摘要:
A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement is associated with a time-stamp. Where possible, the time-stamps are paired with time-stamps that are associated with another plurality of CIR measurements. The CIR data associated with the paired time-stamps is aggregated. Each of the aggregated CIR measurements is aligned, and at least one CIR measurement is selected for use in secret key generation.
摘要:
A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement is associated with a time-stamp. Where possible, the time-stamps are paired with time-stamps that are associated with another plurality of CIR measurements. The CIR data associated with the paired time-stamps is aggregated. Each of the aggregated CIR measurements is aligned, and at least one CIR measurement is selected for use in secret key generation.
摘要:
A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication is performed.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method for multicasting a packet begins by providing a buffer for each of two user equipments (UEs) in communication with a base station. A determination is made whether there is a previously unsent packet at the base station. A second determination is made whether both UE buffers are non-empty. A non-empty buffer is flushed if there is no previously unsent packet and if one of the buffers is non-empty. A packet is selected to be transmitted if there is a previously unsent packet or if both buffers are non-empty. The buffers are updated based on feedback received from the UEs.
摘要:
A method for multicasting a packet begins by providing a buffer for each of two user equipments (UEs) in communication with a base station. A determination is made whether there is a previously unsent packet at the base station. A second determination is made whether both UE buffers are non-empty. A non-empty buffer is flushed if there is no previously unsent packet and if one of the buffers is non-empty. A packet is selected to be transmitted if there is a previously unsent packet or if both buffers are non-empty. The buffers are updated based on feedback received from the UEs.
摘要:
A method for multicasting a packet begins by providing a buffer for each of two user equipments (UEs) in communication with a base station. A determination is made whether there is a previously unsent packet at the base station. A second determination is made whether both UE buffers are non-empty. A non-empty buffer is flushed if there is no previously unsent packet and if one of the buffers is non-empty. A packet is selected to be transmitted if there is a previously unsent packet or if both buffers are non-empty. The buffers are updated based on feedback received from the UEs.
摘要:
A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station.
摘要:
A method and apparatus for use in authentication for secure wireless communication is provided. A received signal is physically authenticated and higher layer processed. Physical authentication includes performing hypothesis testing using a channel impulse response (CIR) measurement of the received signal and predetermined referenced data. Higher layer processing includes validating the signal using a one-way hash chain value in the signal. Once a signal is authenticated, secure wireless communication is performed.
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.