摘要:
In a wireless communication system comprising at least one wireless transmit/receive unit (WTRU), a base station, and a radio network controller (RNC), a method for constant envelope orthogonal frequency division multiplexing (CE-OFDM) modulation comprises the WTRU performing an inverse transform on the data. The WTRU next performs constant envelope (CE) modulation on the data and transmits the CE-OFDM data to the base station. The base station receives the data and CE demodulates the data. The base station performs a transform on the demodulated data.
摘要:
A method and apparatus for securing wireless communications are disclosed. A watermark message is encoded to watermark message symbols. A cover message is encoded to cover message symbols. The watermark message symbols are then overlaid onto the cover message symbols to generate a watermark-embedded cover message in a physical layer. The watermark message symbols have a substantially lower amplitude than the cover message symbols. Thus, the watermark message introduces small perturbation around the constellation points of the cover message symbols. The watermark message symbol may span or spread over a plurality of cover message symbols and may be encrypted with a secret key. The watermark message is used for improving receiver performance by transmitting additional information or for security enhancement purposes. The watermarking function may be selectively turned on and off.
摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method for transmitting an encrypted signal to a wireless transmit/receive unit (WTRU) such that decryption of the encrypted signal depends on a trust zone associated with the WTRU is disclosed. The encryption may be performed using hierarchical modulation, scrambling, authentication, location validation, or a combination thereof. The size of a trust zone may also be adjusted.
摘要:
The present invention is related to a generalized rake receiver for a wireless communication system. The rake receiver comprises a plurality of finger correlators and a plurality of escort correlators. Each finger correlator demodulates each multipath components of the transmitted signal. The escort correlator is used for multipath tracking for optimal finger placement and weight estimation for demodulation. The escort correlator is located in vicinity of multipath center and is programmable within a chip and at a resolution finer than a chip. Weight vector is estimated using the estimate of the total base station energy based upon the pilot information from the base stations in soft-handoff.
摘要:
A method and system for generating a secret key from joint randomness shared by wireless transmit/receive units (WTRUs) are disclosed. A first WTRU and a second WTRU perform channel estimation to generate a sampled channel impulse response (CIR) on a channel between the first WTRU and the second WTRU. The first WTRU generates a set of bits from the sampled CIR and generates a secret key and a syndrome, (or parity bits), from the set of bits. The first WTRU sends the syndrome, (or parity bits), to the second WTRU. The second WTRU reconstructs the set of bits from the syndrome, (or parity bits), and its own sampled CIR, and generates the secret key from the reconstructed set of bits.
摘要:
A personal communicator in the form of a wireless transmit/receive unit (WTRU) can communicate in multiple modes to provide a user with seamless roaming, handover, and session continuity between multiple network or peer to peer communications. The WTRU has selectively operable transceiver components that are configured for wireless mobile network communications with mobile network base stations, wireless local network communications with local network base stations, and wireless peer to peer communications with other WTRUs. Various methods are provided utilizing the WTRU's multiple network communicating capabilities.