摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A medium access control (MAC) entity first computes an achievable rate region based on a total transmit power limit and a channel gain of each of a plurality of WTRUs. Next, the MAC entity selects an order of DPC among the WTRUs. A rate set for use in transmitting to the WTRUs is then selected, said rate set being within the computed achievable rate region. Then, based on the selected DPC order and rate set, a DPC entity performs DPC on a plurality of data streams intended for the plurality of WTRUs. If nested lattice-based DPC is utilized, rate compatibility is achieved by selecting proper nesting ratios corresponding to a desired data rate set. Otherwise, if binary-code based DPC is utilized, rate compatibility is achieved via selecting appropriate message input sizes for input to point-to-point coding units prior to performing DPC.
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
A transceiver comprising a data processing module, a security processing module, a medium access control (MAC) module, a dirty-paper-coding (DPC) module, and a smart antenna processor. The data processing module provides user data streams to the MAC module and channel state information to the smart antenna processor. The security processing module generates security data and provides the security data to the MAC module. The security module also provides security policy data to the smart antenna processor. The MAC module determines data transmission rates for the user data streams and the security data. In addition, the MAC module allocates the data streams and security data to transmission channels for transmission. The DPC module encodes the security data onto the user data streams. The smart antenna processor generates pre-coding coefficients used by the DPC module and transmits the security encoded data streams.
摘要:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A medium access control (MAC) entity first computes an achievable rate region based on a total transmit power limit and a channel gain of each of a plurality of WTRUs. Next, the MAC entity selects an order of DPC among the WTRUs. A rate set for use in transmitting to the WTRUs is then selected, said rate set being within the computed achievable rate region. Then, based on the selected DPC order and rate set, a DPC entity performs DPC on a plurality of data streams intended for the plurality of WTRUs. If nested lattice-based DPC is utilized, rate compatibility is achieved by selecting proper nesting ratios corresponding to a desired data rate set. Otherwise, if binary-code based DPC is utilized, rate compatibility is achieved via selecting appropriate message input sizes for input to point-to-point coding units prior to performing DPC.