WO2003073689A1 - Communication apparatus and communication system - Google Patents
Communication apparatus and communication system Download PDFInfo
- Publication number
- WO2003073689A1 WO2003073689A1 PCT/JP2003/002174 JP0302174W WO03073689A1 WO 2003073689 A1 WO2003073689 A1 WO 2003073689A1 JP 0302174 W JP0302174 W JP 0302174W WO 03073689 A1 WO03073689 A1 WO 03073689A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- propagation
- communication
- information
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/707—Spread spectrum techniques using direct sequence modulation
- H04B1/7097—Interference-related aspects
- H04B1/711—Interference-related aspects the interference being multi-path interference
- H04B1/7113—Determination of path profile
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/707—Spread spectrum techniques using direct sequence modulation
- H04B1/7097—Interference-related aspects
- H04B1/711—Interference-related aspects the interference being multi-path interference
- H04B1/7115—Constructive combining of multi-path signals, i.e. RAKE receivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/08—Secret communication by varying the polarisation of transmitted waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/10—Secret communication by using two signals transmitted simultaneously or successively
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Definitions
- the present invention relates to a technology used for digital communication, and particularly to a security technology. Height
- processing is performed so that information is not leaked even if it is intercepted by encrypting communication information.
- the purpose of this is to estimate the propagation environment using the reference signal transmitted from the communication partner. This can be achieved by acquiring information as confidential information.
- FIG. 1 is a block diagram showing a configuration of a communication apparatus according to Embodiment 1 of the present invention
- FIG. 2 is a block diagram showing a configuration of a communication apparatus according to Embodiment 1 of the present invention
- FIG. FIG. 4 is a sequence diagram illustrating an operation of the communication device according to Embodiment 1
- FIG. 4 is a block diagram illustrating configurations of a propagation estimation unit and a coding unit in the communication device according to Embodiment 2 of the present invention.
- Figure 5 shows the codebook
- Figure 6 shows the delay profile
- FIG. 7 is a block diagram illustrating a configuration of a communication device according to Embodiment 3 of the present invention
- FIG. 8 is a sequence diagram illustrating an operation of the communication device according to Embodiment 3 of the present invention
- FIG. FIG. 10 is a block diagram illustrating a configuration of a communication device according to Embodiment 4 of the present invention.
- FIG. 10 is a block diagram illustrating a configuration of a communication device according to Embodiment 4 of the present invention.
- FIG. 12 is a sequence diagram showing the operation of the communication device according to 5
- FIG. 12 is a diagram showing a frame configuration of a signal according to Embodiment 6 of the present invention
- FIG. 13 is a diagram of a signal according to Embodiment 6 of the present invention.
- FIG. 14 is a diagram showing a frame configuration
- FIG. 14 is a block diagram showing a configuration of a communication device according to Embodiment 7 of the present invention
- FIG. 15 is a block diagram showing a configuration of a communication device according to Embodiment 7 of the present invention
- FIG. 16 is a diagram showing a configuration of a propagation estimating unit in a communication apparatus according to Embodiment 8 of the present invention. Block diagram,
- Fig. 17 is a diagram explaining the direction of arrival estimation.
- FIG. 18 is a block diagram showing a configuration of a communication device according to Embodiment 9 of the present invention
- FIG. 19 is a diagram explaining a polarization state
- FIG. 20 is a block diagram showing a configuration of a communication device according to Embodiment 10 of the present invention.
- FIG. 21 is a block diagram showing a configuration of a communication device according to Embodiment 11 of the present invention.
- 2 is a block diagram showing a configuration of the communication device according to Embodiment 12 of the present invention
- FIG. 23 is a block diagram illustrating a configuration of a communication device according to Embodiment 13 of the present invention.
- FIG. 24 is a block diagram illustrating a configuration of a communication device according to Embodiment 13 of the present invention.
- 5 is a sequence diagram showing the operation of the communication device according to Embodiment 13 of the present invention.
- FIG. 26 is a block diagram showing a configuration of a communication device according to Embodiment 14 of the present invention
- FIG. 27 is a diagram showing a configuration of a propagation estimating unit in the communication device according to Embodiment 14 of the present invention.
- Figure 28 shows the autocorrelation sequence.
- FIG. 30 is a block diagram showing a configuration of a propagation estimating unit in a communication device according to Embodiment 15 of the present invention.
- FIG. 31 is a block diagram showing a configuration of a communication device according to Embodiment 16 of the present invention
- FIG. 32 is a propagation estimating unit, a converting unit, and a communication device in the communication device according to Embodiment 16 of the present invention
- FIG. 2 is a block diagram showing a configuration of an encoding unit.
- FIG. 33 is a system block diagram according to Embodiment 16 of the present invention.
- Figure 34 shows the frequency characteristics of the delay profile.
- FIG. 35 is a block diagram showing a configuration of a communication device according to Embodiment 17 of the present invention.
- FIG. 36 is a block diagram showing a configuration of a communication device according to Embodiment 17 of the present invention.
- 7 is a sequence diagram showing the operation of the communication device according to Embodiment 17 of the present invention.
- FIG. 38 is a diagram illustrating signal processing of the communication device according to Embodiment 17 of the present invention.
- FIG. 39 is a diagram illustrating signal processing of the communication device according to Embodiment 17 of the present invention.
- 0 is a diagram showing the power distribution,
- Figure 41 shows the power distribution
- Figure 42 shows the power distribution
- FIG. 43 is a block diagram showing a configuration of a communication device according to Embodiment 18 of the present invention.
- FIG. 44 is a block diagram showing a configuration of a communication device according to Embodiment 18 of the present invention.
- FIG. 45 is a diagram illustrating signal processing of a communication device according to Embodiment 18 of the present invention.
- FIG. 46 is a block diagram illustrating a configuration of a communication device according to Embodiment 19 of the present invention. 7 is a sequence diagram showing the operation of the communication device according to Embodiment 19 of the present invention,
- FIG. 48 is a diagram illustrating a signal frame configuration according to Embodiment 20 of the present invention.
- FIG. 49 is a diagram illustrating a signal frame configuration according to Embodiment 20 of the present invention.
- FIG. 51 is a block diagram showing a configuration of a communication apparatus according to Embodiment 22 of the present invention
- FIG. 53 is a diagram showing a signal frame configuration according to Embodiment 22.
- FIG. 53 is a block diagram showing a configuration of a communication device according to Embodiment 23 of the present invention.
- FIG. 54 is an embodiment of the present invention.
- FIG. 23 is a diagram illustrating a signal frame configuration according to 23, FIG.
- FIG. 55 is a block diagram illustrating a configuration of a communication device according to Embodiment 24 of the present invention
- FIG. 56 is a block diagram illustrating Embodiment 24 of the present invention
- FIG. 57 is a block diagram illustrating a configuration of the communication device according to Embodiment 25 of the present invention
- 58 is a block diagram showing a configuration of a communication device according to Embodiment 25 of the present invention
- FIG. 59 is a diagram showing a communication system using the communication device according to Embodiment 27 of the present invention
- FIG. 60 is a block diagram illustrating a configuration of a communication device according to Embodiment 27 of the present invention.
- FIG. 61 is a sequence diagram illustrating an operation of the communication device according to Embodiment 27 of the present invention.
- FIG. 62 is a sequence diagram showing an operation of the communication device according to Embodiment 27 of the present invention.
- FIG. 63 is a sequence diagram showing an operation of the communication device according to Embodiment 27 of the present invention.
- Fig. 64 shows the signal transmission status on the time axis.
- Fig. 65 shows the signal transmission status on the time axis.
- Figure 66 is a diagram showing the signal transmission state on the time axis
- Fig. 67 shows the signal transmission status on the time axis.
- FIG. 68 is a diagram showing a communication system using the communication device according to Embodiment 26 of the present invention.
- FIG. 69 is a diagram showing a communication system using the communication device according to Embodiment 26 of the present invention.
- FIG. 70 is a diagram showing a communication system using the communication device according to Embodiment 26 of the present invention.
- Figure 71 is a diagram showing the power distribution
- Figure 72 is a diagram showing the temporal change in orthogonality over the propagation parameters.
- Fig. 73 shows the communication quality in bit error rate (BER)
- Fig. 74 shows the communication quality in bit error rate (BER)
- Fig. 75 shows the signal transmission status on the time axis. Shown in the figure,
- Figure 76 shows the power distribution
- FIG. 77 is a diagram showing a communication system using the communication device according to Embodiment 28 of the present invention.
- FIG. 78 is a diagram illustrating a reception process of the communication device according to Embodiment 28 of the present invention.
- FIG. 1 shows a specific configuration of an encryption receiving device that is a communication device according to the first embodiment
- FIG. 2 shows a specific configuration of an encryption transmitting and receiving device.
- Figure 3 describes the communication procedure between terminals.
- the base station in FIG. 3 will be described as a signal transmitting / receiving device shown in FIG. 2 and the terminal will be a cryptographic receiving device shown in FIG. 1, but the combination is not limited. What Alternatively, both may be the encryption transmitting and receiving devices shown in FIG.
- FIG. 1 is composed of an antenna 101, an encryption receiving section 153, and a transmitting section 152.
- the encryption receiving unit 1503 estimates the propagation state from the received RF signal, decrypts the encryption using this as the encryption key, and outputs the security data.
- the reception demodulation unit 150 and the encryption key It comprises a generating unit 151 and a decoding unit 107.
- the transmission section 152 outputs a reference signal, and includes a reference signal generation section 108 and a transmission modulation section 109.
- the antenna 1 ⁇ 1 receives and transmits radio waves and inputs and outputs RF signals.
- the reception demodulation unit 150 receives an RF signal and outputs propagation information and demodulation information. It consists of 102, a propagation estimating unit 103, and a demodulating unit 104.
- the receiving unit 102 receives the RF signal and propagation information, controls the RF signal to an appropriate receiving state, and outputs the received signal.
- the propagation estimating unit 103 estimates the propagation characteristics from the received signal.
- the demodulation unit 104 performs appropriate demodulation from the received signal and the transmission information, and outputs the demodulation information.
- the encryption key generation unit 151 receives the propagation information and outputs the encryption key information, and includes an encoding unit 105 and a buffer unit 106.
- the encoding unit 105 extracts features from the propagation information and generates and outputs an encryption key (first data).
- the buffer unit 106 stores the encrypted encryption key, It outputs the stored encryption key information.
- the decryption unit 107 receives the encryption key information and the demodulation information, decrypts the encryption of the demodulation information from the encryption key information, and outputs a security data (second data).
- the reference signal generation unit 108 generates and outputs a predetermined reference signal, and the transmission modulation unit 109 inputs a reference signal, modulates and outputs an RF signal.
- FIG. 2 is composed of an antenna 201, an encryption receiving section 253, and an encryption transmitting section 254.
- the antenna 201 and the encryption receiving section 2553 have the same functions as the corresponding parts in FIG.
- the encryption transmission unit 255 inputs the security data and the encryption key information, and outputs a reference signal for propagation estimation, the encryption key information and the security data.
- the modulation and output are performed by switching between the encryption information encrypted by a predetermined method and the transmission modulation section 25 2, the reference signal generation section 208, and the encryption section. 209 and a switching unit 210.
- the transmission modulation section 252 modulates the selected communication information and outputs a signal, and includes a modulation section 211 and a transmission section 212.
- the reference signal generation unit 208 generates and outputs a predetermined reference signal
- the encryption unit 209 inputs the encryption key information and the security data, and obtains the security data from the encryption key information. It encrypts the evening and generates and outputs encrypted information.
- the switching unit 210 inputs the reference signal and the encryption information, selects one of the two, and outputs the communication information.
- the modulation unit 211 modulates the selected communication information and modulates the modulation signal.
- the transmitting section 212 converts and outputs the modulated signal to an RF signal to be transmitted.
- Antenna 101 receives the radio wave and outputs the F signal.
- the received RF signal is input to reception demodulation section 150, and propagation information and demodulation information are output.
- the receiving unit 102 receives the F signal and propagation information, controls the gain according to the propagation information, and keeps the gain constant or corrects the frequency / time lag to maintain the optimal reception state.
- Propagation estimator 103 receives the received signal and detects reception time, propagation time, frequency state, polarization state, received power, multipath state, phase state, propagation distortion, and the like.
- Each state is transmitted to the receiving unit 102 and the demodulating unit 104 as propagation information for the reception demodulation parameter, and is also transmitted to the encryption key generating unit 151.
- the demodulation unit 104 receives the received signal and the propagation information, demodulates the received signal according to the propagation information while removing multipath components or adjusting the phase, and demodulates. Outputs affection.
- the encryption key generation unit 151 extracts the characteristics of the propagation state from the propagation information output from the reception demodulation unit 150, generates and stores the encryption key, and outputs the encryption key information.
- Encoding section 105 receives the propagation information output from propagation estimating section 103, and extracts the characteristics of the propagation state of the received signal therefrom. For example, taking a multipath state as an example, in multipath propagation formed by a plurality of propagation paths, the multipath characteristics can be detected using a correlation function or the like.
- the encoding is performed according to a predetermined method from the delay time and the path of the path component for which the maximum power is detected, and the encryption key used for encryption is obtained. Generate 'output.
- the generated encryption key is input and stored in the buffer unit 106, and the encryption key information is output.
- the decryption unit 107 receives the demodulation information and the encryption key information, decrypts the demodulation information according to a predetermined method, and outputs a security message.
- the transmitting section 152 modulates and outputs an RF signal.
- the reference signal generation unit 108 generates a reference signal for estimating the propagation state to the communication partner terminal, and outputs this.
- the transmission modulator 109 receives a reference signal and outputs an RF signal through modulation and frequency conversion.
- Output: F signal is radiated from antenna 101.
- the cryptographic receiver 253 until the RF signal input from the antenna 201 is decrypted through the decryptor 207 and outputs the security data is the same as the corresponding part in FIG. Configuration.
- the encryption transmission unit 254 inputs the encryption key information and the security data, and outputs an RF signal to be transmitted.
- Reference signal generating section 208 generates and outputs a reference signal for estimating a propagation state to a communication partner terminal.
- the encryption unit 209 inputs the encryption key information and the security data, and outputs encryption information encrypted according to a predetermined method.
- the switching unit 210 includes a reference signal input from the reference signal generation unit 208 and an encryption key.
- One of the encrypted information input from the section 209 is selected, and the selected communication information is output.
- the selected communication information is modulated by the transmission modulator 252 and converted into a transmission signal: an RF signal is output. That is, the communication information is input to the modulation section 211, is subjected to predetermined modulation, and is output from the modulation section 211 as a modulation signal. Next, the modulated signal is input to transmitting section 212, converted into a signal, and output from transmitting section 212. This RF signal is radiated via the antenna 201.
- Both the base station and the terminal are set to the initial state immediately after the power is turned on or when a specific signal is received. At the same time, states such as frequency and time synchronization are set according to predetermined procedures.
- the base station After a certain period of time after the above initial operations are completed, the base station transmits control information on a control signal at regular time intervals.
- the terminal starts searching for a control signal after the initial operation is completed.
- the terminal receives the control signal transmitted from the base station, it detects the time, frequency, etc., and synchronizes with the time and frequency held by the system (system synchronization).
- system synchronization After successful system synchronization, the terminal sends a registration request signal to notify its base station of its existence.
- the base station transmits a registration permission signal to permit terminal registration.
- the base station outputs a reference signal for propagation estimation performed by the terminal as a first reference signal.
- switching section 210 selects the reference signal generated by reference signal generation section 208 and outputs the selected signal to transmission modulation section 255.
- the transmission modulation section 252 radiates the selected communication information from the antenna 201 as an RF signal.
- propagation estimating section 103 In the terminal, waiting for a signal from the base station, propagation estimating section 103 detects the first reference signal from the received signal received, and performs propagation estimation from the received signal and a reference signal that is a known signal. Encoding section 105 receives propagation information from propagation estimating section 103 Then, the feature of the propagation state is extracted. Next, conversion to an encryption key is performed using the extracted feature information. The operation of this part will be described separately in detail. The features extracted by the code section 105 and the method of converting it into an encryption key are shared in advance between the base station and the terminal. The converted encryption key is held in the buffer unit 106 and the encryption key information is output. The base station uses this encryption key as the first key as the encryption key for the subsequent communication.
- the terminal outputs a reference signal for propagation estimation performed by the base station as the second reference signal in the same manner as (1).
- the base station When the base station receives the signal from the terminal, it detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. As in (1), the propagation information output by the propagation estimator 203 is converted into an encryption key by the encoder 205, and the encryption key information is held and output by the buffer 206. The terminal uses this encryption key as the second key and the encryption key for the subsequent communication.
- the base station switches the state of the switching unit 210 so as to select the encryption information output from the encryption unit 209.
- the encrypting unit 209 encrypts the security data by a predetermined method and outputs encrypted information.
- the encryption information is selected by the switching unit 210, and the communication information is output to the transmission modulation unit 252.
- the transmission modulation section 252 modulates communication information and emits an encrypted signal from the antenna 201 as an RF signal.
- reception demodulation section 150 demodulates the received signal into demodulated information.
- the decryption unit 107 decrypts the encryption by a predetermined method and outputs a security message.
- the encryption communication and the normal communication of (3) are repeated.
- the propagation path formed between communication terminals is uniquely determined by the relative position, space shape, reflector, etc., which is the propagation path formed from the base station to the terminal. It is known that the state and the propagation state formed from the terminal to the base station are the same due to the reciprocity of light propagation. This means that the same result is obtained for the propagation state obtained in (1) and the propagation state (for example, delay profile) obtained in (2).
- the procedure for converting the propagation information into an encryption key is shared in advance between the base station and the terminal. Shell 1J, the encryption key (first key) obtained in (1) and the encryption key (second key) obtained in (2) are the same, and can be used as a shared key between communication terminals. It has become.
- the communication procedure (3) encryption and decryption are performed using the shared key, and the 'It report encrypted at the base station is normally decrypted at the terminal.
- the propagation states of each other are estimated by transmitting the reference signals in (1) and (2).
- the use of the reference signal as a known signal generally enables higher estimation. Therefore, it is needless to say that propagation estimation is possible without using a reference signal.
- the control signal performed at (0)
- the propagation state is used as an encryption key. Therefore, a problem may occur when a base station or a terminal moves. In this case, it is also possible to avoid this problem by repeatedly transmitting and receiving the reference signal as (1,), (2,), (3,) shown in Fig. 3.
- propagation estimating section 103 estimates the propagation environment based on the reference signal and calculates the estimated value that is a propagation parameter such as a correlation function.
- the encoding unit 105 outputs the data obtained from the estimated value, so there is no need to exchange a key for encryption between the base station and the terminal.
- this cannot be known, and high security can be ensured without major changes in the communication system at the physical layer of communication.
- security can be ensured by processing independent of encryption and decryption using the conventional arithmetic method, so that the conventional encryption method can be used.
- the communication apparatus and the communication system of the first embodiment since the coding parameter can be changed according to the propagation state, communication that is resistant to environmental changes can be performed. Further, according to the communication apparatus and the communication system of the first embodiment, since the encryption key can be obtained by obtaining the propagation parameters from the estimated propagation environment, the information can be obtained by using the unmodulated signal. Can be sent and received.
- the encryption key information output from the client unit 106 is used as an encryption key when the decryption unit 107 decrypts security data.
- the encryption when decrypting the security key information other than the security data decrypted by the decryption unit 107 using the encryption key information output from the It may be used as a key. In this case, the decoding unit 107 becomes unnecessary.
- the delay profile is used as a parameter indicating the propagation state, but the delay profile such as the polarization plane and the turning direction is used. Using polarization state, using phase information, using propagation delay time, using arrival direction estimation information, using received power information, or using various combinations of parameters Is also conceivable. This makes it possible to ensure high security because the observation of the third terminal is more complicated. In particular, the use of polarization and phase greatly affects the propagation environment, which makes it more difficult to estimate from other terminals.
- an array antenna structure composed of a plurality of antenna elements to the plurality of antennas 201, it is possible to add an arrival direction element as a parameter for propagation estimation. In this way, a more flexible system can be configured.
- the modulation method and the multiplexing method are not described, but it is clear that this method can be applied to any modulation method in principle, and the PSK modulation, QAM modulation, star Q It can be applied to anything such as AM modulation or TDMA, FDM A, SS (FH or CDMA), OFDM, or spatial multiplexing (SDM or MIM 0).
- the first reference signal is transmitted and the second reference signal is transmitted.However, whichever is performed first does not affect this method. Obviously not.
- the reference signal is separately communicated in the communication procedure, but this is done by inserting the reference signal into the data stream as shown in the frame configurations (b) and (c) in Fig. 12 described later. By doing so, the advantages of (1) and (3) can be implemented simultaneously.
- the communication device describes a method of estimating propagation and converting to an encryption key.
- the encoding unit 105 has the configuration shown in FIG.
- the configurations other than the propagation estimation unit 103 and the encoding unit 105 are the same as those in FIG. Therefore, the description is omitted.
- This delay profile includes the delay time of each path component, power, phase, and so on.
- the delay time and the power of the path component are handled.
- Propagation estimating section 103 in FIG. 1 extracts the received signal including the reference signal and estimates the propagation state. It is known that when a delay profile is obtained as a propagation state, the delay profile is obtained by a correlation between a base signal and a received signal. In this case, propagation estimation section 103 obtains a delay profile by using a reference signal that is a known signal and calculating a correlation value between the signal sequence and the received signal sequence.
- the characteristics of the propagation information thus obtained are extracted by the encoding unit 105.
- feature extraction one using a vector quantization technique is considered.
- some typical delay profile templates are prepared on the reference table as quantization vectors, and encryption keys corresponding to the respective quantization vectors are stored on the reference table.
- the encoding unit 105 matches the result estimated by the propagation estimating unit 103 from the reference table prepared in this way, and selects an encryption key corresponding to the template of the delay profile with the highest similarity. Output.
- the method of estimating the propagation state and encoding it into an encryption key has been described above, and will be described in further detail with reference to FIG.
- FIG. 4 shows a propagation estimating unit 103 and an encoding unit 105. These show the functions corresponding to the respective parts in FIG. 1 in more detail.
- the propagation estimating unit 103 estimates various states such as frequency / time shift and phase information. However, only a method of estimating a delay profile will be described here.
- the propagation estimating unit 103 is composed of a digital signal generator 401, a reference signal sequence storage unit 402, a convolver 403, and a digital amplifier 404. , A quantization unit 405, a conversion unit 406, and a codebook 407.
- Buffer 4 0 1 The reference signal sequence storage unit 402 stores and temporarily outputs a predetermined reference signal sequence, and the convolver 403 temporarily stores the input received signal for a fixed length. A convolution operation is performed on the received signal and the reference signal sequence to output a correlation value, and the buffer 404 temporarily stores the calculated correlation sequence.
- the quantization unit 405 searches for a vector that is most similar to the input vector sequence from the quantum vector recorded in the code book 407 and outputs a code.
- the conversion unit 406 selects an encryption key (first data) corresponding to the code output from the quantization unit 405 from the codebook and outputs the selected encryption key.
- the code book 407 stores a quantum vector and an encryption key therein.
- FIG. 5 shows an example of a code book in which a quantum key vector serving as a template of a delay profile and a corresponding encryption key are stored.
- propagation estimating section 103 holds the received signal including the reference signal in buffer 401.
- the convolver 400 outputs the result of calculating the sliding correlation between the reference signal sequence from the reference signal sequence storage unit 402 and the received signal sequence held in the buffer 401 as a correlation sequence, and sequentially outputs them.
- the correlation sequence held by the buffer 404 stores a correlation value between the reference signal sequence and the received signal sequence, that is, data corresponding to a delay profile.
- These delay profile reports are sent to the encoding unit 105 as a series of input vectors.
- FIG. 6 shows an example of the delay profile information obtained in this way.
- the quantization unit 405 compares the input vector from the buffer 404 with the vector recorded in the quantization vector of the codebook 407, extracts the one with the highest similarity, and Output the corresponding code. Specifically, if the input vector is X in and the quantization vector of code m is X qm (m: 1 to M),
- the conversion unit 406 outputs a corresponding encryption key from the corresponding code m of the delay profile and the contents of the encryption key table of the codebook.
- flexible encryption key setting can be realized with a simple circuit.
- the propagation estimating unit 103 generates a delay profile and uses the reference signal as an estimated value.
- the encoding unit 105 reads the encryption key information corresponding to the estimated value input from the propagation estimating unit 103 using a codebook in which the correlation function and the ⁇ key are associated with each other. Therefore, flexible encryption key setting can be realized with a simple circuit. Further, according to the communication apparatus and the communication system of the second embodiment, since a delay profile is obtained by vector quantization of a propagation parameter, stable propagation parameter setting can be performed.
- Embodiment 2 the method using the quantization vector method as the encoding method of the delay profile of encoding section 105 has been described. , And use the coefficients of the approximation formula obtained from the approximation, or divide the delay profile into several programs, and encode them from the size and order, and calculate the maximum Various methods are conceivable, such as encoding based on the delay time of the path and the size of the path.
- Communication device 700 according to Embodiment 3 of the present invention is different from communication device 200 according to Embodiment 1 of the present invention shown in FIG. 2 in that a propagation control unit ⁇ 01 is added and an encoding unit It has an encoding unit 703 instead of 205, a modulation unit 704 instead of the modulation unit 211, and a transmission unit 705 instead of the transmission unit 212. I have. Parts having the same configuration as in FIG. 2 are denoted by the same reference numerals, and description thereof will be omitted.
- the transmitting and receiving device 700 of FIG. 7 is an antenna 2 composed of a plurality of antenna elements. 01, an encryption receiving section 706, and an encryption transmitting section 707.
- the encryption receiving unit 706 includes a reception demodulation unit 708, an encryption key generation unit 251, and a decryption unit 207, and has the same configuration as each unit in FIG.
- the encryption transmission section 707 includes a reference signal generation section 208, an encryption section 209, a switching section 210, and a transmission modulation section 709. 8.
- the encryption unit 209 and the switching unit 210 are the same as the corresponding parts in FIG.
- the transmission modulator 709 includes a propagation controller 701, a modulator 704, and a transmitter 705.
- the propagation control unit 701 receives the propagation information output from the propagation estimating unit 203 and the propagation characteristic information (first data) obtained by the encoding unit 703 extracting features from the propagation information. Then, a modulation control signal and a transmission control signal are output so as to control the propagation state to the communication partner terminal to be optimum.
- the modulation section 704 inputs the modulation control signal output from the propagation control section 701 and the communication information, and modulates the communication information while performing fine adjustment of the phase, output timing, and amplitude based on the modulation control signal. Then, a modulated signal corresponding to each antenna element is output.
- the transmission unit 705 receives the transmission control signal and the modulation signal, and converts the modulation signal into an RF signal corresponding to each antenna element while controlling the frequency and output timing based on the transmission control signal.
- the signal is output to the antenna 201.
- the communication device configured as described above will be described in further detail using the communication procedure in FIG. In FIG. 8, the base station and the terminal will be described as the communication device shown in FIG. Here, only the differences from the first embodiment will be described.
- the base station outputs a reference signal for propagation estimation performed by the terminal as a first reference signal.
- the switching unit 210 selects the reference signal generated by the reference signal generation unit 208. And outputs it to the transmission modulator 709.
- the transmission modulator 709 inputs the selected communication information, the propagation information and the propagation characteristic information, and controls the propagation state to the communication partner terminal: outputs an RF signal and outputs the RF signal from the antenna 201. Radiate. This propagation control will be described in detail separately.
- the terminal is waiting for a signal from the base station, and propagation estimating section 203 detects the first reference signal from the received signal and performs propagation estimation from the received signal and the reference signal that is a known signal. Propagation information, which is this estimated value, is sent to encoding section 703 and propagation control section 701. Encoding section 703 receives the propagation information from propagation estimating section 203, extracts a feature of the propagation state, and outputs a propagation feature report to propagation control section 701. At the same time, conversion to an encryption key is performed using the extracted propagation feature information. The converted encryption key is held in the buffer unit 206 and the encryption key information is output. The base station uses this encryption key as the first key and the encryption key for subsequent communications.
- the terminal outputs a reference signal for propagation estimation performed by the base station as the second reference signal in the same manner as (1).
- the propagation controller 701 sets the propagation state corresponding to the encryption key (first key) to the base station as the communication partner from the propagation information obtained in (1) and the propagation characteristic information.
- the second reference signal is transmitted while controlling the modulation section 704 and the transmission section 705 so as to be as follows.
- the base station When the base station receives the signal from the terminal, it detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. Similarly to (1), the propagation estimator 203 outputs propagation information, and the encoder 703 extracts and outputs propagation feature information from the propagation information. Further, the transmission characteristic information is converted into an encryption key, and the encryption key information is held in the buffer unit 206. The terminal uses this encryption key as the second key as the encryption key for the subsequent communication.
- the base station switches the state of the switching unit 210 so as to select the encryption information output from the encryption unit 209.
- the encryption unit 209 uses the second key obtained in (2) And encrypts the security data by a predetermined method, and outputs the encrypted information.
- the encryption information is selected by the switching unit 210, and the selected communication report is output to the transmission modulation unit 709.
- the propagation control section 701 uses the propagation information obtained in (2) and the propagation characteristic information to transmit the propagation key corresponding to the encryption key (second key) to the communication partner terminal. While controlling the modulator 704 and the transmitter 705 so as to be in a state, an encrypted signal is emitted from the antenna 201 as an RF signal.
- reception demodulation section 708 demodulates the received signal into demodulated information. Using the demodulation information and the first key obtained in (1), the decryption unit 207 decrypts the encryption by a predetermined method and outputs a security message. (4) Terminal: encryption transmission
- the terminal performs encryption using the first key as in (3) and outputs an encrypted message.
- the transmission modulation section 709 uses the propagation information obtained in (1) and (3) and the propagation characteristic information corresponding to the encryption key selected in (1) to perform encryption on the base station as the communication partner.
- An encrypted signal is radiated as an RF signal from the antenna 201 while controlling the modulator 704 and the transmitter 705 so as to be in a propagation state corresponding to the key (first key).
- the base station uses the second key obtained in (2) in a manner similar to (3), decrypts the encryption by a predetermined method, and outputs a security message.
- the encryption keys (first key and second key) generated by the base station and the terminal can be used as shared keys. That is, it can be seen that the encryption and decryption in (3) and (4) are processed without any problem.
- the propagation control unit 701 is generated by the encoding unit 703.
- the communication environment is controlled when the reference signal is transmitted by controlling the modulating unit 704 and the transmitting unit 705 so that the same encryption key as the encryption key can be obtained at the communication partner. Therefore, it is possible to reduce an error between a propagation environment when transmitting a reference signal and a propagation environment when transmitting a reference signal to a communication partner, and reduce an error when generating a common encryption key.
- the communication device and the communication device according to the third embodiment are examples of the communication device and the communication device according to the third embodiment.
- the propagation to the communication partner terminal is performed. Since the state is controlled to be the propagation characteristic information, the error between the propagation state at the time of reception and the assumed propagation state (corresponding to the encryption key) is reduced, and the communication quality is greatly improved. Has advantageous features.
- the transmitting side explicitly controls the propagation state to eliminate ambiguity. Can be done.
- the first reference signal and the second reference signal are transmitted. However, even if either of them is performed first, it is clear that it does not affect the scheme. Naturally, the procedure for cryptographic communication is the same, and the order does not affect this method.
- an encryption key is exchanged by communicating a reference signal.
- the transmission side performs communication while performing propagation control on the reception side, but it is not necessary for the encryption key to match the propagation state indicated.
- the reference signal is separately communicated in the communication procedure. By inserting the reference signal into the data stream, the steps (1) and (3) or (2) and (4) can be performed. Can be performed at the same time.
- the antenna 901 of the communication terminal includes four antenna elements (AN1 to AN4).
- FIG. 4 The operation in FIG. 4 is basically the same as that described in the second embodiment. is there. Here, only the differences will be described.
- the convolver 403 generates a delay profile using a reference signal for each received signal, and four types of delay profiles are held in the buffer 404.
- each delay profile is set to Dsl to 'Ds4.
- the reception signal and the reception weighting coefficient Wrl to Wr4
- Ds O the delay profile of the received signal R0 given by Of these delay profiles (Ds0 to Ds4)
- Ds0 is input to the encoding unit 105, and the encryption key K0 and the corresponding code m0 are output.
- reception weighting coefficients Wr1 to Wr4 are set to initial values in an initial state or the like.
- Antenna 901 in FIG. 9 is composed of four antenna elements, and reception demodulation section 902 receives the RF signal from each antenna element, outputs reception weighting coefficients corresponding to each reception signal and reception sequence, and performs propagation estimation section 103. Receives the reception weighting coefficient and each received signal, performs propagation estimation and outputs propagation information, the encoding unit 105 extracts features from the propagation information and outputs the corresponding code of the encryption key, and the propagation control unit 909 Propagation information, a code corresponding to the encryption key, and a reception weighting coefficient are input, and a transmission weighting coefficient is output. The transmission modulation section 910 generates a transmission signal for each antenna from the communication information and the transmission weighting coefficient. Output.
- the propagation control unit 909 includes a coefficient calculation unit 903, a codebook 905, and a buffer 904.
- the coefficient calculation unit 903 inputs the corresponding code of the propagation information and the encryption key, the reception weighting coefficient, and the quantization vector, and outputs the transmission weighting coefficient corresponding to the antenna element of the transmission signal.
- a note 904 holds a transmission weighting coefficient
- a codebook 905 stores a corresponding code and a quantization vector.
- Transmission modulation section 910 Is composed of a modulation section 906, a weighting section 907, and a transmission section 908.
- Modulation section 906 receives communication information, modulates the signal by a predetermined modulation method, and outputs a modulated signal.
- Weighting section 907 multiplies the modulated signal by a weighting coefficient corresponding to the antenna element and outputs a weighted modulated signal.
- transmitting section 908 receives the weighted modulated signal corresponding to the antenna element and outputs an RF signal corresponding to each signal to the antenna element.
- receiving apparatus 1000 will be described with reference to FIG.
- the feature extraction unit 1001 inputs propagation information obtained from a received signal and extracts the feature.
- the nozzle 1002 temporarily stores the extracted feature extraction information. Then, the nozzle 1002 outputs the stored feature extraction information as first data.
- the function of each block described in FIG. 9 is almost equivalent to each part described in FIGS. Here, only the differences will be described.
- the antenna 901 is an antenna composed of four antenna elements (AN1 to AN4), and outputs a received RF signal to four systems for each antenna element. Also, the reception weighting coefficients (Wrl to Wr4) for each antenna used for reception are output at the same time.
- Received signals (R 1 to! ⁇ 4) corresponding to AN 1 to AN 4 are input to propagation estimating section 103. As described above, the propagation estimating unit 103 outputs the propagation state (D s1 to D s 4) corresponding to each received signal (R 1 to R 4), and the encoding unit 105 outputs the encryption key K 0 and the corresponding code m 0 Output.
- the coefficient calculation unit 903 searches for the code m0 corresponding to the encryption key K0 in the codebook 905, reads and holds the quantum vector (XqmO) that is the target of the code mO. Using the quantization vector (XqmO) and the input propagation information (DsO to Ds4),
- the transmission weighting coefficients (Wtl to Wt4) given by are obtained and output.
- Buffer 904 holds the transmission weighting factor.
- modulation section 906 that has received the communication information modulates the communication information according to a predetermined modulation scheme and outputs a modulated signal.
- This modulated signal is split into modulated signal systems (S1 to S4) corresponding to the antenna elements (AN1 to AN4) and sent to the weighting section 907.
- the weighting section 907 multiplies the transmission weighting coefficients (Wtl to Wt4) from the buffer 904 by the modulation signals (S1 to S4) corresponding to ANs 1 to 4.
- Transmitting section 908 receives the weighted modulated signals, converts them into RF signals (Srfl to Srf4), and outputs the signals to antenna 901.
- the receiving terminal can control the propagation characteristic represented by X qmO.
- receiving apparatus 1000 receiving the transmission signal transmitted from antenna 901 estimates the propagation state from the received signal in propagation estimation section 103 and outputs the estimated propagation state information to feature extraction section 1001.
- the feature extraction unit 10 ⁇ 1 extracts a feature according to the propagation state from the propagation state information and outputs the extracted feature as the first data.
- the same first data is acquired by the transmitting / receiving device 900 and the receiving device 1000.
- the transmission / reception apparatus 900 adjusts the weight at the time of transmitting communication information based on the propagation environment estimated by the propagation estimating unit 103 so that noise and the like affect the estimation of the propagation environment. Transmission and reception equipment This makes it possible to prevent a situation where the same first data cannot be acquired by the device 900 and the receiving device 100000, and it is possible to eliminate the ambiguity of the first data.
- transmission / reception device 900 assigns weights when transmitting communication information based on the propagation environment estimated by propagation estimating section 103.
- the first data obtained by the receiving device 100 can be intentionally changed, so that the confidential information can be decrypted by using the same first data for a long period of time. And other adverse effects can be prevented. This allows
- the encryption key can be changed, so that high security can be secured.
- Embodiment 4 has been described as controlling the delay profile, the present invention is not limited to this. Propagation estimation is performed using the polarization state (polarization plane, turning direction), phase state, and propagation delay time. You may do it. Also, in Embodiment 4, codebook 905 is the same as the codebook of encoding section 105, and only one of them is required in terms of configuration. Further, in the fourth embodiment, the case where antenna 901 has four antenna elements has been described. However, the present invention is not limited to this, and it goes without saying that the same effect can be obtained if the number is two or more. ,. Further, each code shown by the mathematical formula can be applied whether it is a natural number or a complex number. When each value is a complex number, more sophisticated control can be expected because signal control can be performed with amplitude and phase.
- the communication apparatus can select an arbitrary encryption key by performing propagation control.
- FIG. 11 shows a communication procedure according to the present invention. Note that the communication device according to the fifth embodiment has the same configuration as communication device 700 shown in FIG. 7, and a description thereof will be omitted.
- communication is performed by selecting an encryption key corresponding to the estimated propagation state. Therefore, if the propagation state is constant, the encryption key remains the same for a long time. Therefore, there is a possibility that the estimation of the encryption key becomes easy. Also, Since the same encryption key is used in both communication devices, if one encryption key is determined, the other encryption key may be determined.
- the fifth embodiment differs from the above-described embodiments:! To 3 in that the sender can select the first key and the second key for the same key.
- FIG. 11 shows a communication procedure according to the present invention.
- the steps (0) to (4) are the same as those in FIG.
- the base station selects a third key as an encryption key, and determines a weighting coefficient from the propagation characteristic information corresponding to the encryption key and the communication information estimated last.
- propagation control section 701 (second data selection means) outputs a reference signal for propagation estimation performed by the terminal as a third reference signal while performing propagation control using a weighting coefficient.
- the terminal is waiting for a signal from the base station, and propagation estimating section 203 detects a third reference signal from the received signal, and performs propagation estimation from the received signal and a reference signal that is a known signal.
- Propagation information which is this estimated value, is sent to encoding section 703 and propagation control section 701.
- Encoding section 703 receives the propagation information from propagation estimating section 203, extracts the characteristic of the propagation state, and outputs the propagation characteristic information to propagation control section 701.
- conversion to an encryption key is performed using the extracted propagation feature information.
- the converted encryption key is held in the buffer 206 and the encryption key information is output.
- the base station uses this encryption key as the third key and the encryption key for the subsequent communication.
- the terminal selects the fourth key as the encryption key as in (5), and determines the weighting coefficient from the propagation characteristic information corresponding to the encryption key and the communication information estimated last.
- a reference signal for propagation estimation performed by the base station is output as a fourth reference signal while performing propagation control using weighting coefficients.
- the base station Upon receiving the signal from the terminal, the base station detects the fourth reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. (Five ) Similarly to the above, propagation estimating section 203 outputs propagation information, and encoding section 703 extracts and outputs propagation characteristic information from the propagation information. Further, the transmission characteristic information is converted into an encryption key, and the encryption key information is held in the buffer unit 206. The terminal uses this encryption key as the fourth key as the encryption key for the subsequent communication.
- the base station encrypts the security data by the predetermined method using the third key selected in (5), and transmits an encrypted signal.
- reception demodulation section 708 demodulates the received signal into demodulated information.
- the decryption unit 207 decrypts the encryption by a predetermined method, and outputs a security message.
- the terminal encrypts the security message using the fourth key selected in (6) and sends an encrypted signal.
- the base station uses the fourth key obtained in (6) in the same way as (7), decrypts the encryption by a predetermined method, and outputs a security message.
- the terminal can calculate by using the signal transmitted by the base station (first reference signal in Fig. 3), and the base station can calculate by using the signal transmitted by the terminal (second reference signal in Fig. 3).
- first reference signal in Fig. 3 the signal transmitted by the base station
- second reference signal in Fig. 3 the signal transmitted by the terminal
- Hu and Hd are the uplink 'downlink propagation functions
- Stb, Sr-b are the transmission / reception signals on the base station side
- St__m, Sr-m are the transmission functions on the terminal side This is a received signal.
- St__b and St-m are known signals (first and second reference signals)
- the propagation functions are
- the base station performs control using the weighting coefficient W3-b so as to obtain the propagation function H3 corresponding to the third key, and transmits this through the third reference signal. That is,
- the base station performs encrypted communication while performing encryption using the third key.
- the terminal can obtain the propagation function H3 by receiving the third reference signal and analyzing the propagation state. Therefore, the terminal uses the corresponding encryption key (third key) to decrypt the subsequent encrypted information. I should go. Similarly, the terminal selects the fourth key (the corresponding transfer function is H4), and controls the fourth key while controlling it with the weighting coefficient W4-m.
- the terminal performs the encryption communication while performing encryption using the fourth key.
- the base station can decrypt using the fourth key.
- the propagation control unit 701 allows the propagation environment to change when transmitting the reference signal. Since the transmission unit 705 and the modulation unit 704 are controlled, the encryption key can be changed at any time, so there is no possibility that the encryption key can be decrypted by a third party ⁇ 4, providing high security can do.
- the frame configuration described in the first to fifth embodiments is described based on FIG.
- the burst including the reference signal and the burst including the encrypted signal exist separately.
- This method has the advantage that the estimation error on the receiving side can be reduced because the reference signal period can be lengthened.
- the frame structure is a method of inserting a reference signal into a data stream (or burst) for a predetermined period. According to this method, an encryption key can be exchanged simultaneously with the encryption signal, and efficient transmission can be performed.
- FIG. 12 (c) shows the encryption key indicated by the reference signal and the encryption key used by the encryption signal. Is shown.
- the encryption key is changed by temporally (or frequency) changing the encryption key indicated by the reference signal and the corresponding data signal according to a predetermined method.
- the corresponding encrypted signal can be transmitted and received independently, which has the advantage of reducing the risk of leakage to both parties.
- the propagation control performs communication for exchanging the encryption key as described in the other embodiments.
- the receiving side can receive the reference signal in a good propagation state, and can perform stable encryption key exchange.
- (2a) in Fig. 13 when performing overnight communication (encrypted signal), the encryption key has already reached the receiving side, and there is no need to use propagation information for receiving and decrypting.
- the reference signal does not need to be a known signal.
- the change in propagation is estimated while demodulating, and the encryption key is determined. By doing so, the information for determining the encryption key increases, and the encryption key can be detected stably.
- the reference signal can be a pilot signal used for QAM modulation or the like, or a synchronization signal sequence for burst synchronization performed by TDMA or the like. It has the advantage that communication with high security can be provided without any change.
- the propagation control method at the time of data communication is assumed to be beamforming / precoding (equalization on the transmission side), transmission diversity, or the like, but MIM (multi-input mu-ti-out put) ) And spatial multiplexing control (Sace Division Mu 1 tip 1 exing).
- the MIMO multiplexing technology and the spatial multiplexing technology are technologies for expanding the channel capacity by actively using the propagation characteristics, and the technology described in the present invention is also a technology that actively uses the propagation characteristics. And good consistency.
- the propagation control is performed for MIM 0 (Or for spatial multiplexing control), MIMO and spatial multiplexing can be performed continuously. By doing so, it is possible to increase the confidentiality of important information and improve the channel capacity for data communication without adding a special technology configuration.
- the communication partner acquires the encryption key (first data) based on the propagation environment.
- the transmission environment changes between the signal to be transmitted and the other signal in order to transmit the signal, so that the signal other than the signal to be transmitted to obtain the encryption key by the communication partner is optimally controlled according to the communication environment. It can be transmitted in a system.
- a description has been given assuming a known signal as a reference signal in the description. However, the reference signal need not be a known signal. In this case, the change in propagation is estimated while demodulating, and the encryption key is determined.
- the reference signal can be a pilot signal used for QAM modulation or the like, or a synchronization signal sequence for burst synchronization performed in TDMA or the like.According to such a configuration, the conventional configuration is hardly changed. It has the advantage that it can provide communications with high security.
- FIG. 14 shows a part of the receiving device in the communication device according to the seventh embodiment
- FIG. 15 shows the communication device according to the seventh embodiment of the present invention. It shows a part of a transmission device in such a communication device. Note that the same components as those of the communication device according to Embodiment 1 are denoted by the same reference numerals, and description thereof will be omitted.
- An example of the multiple access method is CDMA.
- Reception demodulation section 150 outputs a reception signal that has received the RF signal and demodulation information that has been demodulated.
- Reception demodulation section 150 is reception section 1401, despreading section 1402, propagation estimation It consists of a unit 1405 and a demodulation unit 1403.
- FIG. 14 shows a part of a receiving apparatus according to the present invention.
- the receiver 1401 inputs the RF signal and propagation information, controls the RF signal to an appropriate reception state, outputs the received signal, and the despreader 1442 responds to the received signal and the channel.
- the demodulation unit 1443 performs appropriate demodulation from the received signal and the propagation information and outputs demodulation information, and the decoding unit 1444 outputs a despread signal.
- the encryption key information and the demodulation information are input, the encryption of the demodulation information is decrypted from the encryption key information, and the security data is output.
- the propagation estimating unit 1445 estimates the propagation of each channel and performs
- the demodulation unit 1443 performs appropriate demodulation from the received signal and the propagation information and outputs demodulation information, and the comparison unit 1446 compares the propagation information for each channel.
- the comparison result (first day) is output, and the encryption key generation unit 1407 inputs the propagation information and inputs the encryption key information. (1st day).
- FIG. 15 shows a part of the transmitting apparatus provided for the present invention.
- the data supply units 1501, 1502 hold the data for each channel, and the modulation and spread units 1503, 1504 modulate the data for each channel, and spread them corresponding to the channels.
- the spread signal is output by the code
- the spread signal is output
- the weighting section 1505 multiplies the transmission signal by the transmission weighting coefficient
- the transmission section 1506 converts the modulated signal into an RF signal to be transmitted and outputs the converted signal.
- the antenna 1507 transmits the transmission signal
- the data supply unit 15008 stores the first data
- the reference propagation buffer 1509 holds the reference information of the propagation state
- the propagation control unit 1510 receives the encryption key, the second data, and the propagation information and calculates a transmission weighting coefficient. Next, the operation of transmitting apparatus 150 will be described.
- the transmitting device 1500 extracts data for a plurality of channels from the data supply units 1501, 1502, modulates each of the data, and uses each channel using a preset spreading code. To generate a spread signal.
- the data supply unit 1508 outputs the first data
- Propagation control section 1510 that has input the information is based on information from reference propagation buffer 1509 in which propagation information estimated in advance is stored, and controls propagation state control corresponding to the first data. Is performed by using a transmission weighting coefficient.
- the transmission weighting coefficient is weighted by the weighting section 1505 and transmitted through the transmission section 1506.
- the control of the propagation control unit 15010 is the same as that of the propagation control unit 701 shown in FIG.
- the state matches the state where the reference signal described in the fourth embodiment is output.
- the spreading code is set for each channel, but since there is no correlation between the codes, it has the same meaning as being processed independently in signal processing. That is, if the number of channels is M and the number of antennas is N, the propagation control unit 1510 can perform propagation control for each channel by using M ⁇ N or more transmission weighting coefficients.
- propagation control according to the encryption key can be performed as in the fifth embodiment.
- the receiving device can determine the encryption key based on the relationship between the channel number and the reception power.
- the propagation parameter eg, delay profile
- the encryption key information is used for the delay profile
- the first data is used for the relationship between the channel and the received power (or vice versa). No problem, it is possible to use only the encryption key information or only the second day), indicating that more secure information can be transmitted.
- the receiver can perform propagation estimation using the reference signal at the same time as the first day and the second day, so that extremely efficient transmission is possible. Has features. Next, the operation of the receiving device will be described.
- the method of exchanging encryption key information using propagation parameters can be performed in the same manner as described above except for despreading processing.
- delay profile delay profile, etc.
- the RF signal input from antenna 101 is received by receiving section 1441, and a received signal is output.
- the received signal is subjected to convolution with a spreading code preset for each channel in the despreading section 1442, and the despread signal is output for the number of channels.
- These despread signals are input to propagation estimating section 144, and the propagation state is estimated. Here, among the propagation states, the received power is used.
- the received power for each channel is output from propagation estimating section 1405
- the received power is compared by comparing section 144, and the result is compared with the encryption key information (or the first data). ).
- the decryption unit 1444 decrypts the subsequent demodulation information to obtain security data.
- the comparing unit 1446 performs the signal multiplexing on the received signal for each channel. Since the comparison result of the propagation parameters such as the received power can be transmitted as information, the amount of information when transmitting a multiplexed signal can be increased. Further, according to the communication apparatus and the communication system of the seventh embodiment, when multiplexing a plurality of channels, it is possible to control the reception power at the receiving end by controlling the propagation for each channel, For example, it is possible to control which channel has the maximum power in accordance with the state of the encryption key, and the receiving device can determine the encryption key based on the relationship between the channel number and the reception power.
- the security of several channels can be maintained overnight. Further, according to the communication device and the communication system of the present embodiment 2, while the encryption key information is included in the propagation protocol such as the delay profile in the first data, the channel and the reception are not included. Since it is possible to make the second data of the information different from the first data using the relationship with the transmission power, it is possible to transmit more secure information.
- a CDMA is used as an example, but it goes without saying that a similar effect can be obtained with OFDM.
- the channel in the above description can be used as a subcarrier, and the despreading processing in FIG. 14 can be replaced by Fourier transform processing, and the spreading processing in FIG. 15 can be replaced by inverse Fourier transform processing.
- FIG. 16 is a diagram showing a configuration of a part of the communication device according to the eighth embodiment.
- the configuration of the entire communication device is the same as that of FIG. 1, and a description thereof will be omitted.
- Embodiment 8 describes a method using received arrival direction information as propagation information.
- FIG. 16 is a detailed block diagram of the propagation estimator 203 shown in FIG. 7 showing the configuration for estimating the direction of arrival.
- the propagation estimator 203 is composed of a buffer 161, a correlation matrix calculator 162, a matrix calculator 163, an angle spectrum calculator 164, and a buffer 165. It is configured.
- the correlation buffer 1601 temporarily holds the input signal
- the correlation matrix calculator 1602 finds the correlation matrix of the input signal
- the matrix calculator 1603 inputs the calculated correlation matrix.
- the eigenvector obtained by the matrix operation (here, the eigenvector) is output
- the angle spectrum calculation unit 1604 inputs the eigenvector and performs the angle spectrum calculation to output the arrival direction estimation information.
- 1605 temporarily holds the operation result.
- the above configuration uses the MU SIC method known as the DOA estimation method.
- the Fourier method and the CAME method are known, which are classified according to the operation contents of the matrix operation unit 1603.
- Received signals input from a plurality of antenna elements are held in a noise amplifier 1601.
- the held received signal is subjected to the correlation A matrix is obtained, and then the eigenvector is calculated in the matrix operation unit 1603.
- the angle spectrum operation unit 1604 calculates received signal arrival pattern information from the eigenvector and outputs it.
- the received signal arrival information obtained in this manner is held in the buffer 165.
- An example of the arrival direction information of the received signal obtained in this way is shown in FIG. Figure 17 shows the estimation results when there are two signal arrival directions.
- the base station transmits a first reference signal for propagation estimation of the terminal.
- beam steering is performed by a plurality of antenna elements, and transmission is performed while changing the radiation pattern.
- the propagation estimator 203 estimates the direction of arrival, and compares the radiation direction controlled by the base station with the received signal arrival pattern information at the terminal. The evening is stored on the reference table.
- the terminal selects the encryption key (first key) and outputs the corresponding incoming direction information from the codebook.
- This arrival direction information is detected as the one most similar to the radiation pattern stored in the reference table, and the arrival pattern information corresponding to this is set as the radiation pattern at the time of output.
- a second reference signal for propagation estimation of the base station is transmitted while controlling so as to be the set radiation pattern.
- the propagation estimator 203 estimates the direction of arrival and outputs a received arrival pattern.
- the encoding unit 703 selects an encryption key (second key) from the received arrival pattern and the codebook, and outputs the selected encryption key to the decryption unit 207 via the buffer 206.
- the base station sets the radiation pattern based on the received arrival pattern obtained in (2) so that the reception state of the terminal becomes good.
- the security key is encrypted using the second key, and the encrypted signal is transmitted while controlling to the set radiation pattern.
- the terminal demodulates the RF signal by the reception demodulation unit 708, decrypts the RF signal by the decryption unit 207 using the first key, and outputs the security data.
- the terminal sets a radiation pattern based on the received arrival pattern obtained in (1) so that the reception state of the base station becomes good.
- an encrypted signal is transmitted while controlling the radiation pattern to the set radiation pattern while encrypting the security key with the first key.
- the base station demodulates the RF signal by the reception demodulation unit 708, decrypts the RF signal by the decryption unit 207 using the second key, and outputs security data.
- the angle spectrum calculating unit 1604 further includes the arrival direction estimation result of the received signal. Is used as an estimated value of the propagation environment, so that the arrival of the signal arriving at the third party changes greatly, so that a very high security can be secured.
- encryption key information is created using patterns, the invention is not limited to this.
- Combination with a method that uses a delay profile as propagation information has the advantage that higher security can be expected.
- the communication procedure is not limited to the one described here, which is the same as that described in the other embodiments.
- FIG. 18 is a diagram showing a configuration of a transmission / reception device 1800 which is a communication device according to the ninth embodiment. Note that in FIG. 18, portions having the same configuration as in FIG. 2 are denoted by the same reference numerals, and description thereof will be omitted.
- the antenna section 1 8 1 2 is composed of a vertically polarized antenna 1 8 0 1 and a horizontally polarized antenna 1 8
- the propagation estimating section 203 is composed of a phase difference detecting section 1803 and an electric field strength detecting section.
- the polarization control section 1813 consists of a coefficient calculation section 1806, a codebook 1807 and a buffer section 1808, and is composed of 1804 and a polarization estimation section 1805.
- Modulating section 2 52 includes a modulating section 1809, a weighting section 1810, and a transmitting section 1811.
- the vertical polarization antenna 1801 receives the vertical polarization component
- the horizontal polarization antenna 1802 receives the horizontal polarization component
- the phase difference detection section 1803 detects the position from the two polarization reception signals.
- the phase difference is detected, and the electric field strength detecting section 1804 detects the respective electric field strengths from the vertical polarization reception signal and the horizontal polarization reception signal, and the polarization estimating section 1805 detects the phase difference and the electric field strength.
- the polarization state is estimated from this.
- the coefficient calculation unit 1806 receives the propagation information and the polarization code indicated in the codebook, and performs phase difference control between the vertically polarized transmission signal and the horizontally polarized transmission signal and electric field strength control to perform polarization of the transmitted signal. Calculates the coefficient for performing wave control, the code book 1807 stores the relationship between the coefficient and the polarization code, and the buffer section 1808 converts the data input from the coefficient calculation section 1806. It is temporarily stored and output to the weighting unit 1810.
- Modulating section 18009 receives communication information, modulates the signal with a predetermined modulation method, and outputs a modulated signal.
- Weighting section 1810 multiplies the modulated signal by a weighting coefficient corresponding to the antenna element, and outputs a weighted modulated signal.
- the transmitting section 1811 receives a weighted modulation signal corresponding to the antenna element, and outputs an RF signal corresponding to each signal to the antenna element.
- the vertically polarized antenna 1801 and the horizontally polarized antenna 1802 The wave component is selectively received, and the RF signal is transmitted to the reception demodulation unit 250.
- Reception demodulation section 250 outputs received signals corresponding to each polarization, and these received signals are input to propagation estimating section 203.
- the propagation estimating unit 203 the received phase difference information and the received electric field intensity information output from the phase difference detecting unit 1803 and the electric field intensity detecting unit 1804 are input to the polarization estimating unit 1805. Then, the polarization information of the received signal is output.
- Fig. 19 shows a specific example of the polarization state.
- E v is the electric field strength of the vertically polarized wave
- E h is the electric field strength of the horizontally polarized wave
- p is the turning direction
- 6> is the major axis angle.
- the polarization information obtained in this way is encoded by the encoding unit 205 into a polarization code, and an encryption key is selected.
- This polarization code is input to the polarization controller 18 13.
- the coefficient calculation unit 1806 searches the codebook 1807 for the polarization state corresponding to the polarization code, and performs transmission weighting coefficients while performing phase control, electric field strength control, etc.
- the transmission weighting factor held in the c- buffer 1808 held in the buffer unit 1808 is calculated by the transmission modulation unit 255 so that the transmission weighting coefficient is equal to the vertical polarization transmission signal and the horizontal transmission polarization signal. Are weighted and output from corresponding antenna elements as RF signals.
- the vertical polarization for example, the vertical polarization, the horizontal polarization, the angle of the long axis, the phase between the polarizations, the turning direction, and the like can be used as the encryption key.
- the polarization In the propagation state, the polarization is separated only by the antenna. It should be noted that the contents of the quantization vector of the codebook 1807 store the one corresponding to the polarization state (polarization plane, turning direction, etc.). The communication procedure is almost the same as that shown in the other embodiments. The detection of the delay profile or the control of the propagation control replaces the polarization information and the polarization control, respectively.
- the polarization estimating unit 1805 determines the polarization state based on the electric field strength and the phase difference. Is used as the estimated value of the propagation environment, so that the polarization depends only on the antenna. Because of the feature of being separated, even if other receivers intercept radio waves, it means that the antenna must be compatible, and high security can be expected.
- the propagation state can be used together with the delay profile, the received power, the arrival direction pattern, and the like.
- a method of controlling the communication state of the receiving terminal and superimposing information on the control state is used, so that interception by a third party is impossible in principle. Will be described.
- Embodiment 5 shows that the propagation state on the receiving side can be arbitrarily controlled, but by using this method, physically confidential communication becomes possible. This will be described briefly.
- the propagation state can be controlled by the weighting coefficient of the transmission signal. This is synonymous with transmitting an arbitrary reception state to the receiving side, which means that communication can be performed through the propagation parameters.
- the propagation path that is, the location of the communication partner is specified, and it can be applied to the identification and authentication of the communication partner.
- the propagation control is optimally controlled for communication (for example, multipath components are removed or the received power is maximized). Control can be expected to improve communication quality. Furthermore, at the time of reception, the received signal is optimally controlled using the reception weighting coefficient (similar to the above), so that the communication quality can be similarly improved.
- FIG. 20 is a diagram showing a configuration of a receiving apparatus 2000 that is a communication apparatus according to Embodiment 10. Parts having the same configuration as in FIG. 1 are denoted by the same reference numerals, and description thereof will be omitted.
- Propagation estimating section 103 estimates propagation characteristics from the received signal input from receiving section 102, and outputs the estimated propagation information as data.
- the propagation information output from the propagation estimator 103 is information on whether or not to discard the data output from the demodulator 104.
- the receiving apparatus can be realized with a configuration as shown in FIG. 20 and a transmitting unit is not necessarily required. With such a configuration, it is possible to use the propagation information as highly confidential information as the first data. In this case, the transmission device may superimpose an important signal on the first data, and it is possible to use the first data to identify the terminal that transmitted the communication signal.
- the propagation estimating unit 103 uses the propagation estimation information as data.
- the amount of information to be transmitted can be increased, transmission efficiency can be improved, and highly confidential information can be transmitted as propagation information, so that reliable security can be ensured.
- information that is not highly confidential can be transmitted by the conventional communication method, so that a versatile communication device can be provided. it can
- FIG. 21 is a diagram showing a configuration of a receiving apparatus 2100 which is a communication apparatus according to Embodiment 11 of the present invention. Parts having the same configuration as in FIG. 1 are denoted by the same reference numerals, and description thereof will be omitted.
- Encoding section 105 encodes the propagation estimation information input from propagation estimating section 103 and outputs it as first data.
- a technique for encoding the estimated propagation information it is possible to encode it using a vector quantization method or the like and to output it as transmission information.
- it has the feature that simple and stable code output is possible.
- the encoding unit 105 encodes the propagation information and extracts it as data, so that the communication quality is improved. Can be improved.
- FIG. 22 is a diagram illustrating a configuration of a receiving device 220 that is a communication device according to Embodiment 12.
- a receiving device 220 that is a communication device according to Embodiment 12.
- portions having the same configuration as in FIG. 1 are denoted by the same reference numerals, and description thereof will be omitted.
- Receiveding section 2221 performs convolution integration of the received signal and a spreading code corresponding to the channel, and outputs a despread signal.
- the comparing section 222 encodes the propagation information for each channel, compares the encoded propagation information of each channel, and outputs the comparison result as the first data.
- the comparing unit 2202 compares data of a plurality of channels, and performs the comparison. Since the first data is extracted from the result, it has the advantage of increasing confidentiality and transmitting more data.
- Embodiment 12 data is extracted using CDM signals by providing a despreading unit.
- the present invention is not limited to this, and a signal subjected to orthogonal frequency division multiplex processing is received. By comparing signals arranged in each subcarrier, data may be extracted.
- the communication apparatus according to Embodiment 12 is also applicable to a case where communication is performed using a space-time division multiplexing (MIMO) signal or the like.
- MIMO space-time division multiplexing
- FIG. 23 is a diagram illustrating a receiving device 230
- FIG. 24 is a diagram illustrating a transmitting / receiving device 240. Parts having the same configuration as the receiving apparatus 100 of FIG. 1 and the transmitting / receiving apparatus 200 of FIG. 2 are denoted by the same reference numerals, and description thereof will be omitted.
- the receiving device 230 will be described.
- the reception demodulation unit 150 receives the received RF signal, and outputs the estimated propagation information and the demodulated signal.
- the encoding unit 105 receives the propagation information, extracts its characteristics, outputs its propagation characteristic code (first data), and the decoding unit 107 decodes the code indicating the characteristic of the propagation information and the demodulated signal. Input, and use the input / output parameters corresponding to the propagation feature code to perform the inverse transformation of the order (din / leave), add null information (debankchar), decode (decode), and perform security decoding. (2nd data), the demodulated signal is input, and the inverse transform of the data sequence is performed based on the inverse pattern corresponding to the propagation characteristic code.
- a depuncture section 2303 that inputs a signal and adds neutral information to the signal at the location removed based on the puncture pattern corresponding to the propagation feature code (to determine the code for the subsequent decoder). And input the depuncture signal The transportable characteristic code And a decoder 2303 for decoding corresponding to the corresponding convolutional code.
- Receiving demodulation section 250 receives the received RF signal and outputs propagation information for estimating the propagation state and demodulated demodulation information.
- Decoding section 207 receives a code indicating the characteristic of the propagation information and a demodulated signal, performs inverse transform of the order (din / leave) using an interleave pattern corresponding to the propagation characteristic code, and outputs null information. Add (depuncture), decode (decode), output the data, input the demodulated signal, and reverse the data order based on the in-leave pattern corresponding to the propagation characteristic code.
- the encoding unit 205 receives the propagation information, extracts the feature, outputs the propagation feature code (first data), and the propagation control unit 2404 converts the propagation state into the input propagation feature code.
- the output unit outputs a transmission weighting coefficient for controlling the values to be close to each other, and the encoding unit 205 inputs the data, performs encoding (encoding), removes information (puncture), and performs order conversion (in-order encoding).
- Encoder 240 that outputs encoded data and outputs data and outputs a convolutional code; and a puncture unit 240 that inputs a convolutional code and outputs a puncture code in which a part of the code is removed. 6; and an in-leaver 247 that rearranges the order of puncture codes in a predetermined order and outputs encoded information.
- the transmission modulator 2410 receives the coded information, modulates and controls the propagation, and outputs an RF signal to be transmitted.
- the modulator that receives the coded information, performs predetermined modulation, and outputs a modulated signal 2 1 1, a transmission wait section 2408 that inputs a modulation signal and multiplies by a weighting coefficient to control propagation, and a transmission section 2 1 2 that inputs a transmission wait signal and outputs an RF signal to be transmitted Become.
- transmitting / receiving apparatus 240 is the base station and the terminal in FIG.
- the terminal is not limited to the configuration of transmitting / receiving device 240, but may have the configuration of receiving device 230.
- an in-leave pattern, a puncture pattern, and an encoding pattern corresponding to the propagation state are prepared in advance, and this information is shared by the base station and the terminal.
- the terminal estimates the propagation state based on the reference signal transmitted by the base station, and sets various patterns based on this.
- the base station estimates the propagation state based on the reference signal transmitted from the terminal and sets various patterns.
- the same interleaving pattern, puncture pattern, and encoding pattern as those of the base station and the terminal are selected as described above.
- a signal from the base station is received, and the reception and demodulation section 250 receives the signal, performs propagation estimation and demodulation, and outputs propagation information and a demodulated signal.
- the decoding unit 207 an in-leave pattern, a puncture pattern, and an encoding pattern are selected based on the input propagation feature code.
- the decoding unit 207 inputs the propagation characteristic code and the demodulated signal, and the dinosaur liver 2401 performs an inverse order transform (din leaving) corresponding to the inverse of the corresponding inleave pattern, Din Yu Outputs a leave signal.
- the dingle leave signal is input to the depuncturing section 2402 and a depuncturing signal in which a null signal (a neutral value for judgment in the latter stage of decoding) is inserted (depuncturing) at a position corresponding to the puncturing pattern. Is output.
- the depuncture signal is input to the decoder section 2403, and is decoded (decoded) based on the encode pattern, and the data is output.
- various coding patterns are shared between the transmitting side and the receiving side, and thus it can be seen that the terminal transmits normally the data transmitted by the base station.
- the base station outputs a reference signal for propagation estimation performed by the terminal as a first reference signal.
- the terminal is waiting for a signal from the base station, and the propagation estimating section 203 detects the first reference signal from the received signal and performs propagation estimation from the received signal and the known reference signal.
- the encoding unit 205 receives the propagation information from the propagation estimating unit 203, extracts a feature of the propagation state, and outputs a propagation feature code.
- Dinning Lever 241, Depuncturing section 2402, and Decoder section 2403 have a table of propagation feature codes, a table of in-leave patterns, a table of puncturing patterns, and a table of encoding patterns, respectively. Select the corresponding various patterns (encoding patterns) from the input propagation feature codes.
- the terminal outputs a reference signal for propagation estimation performed by the base station as the second reference signal in the same manner as (1).
- the base station When the base station receives the signal from the terminal, it detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. Similarly to (1), the propagation information output from the propagation estimator 203 is converted into a propagation feature code by the encoder 205, and the encoding corresponding to the propagation feature code is performed by the decoder 205. The pattern is selected. (3) Base station: coded signal transmission
- the encoding unit 2409 outputs encoded information obtained by encoding, puncturing, and in-leave data using the encoding parameters obtained in (2).
- the coded information is output to the transmission modulation section 2410, and the RF signal is output as an encoded signal through the modulation section 211, the transmission weight section 2408, and the transmission section 212.
- reception demodulation section 25 demodulates the RF signal into a demodulated signal through reception section 202 and demodulation section 204.
- the decoding unit 207 uses the demodulated signal and the encoding parameter obtained in (1), the decoding unit 207 performs decoding in the order of dinning leave, depuncturing, and decoding, and outputs the data.
- the encoding unit 2409 outputs the encoded information that has been encoded, punctured, and in-leaved using the encoded parameters obtained in (1).
- the encoded information is output to the transmission modulation section 2410, and the RF information is output as an encoded signal through the modulation section 211, the transmission weight section 2408, and the transmission section 212.
- reception demodulation section 250 demodulates the F signal into a demodulated signal through reception section 202 and demodulation section 204: Using the demodulated signal and the encoding parameters obtained in (2), the decoding section 207 performs decoding in the order of dinreave, depuncture, and decode, and outputs the data. It can be seen that communication can be performed overnight by performing communication as described above.
- the encoding unit 205 further includes an interleave pattern and an interference pattern based on the estimated value of the propagation environment. Since control information such as a puncture pattern is obtained by coding, and data is decoded using the obtained control information, it is possible to perform optimum coding (decoding) according to the propagation state, thereby improving communication quality. Can be expected. Further, according to the communication device and the communication system of the thirteenth embodiment, the encoding parameters are Four
- Embodiment 13 of the present invention the description has been made assuming that communication is performed by changing the encoding parameters according to the propagation state and that propagation control is performed at the time of transmission. As shown in the other embodiments, this is not essential, and any method such as transmission without performing propagation control can be adopted. Although it has been described that a convolutional code is used as the method, the present invention is not limited to this, and an arbitrary coding method such as a block code can be adopted. Further, in Embodiment 13, as the code parameters, the encoding pattern, the puncture pattern, the in-leave pattern, and the like are changed according to the propagation state. However, the present invention is not limited to this.
- Nongchapa is one of the important parameters that greatly affect the data capacity and error rate. One, and changing this pattern is often the most effective.
- the steps (1) and (2) or the steps (3) and (4) in FIG. it is apparent that the steps (1) and (2) or the steps (3) and (4) in FIG. .
- the transmission and reception of the encoding signal are performed after the transmission and reception of the reference signal.
- the reference signal and the encoded signal are arranged in the same format, and the decoding (or encoding) is performed after selecting the encoding parameter. ) May be performed.
- the method of changing the optimal coding time according to the propagation time and the time delay was shown.
- the modulation method itself QPSK, 16
- the spreading code length such as QAM
- CDMA Code Division Multiple Access
- FIG. 26 is a diagram illustrating the configuration of the receiving apparatus 260
- FIG. 27 is a diagram illustrating the configuration of the propagation estimating unit 103. 1 and 4 are denoted by the same reference numerals, and description thereof is omitted.
- the receiving device 260 will be described.
- the receiving section 102, the propagation estimating section 103, the equalizing section 2602, and the demodulating section 2603 constitute a receiving / demodulating section 2604.
- the equalization unit 2602 and the demodulation unit 2603 constitute an equalization demodulation unit 2605.
- the encoding unit 2601 extracts features from the input propagation information and outputs a propagation feature code (first data).
- Equalization section 2602 receives estimated propagation information and a propagation characteristic code indicating the characteristic, and outputs an equalized signal obtained by removing unnecessary components from the received signal.
- the demodulation unit 2603 receives the equalized signal and outputs demodulated information (second data) as a result of demodulating it.
- the autocorrelation unit 270 01 inputs the reference signal sequence and outputs the autocorrelation function of the sequence, and the component removal unit 270 02 inputs the primary delay profile and the autocorrelation function, and the primary delay profile A second-order delay profile is output from which the autocorrelation function component has been removed. This is the average of the estimation results for a certain period.
- Input The propagation state of the received signal whose RF signal has been output by the receiving unit 102 is estimated by the propagation estimating unit 103. This information is input to receiving section 102, equalizing and demodulating section 2605, and encoding section 2601.
- the encoding unit 2601 extracts features from the input propagation information, outputs a propagation feature code, and inputs the result to the equalization demodulation unit 2605.
- Equalization section 2602 receives estimated propagation information and a propagation characteristic code indicating the characteristics thereof, and outputs an equalized signal obtained by removing unnecessary components from the received signal.
- Demodulation section 2603 similarly demodulates the equalized signal using the appropriate demodulation means from the propagation information and the propagation characteristic code, and outputs the demodulation information.
- a table of type coefficients corresponding to the propagation characteristic code is prepared in the equalizer 2602 for removing unnecessary components (for example, multipath components) from the received signal, and taps corresponding to the codes are prepared.
- the input received signal is temporarily held, and the convolver 403 calculates a correlation value between the received signal and the reference signal sequence, and outputs a first-order delay profile.
- the reference signal sequence an autocorrelation function is calculated by the autocorrelation unit 2701, and this is output.
- the calculation of the delay profile is
- D s is the estimated delay profile
- S r is the received signal
- R is the reference signal system. Column.
- the received signal is calculated using the transmitted signal St and the propagation distortion Pd.
- the transmitted signal St is a reference signal.
- the code is not constant in the autocorrelation function AR (t) at t ⁇ 0, unlike the M-sequence code (Fig. 28 (b)).
- Such an autocorrelation function is not an impulse, but affects the delay profile Ds (t) as a frequency characteristic.
- Fig. 29 shows the estimation result when the reference signal is replaced with the Gold code. It can be seen that the waveform is different from Fig. 6 due to the effect of the autocorrelation function.
- the delay profile obtained here it can be seen that since the autocorrelation function of the reference signal sequence is included, it is affected by the characteristics of the reference signal sequence.
- the component removing unit 2702 performs an operation of removing the component of the autocorrelation function (AR (t)) calculated by the autocorrelating unit 2701 from the primary delay profile. Specifically, it is known that the impulse train given by the autocorrelation function can be removed by using the evening coefficient of the IIR filter.
- the equalization unit 2602 performs a security process on the security device. Since demodulation is performed later, high-quality security data can be obtained. Further, according to the communication device and the communication system of Embodiment 14, since component removing section 2702 removes the frequency component of the reference signal, it is highly accurate without being affected by the frequency component of the reference signal. An estimate of the propagation environment can be obtained.
- propagation estimating section 103 shown in FIG. 26 and receiving demodulating section 2604 shown in FIG. 26 can be independently incorporated in a receiving apparatus. It is apparent that the present invention is applicable to the devices shown in other embodiments. In particular, they have the advantage that greater effects can be expected by implementing them together.
- FIG. 30 is a diagram illustrating a configuration of the propagation estimating unit 103 according to the communication device of the fifteenth embodiment.
- the communication device to which the propagation estimating unit 103 is applied has the same configuration as that of FIG.
- the buffer 3001 temporarily stores the delay profile
- the vector quantization unit 3002 compares the stored delay profile with the contents of the codebook 3008, and outputs the most similar code.
- the code conversion unit 3003 receives the vector-quantized code and stores the code corresponding to this code in the codebook 3008.
- the autocorrelation unit 3004 receives the reference signal sequence and outputs its autocorrelation function, and the convolution operation unit 3005 outputs the code from the codebook 3008.
- the codebook 3 ⁇ 08 stores the quantization vector to be referred to when quantizing the vector and the code corresponding to the quantization vector.
- the configuration is as shown in FIG.
- the code block 3008 is composed of a quantization vector storage section 303 and a corresponding code storage section 3007, and these configurations are the same as those of the other embodiments.
- the received signal is temporarily stored in the buffer 401, and the received signal sequence and the reference signal sequence output from the reference signal sequence storage unit 402 are input to the convolver 403.
- the convolver 403 obtains a delay profile by performing a sliding correlation operation between the reference signal sequence and the received signal sequence. These delay profiles are temporarily stored in the buffer 401 and sent to the vector quantization unit 3002.
- autocorrelation is calculated by self-correlation section 304, and the value is sent to convolution calculation section 3005.
- the vector quantization unit 3002 calculates the amount of metrics between the input delay profile and each vector of the quantization vector storage unit 303 in the codebook 310, and calculates the value.
- a metric calculation is performed using a vector in which the auto-correlation number is convolved by the auto-correlation unit 3004.
- the vector quantization unit 3002 outputs the vector code thus selected.
- the code conversion unit 3003 selects the vector code output from the vector quantization unit 3002 and the corresponding code from the code storage unit 3007 in the codebook 3008, and performs propagation estimation. Output information.
- the convolution operation unit 3005 performs quantization at the time of vector quantization. Since the autocorrelation function is convolved with the vector, high-precision impulse response characteristics can be obtained. Further, the communication device and the communication system of the fifteenth embodiment According to this, there is an effect that the propagation estimation information is obtained with high accuracy.
- the autocorrelation number is added to the quantization vector by adding the component of the autocorrelation function. It has a great feature that it can be used.
- FIG. 31 is a diagram showing a configuration of a receiving apparatus 3100 according to Embodiment 16 of the present invention.
- FIG. 32 is a diagram showing a propagation estimating section 103, a transforming section 3101, and an encoding section 1.
- FIG. 5 is a diagram showing a configuration of 05. The same components as those in FIG. 1 are denoted by the same reference numerals, and description thereof will be omitted.
- the transform unit 3101 performs Fourier transform on the delay profile, and selects and outputs main coefficients from the Fourier-transformed coefficients.
- FIG. 32 shows a method for enabling efficient coding by adding Fourier transform means.
- the receiver 320 temporarily holds the input received signal for a certain length.
- the reference signal sequence storage section 3202 stores a predetermined reference signal sequence and sequentially outputs the reference signal sequences.
- the convolver 3 203 convolves the temporarily held received signal with the reference signal sequence and outputs a correlation value.
- the sofa 3204 temporarily holds the calculated correlation sequence. Next, the conversion unit 3101 will be described.
- the Fourier transform unit 3205 receives the delay profile and performs an orthogonal transform such as Fourier transform.
- the coefficient extraction unit 3206 receives the Fourier-transformed coefficients and selects only the main coefficients.
- the vector quantization unit 3207 searches the vector closest to the input vector sequence from among the quantum vectors recorded in the codebook 3209 to output a code.
- the code conversion unit 322 selects an encryption key corresponding to the code output from the vector quantization unit 322 from the codebook 322 9 and outputs it.
- the codebook 3209 stores a quantization vector and an encryption key.
- Figure 33 shows the state of the specific delay profile.
- the horizontal axis represents time (sample timing in the figure), and the vertical axis represents signal amplitude.
- the correlation value is calculated from the in-phase component (I component) and the quadrature component (Q component) of the received signal sequence.
- the solid line in the figure shows the correlation coefficient of the I component, and the broken line shows the Q component.
- the I component and the Q component are represented as a real part and an imaginary part of a complex number. Also, it is normalized by the complex signal having the maximum instantaneous amplitude within a certain time.
- Figure 33 shows a block diagram from the time when the reference signal sequence is generated until the delay profile is obtained. As shown in FIG.
- the reference signal sequence generated in reference signal sequence storage section 3301 is first subjected to band-limiting filter 3302 to form the output signal waveform. Done. This signal is radiated into the space by the transmitting section 3303. The radiated electromagnetic wave reaches the receiving device 100 through the propagation space 334 formed by various reflections and diffractions.
- the received signal sequence received by the receiving section 3305 is band-limited by the band-limiting filter 330 to perform channel selection and noise component removal. Is done.
- correlation section 3308 obtains a correlation with the reference signal sequence output from reference signal sequence storage section 3307, and extracts the reference signal sequence output from transmitting apparatus 200. The above will be described using mathematical expressions. Since the received signal Sr (t) given by (Equation 17) has been subjected to the band limiting filter 3306 (Fr (t)),
- the delay profile can be obtained by convolving the correlation sequence with the reference signal sequence Rs (t).
- F (t) is an impulse response indicated by a combined characteristic of the band-limited filter 3302 and the band-limited filter 3306, and this filter characteristic is called a band-limited filter.
- ARs (t) indicates the self-association function of the reference signal sequence Rs (t).
- Equation 27) obtained in this way indicates the characteristic in which the signal obtained by superimposing the propagation characteristic Pd (t) on the autocorrelation function ARs (t) is band-limited by the band-limiting filter. If the autocorrelation function ARs (t) is an impulse characteristic, it is equivalent to a characteristic obtained by applying a band-limited filter to the propagation characteristic Pd (t).
- the propagation characteristic obtained by adding the frequency characteristic given by F (t) is obtained as D s (t).
- F (t) is a band-limiting filter with a frequency of 11/2 fbw to 10 1/2 fbw. 02174
- the propagation characteristic P d—bw (t) band-limited by f bw is obtained.
- the frequency characteristics of the propagation characteristics are mainly in the band of 1 MHz or more, which indicates that it is particularly effective in communication with a symbol rate of 1 MHz or more.
- the frequency characteristic of the propagation characteristics is mainly in the band of 10 kHz or more, so it is effective in communication with a symbol rate of 10 kHz or more.
- FIG. 29 shows the waveform of D s (t) obtained as the propagation characteristic.
- Figure 34 shows a signal sequence obtained by Fourier-transforming this waveform.
- conversion section 3101 performs Fourier transform on the propagation estimation value, and Since only the coefficients are extracted, the propagation environment can be quantified most accurately. Further, according to the communication device and the communication system of Embodiment 16, vector quantizer 3207 performs Fourier transform on the propagation estimation value in transforming unit 3101 and converts only the main coefficients. Since vector quantization is performed after extracting, vector quantization is possible with a very simple configuration. Further, according to the communication apparatus and the communication system of the present embodiment 16, since only the main coefficients are selected and coded by performing Fourier transform, It is possible to efficiently obtain the first data overnight with a small number of propagation parameters. Further, according to the communication apparatus and the communication system of Embodiment 16, the conversion section 3101 is inserted between the propagation estimation section 103 and the encoding section 105, so that It has a very large feature that simplification is possible.
- Embodiment 16 of the present invention Fourier transform is used in transform section 3101.
- the present invention is not limited to this, and may be replaced with DCT (discrete cosine transform), wavelet transform, Hilbert transform, or the like. It is known that the same effect can be obtained.
- DCT discrete cosine transform
- wavelet transform wavelet transform
- Hilbert transform Hilbert transform
- FIG. 35 is a diagram illustrating a configuration of a transmission device 350 according to Embodiment 17 of the present invention
- FIG. 36 is a diagram illustrating a configuration of a reception device 360 of Embodiment 17 of the present invention.
- the transmitting apparatus 3500 performs communication by adding the transmission data to the modulated signal and superimposing it on the signal power at the receiving end.
- the receiving device 3600 detects the superimposed information from the received power of the received signal.
- the transmitting device 350 will be described.
- the modulation section 3501 temporarily holds the first transmission data and outputs channel modulation signals for the number of channels, and the spreading code storage section 3502 stores and outputs the spreading codes for the number of channels.
- the spreading section 3503 convolves the channel code and the spreading code corresponding to the channel to perform frequency spreading, and the propagation control section 3504 receives the first transmission data and calculates the antenna coefficient for each channel.
- the combining unit 3505 multiplies the spread signal by an antenna coefficient to output an antenna signal, and the transmitting unit 3506 frequency-converts and amplifies the weighted signal, and the antenna unit 3507 Emits the corresponding sequence of signals.
- the antenna section 3601 outputs the received RF signal
- the receiving section 3602 receives the received RF signal and performs power amplification and frequency conversion
- the spreading code storage section 3603 spreads the number of channels.
- the code is stored and output
- the despreading unit 3604 corresponds to the channel.
- the demodulation unit 3605 receives the channel signal and demodulates it, outputs a channel demodulated signal, and outputs a channel demodulated signal.
- 6 detects the reception power for each channel and outputs the reception power information
- the receiver 36007 temporarily holds the channel demodulated signal and outputs the second data
- the comparison section 360608 receives the reception power information. And compare the size and output the first data.
- FIG. 37 illustrates a communication method for superimposing information on received power obtained as propagation information.
- the transmitting device has the same configuration as that of FIG. 35 and the receiving device has the same configuration as that of FIG. 36.
- the transmitting device has the same configuration as that of FIG. 35 and the receiving device has the same configuration as that of FIG. 36.
- the sake of convenience only terminals that can transmit and receive both devices will be described. It may be hot.
- the transmitting device and the receiving device After the power is turned on, the transmitting device and the receiving device perform predetermined initial operations and set values of various parameters and the like to predetermined values.
- the receiving device outputs a reference signal for detecting a propagation state.
- the transmitting device calculates a propagation state from the receiving device based on the signal.
- the transmitting device superimposes information on power control at the receiving end and outputs a communication signal.
- the receiving device demodulates the received signal that has received the communication signal, detects the received power of the signal, and detects the information superimposed thereon. The procedure is the same in the following.
- the propagation state from the receiving device is determined by the communication procedure (1) described above. Is calculated.
- the modulator 3501 When the first data and the second data are input, the modulator 3501 temporarily holds the second data and outputs channel modulation signals for three channels.
- the channel modulated signal is sent to spreading section 3503, and is subjected to frequency spreading by convolution with a spreading code provided from spreading code storage section 3502, and a channel spread signal is output.
- the propagation control unit 3504 outputs an antenna coefficient such that the power at the receiving end becomes a predetermined state using the propagation state obtained by the communication procedure (1) and the input first data. I do.
- a method of superimposing information on power a method of superimposing power in each channel in order or a method of superimposing information on a power difference or a power ratio between channels can be considered.
- a method of superimposing information in the order of power is described.
- a code is assigned to each of these six patterns, and the transmitting device and the receiving device share them in advance.
- Propagation control section 3504 obtains an antenna coefficient for the channel modulated signal according to the power information corresponding to the first data.
- FIG. 38 shows the relationship between the antennas provided in the transmitting device and the receiving device, the propagation coefficient determined between the transmitting and receiving antennas, and the signals input and output from each antenna.
- a 1-4 are antennas provided in the transmitting device
- Ar is an antenna provided in the receiving device
- S t 1 to 4 are transmission RF signals
- Srx is a reception RF signal
- h 1 to 4 are propagation coefficients.
- the combining section 3505 shown in the figure corresponds to the combining section 3505 in FIG. 35, and shows the arithmetic relationship between the channel spread signals Sc 1 to Sc 4 and the antenna coefficients C 11 to C 34. . (The transmitter is omitted.)
- the transmitting device adjusts the values of C11 to C34 from the values of h1 to h4 obtained from the reference signal in the communication procedure (1) to adjust the received power in the received signal Srx received by the antenna Ar.
- the channel spread signals Sc 1-3 can be adjusted independently. In particular, when the control is performed only by changing the phases of C11 to C34, the power radiated from each antenna does not change.
- channel A For example, for channel A (Sc 1), C 11 to C 14 are calculated so that the signals radiated from A 1 to 4 have the maximum power in Ar by spatial synthesis, and channel B (S c 2) is the same. Then, C21 to C24 are calculated so that a notch is formed, and antenna coefficients C31 to C34 are calculated for channel C (Sc3) so that the power is intermediate between channels A and C. .
- the combining unit 3505 receives the antenna coefficient and the channel modulation signal and combines the antenna signals for the antennas 1 to 4. The antenna signal is frequency-converted and power-amplified by the transmission section 3506 and then radiated by the antenna section 3507.
- the encrypted signal output in this manner is received by antenna section 3601 of the receiving apparatus, and the received RF signal is transmitted to receiving section 3602.
- the receiver 3602 receives the received RF signal, power-amplifies it, and outputs the received signal after frequency conversion.
- the received signal is input to despreading section 3604, and a convolution operation with the spreading code input from spreading code storage section 3603 is performed. Despreading is performed for the number of channels (3 channels in this case), and the channel signal separated for each channel Is output.
- the demodulation unit 3605 receives the channel signal, demodulates it and outputs the channel demodulated signal, and outputs the channel detection signal for power detection. Temporarily holds the demodulated signal input from, and outputs it as the first data.
- the power detection unit 3606 receives the channel detection signal, estimates the received power for each channel, and outputs channel power information.
- the comparing unit 3608 compares the power values given by the channel power information, converts the result into codes assigned in advance in the order of channel power, and outputs the codes as the first data.
- the first data transmitted by the transmitting device 350 can be used as the first data by the receiving device 360 °, and in particular, the first data transmitted by the transmitting device 350 Since communication is based on the active use of the propagation path formed between the devices 360 °, it has the characteristic that it cannot be received by other receivers. Needless to say, this is an effective communication means.
- FIGS. Figure 39 shows an example of the prior art.
- An example is shown in which the output power of the signals Sc1 to Sc3 is controlled by C1 to C3 and the directivity control is performed by using W1 to W4.
- FIG. 39 and FIG. 38 FIG. 39 multiplies the same weighting factor (C 1 to C 3) for all antennas, while in FIG. The weight coefficient (CI 1 to C 34) is controlled independently.
- the same weighting factor is used for all the antennas as shown in Fig. 39, the radiation characteristic given by the directivity is given the magnitude characteristic.
- FIG. 40 to 42 depict the power distribution of each signal with the position of the cross section of the space as the horizontal axis and the received power at that position as the vertical axis. Yes Indicates the installation location of the receiving terminal.
- FIG. 40 shows the characteristics obtained in FIG. As shown in FIG. 40, all the signal distributions are similar, and the distribution shape shows the characteristic of directivity control given by W1 to W4. For this reason, even if the reception position deviates from the position where the signal is obtained at night, the reception signal power relatively changes. I understand that there is no.
- FIG. 41 shows the signal distribution whose propagation is controlled by FIG.
- the received power of each signal differs depending on the reception position (as a result, the directional characteristics are different).
- the power ratio is the controlled power ratio for the target receiving position (hata), but the received power ratio will be different if the location is different.
- the null point at which the received power becomes 0 can be controlled by the weighting coefficients C11 to C34 in FIG. It is known that this null point can control ⁇ -1 null points, where n is the number of output antennas.
- the transmission signal for example, Sc1
- the other transmission signals for example, Sc1, Sc2
- Control is performed so that some (or all) of the null points are the target receiving positions. In this way, m (m ⁇ 2) or more signals are transmitted from n (n ⁇ 2) antennas with their propagation controlled, and appropriate power is supplied to the receiving antenna for transmission control of the signals.
- transmission control can perform a maximum of n ⁇ 1 null control on the receiving antenna.
- the number of signals to be transmitted may be two or more as long as at least one of the m types of signals is a signal to be transmitted.
- Figure 42 shows the state controlled in this way.
- each signal (S c 2, S c 3) indicated by a dashed line forms a null at the position of ⁇ , and the received power is controlled to be low.
- S c 1) shows that sufficient reception power is obtained.
- the transmitting terminal superimposes information to be transmitted on Sc1, and pseudo information (or unimportant information) on Sc2 and Sc3.
- the received signal at the reception position that is the evening gate is only Scl, so that the receiving terminal can obtain the SC1 information by demodulating the received signal as it is.
- the received signals Become. on the other hand, If you try to receive these signals in other places, it is difficult to separate them because the received signals have Sc 1-3 power. Also, even if separation is possible, it is impossible to estimate which of Sc1 to Sc3 is the information to be received, so that demodulation cannot be performed correctly.
- the receiving terminal may have the same configuration as the conventional one. In other words, it has a great feature that it is possible to perform secure communication by changing only the transmitting terminal.
- the combining section 3505 on the transmission side performs different propagation using a plurality of antennas.
- the first data is transmitted to the communication partner on the path, and the comparing section 3606 on the receiving side receives the arriving wave via different propagation paths and obtains the first data from the comparison result of the estimated value of the propagation environment of each path. Since one day is obtained, it is extremely difficult to intercept the first day using a third-party communication device, and high security can be ensured.
- transmitting apparatus 3500 spreads the frequency of a plurality of channels, and then multiplies these by an antenna coefficient to determine the propagation state for each channel. By controlling, it becomes possible to superimpose information on the propagation state (here, signal power, that is, propagation loss). Further, according to the communication apparatus and the communication system of Embodiment 17, there is amplitude modulation represented by ASK as a method of superimposing information on signal power. In other words, since the signal power at the receiving antenna end is used, the propagation characteristics are different at the other receiving points, so that normal reception cannot be performed.
- ASK amplitude modulation represented by ASK
- the signal power at the receiving end can be changed without changing the output power from the antenna, even if a third party intercepts transmission / reception communication and tries to demodulate it, (2) Since it is impossible to demodulate received data, it has a great feature that high security can be ensured. Further, according to the communication device and the communication system of the seventeenth embodiment, By using carrier signals and focusing on the signal power difference between carriers to perform communication, there is a great feature that detection can be performed from signals received at the same time. Since this is the same time and the same frequency, the propagation conditions can be considered to be the same, so that stable communication can be provided.
- channel R and channel S when a spread signal in which two channels are multiplexed (channel R and channel S) is used, whether the signal power of channel S is larger or smaller than the signal power is assigned to code based on channel R. It is also possible.
- the reference phase of the channel S may be detected with respect to the reference phase of the channel R in the same manner.
- Embodiment 17 has been described with respect to spread spectrum communication as an example, the present invention is not limited to this, and can be applied to multicarrier signals such as OFDM and single carrier signals.
- OFDM communications spreading and despreading can be easily realized by replacing IFFT and FFT with channels and subcarriers.
- information of this envelope may c also be such as assigning a code as parameters Isseki, in the first 7 of the present embodiment, the signal power synthesized through propagation
- the present invention is not limited to this, and it is of course possible to superimpose the signal on the phase and frequency of the signal. There is a feature when it is possible.
- Embodiment 17 by arranging antennas having different polarization planes (for example, the polarization planes are orthogonal to each other) as the antenna configuration, it is also possible to superimpose the signal on the polarization as described above. . In this case, it is not necessary to use a multicarrier signal. However, when a multicarrier signal is used, it is conceivable to superimpose a signal on the angle of the polarization plane of the channel S with reference to the polarization plane of the channel R.
- polarization planes for example, the polarization planes are orthogonal to each other
- Embodiment 17 of the present invention when information is superimposed on a delay profile, by using a multicarrier signal, information is added to the difference of the delay profile obtained from channel S with reference to the delay profile obtained from channel R. Is heavy It is also conceivable that the delay profile can maintain the same transmission state as the target, so that highly accurate communication can be expected. Also, in Embodiment 17, by superimposing confidential information and pseudo information at the same time and on the same frequency, it is possible to communicate only at the target reception position and provide a highly confidential communication method. can do.
- Embodiment 18 is characterized in that the invention described in Embodiment 17 is further extended to superimpose information on each propagation parameter obtained from a plurality of received signal sequences. It is.
- FIG. 43 is a diagram showing a configuration of a receiving device 4300 which is a communication device according to Embodiment 18;
- FIG. 44 is a diagram showing a transmitting and receiving device which is a communication device according to Embodiment 18;
- FIG. 3 is a diagram showing a configuration of a device 4400.
- 9 and FIG. 36 are denoted by the same reference numerals, and description thereof will be omitted.
- Receiving apparatus 4300 which is a communication apparatus according to Embodiment 18 of the present invention, is different from receiving apparatus 3600 according to Embodiment 1 of the present invention shown in FIG.
- the receiving unit 4302 a and the receiving unit 4302 b constitute a receiving device 4302.
- the despreading unit 4303a and the despreading unit 4303b constitute a despreading device 4303.
- the demodulation unit 4304 a and the demodulation unit 4304 b constitute a demodulation device 4304.
- Receiving section 4302a power-amplifies and frequency-converts the received RF signal input from antenna 4301a, and outputs the result to despreading section 4303a.
- Receiving section 4302b performs power amplification and frequency conversion on the received RF signal input from antenna 4301b, and outputs the result to despreading section 4303b.
- the despreading section 4303a is composed of the received signal input from the receiving section 4302a and the channel. Then, the channel signal is despread by convolution with the spreading code corresponding to, and the channel signal is output to the demodulation section 43 4a.
- the despreading section 4303b despreads the received signal input from the receiving section 4302b and the spread code corresponding to the channel by convolution operation and outputs the channel signal to the demodulation section 4304b. I do.
- the demodulation section 4304a demodulates the channel signal input from the despreading section 4303a and outputs the channel demodulated signal to the selection / combination section 4305.
- the demodulation signal is output to power detection section 3606 according to the output instruction signal.
- the demodulation section 4304b demodulates the channel signal input from the despreading section 4303b, outputs the channel demodulated signal to the selection / combination section 4305, and outputs the demodulated signal to the communication control section 4306.
- the demodulation signal is output to power detection section 3606 according to the output instruction signal.
- the selection / combination unit 4305 selects (or combines) the branch reception signals (or branch reception data) received from each antenna based on the selection / combination signal input from the communication control unit 4306. And outputs the result of the selective synthesis as the second data. By doing so, the effect of switching the propagation space according to time can be obtained, and a gain similar to that of space diversity can be obtained.
- the communication control unit 4306 selects the combined signal so as to select and combine a branch reception signal (or branch reception data) from a predetermined antenna at a predetermined time. Output to 5. Also, the communication control unit 4306 is configured to output the demodulated signals of the antennas 4301a and 4301b, which have received the signal containing the confidential information, to the power detection unit 3606. The output instruction signal is output to demodulation units 4304a and 4304b.
- Comparing section 3608 calculates a difference between the reception power of the reception signal received by antenna element 4301a and the reception power of the reception signal received by antenna element 4301b (propagation parameter difference). Difference) and outputs the calculated difference information as the first day.
- FIG. 45 is a diagram illustrating the relationship between antennas provided in the transmission device and the reception device, propagation coefficients determined between the transmission and reception antennas, and signals input / output from each antenna.
- Fig. 45 shows the number of receiving antennas in Fig. 38 expanded from one to two.
- the received signals at the antennas Ar 1 and Ar 2 are given by the following equations.
- S rx1 and S rx 2 have different propagation path configurations, so the propagation parameters hin and h 2 n also differ.
- the reception states of S r1 and S 2 can be controlled by the operation of Cmn shown in equations (29) and (30).
- the receiving terminal may use the result of comparison between the propagation state obtained by S rx1 and the propagation state obtained by S rx2 as information for demodulation and decoding. That is, on the transmitting side, information is superimposed on the difference between the propagation parameters controlled by SrX1 and SrX2 (a phase difference and a received power difference can be considered) and transmitted.
- the difference between the propagation parameters calculated from the received signals of S rx 1 and S rx 2 is calculated, and this difference is used as part or all of the communication information for communication. Furthermore, by performing communication in this way, it becomes necessary to estimate the propagation parameters for two systems, and therefore it is possible to ensure a high level of security. By increasing the number, it is possible to build a more sophisticated system. Can be expected to be improved.
- security communication can be performed using a plurality of antennas Arl and Ar2. Since the propagation parameters are different between the antennas A r1 and A r2, the received signals are different as described above. By utilizing this fact, by controlling the modulation signal for antenna A r 1 and the modulation signal for antenna A r 2, respectively, it is possible to transmit confidential information only to antenna A r 1, or to antenna A r 2. By transmitting confidential information only to the other antennas, or transmitting confidential information to both antennas A r 1 and A r 2, and switching these states at a specified time, more complicated Enable high security communication.
- FIG. 42 shows the case where the number of places to be evening has been increased from one to two.
- the graph is divided into upper and lower parts in Fig. 42, it shows the power distribution of radio waves as in Fig. 42.
- the upper and lower graphs show the same cross section.
- the upper graph and the lower graph are switched. Then, on the receiver side, communication can be performed in the same manner as in Embodiment 17 by switching in synchronization with it. Further, if a null is formed at two corresponding locations as shown in FIG.
- the signals received by the antennas Arl and Ar2 can be separated from the thick solid line and the thick dotted line in the figure by using the propagation coefficient. If the number of receiving antennas is n (A r 1 ⁇ A rn), communication is performed as compared to Fig. 42 by performing space-time multiplexing (SDM (Space Division Multiplex) and MIMO (Multi-Input Multi-Output)). It is possible to increase the capacity by n times. Naturally, a significant improvement in the characteristics can be expected by using space-time coding (Space—TimeCode). Therefore, it has a very advantageous feature from the viewpoint of communication capacity and communication quality.
- SDM Space Division Multiplex
- MIMO Multi-Input Multi-Output
- the channel is configured as shown in Fig. 45. It has the major feature that the risk of information leakage to a third party is greatly reduced because the number of parameters that can be created increases. Similar effects can be obtained by performing this confidential communication on a pilot signal for space separation used in MIMO or the like or a reference signal for the phase and amplitude of communication.
- the antenna coefficient (weighting coefficient) is calculated according to the propagation characteristics, but this calculation method will be described.
- a matrix H of n rows and m columns is taken as an example (that is, the number of transmitting antennas is n and the number of receiving antennas is m). All matrices H are calculated using orthogonal matrices U (m rows and m columns) and V (11 rows and 11 columns) and singular value matrix S (11 rows and 111 columns).
- V Hermitian transposition of V.
- the orthogonal matrix U (or V) decomposed in this way is regarded as a matrix in which m (n) singular value vectors of mx 1 (1 xn) are arranged, and this is ul ⁇ m (vl ⁇ n) And
- X is a singular value corresponding to ux (x).
- the matrix H representing the propagation characteristics is decomposed into singular values, and each element of the eigenvector ux whose singular value is lx2 0 is used as an antenna coefficient (weighting coefficient) to reduce the received power at the receiving antenna end to 0. Can be controlled.
- Propagation estimating section 103 calculates a propagation characteristic (propagation matrix H) between the terminals from the received signal.
- the propagation characteristics are sent to the coefficient calculation unit 903, and the coefficient calculation unit 903 performs singular value decomposition of the propagation matrix H.
- the former is called the singular vector, and the latter is called the zero vector.
- communication information 1 to k are input to modulation section 906, and corresponding modulation signals l to k are output.
- the singular value vector and the modulated signal are input to weighting section 907, respectively, and the modulated signal corresponding to the communication information to be concealed (here, communication information 1 and modulated signal 1) and the singular vector (vl to vp) (Eg, the vector with the largest singular value, or some or all).
- a singular value vector held in the buffer 904 by a coefficient multiplied by the weighting unit 907 for communication information unnecessary for the receiving device here, communication information 3 and modulation signal 3.
- any of the zero vectors (vp + l to vn) (a vector obtained by adding some or all) is vector-multiplied.
- the modulated signal vectors subjected to these vector calculations are input to transmitting section 908.
- each modulated signal vector is subjected to frequency conversion after being added for each signal sequence of the corresponding antenna, and is radiated via antenna 901.
- the signal radiated in this way is received by the receiver via the propagation space, and is expressed as follows using the characteristics of the propagation space (propagation matrix H) and the modulation signal S mod.
- the modulated signal 1 multiplied by the singular value vector reaches the receiver.
- the above is equivalent to performing null control as shown in FIGS. 42, 71, and 76. In other words, it is shown that when confidential communication is performed by null control, singular value decomposition is performed, and the singular value vector obtained in this way can be easily implemented.
- Expression 33 does not hold because the propagation matrix H ′, which is a propagation characteristic shared by the transmitting device, is different. That is, modulated signals 1 and 3 are given by the correlation between the propagation matrix H ′ and the singular value vector, and it is impossible to decompose these signals into modulated signals 1 and 3.
- the coefficients multiplied by the weighting unit 907 other than the singular value vector held in the buffer 904 are used. (Or a constant vector such as [1, 1, ⁇ ⁇ ⁇ ⁇ 1]). In this case, since a coefficient different from the singular value vector is given, Expression 33 does not hold and is received by the receiver.
- the modulated signal to be transmitted is decomposed according to the propagation state (or propagation parameters) formed between the terminal and the transmission partner, and the decomposed signal is transmitted from each antenna.
- the signal at the receiving end becomes the original modulated signal by spatial synthesis.
- a coefficient (a value corresponding to each element of the eigenvector in Equation 32) derived from the propagation parameter is given as an antenna coefficient (or a weighting coefficient). This can be achieved by multiplying the original modulation signal by the antenna coefficient.
- the third terminal which cannot share the propagation and the lame, has different confidentiality because the result of spatial synthesis is different and demodulation cannot be performed correctly.
- Embodiment 18 in addition to the effects of Embodiments 1 and 17, the modulated signal to be transmitted is decomposed by the propagation state, and Signal from different antennas, the 3rd terminal with a different propagation state cannot demodulate correctly due to the different spatial synthesis result. Security can be secured. Also, in Embodiment 18 of the present invention, by superimposing the confidential information and the pseudo information at the same time and on the same frequency, it is possible to perform communication only at the reception position where the receiver is to be set, and a communication method with high confidentiality is realized. Can be provided.
- Embodiment 18 has been described on the assumption that antennas A rl and ⁇ ⁇ 2 are connected to the same terminal, the present invention is not limited to this. It may be connected to another terminal (for example, terminal 1 and terminal 2). In this way, security communication with terminal 1 and security communication with terminal 2 can be performed simultaneously, and an efficient system can be constructed.
- Embodiment 19 is characterized in that terminal identification is performed using propagation characteristics superimposed on a received signal.
- FIG. 46 is a diagram illustrating a configuration of a receiving apparatus 4600 according to Embodiment 19c. Parts having the same configuration as in FIG. 1 are denoted by the same reference numerals, and description thereof is omitted.
- the feature extraction unit 460 1 and the buffer unit 460 2 constitute a propagation feature extraction unit 466.
- the feature extraction unit 460 1 extracts the propagation state features from the propagation estimation information input from the propagation estimation unit 103 and outputs the feature extraction information to the buffer 462 and the terminal determination unit 460 3 I do.
- the buffer unit 4602 outputs the stored feature extraction information corresponding to the propagation state to the terminal determination unit 4603 as buffer information.
- the buffer unit 4604 and the information processing unit 4605 constitute a signal processing selection unit 4607.
- the feature extraction unit 4601 extracts the feature by inputting and encoding the propagation information obtained from the received signal.
- Elements for extracting features include phase characteristics, gain characteristics, polarization characteristics, propagation delay characteristics, delay dispersion characteristics, and angle profiles based on DOA estimation. These elements can be used alone or in combination.
- the feature obtained in this way may be sampled as an analog value. In this case, it is not particularly necessary to extract the feature, and the determination by the terminal determination unit 4603 is performed by comparison using analog information, so that a more sophisticated and accurate determination is possible.
- methods such as Fourier transform, discrete cosine transform, and wavelet transform are typical methods for extracting features, fill filters such as fill filters and multi-band fill filters, or coefficient extraction based on linear prediction methods.
- feature extracting section 4601 can have the same configuration as encoding section 105 used in FIG. 1 and the like. As shown in Fig. 4, by using the vector quantization method for the encoding unit 105, it is possible to represent various signal sequences as one code. There is a feature that it becomes easier.
- the buffer unit 466 temporarily stores the extracted feature extraction information, and outputs the stored feature extraction information to the terminal determination unit 4603 as buffer information at a predetermined timing.
- the terminal determination unit 4603 determines means compares the feature extraction information input from the feature extraction unit 4601 with the buffer information input from the buffer unit 4606 to determine a match, and determines The result of the determination is output to the information processing section 4605 as a terminal determination signal (first data).
- the terminal determining section 4603 uses the propagation information obtained in a fixed time to output the final terminal determination result as a terminal determination signal as a binary signal. In this case, a more flexible system can be configured by using a multi-level signal such as 0 to 9 instead of a binary signal such as 1Z0 as described above.
- the terminal determination unit 4603 obtains a clear distance between the obtained coefficient sequences from each other, and the value is equal to or less than a certain value. If so, it is determined that they are the same terminal; otherwise, they are determined to be different terminals. If the judgment result is not stable due to noise or fluctuations in the propagation characteristics during the judgment, a method such as storing the judgment result for a certain period of time and averaging for a certain period of time may be considered. In such a case, it is conceivable to use a certainty value such as 0 to 9 instead of the binary value of 0/1 indicating whether the judgment result is the same or different. It is.
- the terminal determining unit 4603 monitors the terminal currently communicating based on the estimated propagation environment, and the secret information is changed due to the fact that the communicating terminal is changed without knowing it. Is monitored so that it does not leak.
- the buffer unit 640 stores the received data input from the demodulation unit 104 for a certain period.
- the information processing unit 4605 switches the content of the key report process from the received data stored and input in the buffer unit 4604 and the terminal determination result input from the terminal determination unit 4603. change. For example, of the received data, privacy information, billing information, confidential information, etc., which is highly dependent on the terminal, may not be processed and all received data may be discarded as error processing. . In addition, there is a method of transmitting information that access is determined to be from a different terminal based on the result of terminal determination, and performing security countermeasure processing.
- the communication terminal performing terminal identification is the communication terminal 1 and the communication partner is the communication terminal 2.
- terminal registration and terminal determination operations are performed on the signal output by the communication terminal 2, so the description will be made only on the case where the terminal 2 outputs.
- the communication terminal 1 performs a terminal registration operation of the communication terminal 2.
- the communication terminal 1 receives the reference signal from the communication terminal 2 with the antenna 101, the RF signal is input to the receiving unit 102, and the received signal is output.
- the received signal is input to propagation estimating section 103, which estimates propagation characteristics from the received signal and the reference signal and outputs propagation information.
- the output propagation information is input to the propagation feature extraction section 466, and the feature extraction section 4601 outputs the feature extraction information.
- This feature extraction information is stored in the buffer unit 466 as information specifying the communication terminal 2 that is the communication partner. Thus, the terminal registration operation is completed.
- the communication terminal 1 transmits and receives information to and from the communication terminal X, and determines that the communication terminal X is a registered terminal (communication terminal 2).
- the communication terminal 1 receives a communication signal from the communication terminal X via the antenna 101, and the RF signal is input to the receiving unit 102, and the received signal is output.
- the received signal is input to propagation estimating section 103, which estimates propagation characteristics from the received signal and outputs propagation information.
- the propagation information is output to feature extraction section 4601, reception section 102 and demodulation section 104.
- the receiving unit 102 performs control such as frequency correction, time correction, and gain correction based on the propagation information so as to maintain an optimal state from the RF signal to the received signal.
- the demodulation unit 104 receives the received signal, performs detection and demodulation while performing frequency / phase correction, time correction, gain correction, and the like based on the propagation information, and outputs a received data sequence.
- the side that specifies the terminal is described as the base station (the receiving device in FIG. 47), and the side that specifies the terminal is the terminal (the transmitting device in FIG. 47).
- Both the base station and the terminal are set to the initial state immediately after the power is turned on or when a specific signal is received. At the same time, states such as frequency and time synchronization are set according to predetermined procedures.
- the receiving apparatus After a certain period of time after the completion of these initial operations, the receiving apparatus transmits control information on a control signal at regular time intervals.
- the base station starts searching for a control signal.
- the terminal receives the control signal transmitted from the base station, it detects the time, frequency, etc., and synchronizes with the time and frequency held by the system (system synchronization).
- system synchronization After successful system synchronization, the terminal sends a registration request signal to notify its base station of its existence.
- the base station transmits a registration permission signal to permit terminal registration.
- Terminal Reference signal transmission
- the terminal outputs a reference signal for propagation estimation performed by the base station as a reference signal.
- the specific operation is the same as the method described in the first embodiment, etc., except that the base station extracts its characteristics from the propagation information obtained by this communication and obtains it as information for terminal identification.
- the characteristic information of the obtained propagation characteristic is registered together with the corresponding terminal information.
- the base station starts communication and outputs a communication signal.
- the encrypted signal may be output using the method described in the other embodiments.
- reception demodulation section 150 demodulates the received signal into demodulated information and outputs demodulated data. If the communication is encrypted, it is decrypted using the method described in the other embodiments.
- the terminal transmits a communication signal.
- the base station estimates propagation characteristics from a signal received from the receiving unit 102 and extracts feature information from the propagation information. At the same time, it demodulates the received signal and outputs the received data.
- the feature information is compared with the feature information registered in (1) to determine the terminal. It outputs the final / non-permissible information of the final judgment result summarizing the judgments thus obtained and the received data.
- the signal processing selector 460 7 receives the received data and the terminal determination signal, and stores the received data in the buffer 460 for a certain period of time.
- the terminal determination unit 4603 outputs the final terminal determination result as a terminal determination signal as a binary signal using the propagation information obtained in a fixed time.
- the information processing section 4605 switches the content of the information processing based on the received data sequence stored in the buffer section 4604 and the terminal determination result. For example, among the received data, privacy information, billing information, confidential information, etc., which largely depends on the terminal, may be discarded as error processing without performing the processing. In addition, there may be a method of transmitting information that the access is determined to be from a different terminal based on the terminal determination result, and performing security countermeasure processing. Hereinafter, the encryption communication and the normal communication of (2) and (3) are repeated.
- this method for terminal determination does not require the procedure of (2), but can be implemented only by the procedures of (1) and (3). Further, it is conceivable that the subsequent information processing operation is changed based on the determination result in the operation (3). By switching the processing based on the determination result in this way, it is possible to maintain the security of the processing more and to prevent improper deception by a terminal that cannot be properly authenticated. Therefore, it has the advantage that devices and systems with very high security can be constructed.
- the characteristics of the propagation path formed between the communication terminals are determined by the position of the terminals and the surrounding rates, and cannot be changed to any characteristics. Although a method of controlling propagation using multiple antennas is conceivable, the propagation path characteristics cannot be measured and predicted from the third terminal. It turns out that it is extremely difficult to spoof. Therefore, the terminal identification method using the present invention can be realized very easily and with high accuracy.
- the propagation information with terminals determined by deriving the characteristics of two or more propagation paths from two or more received signal sequences using a plurality of antennas 101 and receiving units 102 is diversified. This makes it possible to make a more accurate determination.
- the base station determines a terminal by using propagation information obtained from a communication signal output from the terminal. (Here, it is assumed that the result differs from the information registered in (1).) As a result of the determination, the base station determines that the information is from a terminal different from the registered terminal and receives the information. A terminal determination signal of no is output together with the night.
- Base station request signal The base station outputs an authentication request signal to the terminal as a request signal in order to reconfirm the terminal according to the result of the terminal determination.
- the terminal Upon receiving the request signal, the terminal performs an operation corresponding to the request signal.
- the reference signal is output again.
- the following procedure is the same as (1) to (3).
- the processing of the information processing unit 460 5 is temporarily stopped, and the information processing unit 465 waits for the re-judgment result after (1 ′) and the information processing unit Determining the procedure can be considered.
- the terminal identification information registered by the base station it is conceivable to update the terminal identification information registered by the base station at regular intervals, apart from the above procedures (3,) to (1,).
- the base station By inserting a reference signal into a part of the communication signal of (3,), the base station can perform stable propagation estimation, and as a result, a stable terminal determination result can be obtained. There is an effect that it can be.
- the reference signal does not need to be the same as the reference signal used in (1), and can be replaced by a pilot signal or a known signal sequence generally used in communication.
- the reference signal is used for estimating the propagation.
- any signal sequence that can detect an error in a communication environment may be used.
- Such signal sequences include a pilot signal, a known signal, a sync word signal, a synchronization signal, a synchronization word, a preamble signal, a midamble signal, a postamble signal, and a reamble signal.
- Reference signals and unique word signals are known.
- it is also possible to use a signal sequence in which a demodulation error is sufficiently protected for example, a PSK signal sequence included in a signal sequence communicating in a multi-level modulation scheme, or a high error correction capability.
- a signal sequence coded by the method can be considered.
- the terminal determination unit 4603 determines that the terminal currently communicating is Is determined based on the estimated propagation value, and if it is not the desired communication partner, the receiver performs processing such as not demodulating the receiver based on the terminal determination result. Switching makes it possible to maintain the security of processing more and to prevent false spoofing by terminals that cannot be properly authenticated, so that devices and systems with extremely high security can be constructed.
- FIG. 48 and FIG. 49 are diagrams showing a specific communication frame setting method in a system for multiplexing information over a propagation parameter. Note that the communication device in the present embodiment 20 has the same configuration as that of FIG. 7, and a description thereof will be omitted.
- FIG. 48 is a diagram for explaining the signal output timing of the uplink and the downlink.
- FIG. 48 (a) shows a case where secure information is communicated in one direction
- FIG. 48 (b) shows a case where secure information is communicated in two directions.
- the base station and the terminal include transmitting apparatus 700.
- the base station When the base station is transmitting an unencrypted normal communication signal # 4801 to the terminal, the base station includes the reference signal # 4802 using the uplink from the terminal to the base station.
- communication signal # 4803 When communication signal # 4803 is transmitted, an encryption key corresponding to the propagation state is selected based on reference signal # 4802, and encryption is performed using an encryption key common to the selected terminal.
- a communication signal # 4804 is transmitted to the terminal.
- the terminal transmits a communication signal including the reference signal # 4802 to the base station at a predetermined cycle. Each time the base station receives the reference signal # 4802 transmitted from the terminal, it checks whether the encryption key has been changed, and after that, transmits the encrypted signal # 4805 to the terminal. I do.
- the base station transmits a communication signal # 4807 including a reference signal # 4806 to the terminal.
- the terminal transmits a communication signal # 4809 including the reference signal # 48008 to the base station.
- the base station receiving the reference signal # 4808 selects an encryption key according to the propagation state based on the reference signal # 4808, and encrypts the encrypted signal using the selected encryption key.
- the terminal that has received the reference signal # 4806 selects an encryption key according to the propagation state based on the reference signal # 4806, and encrypts the encrypted signal using the selected encryption key.
- # 4 8 1 1 is transmitted to the base station.
- the base station transmits the encrypted signal # 4 8 12 to the terminal.
- FIG. 49 shows an example of the burst configuration.
- a burst is composed of a communication signal and a reference signal.
- the reference signal for example, a pilot signal is used.
- the terminal transmitting the burst uses the propagation characteristics to the terminal (terminal 2) to be transmitted, and the received power of the reference signal 1 at the receiving point is reduced by the reference signal 2
- the terminal 2 uses the propagation characteristics to the terminal (terminal 2) to be transmitted, and the received power of the reference signal 1 at the receiving point is reduced by the reference signal 2
- the terminal 2 By performing communication while controlling the received power to be greater than the received power of terminal 2, it becomes possible for terminal 2 to be transmitted to determine reference signal 1 from the difference in received power and to correctly demodulate as the reference for the communication signal.
- other terminals have the advantage that demodulation cannot be performed correctly because the received power differs depending on the location.
- reference signals 1 to n may be multiplexed for each antenna. In this way, advanced communication is enabled by superimposing information on the propagation parameters of reference signals 1 to n. Further, when there are m terminals 2, it is possible to improve the frequency use efficiency by spatially multiplexing the communication for each terminal. (In this case, the relationship of n> m holds between n and m.) By doing so, the frequency utilization efficiency is high), and it is possible to construct a system.
- part or all of the communication signals having the frame configuration shown in FIG. 49 (a) are used as communication signal 1 and communication signal 2.
- terminal 1 performs communication by controlling the received power of communication signal 1 to be greater than the received power of communication signal 2 at the receiving point using the propagation characteristics with respect to terminal 2.
- terminal 2 it is possible for terminal 2 to be transmitted to judge communication signal 1 from the difference in received power and demodulate it, but for other terminals, since the received power differs depending on the location, it is impossible to demodulate correctly. It has the feature that it becomes possible.
- Communication signal is data, data symbol, modulation symbol, data symbol It is also called a key symbol, free symbol or user symbol, and indicates a symbol that is modulated by communication data.
- the transmission timing of the reference signal is changed or the uplink and downlink are selected.
- the encrypted signal can be transmitted and received efficiently.
- FIGS. 48 (b) and (c) have been described by focusing on the difference in the received power. However, this is merely described as an example of the propagation parameter, and the communication signal 1 It is conceivable to superimpose information on the difference between the propagation parameters between (reference signal 1) and communication signal 2 (reference signal 2). Terminal 2 that receives communication signal 1 and communication signal 2 transmits communication signal 1 ( It is also conceivable to calculate the difference between the propagation parameters based on the reference signal 1) and use this result as part or all of the demodulation result.
- FIG. 49 (b) describes a case where reference signals are multiplexed
- FIG. 49 (c) describes a case where communication signals are multiplexed. It goes without saying that the signal and the communication signal can be multiplexed.
- FIG. 50 is a diagram illustrating a specific method of setting a communication frame in a system that multiplexes information over a propagation parameter.
- the communication device according to Embodiment 21 has the same configuration as that of FIG. 36, and a description thereof will be omitted.
- FIG. 50 shows an example of a frame configuration of code division multiplexing (CDM).
- the frame in Fig. 50 (a) is composed of a pilot signal and a data signal.
- the pilot signal indicates the reference of the phase and amplitude of the data signal.
- the receiver uses the information of the phase and amplitude obtained from the pilot signal as a reference for demodulation, and calculates propagation states such as time and frequency synchronization and multipath states.
- data l to n (n is an integer of 1 or more) are code division multiplexed.
- codes l to m are assigned to de It is assumed that Terminal 1 controls the propagation parameters (here, the received power) for each of data 1 to Q according to the estimated propagation characteristics.
- the receiving end of the terminal 2 receives the received power of each of the de-evening 1 to Q in a controlled state. Since these received powers are obtained as signal amplitudes despread by codes l to m, it is possible to detect the superimposed information from the amplitude information.
- the number of data to be multiplexed is n
- the type of code is m, but the relation of n ⁇ m holds between n and m.
- the frame of FIG. 50 (b) differs from the frame configuration of FIG. 50 (a) in that pilot signals are code-division multiplexed on data l to n.
- pilot signals are code-division multiplexed on data l to n.
- the frame in Fig. 50 (c) is the pilot 1 ⁇ !
- the feature is that n is code division multiplexed.
- n is code division multiplexed.
- data 1 to j are modulated based on the phase and amplitude of pilot 1
- data j + Since 1 to k are modulated on the basis of the phase and amplitude of the pilot port 2, an advanced communication system can be constructed. By doing so, it is possible to independently communicate with a plurality of receiving terminals using a pilot signal and a data signal corresponding to the pilot signal, and each pilot signal is used as a communication partner.
- the communication signal may also be called a data symbol, a data symbol, a modulation symbol, a data modulation symbol, a free symbol, a user symbol, or the like, and indicates a symbol modulated by the communication data.
- the pilot signal and the data are code-division multiplexed, interference-resistant encryption is performed. Signals can be transmitted and received.
- a pilot signal is used as a reference for the phase and amplitude of the data signal.
- the present invention is not limited to this, and a reference signal other than the Pipit signal may be arbitrarily set. You can choose.
- FIG. 51 is a diagram showing a configuration of a transmission / reception device 5100 which is a communication device according to Embodiment 22 of the present invention.
- the transmitting / receiving apparatus 5100 is different from the transmitting / receiving apparatus 200 according to Embodiment 1 shown in FIG. 2 in that an orthogonal frequency division multiplexing unit 5101 is added. Parts having the same configuration as in FIG. 2 are denoted by the same reference numerals, and description thereof will be omitted.
- the switching section 210 encrypts the transmission signal after the transmission signal is subjected to the orthogonal frequency division multiplexing processing in the orthogonal frequency division multiplexing section 5101 described later so that the transmission signal has a desired arrangement with respect to each subcarrier.
- the encrypted security data output from the unit 209 and the reference signal output from the reference signal generation unit 208 are switched and output to the modulation unit 211.
- Orthogonal frequency division multiplexing section 5101 performs orthogonal frequency division multiplexing processing on the transmission signal input from modulating section 211 and outputs the result to transmitting section 212. That is, the orthogonal frequency division multiplexing section 5101 converts the transmission signal input from the modulation section 211 from a parallel data format to a serial data format, performs an inverse fast Fourier transform, and then performs a parallel data The data is converted to the serial data format and output to the transmission unit 212. The transmission signal that has been subjected to the orthogonal frequency division multiplexing process is allocated to each subcarrier and arranged.
- FIG. 52 shows an example of a frame configuration of orthogonal frequency division multiplexing (OFDM). The vertical axis represents frequency, the horizontal axis represents time, and one analysis represents one subcarrier in one symbol.
- OFDM orthogonal frequency division multiplexing
- Figure 5 2 (a) shows a pilot signal for symbol synchronization and demodulation And a reference signal for data transmission.
- a pilot signal for symbol synchronization is used to synchronize the time and frequency of an OFDM symbol, and a null symbol, a short word symbol, a long word symbol, and the like are known.
- the reference signal for the data sub-length is inserted to correct frequency characteristics, propagation delay, phase rotation, etc. caused by propagation distortion, and is used as a reference for the phase and amplitude of the data signal to be modulated. give. By inserting this reference signal into the frame, stable communication can be performed even in an environment where the propagation environment changes or the delay profile changes.
- a correct reference signal cannot be obtained at a place other than the set receiving end, so that correct demodulation is performed. It has a big feature that it becomes difficult.
- the frame of FIG. 52 (b) is composed of a pilot signal for symbol synchronization, a reference signal for demodulation and a data signal, as in the frame configuration of FIG. 52 (a).
- a reference signal in which a reference signal is transmitted using a specific symbol, part of all symbols are reference signals, so that it is possible to change the reference signal corresponding to the symbol.
- the control coefficient by changing the control coefficient using the propagation characteristics at the time of symbol switching and changing the phase and amplitude values indicated by the reference signal every moment, more complex control becomes possible, and in a security system, It has the feature that high security can be secured.
- the reference signal is a known signal, it can be used as a pilot signal, and in this way, it has a characteristic that a time change of the environment can be corrected.
- the frame of FIG. 52 (c) is characterized in that the reference signal of the frame configuration of FIG. 52 (b) is changed with time. As the position of the reference signal changes every moment, the effect of frequency hopping appears on the reference signal and the overnight signal. In other words, even if the power of a certain subcarrier decreases due to the notch due to the propagation state, the signal pattern switches, so the effect of the notch is only temporary. Can be For example, if the location of the reference signal is affected by the notch, it will have a large effect on the data signal, and in frame configuration 2, the effect will continue until the propagation state changes. With this configuration, it is possible to limit the influence of the reference signal.
- a communication signal may be completely different from a data symbol, a data symbol, a modulation symbol, a data modulation symbol, a free symbol, a user symbol, or the like, and indicates a symbol modulated by the communication data.
- the orthogonal frequency division multiplexing unit 51 1 No. Since the pilot signal is subjected to orthogonal frequency division multiplexing and allocated to each subcarrier, it is possible to increase the frequency use efficiency when transmitting the encrypted signal.
- Embodiment 23 is characterized in that it is determined whether or not to perform security communication according to an instruction of an upper layer.
- FIG. 53 is a diagram showing the configuration of the transmitting / receiving apparatus according to Embodiment 23.
- the same components as those in FIG. 7 are denoted by the same reference numerals, and description thereof will be omitted.
- the communication control section 5301 controls switching of the communication method according to the communication time and controls the synthesis. That is, when a communication control signal for performing secure communication is input from the upper layer 5303, the communication control unit 5301 transmits the propagation information input from the encoding unit 7003 to the propagation control unit. 701, and further outputs a reception control signal to the receiving section 202 to perform secure communication and outputs a transmission control signal to the transmitting section 705 to perform secure communication. On the other hand, if a communication control signal indicating that secure communication is not to be performed is input, communication control section 5301 outputs a reception control signal indicating that secure communication is not to be performed to receiving section 202 and transmits the signal. A transmission control signal indicating that secure communication is not to be performed is output to unit 705.
- the propagation control as described in the other embodiments is performed, and when the conventional communication method is performed, communication is performed without the propagation control. As It is conceivable to improve the communication quality by narrowing the directivity.
- the buffer unit 5302 temporarily holds the transmission data and outputs it to the switching unit 210.
- the upper layer 5303 is a part that is higher than L1 in the communication layer structure (de-link layer, network layer, transport layer, session layer, presentation layer, or application layer). ).
- the upper layer performs input / output of received data and transmitted data, and at the same time, selects a communication method as necessary, and outputs the control signal as a communication control signal.
- the communication method using the present invention has a high affinity with the conventional communication method and can be used by switching between the two communication methods. By doing this,
- the communication control unit When a communication control signal is issued from the upper layer unit to perform security communication, the communication control unit outputs a transmission / reception control signal so as to perform propagation control for security communication. ((1), (4) in the figure) On the other hand, when a communication control signal is output from the upper layer unit so as not to perform security communication, the communication control unit transmits so as not to perform propagation control for security communication. Outputs a reception control signal. ((2), (3), (5) in the figure)
- the communication control unit 5301 can control the instruction of the upper layer 5303 , which is a communication method for transmitting and receiving the first data using the propagation estimation value, switches between a security communication method that secures important information and a conventional communication method and transmits it. Can be provided.
- the transmission control signal and the reception control signal are used to turn on / off the propagation control of receiving section 202 and transmitting section 705.
- the present invention is not limited to this.
- a control signal for that part is unnecessary.
- the transmission unit 152 of the communication device shown in FIG. 1 and the encryption reception unit 706 of the communication device corresponding to the communication device shown in FIG. 7 correspond to this.
- Embodiment 24 is characterized in that confidential information is included in the antenna coefficient.
- FIG. 55 is a diagram illustrating a configuration of a transmitting device 550 that is a communication device according to Embodiment 24.
- FIG. 56 is a diagram illustrating a receiving device that is a communication device according to Embodiment 24.
- FIG. 2 is a diagram showing a configuration of 560.
- the transmitting device 5500 will be described.
- Modulating section 5501 temporarily holds the second data and outputs channel phase modulated signals for the number of channels to synthesizing section 5502.
- the combining section 5502 performs a combining operation with the modulation signal input from the modulation section 5501 according to the modulation antenna coefficient input from the propagation modulation section 5507.
- the transmitting section 5503 performs frequency conversion, power amplification, and the like on the combined signal input from the combining section 5502.
- Antennas 5504 emit a corresponding sequence of signals.
- Propagation characteristic storage section 550 5 stores propagation characteristics such as a delay profile and outputs the result to antenna coefficient calculation section 550 6.
- the antenna coefficient calculation unit 555 based on the propagation characteristic input from the propagation characteristic storage unit 555, in order to superimpose information on the propagation state represented by the antenna coefficient. Calculate the coefficient. There are various ways to find antenna coefficients, but singular value decomposition is known.
- Propagation modulating section 550 7 modulates a modulation antenna coefficient obtained by superimposing the antenna coefficient input from antenna coefficient calculating section 550 6 and first data to be transmitted as confidential information and modulating the amplitude by combining the antenna data.
- Antenna 560 1 outputs the received signal to receiving section 560 2.
- Receiving section 5602 performs power amplification, frequency conversion, and the like on the received signal received and input by antenna 5601 and outputs the signal to demodulating section 5603.
- the demodulation unit 560 3 demodulates each channel signal input from the reception unit 5602 and outputs a channel demodulated signal to the antenna coefficient detection unit 5605 and the buffer 5604. Since the receiving device 5600 receives a QAM signal (or a phase / amplitude modulated signal) obtained by adding amplitude modulation to phase modulation, the demodulation unit 56003 converts the received signal into a phase signal. ⁇ Amplitude demodulation.
- the receiver 564 temporarily holds the channel demodulated signal input from the demodulation unit 560 3 and outputs the second data.
- Antenna coefficient detecting section 566 5 detects an antenna coefficient for each channel from the channel demodulated signal input from demodulating section 560 3 and outputs the detected antenna coefficient information to comparing section 566 6.
- Comparing section 566 06 encodes the antenna coefficient information input from antenna coefficient detecting section 560 5 and outputs the result of comparing the magnitudes of the encoded antenna coefficient information as first received data.
- the operations of transmitting apparatus 550 ° and receiving apparatus 5600 are the same as those in FIG. 37 except that an antenna coefficient is used instead of the received power, and a description thereof will be omitted.
- a significant feature is that the modulation method output from the antenna and the modulation method demodulated by the receiving device are different. In other words, the modulation scheme of the signal output from the antenna is the same as the modulation scheme supported by the receiver. It is also possible to set differently.
- the combining section 550 2 modulates the signal by the propagation modulation section 550 7.
- the modulated first data and the modulation section 550 1 combine the second data modulated by the modulation method different from that of the propagation modulation section 550 7, and the transmission section 550 3 outputs the phase and amplitude data.
- the first data and the second data are transmitted using a modulation scheme that combines frequencies, a communication partner having a different modulation scheme cannot demodulate, so that high security can be ensured.
- the antenna output signal is phase-modulated and the propagation modulation is amplitude modulation.
- the present invention is not limited to this, and both may use the same modulation method, and the modulation method is also limited to this. Not something. It can be frequency modulation, phase modulation, amplitude modulation, PWM, PAM, quadrature amplitude modulation, CCK (ComplimimntarayCodeKeing).
- Embodiment 25 is characterized in that antenna coefficient information is superimposed on signals of a plurality of channels subjected to spreading processing and antenna coefficient information is extracted as confidential data.
- FIG. 57 is a diagram illustrating a configuration of a transmitting device 5700 that is a communication device according to Embodiment 25.
- FIG. 58 is a diagram illustrating a receiving device that is a communication device according to Embodiment 25.
- FIG. 3 is a diagram showing a configuration of 580.
- the spreading code storage unit 57001 stores the spreading codes of the number of channels and stores the spreading codes. 0 Output to 2.
- Spreading section 5702 convolves the channel data which is the first data input from modulating section 5501 with the spreading code corresponding to the channel input from spreading code storage section 5701 to perform frequency spreading. And outputs the result to the synthesizing unit 550 2.
- the spreading code storage unit 580 1 stores the spreading codes for the number of channels and outputs the same to the despreading unit 580 2.
- the despreading unit 5802 despreads the spreading code corresponding to the channel input from the spreading code storage unit 5801 and the received signal input from the receiving unit 562 by convolution operation to obtain a channel signal. Is output to the demodulation unit 560 3.
- the operations of transmitting apparatus 570 and receiving apparatus 580 0 are the same as those in FIG. 37 except that an antenna coefficient is used instead of received power, and a description thereof will be omitted.
- a significant feature is that the modulation scheme output from the antenna and the modulation scheme demodulated by the receiving device are different. In other words, it is possible to set the modulation scheme of the signal output from the antenna to be different from the modulation scheme supported by the receiving device. By doing so, a correct modulated signal is obtained only for the receiving apparatus to be transmitted, and a correct modulated signal cannot be obtained with other receiving apparatuses, so that high confidentiality can be secured.
- the combining section 5502 includes the propagation modulation section 5
- the first data modulated at 507 and the second data modulated at 550 1 by the modulation unit 550 1 and modulated by a different modulation method from the propagation modulation unit 550 7 are combined with the second data, Since the transmitting unit 5503 transmits the first data and the second data using a modulation method that combines phase, amplitude, or frequency, it is necessary to ensure high security for data with high frequency use efficiency. Can be.
- Embodiment 25 while the antenna output signal is phase-modulated and the propagation modulation is amplitude modulation, the present invention is not limited to this, and both may be of the same modulation scheme, and the modulation scheme is also limited to this. Not something. These are frequency modulation, Phase modulation, amplitude modulation, PWM, PAM, quadrature amplitude modulation, CCK (Comb 1 imentary Code Keying), etc. are considered.
- Embodiment 26 is characterized in that secondary modulation is superimposed on primary modulation by controlling antenna coefficients.
- FIG. 68 is a diagram showing a communication system according to Embodiment 26 of the present invention, and FIG. 69 shows parts involved in transmission / reception in detail.
- FIG. 68 will be described.
- communication terminal A 6850 and communication terminal B 6851 which are configured identically, are connected via propagation space 6852.
- FIG. 68 it is assumed that the terminals are the same terminal. However, in this configuration, the terminals need not be the same.
- the communication terminal A 6850 and the communication terminal B 685 1 will be described.
- the reference signal storage section 6801 outputs a reference signal that provides a reference such as time synchronization, frequency synchronization, and phase / amplitude.
- the modulator 6802 receives the data 2 (second data), generates a predetermined modulation signal, and outputs the modulation signal.
- the channel synthesis unit 6803 inputs the modulated signal and the channel parameters extracted from the channel components and the data parameters 1 (1st data), and weights the signals so that channel synthesis is performed through propagation. Perform and transmit: Output RF signal.
- the channel analysis unit 6804 receives the propagation coefficient extracted from the received signal, analyzes this, calculates and outputs a coefficient for channel combining.
- the reception demodulation section 680 5 receives the received RF signal, outputs the propagation coefficient to the channel analysis section 680 4, and demodulates and outputs data 1 and 2.
- the RF section 686 outputs the transmission RF signal to the antenna 680, and receives the signal received by the antenna 680, and outputs the reception RF signal to the reception demodulation section 680.
- Antenna 68007 radiates or receives the corresponding sequence of transmitted RF signals.
- the RF signal is output to the reception demodulation unit 6805.
- the switch 688 selects whether the modulation signal to be output to the channel synthesis section 680 3 is to be a signal from the reference signal storage section 680 1 or a signal from the modulation section 680 2 And output.
- the control unit 680 9 controls the control signal, and controls the channel synthesis unit 680 3, the channel analysis unit 680 4, the reception demodulation unit 680 5, and the switch 688. Specifically, as described in Embodiment 23, a control signal from an upper layer is received to set whether or not to perform confidential communication, and the communication procedure described in Embodiment 1 etc. In response, it controls the output of the propagation estimation signal and the operation according to the specified communication frame.
- FIG. 69 showing details of the transmission / reception part will be described.
- FIG. 69 shows a part of FIG. 68 in detail, and the same components are denoted by the same reference numerals. Here, description of each part is omitted, and details of the operation will be described.
- the modulation section 680 2 to which the data (data 1 to 1) has been input receives the modulation signal 1 to! ! Is generated and output to the channel synthesis unit 6803.
- the modulation signal is input from the modulation section 680 2 to the channel synthesis section 680 3, and the channel parameters are input as the antenna coefficient from the channel analysis section 680 4.
- the channel analysis unit 684 inputs the control signal and the received signal received by the RF unit 686, and uses the received signal sequence and the known signal sequence such as the reference signal to perform phase, amplitude, and delay dispersion. It extracts the characteristics of the propagation characteristics, etc., and outputs the channel parameters to the channel combining unit 6803.
- Channel combining section 6803 calculates an antenna coefficient corresponding to the antenna sequence from the channel parameters and the modulated signal. If propagation control is required by the control signal, the antenna coefficient calculated in this way is multiplied by the modulation signal, and the weighted transmission signal is output to the corresponding RF section 6806, where the power It is amplified and radiated from the antenna section 6807.
- control when propagation control is not required, it is suitable for communication (ie, maximum sensitivity at the receiving point).
- Control set the weighting coefficient to a preset value, or set one or more coefficients to 0.
- communication quality is improved.
- the weighting coefficient is set to a preset value, for example, if the communication environment is almost fixed and the directivity can be set in advance, high communication quality can be improved without complicated control. Then there is a special feature. If it is not possible to set the directivity in advance in this way, setting all of them to the same value improves the total output power and leads to the improvement of communication quality. If some of the weighting factors are set to 0, the output power will be reduced and power consumption will be reduced.
- the weighting operation can be performed by the configuration shown in FIG.
- the former is called primary modulation and the latter is called secondary modulation.
- the modulation signals l to k are primary modulation, and the modulation signals k + 1 to! This is possible by using!
- the secondary modulation For example, as shown in Embodiment 17, in the case of a system in which power is controlled to be 0 except for one modulation signal, the primary modulation is performed to a (1, 0) modulation signal as a secondary modulation.
- the modulated signals l to k as the second-order modulation applied to the (0, 0) modulated signal by applying the first-order modulated signals k + 1 to n.
- the modulated signals l to k it is also possible to regard the modulated signals l to k as the second-order modulation applied to the (0, 0) modulated signal by applying the first-order modulated signals k + 1 to n.
- Equation 34 the antenna coefficient is given by Equation 34.
- X is a component for superimposing information by secondary modulation.
- ASK represents amplitude
- PSK represents phase
- FSK represents frequency.
- the radiated radio wave is received by the antenna 680 7 of the communication terminal B 6851 via the propagation space 6852.
- This signal is sent by the channel synthesis unit
- the received signal S r X is expressed as in Equation 35 using the primary modulation signal St-1 and the secondary modulation signal St-2, the channel characteristics H, and the antenna coefficient W. It is possible.
- a received signal is obtained as a signal obtained by multiplying the primary modulated signal and the secondary modulated signal.
- the reception and demodulation unit 6805 can detect phase components by detecting phase components and detect amplitude components corresponding to primary modulation.
- data 2 corresponding to the secondary modulation can be demodulated.
- FIG. 70 shows FIG. 69 more specifically.
- reference numerals 7050 to 7052 describe signal constellations.
- Weighting multiplication section 7001 outputs a weighted transmission signal obtained by multiplying the primary modulation signal by the antenna coefficient.
- the coefficient storage unit 7002 stores the channel parameters calculated by the channel analysis unit 6804.
- the held basic coefficients are converted into antenna coefficients according to the secondary modulation signal and output.
- the number of secondary modulation patterns is small as described above, basic coefficients are prepared for the number of patterns, and antenna coefficients are easily switched according to the data 1 corresponding to the secondary modulation. It is possible to realize it.
- the primary modulation is described as QPSK and the secondary modulation is ASK.
- Signal 7050a shows the QPSK constellation and signal 7050b shows the ASK constellation.
- the antenna output from the coefficient storage unit 7002 The primary modulation signal is weighted using the coefficient, and the weighted transmission signal is output to the corresponding antenna 6807.
- This antenna coefficient is different from the phase and amplitude in the symbols 'sp ace,' and 'mark' of the secondary modulation, so that the primary modulation signal had four signal points,
- the signal has eight signal points.
- c space of secondary modulated signal ', c ma rk' antenna coefficient is for, it is assumed that the phase 'amplitudes differ, is either possible with the fixed child as a constant value.
- the amplitude is constant, the power supplied from each antenna is equal.
- the configuration of the weighting and multiplying unit 7001 becomes easy.
- the signal 7052 indicates a signal received by the communication terminal B 6851 via the propagation space 6852, and becomes an 8-APSK signal obtained by superimposing ASK on QPSK as shown in Expression 36.
- the reception demodulation unit 6805 can demodulate the data 2 by detecting the phase and demodulate the data 1 by detecting the amplitude.
- the secondary modulation is superimposed on the primary modulation by controlling the antenna coefficient, and the modulated signal forms a correct modulated signal only at the receiving point.
- the feature is to make it possible.
- Embodiment 27 describes a communication protocol for controlling secret communication in the physical layer in communication in the upper layer.
- FIG. 59 shows a communication system used in the twenty-seventh embodiment.
- communication terminal A 5950 and communication terminal B 5951 are communicating via propagation space 5952.
- communication terminal A 5950 and communication terminal B 5951 have the same configuration.
- the communication terminal A 5950 will be described.
- the upper layer 4750 is the application (in the case of external or internal).
- the received data and the transmitted data are transmitted and received, the transmitted data is output from the transmitting section 152, the control signal is output to the communication control section 4701, and the received data is input from the receiving demodulating section 150. I do.
- Reception demodulation section 150 receives a reception RF signal from antenna 1 11, demodulates the signal, and outputs reception data.
- the transmission section 152 receives the transmission data, generates a modulation signal, and outputs the transmission signal to the antenna 101.
- Communication control section 470 1 receives a control signal and outputs a transmission control signal to transmission section 152 and a reception control signal to reception demodulation section 150. In addition, propagation parameters are input from reception demodulation section 150, and propagation parameters are output to transmission section 152.
- the antenna 101 receives a transmission RF signal from the transmission unit 152, radiates the RF signal, and outputs the received reception RF signal to the reception demodulation unit 150.
- Communication control such as channel control and time control, which are essential for communication, is performed by the communication control unit 4701, and in addition, commands from the upper layer are notified via control signals.
- Communication terminal A 595 0 and communication terminal B 595 1 output an initialization control signal from the upper layer to set to the initial state according to a predetermined procedure when power is turned on or communication starts. I do.
- the upper layer of communication terminal A Upon receiving a secure transmission request, the upper layer of communication terminal A issues a secure transmission command with secure information to the physical layer.
- the physical layer of communication terminal A Upon receiving the secure transmission request command, the physical layer of communication terminal A sends a secure communication command to terminal B in synchronization with the communication timing between terminals A and B.
- the physical layer of communication terminal B Upon receiving the secure communication command, the physical layer of communication terminal B transmits a secure communication request to communication terminal A together with a propagation estimation signal in accordance with communication timing.
- the physical layer of communication terminal A estimates the propagation from the propagation estimation signal and calculates the propagation parameters. Furthermore, the secure information input in (1.2) is transmitted to communication terminal B using the secret communication method using the propagation parameter.
- the physical layer of the communication terminal B receives and demodulates the secure information transmitted using the secret communication method, and outputs the information to the upper layer.
- the upper layer of communication terminal B outputs the secure information output from the physical layer to the application.
- the secure information is transmitted from the application of the communication terminal A to the application of the communication terminal B using the confidential communication of the present invention.
- the communication procedure between applications can be transmitted most easily.
- Tguard is a time provided to avoid collision of communication signals, and is generally obtained from the communication distance to be saboted.
- T access indicates the time from issuing a secure communication command to completion of secure communication.
- the upper layer can use this value to perform communication state management when performing secure communication. is there.
- Tr ⁇ y is the time from when a secure communication request (propagation estimation signal) is given until the end of secure communication.
- the present invention uses propagation parameters for communication, so it is assumed that there is no change in the propagation environment. Invite. This effect will be described with reference to FIGS.
- FIG. 72 shows a temporal change in orthogonality over a propagation parameter, and represents a change from the propagation environment at a predetermined time by an index called orthogonality.
- the vertical axis shows the magnitude of the exponent
- FIGS. 73 and 74 show the communication quality in terms of bit error rate (BER), and show the communication quality in eight different fading patterns in consideration of the variety of communication changes.
- FIG. 73 shows a communication state with an index around 0.25
- FIG. 74 shows a communication state with an index around 0.35.
- the BER drops below 0.01 for all communications
- the exponent is 0.0, considering that information can be restored by error correction.
- a value of 3 or less is a large guide for the confidential communication of the present invention.
- S max is the maximum moving speed
- C is the speed of light
- Fc is the carrier frequency
- Fba ud is the symbol rate frequency.
- f d lZn
- Treply is about 3.5 ms or less.
- Treply Since the value of Treply is limited in this way, in TDD (Time D ivi si on D up 1 ex) communication that performs duplex using the same frequency band, access from other communication terminals within T access Prohibiting is effective. That is, it is conceivable that Tac access is set to a value larger than T reply (for example, 10 ms), and during this period, the upper layer controls so that only terminals performing confidential communication occupy communication resources.
- TDD Time D ivi si on D up 1 ex
- the application of communication terminal A outputs a request for receiving secure information to the upper layer.
- the upper layer of communication terminal B Upon receiving the secure information reception request, the upper layer of communication terminal B issues a secure reception command to the physical layer.
- the physical layer of communication terminal B Upon receiving the secure reception command, the physical layer of communication terminal B transmits a secure communication request to communication terminal B together with a propagation estimation signal in accordance with communication timing.
- the physical layer of communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameters. At the same time, it issues an information request command to the upper layer. (If the information is managed in the physical layer, no command is issued to the upper layer. (2.4) (2.5) is unnecessary. On the other hand, if the information is managed in the upper layer, (2.4) is No need.)
- the upper layer of communication terminal B receives information request commands from the physical layer and obtains information from the application.
- the upper layer of the communication terminal B issues an information response command to the physical layer together with the set information.
- the physical layer of communication terminal A receives and demodulates the secure information transmitted by using the secure communication method, and outputs it to the upper layer.
- the upper layer of communication terminal A outputs the secure information output from the physical layer to the application.
- the application of communication terminal A can request secure information from communication terminal B, and secure information can be transmitted from communication terminal B to communication terminal A.
- secure information can be received with the simplest procedure.
- an actual communication signal in the physical layer will be described with reference to FIG.
- the shaded portions in the figure indicate signals from communication terminal A to communication terminal B, and the others indicate signals from communication terminal B to communication terminal A.
- the application of communication terminal A outputs a request for receiving secure information to the upper layer.
- the upper layer of communication terminal B Upon receiving the secure information reception request, the upper layer of communication terminal B issues a secure reception command to the physical layer.
- the physical layer of communication terminal B Upon receiving the secure reception command, the physical layer of communication terminal B transmits an information preparation request to communication terminal B according to the communication timing.
- the physical layer of communication terminal B Upon receiving the information preparation request, the physical layer of communication terminal B issues an information request command to the upper layer. (If the information is managed by the physical layer, no command is issued to the upper layer. (3.4) (3.5) is unnecessary. On the other hand, if the information is managed by the upper layer, (3.4) Is unnecessary.)
- the upper layer of the communication terminal B receives the information request command from the physical layer and obtains the information from the application.
- the upper layer of communication terminal B issues an information response command to the physical layer together with the set information.
- the communication terminal A In the physical layer of the communication terminal B, when the information response command notifies that the information has been set, the communication terminal A notifies the communication terminal A of the completion of information preparation.
- the physical layer of communication terminal A Upon receiving the information preparation completion notification from communication terminal B, the physical layer of communication terminal A transmits a secure communication request to communication terminal B together with a propagation estimation signal in accordance with the communication timing.
- the physical layer of communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameters. Next, using the estimated propagation parameters, the obtained information is transmitted to communication terminal A by a secret communication method.
- the physical layer of communication terminal A receives and demodulates the secure information transmitted using the confidential communication method, and outputs it to the upper layer.
- the upper layer of communication terminal A outputs the secure information output from the physical layer to the application.
- the publication can perform confidential communication without being particularly aware of the communication state.However, depending on the application, specific information can be exchanged by confidential communication, or the received information can be confidentially communicated. You may need information on whether you are In such a case, as shown in FIG. 60, in the processing in the upper layer 4750, for example, (1.0), (2.0), (3.0), (1.6), (2. When exchanging information with an application in steps such as 8) and (3.10), by adding a flag indicating that confidential communication was used as an attribute of information, the application can perform more flexible processing. It has the feature of saying.
- the twenty-eighth embodiment further extends the invention described in the seventeenth and eighteenth embodiments, and makes it possible to increase the apparent number of transmitting antennas of the transmitting terminal. It is characterized by improving confidentiality.
- FIG. 77 shows a communication system used in the present embodiment.
- Communication terminal A 7750 has one transmitting / receiving antenna element, and communication terminal B has four transmitting / receiving antenna elements.
- communication terminal A 7750 will be described.
- the modulator 770 1 receives data and outputs a modulated signal obtained by modulating the data.
- the buffer 7702 outputs the buffered modulation signal, which holds the input of the modulation signal, to the channel synthesizing unit 7703.
- Channel combining section 7703 combines the modulated signal with the channel parameters, and outputs the transmission signal to transmitting section 7704.
- the transmitting section 7704 converts the frequency of the transmission signal, amplifies the power, and outputs the transmission: RF signal to the antenna 775.
- the antenna 770 5 radiates a transmission RF signal and outputs the received reception RF signal to the receiving section 770 6.
- Receiving section 7706 outputs a baseband signal to channel estimating section 7707 from the received RF signal inputted from antenna 7705.
- Channel estimating section 7707 estimates the characteristics of channel 7752 from the baseband signal input from receiving section 7706, and outputs estimated channel information.
- the channel analysis unit 77008 inputs the estimated channel information, calculates a channel parameter using a predetermined analysis method, and outputs the calculated channel parameters.
- the antenna 7709 inputs the transmission RF signal and radiates it, and outputs the received reception RF signal to the transmitting section 7710.
- the receiving section 7710 converts the received RF signal to a baseband signal and outputs the converted signal to the buffer 7711.
- Noise buffer 7 7 1 1 temporarily holds the baseband signal and shifts it by a predetermined time.
- the signal is output to the selective combining unit.
- the selection combining section 7 7 1 2 combines the signals with a time difference and outputs a combined signal.
- the demodulation unit 7 7 13 receives the synthesized signal and demodulates it to obtain a signal.
- the reference signal storage section 7714 stores and outputs a reference signal for estimating the channel 7752.
- the antenna selection unit 7 715 receives the reference signal and outputs it as a transmission signal to the selected antenna.
- the transmitting section 7 7 1 6 is an antenna element that receives a transmission signal and transmits a transmission RF signal.
- the channel of the communication propagation path is considered as a channel matrix H composed of h1, h2, h3, and h4.
- Communication terminal A 775 0 estimates the propagation using the reference signal from communication terminal B 775 1 ', and at this time, communication terminal A 775
- the orthogonal signals are output from the respective antennas so that the coefficient can be measured.
- a reference signal is output in a time division manner as a representative. In this way, communication terminal A can measure h1, h2, h3, and h4.
- the antennas from which the reference signal output from the reference signal storage unit 7714 is sequentially output by the antenna selection unit 7715 are switched.
- the transmission signal output in this way is amplified by the transmission section 717 16 and radiated from the corresponding antenna.
- the received RF signal is input to receiving section 770, and is sequentially converted into a baseband signal.
- the channel estimating unit 77007 receives the baseband signal, estimates the channel using the reference signal, and outputs channel information.
- the channel information is input to the channel analysis unit 770 8 and is analyzed.
- the singular value vector V obtained by the singular value decomposition can be separated into a singular vector with a non-singular value of 0 and a zero vector with a singular value of 0.
- each vector is V 1 to ⁇ 4
- V 1 is a singular vector
- V 2 to v 4 is a zero vector
- the singular value is assumed.
- Modulation section 7701 receives four sequences of data, and generates and outputs four sequences of modulated signals in accordance with a predetermined modulation method. These modulation signals are d1 to d4, d1 is a communication modulation signal, and d2 to d4 are pseudo modulation signals.
- the buffer unit 7702 inputs and holds the four series of modulation signals. The buffer unit 7702 keeps holding the same signal for four time slots.
- the channel combining unit 7703 inputs the four series of modulation signals and the channel parameters, and performs the following calculation.
- the transmission signal thus obtained is output to transmitting section 7704.
- the channel synthesizing unit 7703 receives the modulated signals d1 to d4 and performs the following operation.
- FIG. 78 shows the details of the reception processing of communication terminal B 7751.
- the received RF signal received by each antenna is converted into a baseband signal by the corresponding receiving unit 7710 and output.
- the baseband signal is temporarily held by the buffer unit 7711.
- 16 buffers are displayed in a series of 4 antennas for 4 timeslots.
- the signals stored in the buffer unit 7711 for four time slots by the above operation are designated as S1 :! to 44, respectively.
- This signal is a channel element h i ⁇ ! 14.
- Channel parameter overnight elements V11 to ⁇ 44 and modulated signals St1 to 4 can be expressed as follows.
- ⁇ 3]? 11 is given by the following equation using matrices 11, V, and D.
- the modulated signal d1 that the communication terminal A 7750 tried to transmit is obtained, and the other modulated signals are canceled. If the demodulation unit 7713 demodulates the signal thus obtained as it is, a demo can be obtained. Here, even if a third party tries to demodulate this, as in the other embodiments, since the channel parameters are unknown, d 1 cannot be separated and cannot be demodulated. By doing so, there is a significant feature that confidential communication can be realized without requiring special calculations for reception and demodulation.
- a propagation estimation signal is output together with the secure communication request signal.
- transmission slots are provided by the number of antenna elements of communication terminal B 7751, but transmission is not limited to this as long as the signals output from the antenna elements are orthogonal as described above.
- P1 to P4 shown in the figure are known signals output from corresponding antennas, respectively, and based on this, the channel estimation unit 7707 of the communication terminal A 7750 estimates a propagation path.
- communication terminal A 7750 performs confidential communication by preparing four time slots and transmitting the signal given by (DS1 to DS4) Equation 40 when performing confidential communication.
- the number of elements of antenna 7705 in communication terminal A 7750 is 1, and the number of elements of antenna 7709 in communication terminal B 7751 is 4. As mentioned, it is not limited to this.
- the present invention provides a higher-level communication system when m ⁇ n where the number of elements of communication terminal A 7750 is m and the number of elements of communication terminal B 7751 is n.
- m is 2 or more
- antenna selection such that k (k ⁇ m) of n is performed, and confidential communication as described in the other embodiments is also possible. It can be said that confidential communication can be performed by maximizing, so that the highest level of communication protection is achieved.
- a communication terminal having a small number of antenna elements (m) can provide the highest degree of communication protection to a communication terminal having a large number of antenna elements (n). This feature is particularly significant when m is 1.
- Embodiments 1 to 28 above confidential information corresponding to the propagation environment is acquired by the hardware configuration.
- the present invention is not limited to this, and processing according to the propagation environment is performed by software using a program or the like. You may be made to acquire the confidential information.
- a program or the like obtained by an arbitrary method such as a program transmitted through a network such as a program stored in a storage medium such as a CD-ROM.
- the present invention is a technique used for digital communication, and is particularly suitable for a technique related to security.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Facsimile Transmission Control (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
Priority Applications (8)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP03707115A EP1480372A4 (en) | 2002-02-28 | 2003-02-27 | COMMUNICATION APPARATUS AND COMMUNICATION SYSTEM |
| US10/502,048 US20050123138A1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| US10/502,048 US7515714B2 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| CN038072823A CN1643842B (zh) | 2002-02-28 | 2003-02-27 | 通信设备和通信系统 |
| US13/045,876 USRE45368E1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| AU2003211745A AU2003211745A1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| US14/571,857 USRE47356E1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| US16/295,722 USRE49244E1 (en) | 2002-02-28 | 2019-03-07 | Communication apparatus and communication system |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2002-54064 | 2002-02-28 | ||
| JP2002054064 | 2002-02-28 | ||
| JP2002-132068 | 2002-05-07 | ||
| JP2002132068 | 2002-05-07 | ||
| JP2003048364A JP2004032679A (ja) | 2002-02-28 | 2003-02-25 | 通信装置及び通信システム |
| JP2003-48364 | 2003-02-25 |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US201414571857A Continuation | 2002-02-28 | 2014-12-16 |
Related Child Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/502,048 A-371-Of-International US20050123138A1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
| US201113045876A Reissue | 2002-02-28 | 2011-03-11 | |
| US16/295,722 Reissue USRE49244E1 (en) | 2002-02-28 | 2019-03-07 | Communication apparatus and communication system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2003073689A1 true WO2003073689A1 (en) | 2003-09-04 |
Family
ID=27767759
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2003/002174 Ceased WO2003073689A1 (en) | 2002-02-28 | 2003-02-27 | Communication apparatus and communication system |
Country Status (6)
| Country | Link |
|---|---|
| US (5) | USRE47356E1 (enExample) |
| EP (5) | EP2479923A1 (enExample) |
| JP (1) | JP2004032679A (enExample) |
| CN (2) | CN101917244A (enExample) |
| AU (1) | AU2003211745A1 (enExample) |
| WO (1) | WO2003073689A1 (enExample) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100903697B1 (ko) * | 2007-05-25 | 2009-06-18 | 스펜션 엘엘씨 | 비휘발성 기억장치 |
| US7634088B2 (en) | 2003-09-04 | 2009-12-15 | The Doshisha | Radio communications system |
Families Citing this family (94)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040179713A1 (en) * | 2003-03-11 | 2004-09-16 | Kenji Tani | Image processing method, image processing apparatus, and information processing apparatus |
| GB0305486D0 (en) * | 2003-03-11 | 2003-04-16 | Koninkl Philips Electronics Nv | Multi-input multi-output system |
| US7983355B2 (en) | 2003-07-09 | 2011-07-19 | Broadcom Corporation | System and method for RF signal combining and adaptive bit loading for data rate maximization in multi-antenna communication systems |
| US8391322B2 (en) | 2003-07-09 | 2013-03-05 | Broadcom Corporation | Method and system for single weight (SW) antenna system for spatial multiplexing (SM) MIMO system for WCDMA/HSDPA |
| US7421075B2 (en) * | 2003-12-15 | 2008-09-02 | Microsoft Corporation | Wireless online cryptographic key generation method |
| US7680278B2 (en) * | 2004-02-04 | 2010-03-16 | Microsoft Corporation | Domino scheme for wireless cryptographic communication and communication method incorporating same |
| US7804912B2 (en) | 2004-09-23 | 2010-09-28 | Motorola, Inc. | Method and apparatus for encryption of over-the-air communications in a wireless communication system |
| GB0423567D0 (en) * | 2004-10-23 | 2004-11-24 | Koninkl Philips Electronics Nv | Mimo system and method of operating a mimo system |
| DE112004003005B4 (de) * | 2004-10-26 | 2011-12-01 | Spansion Llc (N.D.Ges.D. Staates Delaware) | Nicht-Flüchtiges Speicherbauelement |
| US8077782B2 (en) * | 2005-01-11 | 2011-12-13 | Sharp Kabushiki Kaisha | Adaptive modulation control apparatus and wireless communication apparatus |
| US7382744B2 (en) * | 2005-01-27 | 2008-06-03 | Qualcomm Incorporated | Systems and methods for optimizing the allocation of resources to serve different types of data flows in a wireless communication system |
| US8280046B2 (en) | 2005-09-12 | 2012-10-02 | Interdigital Technology Corporation | Method and system for deriving an encryption key using joint randomness not shared by others |
| KR20110076992A (ko) * | 2005-01-27 | 2011-07-06 | 인터디지탈 테크날러지 코포레이션 | 다른 것에 공유되지 않는 결합 랜덤성을 이용하여 암호화 키를 유도하는 방법 및 시스템 |
| CN101288260A (zh) | 2005-01-27 | 2008-10-15 | 美商内数位科技公司 | 使用未由他人分享联合随机衍生秘钥方法及系统 |
| US7797320B2 (en) * | 2005-03-15 | 2010-09-14 | Hyperion Solutions Corporation | Dimensionality reduction |
| US7684784B2 (en) * | 2005-03-24 | 2010-03-23 | Honeywell International Inc. | System for secure communications |
| CN101185280A (zh) * | 2005-06-01 | 2008-05-21 | 皇家飞利浦电子股份有限公司 | 补偿帮助数据系统中的采集噪声 |
| US8730877B2 (en) | 2005-06-16 | 2014-05-20 | Qualcomm Incorporated | Pilot and data transmission in a quasi-orthogonal single-carrier frequency division multiple access system |
| JP4662040B2 (ja) * | 2005-07-08 | 2011-03-30 | 日本電気株式会社 | 通信システムおよびその同期制御方法 |
| KR100810231B1 (ko) * | 2005-09-28 | 2008-03-06 | 삼성전자주식회사 | 무선 통신 시스템에서 다중 안테나를 이용한 신호 송신방법 및 장치 |
| US7893873B2 (en) * | 2005-12-20 | 2011-02-22 | Qualcomm Incorporated | Methods and systems for providing enhanced position location in wireless communications |
| KR20080083176A (ko) * | 2005-12-20 | 2008-09-16 | 인터디지탈 테크날러지 코포레이션 | 결합 랜덤성으로부터 비밀키를 발생하는 방법 및 시스템 |
| JP2007288694A (ja) * | 2006-04-19 | 2007-11-01 | Nec Corp | 秘匿通信システムおよびチャネル制御方法 |
| WO2007137246A2 (en) * | 2006-05-22 | 2007-11-29 | Continental Automotive Systems Us, Inc. | Method of operating multiple vehicles using any transmitter from a programmed group |
| AT504196B1 (de) * | 2006-09-15 | 2012-04-15 | Frequentis Gmbh | Verfahren und system zur übertragung von vertraulichen und nicht vertraulichen daten |
| US7899475B2 (en) * | 2006-10-25 | 2011-03-01 | Microsoft Corporation | Enhanced short message service (SMS) |
| JP2008109466A (ja) * | 2006-10-26 | 2008-05-08 | Yokohama National Univ | 秘密鍵共有方法および装置 |
| US7809074B2 (en) * | 2007-03-16 | 2010-10-05 | Freescale Semiconductor, Inc. | Generalized reference signaling scheme for multi-user, multiple input, multiple output (MU-MIMO) using arbitrarily precoded reference signals |
| US7986933B2 (en) * | 2007-03-19 | 2011-07-26 | Apple Inc. | Method and system for wireless communications between base and mobile stations |
| JP5126651B2 (ja) * | 2007-03-28 | 2013-01-23 | 株式会社国際電気通信基礎技術研究所 | 通信システムおよびそれに用いる無線装置 |
| WO2008129754A1 (ja) * | 2007-04-13 | 2008-10-30 | Panasonic Corporation | Ofdm信号受信装置及びofdm信号受信方法 |
| JP5147936B2 (ja) * | 2007-04-19 | 2013-02-20 | インターデイジタル テクノロジー コーポレーション | Fdd、tdd、およびmimo通信でjrnsoを実行するための方法および機器 |
| KR101107940B1 (ko) * | 2007-06-08 | 2012-01-25 | 콸콤 인코포레이티드 | 단일-캐리어 주파수 분할 다중 액세스에서 통신 채널들을 위한 계층적 변조 |
| KR100889936B1 (ko) * | 2007-06-18 | 2009-03-20 | 한국전자통신연구원 | 디지털 비디오 특징점 비교 방법 및 이를 이용한 디지털비디오 관리 시스템 |
| US20090046794A1 (en) * | 2007-07-25 | 2009-02-19 | Buffalo Inc. | Multi-input multi-output communication device, antenna device and communication system |
| JP2009055228A (ja) * | 2007-08-24 | 2009-03-12 | Sony Corp | 無線通信システム、無線通信装置及び無線通信方法 |
| US20100278335A1 (en) * | 2007-11-02 | 2010-11-04 | Per Enge | Arrangements for Location-Based Security Systems and Methods Therefor |
| CN101505485B (zh) | 2008-02-05 | 2014-11-05 | 三星电子株式会社 | Lte tdd系统中发送srs的方法和装置 |
| JP2010109631A (ja) * | 2008-10-29 | 2010-05-13 | Kyocera Corp | 無線通信システム、送信装置、および通信信号送信方法 |
| IL194996A0 (en) * | 2008-10-30 | 2011-08-01 | Mariana Goldhamer | A method for depoying heterogeneous base stations in a wireless network |
| US20100146289A1 (en) * | 2008-10-30 | 2010-06-10 | Theodoros Kamakaris | Radio scene encryption and authentication process |
| KR101616873B1 (ko) * | 2008-12-23 | 2016-05-02 | 삼성전자주식회사 | 디지털 앰프의 소요 전력량 예측 장치 및 그 방법 |
| US8554136B2 (en) | 2008-12-23 | 2013-10-08 | Waveconnex, Inc. | Tightly-coupled near-field communication-link connector-replacement chips |
| JP5590803B2 (ja) * | 2009-01-13 | 2014-09-17 | キヤノン株式会社 | 通信装置及び通信方法 |
| EP2403173B1 (en) * | 2009-02-24 | 2017-03-29 | Panasonic Corporation | Wireless transmission apparatus and precoding method |
| US8611288B1 (en) * | 2009-03-05 | 2013-12-17 | Marvell International Ltd | Systems and methods for link adaptation in wireless communication systems |
| US8982803B1 (en) | 2009-03-05 | 2015-03-17 | Marvell International Ltd. | Systems and methods for link adaption in wireless communication systems |
| JP5288473B2 (ja) * | 2009-03-13 | 2013-09-11 | オムロンオートモーティブエレクトロニクス株式会社 | 制御システムおよび方法、並びに、携帯機および通信方法 |
| JP4918580B2 (ja) * | 2009-08-27 | 2012-04-18 | 株式会社エヌ・ティ・ティ・ドコモ | 無線基地局、移動局、移動通信方法及び測定方法 |
| JP5573053B2 (ja) * | 2009-09-04 | 2014-08-20 | ソニー株式会社 | 無線通信装置および無線通信方法 |
| US8902873B2 (en) * | 2009-10-08 | 2014-12-02 | Qualcomm Incorporated | Efficient signaling for closed-loop transmit diversity |
| JP5505178B2 (ja) * | 2009-11-02 | 2014-05-28 | 日本電気株式会社 | 無線通信装置、無線通信装置の受信レベル判別方法及びプログラム |
| EP2343837A1 (en) * | 2010-01-08 | 2011-07-13 | Alcatel Lucent | Channel state information feedback using a hierarchical codebook for vector quantisation |
| WO2011126351A2 (ko) * | 2010-04-09 | 2011-10-13 | 엘지전자 주식회사 | 경쟁 기반의 상향링크 채널 신호 송수신 방법 |
| KR101737842B1 (ko) | 2010-04-09 | 2017-05-29 | 엘지전자 주식회사 | 경쟁 기반의 상향링크 채널 신호 송수신 방법 |
| US9088888B2 (en) * | 2010-12-10 | 2015-07-21 | Mitsubishi Electric Research Laboratories, Inc. | Secure wireless communication using rate-adaptive codes |
| JP2014512154A (ja) * | 2011-05-24 | 2014-05-19 | エンパイア テクノロジー ディベロップメント エルエルシー | 実世界オブジェクトを使用する暗号化 |
| CN103548293A (zh) * | 2011-07-15 | 2014-01-29 | 富士通株式会社 | 功率补偿方法、基站和终端设备 |
| KR101269502B1 (ko) * | 2011-12-14 | 2013-05-30 | 한국전자통신연구원 | 무선 통신 네트워크에서 무선 채널 변화를 이용한 비밀키 생성을 위한 장치 및 방법 |
| CN103368583B (zh) * | 2012-04-11 | 2016-08-17 | 华为技术有限公司 | 极性码的译码方法和译码装置 |
| CN106899311B (zh) * | 2012-09-24 | 2023-11-03 | 华为技术有限公司 | 混合极性码的生成方法和生成装置 |
| US8855303B1 (en) * | 2012-12-05 | 2014-10-07 | The Boeing Company | Cryptography using a symmetric frequency-based encryption algorithm |
| CN105379409B (zh) * | 2013-03-15 | 2019-09-27 | 凯萨股份有限公司 | Ehf安全通信设备 |
| JP6273566B2 (ja) | 2013-04-12 | 2018-02-07 | パナソニックIpマネジメント株式会社 | 通信システム、画像生成方法、及び通信装置 |
| CN105612407B (zh) * | 2013-10-09 | 2018-05-15 | 富士机械制造株式会社 | 多路复用通信系统及作业用机器人 |
| WO2015056353A1 (ja) * | 2013-10-18 | 2015-04-23 | 株式会社日立製作所 | 高セキュア無線通信システム |
| US9312944B2 (en) * | 2013-12-26 | 2016-04-12 | Aruba Networks, Inc. | System, apparatus and method for integrated wireless link management for a multi-polarized antenna system |
| CN104753576B (zh) * | 2013-12-30 | 2018-05-25 | 瑞昱半导体股份有限公司 | 波束成形器及其无线通信方法 |
| US9124580B1 (en) * | 2014-02-07 | 2015-09-01 | The Boeing Company | Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications |
| KR102208226B1 (ko) * | 2014-03-25 | 2021-01-27 | 한국전자통신연구원 | 송수신 방법 및 장치 |
| CN104980187B (zh) * | 2014-04-08 | 2017-09-19 | 华北电力大学 | 一种信号去噪处理的方法及装置 |
| US10153824B2 (en) * | 2014-11-13 | 2018-12-11 | Hitachi, Ltd. | Wireless communication system and system using same |
| US9756024B2 (en) * | 2015-09-18 | 2017-09-05 | Trillium Incorporated | Computer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same |
| FR3046315B1 (fr) * | 2015-12-29 | 2018-04-27 | Thales | Procede d'extraction univalente et univoque de cles a partir du canal de propagation |
| US10616184B2 (en) * | 2016-06-30 | 2020-04-07 | Intel Corporation | Wireless display streaming of protected content |
| CN115225169B (zh) | 2017-05-31 | 2025-06-13 | 弗劳恩霍夫应用研究促进协会 | 装置、用于测试装置的测量系统及其操作方法 |
| US10999304B2 (en) | 2018-04-11 | 2021-05-04 | Palo Alto Networks (Israel Analytics) Ltd. | Bind shell attack detection |
| US10764285B2 (en) * | 2018-07-25 | 2020-09-01 | Honda Motor Co., Ltd. | Method and system for encryption using a radio frequency fingerprint |
| US10778339B2 (en) | 2018-09-14 | 2020-09-15 | Viasat, Inc. | Systems and methods for creating in a transmitter a stream of symbol frames configured for efficient processing in a receiver |
| CN109302216B (zh) * | 2018-12-04 | 2021-03-30 | 电子科技大学 | 基于空间调制的全双工通信系统 |
| CN113346936B (zh) * | 2019-01-07 | 2022-09-13 | Oppo广东移动通信有限公司 | 一种码本处理方法、终端设备及网络设备 |
| US11184376B2 (en) * | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Port scan detection using destination profiles |
| US11184377B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using source profiles |
| US11184378B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Scanner probe detection |
| US11316872B2 (en) | 2019-01-30 | 2022-04-26 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using port profiles |
| TWI693419B (zh) * | 2019-02-13 | 2020-05-11 | 國立交通大學 | 訊號處理方法 |
| US11395136B2 (en) * | 2019-09-25 | 2022-07-19 | Qualcomm Incorporated | Impairment based physical layer fingerprint |
| US20230063345A1 (en) * | 2020-01-31 | 2023-03-02 | Sony Group Corporation | Operating a terminal device and a network node in a wireless mimo system |
| WO2021167569A1 (en) * | 2020-02-18 | 2021-08-26 | İstanbul Medi̇pol Üni̇versi̇tesi̇ | Joint random subcarrier selection and channel-based artificial signal design aided pls |
| CN112491547B (zh) * | 2020-12-03 | 2022-06-28 | 长春理工大学 | 大气湍流光信道共享随机比特提取系统 |
| CN117501732A (zh) * | 2021-06-23 | 2024-02-02 | 高通股份有限公司 | 用于通过信道测量和报告来维持传输完整性和真实性的方法和装置 |
| US12039017B2 (en) | 2021-10-20 | 2024-07-16 | Palo Alto Networks (Israel Analytics) Ltd. | User entity normalization and association |
| US11799880B2 (en) | 2022-01-10 | 2023-10-24 | Palo Alto Networks (Israel Analytics) Ltd. | Network adaptive alert prioritization system |
| CN119171990A (zh) * | 2024-10-14 | 2024-12-20 | 北京理工大学 | 信号生成方法和装置、非线性系统噪声测量方法和系统 |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0541607A (ja) * | 1991-08-06 | 1993-02-19 | Kokusai Denshin Denwa Co Ltd <Kdd> | アダプテイブアレイアンテナ制御方式 |
Family Cites Families (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3633105A (en) * | 1970-04-01 | 1972-01-04 | Gte Automatic Electric Lab Inc | Digital adaptive equalizer system |
| US3671967A (en) * | 1970-05-11 | 1972-06-20 | Boeing Co | Multiple antenna instrument landing system |
| US4514753A (en) * | 1982-11-03 | 1985-04-30 | Colorado Video, Incorporated | Spectrum conservation in encoded color TV signals |
| JPS6020660A (ja) | 1983-07-14 | 1985-02-01 | Sharp Corp | 符号化情報のランダム化方式 |
| JPH0644701B2 (ja) | 1986-06-27 | 1994-06-08 | 日本電気株式会社 | たたみ込み演算回路 |
| JPS63121334A (ja) | 1986-11-11 | 1988-05-25 | Kenwood Corp | 秘密通信方式 |
| CA1310709C (en) | 1989-06-26 | 1992-11-24 | Simon Haykin | Adaptive interference canceller |
| JPH04220033A (ja) | 1990-12-19 | 1992-08-11 | Alpine Electron Inc | デ−タ通信方式 |
| JPH0595352A (ja) | 1991-10-02 | 1993-04-16 | Matsushita Electric Ind Co Ltd | スクランブル装置およびそのデスクランブル装置 |
| DE69309496T2 (de) * | 1992-12-24 | 1997-08-07 | British Telecommunications Public Ltd. Co., London | System und verfahren zur schluesselverteilung unter verwendung von quanten-kryptographie |
| US5532706A (en) | 1994-12-05 | 1996-07-02 | Hughes Electronics | Antenna array of radiators with plural orthogonal ports |
| US5604806A (en) | 1995-01-20 | 1997-02-18 | Ericsson Inc. | Apparatus and method for secure radio communication |
| DE19742124C2 (de) | 1997-09-24 | 2001-10-18 | Siemens Ag | Verfahren und Basisstationssystem zur Sprachübertragung über eine Funkschnittstelle in einem digitalen Funk-Kommunikationssystem |
| JP2000049524A (ja) | 1998-07-31 | 2000-02-18 | Nec Corp | アレイアンテナ |
| JP2000046939A (ja) | 1998-07-31 | 2000-02-18 | Nippon Telegr & Teleph Corp <Ntt> | ワイヤレスカード位置検出システム及び方法及び位置検出プログラムを記録した記録媒体 |
| FI108588B (fi) * | 1998-12-15 | 2002-02-15 | Nokia Corp | Menetelmä ja radiojärjestelmä digitaalisen signaalin siirtoon |
| JP2000286751A (ja) | 1999-03-30 | 2000-10-13 | Matsushita Electric Ind Co Ltd | 基地局装置及び送信方法 |
| CN1270445C (zh) | 1999-04-02 | 2006-08-16 | 株式会社Ntt杜可莫 | 信道估计装置和方法以及解调装置和方法 |
| AU5567300A (en) | 1999-06-23 | 2001-01-09 | Japan As Represented By President Of Hokkaido University | Radio device |
| JP3425589B2 (ja) | 2000-02-29 | 2003-07-14 | 独立行政法人通信総合研究所 | 伝送品質の測定装置、測定方法、および、情報記録媒体 |
| KR100327494B1 (ko) | 2000-03-24 | 2002-03-15 | 윤종용 | 다중 접근 방식을 이용한 보안 통신 시스템에서의 키 동의방법 |
| JP4509296B2 (ja) | 2000-04-26 | 2010-07-21 | 株式会社東芝 | 移動無線端末 |
| JP3678119B2 (ja) * | 2000-06-01 | 2005-08-03 | 株式会社デンソー | Ofdm用通信システムおよびその通信システムに用いられる基地局並びに端末 |
| JP3567983B2 (ja) | 2000-10-30 | 2004-09-22 | 京セラミタ株式会社 | 画像形成機 |
| JP2002054064A (ja) | 2000-08-03 | 2002-02-19 | Sekisui Chem Co Ltd | 水解性不織布 |
| JP3580495B2 (ja) | 2000-08-25 | 2004-10-20 | 日本電気株式会社 | 適応アンテナ受信装置 |
| JP2003048364A (ja) | 2001-08-06 | 2003-02-18 | Canon Aptex Inc | 記録媒体の終端検出方法及び記録装置 |
| JP2003069516A (ja) | 2001-08-27 | 2003-03-07 | Kenwood Corp | 受信方法及び受信機 |
| JP2003258771A (ja) | 2002-03-06 | 2003-09-12 | Shuichi Sasaoka | 秘密通信方法 |
| KR101012553B1 (ko) | 2006-02-02 | 2011-02-07 | 후지쯔 가부시끼가이샤 | 무선 전송 방법과 무선 송신기 및 무선 수신기 |
| JP5624988B2 (ja) | 2010-06-08 | 2014-11-12 | パナソニック株式会社 | Mimo受信装置及び受信方法 |
-
2003
- 2003-02-25 JP JP2003048364A patent/JP2004032679A/ja active Pending
- 2003-02-27 EP EP20110184395 patent/EP2479923A1/en not_active Withdrawn
- 2003-02-27 EP EP20100154511 patent/EP2276193A1/en not_active Withdrawn
- 2003-02-27 EP EP11184390A patent/EP2479922A1/en not_active Withdrawn
- 2003-02-27 US US14/571,857 patent/USRE47356E1/en not_active Expired - Lifetime
- 2003-02-27 AU AU2003211745A patent/AU2003211745A1/en not_active Abandoned
- 2003-02-27 WO PCT/JP2003/002174 patent/WO2003073689A1/ja not_active Ceased
- 2003-02-27 CN CN2010102742506A patent/CN101917244A/zh active Pending
- 2003-02-27 CN CN038072823A patent/CN1643842B/zh not_active Expired - Lifetime
- 2003-02-27 US US10/502,048 patent/US20050123138A1/en active Granted
- 2003-02-27 US US10/502,048 patent/US7515714B2/en not_active Ceased
- 2003-02-27 EP EP03707115A patent/EP1480372A4/en not_active Withdrawn
- 2003-02-27 EP EP20110184399 patent/EP2461517A3/en not_active Withdrawn
- 2003-02-27 US US13/045,876 patent/USRE45368E1/en not_active Expired - Lifetime
-
2019
- 2019-03-07 US US16/295,722 patent/USRE49244E1/en not_active Expired - Lifetime
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0541607A (ja) * | 1991-08-06 | 1993-02-19 | Kokusai Denshin Denwa Co Ltd <Kdd> | アダプテイブアレイアンテナ制御方式 |
Non-Patent Citations (5)
| Title |
|---|
| CHIKAKO UCHIYAMA: "Surikagaku,", 1 December 1996, SAIENSU-SHA CO., LTD., article "Ryoshi rikigaku no kiso to ryoshi ango ryoshi tsushin channel no shiten", pages: 53 - 61, XP002969410 * |
| HERO A. O.: "Secure Space-Time Communication", 24 April 2001, DEPT. OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, pages: 1 - 37 |
| HERSHEY J. E. ET AL.: "UNCONVENTIONAL CRYPTOGRAPHIC KEYING VARIABLE MANAGEMENT", IEEE TRANSACTION 5 ON COMMUNICATIONS, IEEE INC. NEW YORK. US, vol. 43, no. 1, January 1995 (1995-01-01), pages 3 - 6, XP000487370, DOI: doi:10.1109/26.385951 |
| KOORAPATY H. ET AL.: "Secure Information Transmission for Mobile Radio", IEEE COMMUNICATIONS LETTERS. IEEE SERVICE CENTER, PISCATAWAY .US, vol. 4, no. 2, February 2000 (2000-02-01), pages 52 - 55, XP000949604, DOI: doi:10.1109/4234.824754 |
| MASAYOSHI MUROYA, HEICHI YAMAMOTO, 10 March 1992, SANGYO TOSHO KABUSHIKI KAISHA, article "Digital communication series digital musen tsushin", XP002969411 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7634088B2 (en) | 2003-09-04 | 2009-12-15 | The Doshisha | Radio communications system |
| KR100903697B1 (ko) * | 2007-05-25 | 2009-06-18 | 스펜션 엘엘씨 | 비휘발성 기억장치 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2276193A1 (en) | 2011-01-19 |
| USRE47356E1 (en) | 2019-04-16 |
| EP1480372A4 (en) | 2005-04-20 |
| CN1643842B (zh) | 2010-11-10 |
| USRE49244E1 (en) | 2022-10-11 |
| USRE45368E1 (en) | 2015-02-10 |
| US7515714B2 (en) | 2009-04-07 |
| US20050123138A1 (en) | 2005-06-09 |
| JP2004032679A (ja) | 2004-01-29 |
| EP2461517A2 (en) | 2012-06-06 |
| EP2479922A1 (en) | 2012-07-25 |
| CN101917244A (zh) | 2010-12-15 |
| CN1643842A (zh) | 2005-07-20 |
| EP2479923A1 (en) | 2012-07-25 |
| EP2461517A3 (en) | 2012-07-25 |
| AU2003211745A1 (en) | 2003-09-09 |
| EP1480372A1 (en) | 2004-11-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2003073689A1 (en) | Communication apparatus and communication system | |
| US10382106B2 (en) | Pilots for MIMO communication systems | |
| US6128276A (en) | Stacked-carrier discrete multiple tone communication technology and combinations with code nulling, interference cancellation, retrodirective communication and adaptive antenna arrays | |
| CN100380857C (zh) | Mimo通信系统的导频 | |
| US7792208B2 (en) | Pilot tones in a multi-transmit OFDM system usable to capture transmitter diversity benefits | |
| EP1719314B1 (en) | Transmission method and apparatus in a multiple antenna communication system | |
| EP1233547A1 (en) | Data transmitting apparatus, radio communication system and radio communication method | |
| US20070047678A1 (en) | Method and system for combined polarimetric and coherent processing for a wireless system | |
| CN100593288C (zh) | 无线通信系统、无线通信设备、无线通信方法和计算机程序 | |
| CA2340716A1 (en) | Stacked-carrier discrete multiple tone communication technology | |
| WO2008035812A1 (en) | Systems and methods for obtaining an optimum transmission format of reference signals | |
| JP2008211842A (ja) | 端末の受信方法及び端末の受信装置 | |
| CN102439894A (zh) | 用于多输入多输出(mimo)和空分多址(sdma)系统中的正交导频频调映射的方法和装置 | |
| JP4381749B2 (ja) | 無線通信装置及び無線通信方法 | |
| TWI397271B (zh) | 使用髒紙編碼之mimo空氣介面 | |
| JP4794085B2 (ja) | データ伝送装置及び無線通信システム | |
| CN102804832A (zh) | 蜂窝网络中的多站点mimo协作 | |
| JP2004120730A (ja) | 通信方法およびそれを用いた送信装置と受信装置 | |
| JP2006230025A (ja) | 通信装置及び通信方法 | |
| CN111224702A (zh) | 基于拉格朗日乘子的最小正则化发射功率波束成形方法 | |
| KR20200031546A (ko) | 물리 계층 보안을 위한 빔포밍 방법 및 장치 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 10502048 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2003707115 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 20038072823 Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2003707115 Country of ref document: EP |