705, 710, 715, 720 and 725, which are in a plurality of non-overlapping trusted areas 730, 740, 750 or one outside of the trusted areas. I don't trust the operation in the 760 area. The trust zones 730, 740, 750 and the untrusted zone 760 are established in such a manner that selection of transmission parameters such as a code rate architecture, a breakdown architecture, a power architecture or the like results in a trust zone 750 and a do not trust zone. A receiver outside the boundary of 760 (i.e., a WTRU) cannot decode the transmission signal, even if the receiver is fully aware of all transmission parameters. In addition, selecting a bit disturbing architecture (to be implemented by the MLSB subsystem) causes the receivers inside the trust zone 730 to demodulate the data, even if the receivers do not know any of the disturbed bits. . The received power will be high enough for a successful demodulation operation to occur, even if the victim bit is simply used to be broken down.

信任區740內之接收器除非知道MLSB所施用之擾密型樣的一些部分否則不再有能力解調變發送的資料。據此,位於信任區740內之接收器會被迫要與發射器經過某種類型的認證程序使得擾密序列之一些必要部分向其揭露。The receiver within the trust zone 740 is no longer capable of demodulating the transmitted data unless it knows some portions of the scrambled pattern applied by the MLSB. Accordingly, the receiver located within the trust zone 740 is forced to pass the transmitter with some type of authentication procedure to expose some necessary portions of the scrambling sequence to it.

信任區750內之接收器就算知道向信任區740內之接收器揭露的擾密序列部分(例如藉由偷聽側通信藉此使這些接收器被允許存取此序列)也沒有能力解調變資料發射器。事實上,這些接收器被要求要請求有關擾密序列的額外資訊(例如其可能必須知道完整序列),且因此其必須經過一獨立於信任區740內之接收器(很可能是需求更高)的認證程序。如前所述,區域760內之接收器在任何情況下都無法解調變發送的資料。The receiver within trust zone 750 does not have the ability to demodulate even if it knows the portion of the scrambling sequence that is exposed to the receiver within trust zone 740 (e.g., by eavesdropping side communications thereby allowing these receivers to access the sequence) Data transmitter. In fact, these receivers are required to request additional information about the scrambling sequence (eg, they may have to know the complete sequence), and therefore they must go through a receiver that is independent of the trust zone 740 (most likely more demanding) Certification process. As previously mentioned, the receiver in region 760 is unable to demodulate the transmitted data under any circumstances.

依據以上所述本發明之實施例,從一發射WTRU 705到一接收WTRU的距離是保密措施之一函數。藉由動態選擇距離d(例如50公尺),一距離比d近的接收WTRU 710可用一較鬆散的保密措施運作,而距離超過d的接收WTRU 715、720和725會需要一較嚴保密措施。In accordance with an embodiment of the invention described above, the distance from a transmitting WTRU 705 to a receiving WTRU is a function of privacy measures. By dynamically selecting the distance d (e.g., 50 meters), a receiving WTRU 710 that is closer than d can operate with a looser security measure, while receiving WTRUs 715, 720, and 725 that are more than d would require a stricter security measure. .

第8圖示出一包含一AP 805和一WTRU 810的傳統網路800。當AP 805傳輸一位元串流815給WTRU 810,一在AP 805之範圍內的竊聽者820能夠接收完整位元串流譬如111000101。FIG. 8 shows a conventional network 800 including an AP 805 and a WTRU 810. When the AP 805 transmits a one-bit stream 815 to the WTRU 810, an eavesdropper 820 within range of the AP 805 can receive a full bit stream, such as 111000101.

第9圖示出一依據本發明一實施例之網路900,其包含多個存取點(APs)905、910、915及一WTRU 920及第8圖之竊聽者820。藉由使用多個APs 905、910、915而不像第8圖之傳統網路800只用單個AP 805,位元串流815被確保不被竊聽者820解密。WTRU 920被定位在APs 905、910及915之傳輸型樣的交會區935,藉此WTRU 920會從AP 905收到位元串流815之一第一片段930A 〝111〞,從AP 910收到位元串流815之一第二片段930B 〝000〞,且從AP 915收到位元串流815之一第三片段930C 〝101〞。每一片段930A 、930B 、930C 被稱為一PDU,且原始位元串流〝111000101〞被稱為一服務資料單元(SDU)。然後WTRU 920從這三個PDUs 930A 、930B 、930C 重組整個已加密SDU。由於竊聽者820並未實質位於APs 905、910及915之傳輸型樣的交會區935,致使所有片段930A 、930B 、930C 相較於WTRU 920係在一錯誤率下被接收,竊聽者820無法解譯整個位元串流815(即使知道一密鑰亦如此)。FIG. 9 illustrates a network 900 including a plurality of access points (APs) 905, 910, 915 and a WTRU 920 and an eavesdropper 820 of FIG. 8 in accordance with an embodiment of the present invention. By using multiple APs 905, 910, 915 instead of the traditional network 800 of Figure 8, using only a single AP 805, the bit stream 815 is guaranteed not to be decrypted by the eavesdropper 820. The WTRU 920 is located at the intersection 935 of the transmission pattern of the APs 905, 910, and 915, whereby the WTRU 920 receives a first segment 930 A 〝 111 之一 of the bit stream 815 from the AP 905, and receives a bit from the AP 910. The second segment 930 B 〝000 之一 of one of the meta-streams 815 receives a third segment 930 C 〝 101 之一 of the bit stream 815 from the AP 915. Each segment 930 A , 930 B , 930 C is referred to as a PDU, and the original bit stream 〝 111000101 〞 is referred to as a Service Data Unit (SDU). The WTRU 920 then reassembles the entire encrypted SDU from the three PDUs 930 A , 930 B , 930 C. Since the eavesdropper 820 is not physically located in the intersection 935 of the transmission pattern of the APs 905, 910, and 915, causing all segments 930 A , 930 B , and 930 C to be received at an error rate compared to the WTRU 920, the eavesdropper 820 cannot interpret the entire bitstream 815 (even if one knows a key).

在第9圖之網路900內,被WTRU 920解譯出來的SDU是111000101,其中PDUA =111、PDUB =000且PDUC =101。如果竊聽者820勉強解譯出這三個PDUs當中兩個(例如000和101),竊聽者820會勉強得到不完整但正確的部分資訊。In the network 900 of FIG. 9, the SDU interpreted by the WTRU 920 is 111000101, where PDU A = 111, PDU B = 000, and PDU C = 101. If the eavesdropper 820 barely interprets two of the three PDUs (eg, 000 and 101), the eavesdropper 820 will barely get incomplete but correct partial information.

在一替代實施例中,竊聽者820確實接收到的任何PDUs只要不完整就變成無意義的。舉例來說,網路900內需要發送給WTRU 920的SDU是111000101。但是,由三個不同APs 905、910和915發出的三個PDUs(例如PDU1、PDU2、PDU3)不像第9圖所示是片段的,而是經替代選擇致使SDU=PDU1 XOR PDU2 XOR PDU3,其中PDU1=100110011、PDU2=110000111且PDU3=101110001,致使SDU=100110011 XOR 110000111 XOR 101110001=111000101,其中XOR是一互斥或函數。因此,假設WTRU 920位在APs905、910及915之傳輸型樣的交會區935,則WTRU 920能夠接收全部三個PDUs並且XOR這些PDUs以解譯SDU 111000101。如果竊聽者820捕捉到這三個PDUs當中任兩者,這對於解譯該SDU來說完全無意義。XOR以外之替代機制亦屬可能,譬如以一除非成功接收所有傳輸否則就無意義的方式擾密封包並且從不同發射器發出不同位元。In an alternate embodiment, any PDUs that the eavesdropper 820 does receive become meaningless as long as they are incomplete. For example, the SDU that needs to be sent to the WTRU 920 within the network 900 is 111000101. However, three PDUs (e.g., PDU1, PDU2, PDU3) issued by three different APs 905, 910, and 915 are not fragmented as shown in Figure 9, but instead result in SDU = PDU1 XOR PDU2 XOR PDU3, Where PDU1=100110011, PDU2=110000111 and PDU3=101110001, causing SDU=100110011 XOR 110000111 XOR 101110001=111000101, where XOR is a mutually exclusive or function. Thus, assuming that the WTRU 920 is at the intersection 935 of the transmission pattern of APs 905, 910, and 915, the WTRU 920 can receive all three PDUs and XOR these PDUs to interpret the SDU 111000101. If the eavesdropper 820 captures either of these three PDUs, this is completely meaningless for interpreting the SDU. Alternative mechanisms other than XOR are also possible, such as scrambling the sealed packets and issuing different bits from different transmitters unless the transmission is successfully received.

在另一實施例中,一位置型認證機制可併入第9圖之網路900內。WTRU 920從APs905、910及915接收傳輸,且向APs 905、910及915每一者報告其位置。基於WTRU 920及APs 905、910和915之報告位置,APs 905、910及915每一者可啟動一協定以一高於或低於每一相應AP 905、910及915與WTRU 920間之標稱距離之建議編碼率高或低的變動有效編碼率發出一訊息序列,請求來自WTRU 920之一肯定確認接收訊號(ACK)或一否定確認接收訊號(NACK)。因此,該協定建立一準則,其以WTRU 920之位置相對於APs 905、910及915之位置為基礎指定該WTRU是否可解碼從APs 905、910及915收到的傳輸。如果WTRU 920報告的位置被判定是正確的,則該協定會藉由處理WTRU 920回應於該訊息序列而被收到之ACK/NACK訊息來查驗WTRU 920之位置的可信度。In another embodiment, a location type authentication mechanism can be incorporated into network 900 of FIG. The WTRU 920 receives transmissions from APs 905, 910, and 915 and reports its location to each of APs 905, 910, and 915. Based on the reporting locations of the WTRU 920 and the APs 905, 910, and 915, each of the APs 905, 910, and 915 can initiate an agreement to be higher or lower than the nominal between each respective AP 905, 910, and 915 and the WTRU 920. The variable effective coding rate of the proposed coding rate is either high or low, and a message sequence is sent requesting a positive acknowledgement (ACK) or a negative acknowledgement (NACK) from the WTRU 920. Accordingly, the agreement establishes a criterion that specifies whether the WTRU can decode transmissions received from APs 905, 910, and 915 based on the location of the WTRU 920 relative to the locations of APs 905, 910, and 915. If the location reported by the WTRU 920 is determined to be correct, the agreement will verify the confidence of the location of the WTRU 920 by processing the ACK/NACK message received by the WTRU 920 in response to the sequence of messages.

WTRU 920之可信度的查驗亦可被進行為致使WTRU 920(或WTRU 920之使用者)與APs 905、910及915共享一共同秘密。舉例來說,如果APs 905、910及915要求WTRU 920指出之位置要經認證,則APs 905、910及915經由多個PDUs(其可如前所述經分段或加密)發送一〝挑戰問題〞,致使該〝挑戰問題〞只在WTRU 920位於其所述位置時方能由WTRU 920解譯。因此,WTRU 920除非位於一可解譯出該〝挑戰問題〞的位置否則就無法〝回答〞該〝挑戰問題"。The verification of the WTRU 920's confidence may also be made to cause the WTRU 920 (or the user of the WTRU 920) to share a common secret with the APs 905, 910, and 915. For example, if APs 905, 910, and 915 require the location indicated by WTRU 920 to be authenticated, APs 905, 910, and 915 send a challenge issue via multiple PDUs (which may be segmented or encrypted as previously described). That is, the challenge issue can only be interpreted by the WTRU 920 when the WTRU 920 is in its location. Therefore, the WTRU 920 cannot answer the challenge question unless it is located at a location where the challenge problem can be interpreted.

第10圖示出一分級調變(HM)架構之一實例,其由主要和次要調變架構(在本例中分別是QPSK和BPSK)之一組合定義。眾所周知一QPSK調變架構係由4個調變點定義,這些調變點一同建構QPSK調變星座。該等調變點分別呈現π/2、3π/2、-π/2及-3π/2的載波相位且分別代表二個位元00、01、10和11。相似地,眾所周知一BPSK調變架構係由2個調變點定義,這些調變點一同建構BPSK調變星座。該等調變點分別呈現+δ和-δ弳度的載波相位且分別代表一個位元0或1。然後,該HM架構係由8個調變點定義,從主要和次要調變星座建構。Figure 10 shows an example of a hierarchical modulation (HM) architecture defined by a combination of primary and secondary modulation architectures (QPSK and BPSK, respectively in this example). It is well known that a QPSK modulation architecture is defined by four modulation points, which together construct a QPSK modulation constellation. The modulation points exhibit carrier phases of π/2, 3π/2, -π/2, and -3π/2, respectively, and represent two bits 00, 01, 10, and 11, respectively. Similarly, it is well known that a BPSK modulation architecture is defined by two modulation points that together construct a BPSK modulation constellation. The modulation points exhibit carrier phases of +δ and -δ弪, respectively, and represent one bit 0 or 1, respectively. The HM architecture is then defined by eight modulation points, constructed from primary and secondary modulation constellations.

HM調變點分別呈現(π/2-δ)、(π/2+δ)、(3π/2-δ)、(3π/2+δ)、(-π/2-δ)、(-π/2+δ)、(-3π/2-δ)、(-3π/2+δ)的載波相位且分別代表三個位元000、001、010、011、100、101、110和111。這8個調變點構成四個叢集,每一叢集包含二個小間隔調變點。舉例來說,載波相位(π/2-δ)、(π/2+δ)代表的調變會構成一叢集。發射器透過一無線通道發送一從該HM星座取得的符號序列,該無線通道隨訊號走得離發射器越遠會衰減並污染該訊號。整體而言,一較接近發射器的接收器會收到一具備較好訊號強度及訊號品質的訊號,使得其能準確地偵測載波相位及所屬3個位元。但一遠離發射器的接收器通常會收到一具備較低訊號強度及訊號品質的訊號,使得其就算能夠判斷傳送符號所屬叢集為何也可能無法辨別每一叢集內之小間隔調變點。因此,此一接收器能偵測主要調變但無法偵測次要調變。據此,接收器能偵測出資料之二個位元但偵測不出第三位元。The HM modulation points are (π/2-δ), (π/2+δ), (3π/2-δ), (3π/2+δ), (-π/2-δ), (-π The carrier phases of /2+δ), (-3π/2-δ), (-3π/2+δ) and represent three bits 000, 001, 010, 011, 100, 101, 110, and 111, respectively. These eight modulation points form four clusters, each cluster containing two small interval modulation points. For example, the modulation represented by the carrier phase (π/2-δ) and (π/2+δ) constitutes a cluster. The transmitter transmits a sequence of symbols obtained from the HM constellation through a wireless channel that attenuates and contaminates the signal as the signal travels farther away from the transmitter. In general, a receiver closer to the transmitter will receive a signal with better signal strength and signal quality, so that it can accurately detect the carrier phase and its associated three bits. However, a receiver remote from the transmitter typically receives a signal with a lower signal strength and signal quality, so that even if it can determine the cluster to which the transmitted symbol belongs, it may not be able to distinguish the small interval modulation points in each cluster. Therefore, this receiver can detect the main modulation but cannot detect the secondary modulation. Accordingly, the receiver can detect two bits of data but cannot detect the third bit.

本發明此實施例可被用來實施一保密或信任區。與主要調變點相關之資料(亦即前頭2個位元)被用一密鑰編碼或加密或擾密,且該密鑰本身經由一符號序列之第三位元傳輸。因此,一信任區內的接收器可偵測到該密鑰且用其解碼或解密或解擾密主要資料。一信任區外的接收器能偵測到主要資料但偵測不到該密鑰,因而無法解碼或解密或解擾密主要資料。任何調變架構皆可用作本發明之主要和次要調變架構。實例包含M-ary PSK、M-ary FSK、M-ary QAM、或類似物。此外,只有主要調變星座內之選定調變點可被次要叢集疊加。最後,可施加超過兩層的分級。舉例來說,QPSK加BPSK加BPSK呈現三層的HM。This embodiment of the invention can be used to implement a privacy or trust zone. The data associated with the primary modulation point (i.e., the first 2 bits) is encoded or encrypted or scrambled with a key, and the key itself is transmitted via a third bit of a sequence of symbols. Thus, a receiver within a trust zone can detect the key and use it to decode or decrypt or descramble the primary data. A receiver outside a trusted zone can detect the primary data but cannot detect the key, and thus cannot decode or decrypt or descramble the primary data. Any modulation architecture can be used as the primary and secondary modulation architecture of the present invention. Examples include M-ary PSK, M-ary FSK, M-ary QAM, or the like. In addition, only selected modulation points within the main modulation constellation can be superimposed by the secondary cluster. Finally, more than two layers of grading can be applied. For example, QPSK plus BPSK plus BPSK presents a three-layer HM.

在另一實施例中,可實施一分層HM架構。第10圖示出一種簡單兩層式架構,其中主波形是一被疊以一雙移相鍵控(BPSK)HM的QPSK訊號。當一接收器的SNR為高,其有可能辨別所有星座點。隨著SNR減低,要區別BPSK層級之點與標稱QPSK星座點變困難且因而遺失HM資料。In another embodiment, a layered HM architecture can be implemented. Figure 10 shows a simple two-layer architecture in which the main waveform is a QPSK signal that is stacked with a double phase shift keying (BPSK) HM. When the SNR of a receiver is high, it is possible to distinguish all constellation points. As the SNR decreases, it becomes difficult to distinguish between the BPSK level and the nominal QPSK constellation point and thus lose the HM data.

依據本發明,已擾密資料被以主波形調變,且解擾密資訊被以HM編碼。當接收器位於一可認出該HM的區域內時,解擾密資訊促成成功的接收。當接收器太遠且因此無法提取HM資料時,必須透過其他通道明確請求解擾密資訊。藉由改變分配給HM波形的功率,範圍可為區域受控的。According to the present invention, the scrambled data is modulated by the main waveform, and the descrambling information is encoded in HM. The descrambling information facilitates successful reception when the receiver is located in an area in which the HM can be recognized. When the receiver is too far away and therefore cannot extract HM data, the descrambling information must be explicitly requested through other channels. By varying the power assigned to the HM waveform, the range can be area controlled.

雖然已就特定組合以較佳實施例說明本發明之特徵和元素,每一特徵或元素可在沒有較佳實施例其他特徵和元素的條件下或是在有或沒有本發明其他特徵和元素之多種組合的條件下使用。Although the features and elements of the present invention have been described in terms of a particular combination of the preferred embodiments, each of the features or elements may be used without or without other features and elements of the preferred embodiments. Used under a variety of combinations.

BER‧‧‧解碼器輸出BER‧‧‧ decoder output

SNR‧‧‧有效解碼器輸入SNR‧‧‧Efficient decoder input

100‧‧‧通信系統100‧‧‧Communication system

AP‧‧‧存取點AP‧‧‧ access point

WTRU‧‧‧無線傳輸/接收單元WTRU‧‧‧Wireless Transmission/Reception Unit

以下以舉例方式並參照隨附圖式更詳細地說明本發明,圖式中:第1圖是一示出一接收器解碼器之有效輸入SNR與該解碼器之輸出BER間之一關係的曲線圖表現;第2圖是一無線通信系統的方塊圖,其包含依據本發明用來確保無線通信之一發射器及一接收器;第3圖是一示出規格化安全近接半徑(NSPR)與已知符號在R=1、γ=2條件下之關係的曲線圖表現;第4圖是一示出NSPR與已知符號在R=1、γ=4條件下之關係的曲線圖表現;第5圖是一示出NSPR與已知符號在R=1/2、γ=2條件下之關係的曲線圖表現;第6圖是一示出NSPR與已知符號在R=1/2、γ=4條件下之關係的曲線圖表現;第7圖是一依據本發明一實施例具備多個用來確保無線通信之信任區的保密網路的簡圖;第8圖是一傳統網路,其中一竊聽者可截收一從一AP傳輸到一WTRU的位元串流;第9圖是一依據本發明另一實施例的網路,其中多個APs之每一者傳輸PDUs給一位於該等APs每一者之傳輸型樣相交之一信任區內的WTRU以確保無線通信;且第10圖示出一QPSK調變星座,其例示如何依據本發明另一實施例確保無線通信。The invention will now be described in more detail by way of example with reference to the accompanying drawings in which: FIG. 1 is a graph showing a relationship between the effective input SNR of a receiver decoder and the output BER of the decoder. Figure 2 is a block diagram of a wireless communication system including one of the transmitters and a receiver for ensuring wireless communication in accordance with the present invention; and Figure 3 is a diagram showing the normalized safety proximity radius (NSPR) and A graph showing the relationship of the symbol under the condition of R=1 and γ=2; FIG. 4 is a graph showing the relationship between the NSPR and the known symbol under the condition of R=1 and γ=4; Figure 5 is a graph showing the relationship between NSPR and known symbols under the conditions of R = 1/2 and γ = 2; Figure 6 is a graph showing NSPR and known symbols at R = 1/2, γ. A graph representation of the relationship under the condition of =4; FIG. 7 is a simplified diagram of a secure network having a plurality of trusted areas for ensuring wireless communication in accordance with an embodiment of the present invention; and FIG. 8 is a conventional network. One of the eavesdroppers may intercept a bit stream transmitted from an AP to a WTRU; FIG. 9 is a network according to another embodiment of the present invention, Each of the plurality of APs transmits PDUs to a WTRU within one of the trusted areas of the transmission pattern of each of the APs to ensure wireless communication; and FIG. 10 shows a QPSK modulation constellation, which illustrates how Wireless communication is secured in accordance with another embodiment of the present invention.

WTRU...無線傳輸/接收單元WTRU. . . Wireless transmission/reception unit

Claims (8)

一種在確保無線通信中使用的B節點,該B節點包含:一發射器,受配置傳輸一所加密訊號到一無線傳輸/接收單元(WTRU)以致使該所加密訊號的解密取決於與該WTRU相關的一地理信任區,其中在該信任區是一第一信任區的條件下該所加密訊號允許該所加密訊號的解密,且在該信任區是一第二信任區的條件下該所加密訊號防止該所加密訊號的解密。 A Node B for use in securing wireless communications, the Node B comprising: a transmitter configured to transmit an encrypted signal to a WTRU to cause decryption of the encrypted signal depending on the WTRU Corresponding a geographic trust zone, wherein the encrypted signal allows decryption of the encrypted signal under the condition that the trusted zone is a first trusted zone, and the encrypted zone is encrypted if the trusted zone is a second trusted zone The signal prevents decryption of the encrypted signal. 如申請專利範圍第1項所述之B節點,其中該信任區是多個地理信任區的其中之一。 For example, the B node described in claim 1 of the patent scope, wherein the trust zone is one of a plurality of geographic trust zones. 如申請專利範圍第1項所述之B節點,其中該發射器進一步受配置藉由使用從一分級調變星座所選擇的分級調變點而調變一訊息以產生該所加密訊號。 The Node B of claim 1, wherein the transmitter is further configured to modulate a message to generate the encrypted signal by using a hierarchical modulation point selected from a hierarchical modulation constellation. 如申請專利範圍第3項所述之B節點,其中所述調變一訊息包含:使用一第一加密碼而加密該訊息;使用該分級調變點的一第一調變位準而調變所加密訊息;及使用該分級調變點的一第二調變位準而調變該第一加密碼。 The Node B of claim 3, wherein the modulating a message comprises: encrypting the message by using a first encryption code; and modulating using a first modulation level of the hierarchical modulation point Encrypting the message; and modulating the first encryption code using a second modulation level of the hierarchical modulation point. 如申請專利範圍第1項所述之B節點,其中該所加密訊號包含在一訊息中的一所擾密符號,該訊息是使用一擾密序列而被擾密的一訊息。 The Node B of claim 1, wherein the encrypted signal comprises a scrambling symbol in a message, the message being a message that is scrambled using a scrambling sequence. 如申請專利範圍第1項所述之B節點,進一步包含:一處理器,受配置藉由調整一傳輸參數而調整該信任區的一大小。 The Node B of claim 1, further comprising: a processor configured to adjust a size of the trust zone by adjusting a transmission parameter. 如申請專利範圍第6項所述之B節點,其中該傳輸參數是一編 碼率架構、一擊穿架構、或一功率架構。 For example, the B node described in claim 6 of the patent scope, wherein the transmission parameter is a A rate architecture, a breakdown architecture, or a power architecture. 如申請專利範圍第1項所述之B節點,進一步包含:一處理器,受配置以證實該WTRU的位置。The Node B of claim 1, further comprising: a processor configured to verify the location of the WTRU.
TW98106910A 2004-11-23 2005-11-21 Node B used in ensuring wireless communication TWI459779B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US63073004P 2004-11-23 2004-11-23
US66185605P 2005-03-15 2005-03-15
US68425705P 2005-05-25 2005-05-25

Publications (2)

Publication Number Publication Date
TW201002011A TW201002011A (en) 2010-01-01
TWI459779B true TWI459779B (en) 2014-11-01

Family

ID=44825041

Family Applications (4)

Application Number Title Priority Date Filing Date
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication
TW98106910A TWI459779B (en) 2004-11-23 2005-11-21 Node B used in ensuring wireless communication
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW94140854A TWI308445B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW095120112A TWI455543B (en) 2004-11-23 2005-11-21 Method and device for ensuring wireless communication

Family Applications After (2)

Application Number Title Priority Date Filing Date
TW103122744A TW201507418A (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications
TW94140854A TWI308445B (en) 2004-11-23 2005-11-21 Method and system for securing wireless communications

Country Status (1)

Country Link
TW (4) TWI455543B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI733338B (en) * 2020-02-18 2021-07-11 瑞昱半導體股份有限公司 Communication device and method for adjusting transmitting parameter

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030065738A1 (en) * 2001-10-01 2003-04-03 Thumb Logic, Inc. Wireless information systems and methods

Also Published As

Publication number Publication date
TW201507418A (en) 2015-02-16
TWI455543B (en) 2014-10-01
TW200715786A (en) 2007-04-16
TW200627890A (en) 2006-08-01
TWI308445B (en) 2009-04-01
TW201002011A (en) 2010-01-01

Similar Documents

Publication Publication Date Title
US8843743B2 (en) Method and system for securing wireless communications
US7904723B2 (en) Method and apparatus for enhancing security of wireless communications
Jin et al. Specguard: Spectrum misuse detection in dynamic spectrum access systems
US20050220322A1 (en) Watermarks/signatures for wireless communications
Borle et al. Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation
Xiong et al. MIO: Enhancing wireless communications security through physical layer multiple inter-symbol obfuscation
Rahbari et al. Full frame encryption and modulation obfuscation using channel-independent preamble identifier
Subraman et al. Demonstrating and mitigating the risk of an FEC-based hardware trojan in wireless networks
Bang et al. Secure modulation based on constellation mapping obfuscation in OFDM based TDD systems
TWI459779B (en) Node B used in ensuring wireless communication
Zhang et al. Secure and optimized unauthorized secondary user detection in dynamic spectrum access
Lebold Physical layer watermarking of binary phase-shift keyed signals using standard gnu radio blocks
CN101167382A (en) Method and system for securing wireless communications
Zhang et al. Reliable information transmission: A chaotic sequence-based authentication scheme for radio environment maps enabled cognitive radio networks
West Phased dithered watermarking for physical layer authentication
Wilhelm Feasibility and Applications of a Wireless Firewall
Zentner Security Implications for Wireless Local Area Networks
Xiong Symbol-level information extraction: from bits to symbols in wireless network cross-layer design
Golygowski Increasing security in the physical layer of wireless communication
WO2017167369A1 (en) An apparatus and method for controlling the secure transmission of a message from a transmitter to a receiver

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees