The present disclosure relates to a first and second communication device for use in a wireless communication system to communicate with each other in a secure manner. The present disclosure relates further to corresponding communication methods.
Secure messaging between an information sender and an intended recipient is one of the fundamental challenges in communication systems. In order to not let information pass to an unintended recipient (an adversary or eavesdropper), care must be taken to control the environment and/or cryptographically secure the information so that only the intended recipient is able to understand the information transmitted. Cryptographic approaches usually operate on upper layers of the transmission protocol. Once the signal is intercepted on a lower layer, such as PHY layer (over the medium, such as RF waves), brute force decryption may be possible, especially when the packet lengths and encryption keys are relatively short. This is especially true for Internet of Things (IOT) applications, in which typically only a few bits or bytes may be transmitted. Thus, PHY layer security has been considered as an additional means to protect the signal already on PHY layer.
In a wireless communication system all participants (hereinafter also called communication devices) share the same communication medium and are able to listen (or eavesdrop) on any communication within receive range. According to conventional approaches, information that shall not be shared with all potential recipients might be encrypted using keys exclusively known to the sender and receiver. The standard way to establish those keys is to derive them from a pre-shared secret (also known as the network password) given to legitimate participants for association with the network. Unless further measures are taken, all participants are then able to decrypt information from any other participant that is part of the network. To mitigate the problem of potential “eavesdropping” of sensitive information, concepts for Point-to-Point encryption for such networks exist. Nevertheless, an exchange of an encryption key is required to establish a secure communication link. A common solution is implemented in the Extensible Authentication Protocol (EAP) which is used in the context of IEEE 802.11 wireless LANs to exchange keys. The handshake procedure that takes place in the set-up phase of such a secure connection still is sensitive, and if it is eavesdropped or manipulated all subsequent communication can be decrypted and captured by a potential eavesdropper.
The “background” description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventor(s), to the extent it is described in this background section, as well as aspects of the description which may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
It is an object to provide communication devices that prevent or at least make it more difficult that a potential eavesdropper can actually eavesdrop on the communication between a first communication device and a second communication device. It is a further object to provide corresponding communication methods as well as a corresponding computer program and a non-transitory computer-readable recording medium for implementing said communication methods.
According to an aspect there is provided a first communication device for use in a wireless communication system to communicate with a second communication device, the first communication device comprising circuitry configured to
According to a further aspect there is provided a second communication device for use in a wireless communication system to communicate with a first communication device, the second communication device comprising circuitry configured to
According to a further aspect there is provided a first communication method of a first communication device for use in a wireless communication system to communicate with a second communication device, the first communication method comprising
According to a further aspect there is provided a second communication method of a second communication device for use in a wireless communication system to communicate with a first communication device, the second communication method comprising
According to still further aspects a computer program comprising program means for causing a computer to carry out the steps of the method disclosed herein, when said computer program is carried out on a computer, as well as a non-transitory computer-readable recording medium that stores therein a computer program product, which, when executed by a processor, causes the method disclosed herein to be performed are provided.
Embodiments are defined in the dependent claims. It shall be understood that the disclosed second communication device, the disclosed communication methods, the disclosed computer program and the disclosed computer-readable recording medium have similar and/or identical further embodiments as the claimed communication devices and as defined in the dependent claims and/or disclosed herein.
In contrast to wired networks, where all network participants are (quasi-) statically connected to the medium, wireless communication systems broadcast their message to everyone in a certain proximity. To mitigate this, wireless communication networks provide the option to exploit spatial properties like directivity. Additionally, the wireless medium and its properties are dependent on multiple parameters like position and orientation of devices, time, etc. According to the present disclosure one or more of these properties are used in order to increase security of the exchange of information between a first and second communication device and thus to decrease the probability of eavesdropping by a third communication device (i.e., a potential eavesdropper) in a wireless communication system (such as a wireless LAN network), especially in the 60 GHz (or mmWave) frequency spectrum.
For this purpose, a security criterion that is directed to reducing (or even minimizing) the probability that a third communication device can eavesdrop on the communication between the first communication device and the second communication device is used. A reduction of the eavesdrop probability may thus lead to a minimization of this probability, but may also be a tradeoff between useful rate/SNR and eavesdrop probability. Further, communication means to optimize this security criterion are provided. In one embodiment, the first and second communication devices select one or more antenna beam combinations (i.e., one or more combinations of an antenna beam used by the first communication device and an antenna beam used by the second communication device) that have been trained before in a beamforming training, which are then used for securely transmitting and receiving information. A sender and a receiver thus may utilize PHY layer spatial diversity and multi-array antenna configurations to prevent a malicious third party from potentially eavesdropping communication between the legitimate sender and receiver.
The foregoing paragraphs have been provided by way of general introduction, and are not intended to limit the scope of the following claims. The described embodiments, together with further advantages, will be best understood by reference to the following detailed description taken in conjunction with the accompanying drawings.
A more complete appreciation of the disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
In conventional communication systems a single transmitter and a single receiver is observed. The typical metric to characterize the upper bound of communication throughput of these systems is the Shannon capacity, measured in bit per second per Hertz or bit per channel use [bpcu]. The Shannon capacity (assuming an additive white Gaussian noise channel model (AWGN)) can be determined based on the received signal to noise ratio (SNR) according to:
with signal power S, and noise power N. The signal to noise ratio (S/N) in such a system is usually (in linear systems) proportional to the transmit powerPTX. Usually, a communication system is designed in a way that C is maximized, assuming a single information source A and a single information sink B are involved.
Assuming that another information sink E exists (also called “wire-tapper” or “Eve” for “eavesdropper”) that can eavesdrop the signals transmitted by A, this can be considered as a secrecy system. In order to quantify the secrecy of the system, a commonly known metric is the so called secrecy rate (SR) Cs that is defined as the difference between achievable rate of “A to B” and achievable rate of “A to E”:
C
s
=C (SNRA)−C (SNRE)
A simple visualization of this relation is shown in
In practical communication systems, the full Shannon capacity can never be reached (limited A/D resolution, finite complexity, . . . ) and thus the secrecy rate shown in
with E[.] being the expectation operator. Based on the CM capacity, a more realistic CM secrecy rate can be defined that is visualized for a 4-QAM constellation in
CS,cm=Ccm (SNRA)−Ccm (SNRE)
Another, even more realistic metric, that can be used to define the secrecy rate is the bit interleaved coded modulation (BICM) capacity. This metric is taking into account additional practical limitations of communication systems and can be used in analogy to the previously defined definitions.
C
S,bicm
=C
bicm(SNRA)−Cbicm(SNRE)
Still it is obvious that the highest CM secrecy rate can be achieved when SNRA is high and SNRE is low. But in contrast to the secrecy rate shown in
In a typical scenario, the SNR of A and E are not independent, but both proportional to the transmit power that is used by A. Thus a coupled CM secrecy rate can be defined by introducing an attenuation factor a, defining the SNR-offset between A and E:
SNRA|dB=PTX|dBm−PL|dB−PN,A|dBm
SNRe|dB=SNRA|db+α|dB
with transmit power PTX, path loss PL noise power at A/E PN,A/E and attenuation factor α. It shall be noted that PRX/dBm=PTTX|dBm−PL|dB defines the received signal power taking into account the path loss P L|dB, which can be treated as a constant offset and is thus not further considered in the context of this disclosure. Thus, for simplicity it is assumed: PL|dB=0 dB. Using this definition, it can be shown that there exists an optimum PTX for each combination of α and χ that maximizes CS,cm. This relation is visualized for an explanatory set of χ and α in
Thus, for a secure communication system, an optimization goal can be defined in order to provide the highest possible CM secrecy rate:
max{CS,cm(PTX, χ, α)}
Additionally, it might be considered to maximize the above mentioned metric under the additional constraint of a specific minimal communication rate/capacity Ctarget, resulting in the following constrained optimization problem:
max {CS,cm(PTX, χ, α)} with Ccm,A(PTX, χ, α)≥Ctarget
Another formulation might target minimization of the eavesdroppers rate/capacity:
min{Ccm,E(PTX, χ, α)} with Ccm,A(PTX, χ, α)≥Ctarget
In order to reach this goal several approaches will be described in the following that aim to influence the three parameters PTX, χ and α specifically for mmWave communication systems.
The above introduced metric for secrecy provides one option regarding the problem of providing secrecy in a communication system. Other optional metrics are listed in the following:
Besides the above mentioned information theoretic aspects on security, in implementations of communication systems, data is usually protected by Forward Error Correcting Codes (FECs) in order to make the transmission more robust against effects of noise or interference. These codes are usually designed in order to minimize the probability of bit errors in the received message (bit error rate (BER)) for a given SNR or SNR range (or channel conditions in general). Designing these codes with respect of maximting the above mentioned metrics is another approach to enhance physical layer security.
Based on the introduced secrecy metric, the present disclosure describes multiple methods by which a station (STA) and access point (AP) can utilize spatial diversity b prevent other stations within the same network sharing the same cryptographic secret to eavesdrop communication between the station and the access point. The same method may also be used for direct communication between two stations or in other communications systems, besides WLAN.
High frequency wireless communication such as 60 GHz WLAN is, use directional wave radiation (beams) between the transmitter (TX) and receiver (RX) to cover even medium distances because omnidirectional radiation patterns as used for lower frequencies are subject to strong attenuation. Hence, two communication partners, such as a STA and AP, use beamforming antenna configurations that are learned (or trained) initially and continuously updated to changing conditions such as displacement or blockage. Intuitively, the best communication path between both parties would be the transmit and receive-beams directed on a straight line towards each other (line of sight, LOS). However, in typical situations there will additionally be reflections that form indirect paths between the sender and receiver, and it may as well be that the direct path is not the best performing due to materials to be penetrated. But in any case, if communication is at all possible, there is an ensemble of beam configurations that, if some or all of them are used together, provides the potential of a spatially diverse communication method. It can be shown that if using a sufficient number of reflective path components there is little to zero potential for a eavesdropper device to be in a position where it is able to receive the same complete superposition of sub-streams as the legitimate receiver, simply because it cannot be in the same position where all sub-streams are decodable into the full information set.
The following embodiments of the present disclosure might be applied either separately or in combination in order to enhance the secrecy of a communication system. As overall goal it can be formulated that the embodiments are directed to reducing (or even minimizing) eavesdrop probability and preferably optimizing (or even maximizing) the secrecy rate SR.
While for classical beamforming in the mmWave domain it is an objective for A and B to find a single, adequate combination of transmit and receive beams for the purpose of point-to-point communication or (in case of beamforming for position determination) for the purpose of accurate fine timing measurement (FTM, which is used to estimate the distance between a sender and a receiver), according to the present disclosure it is an objective for A and B to:
test beams and/or beam combinations;
evaluate the tested beams based on one of the previously defined metrics (BER, PER, SR, CMSR, BICMSR, . . . );
select a beam combination or a sequence or superposition of beams that allow A and B to exchange a predetermined amount of information while minimizing the probability of eavesdropping; and/or
transmit and receive information using the previously selected beam or combination of beams or sequence of beams.
For instance, secrecy rate may be considered as a metric, in which case the security criterion shall be maximized (which may be formulated as max. of {Secrecy Rate/CM SR/BICM SR} min of {abs(bit error rate at eavesdropper-0.5)}) such that the probability of eavesdropping by a third device is minimized. Other forms of security metric/criteria that can be used, such as max of {packet/frame error rate at eavesdropper} or max of {outage probability at eavesdropper}.
As shown in
In order to maximize the secrecy rate, A (also called “first communication device”) and B (also called “second communication device”) can negotiate a constellation x and a reduction of PTX such that the received message can be decoded by B, which increases the secrecy rate. x may be selected such that the constellation provides the highest possible order M, which maximizes the SR as can be seen in
These message portions may be transmitted via the different paths using different orthogonal dimensions. For instance, the message portions may be transmitted in different time slots, different frequency bands or subcarriers, different spreading sequences, different polarizations, etc. As only the message period transmitted via the path 1 can be decoded by the eavesdropper E, a reconstruction of the complete message is not possible. This can be straightforwardly extended to N paths, further minimizing the proportion of information bits an arbitrarily placed eavesdropper is able to reconstruct, resulting in a high secrecy rate between A and B.
To inform the receiver of the selected beams the transmitter A may transmit selection information to the receiver B, the selection information indicating the selected one or more antenna beam combinations and the order of their use. As an alternative, the receiver B may derive the use of the antenna beam combinations via known properties of both devices (e.g. their MAC address) or in another way (e.g. by using a unique sequence known to both devices or a prior message transmission).
Besides the method described above, where beamforming is changed in order to transmit information via different reflections using different orthogonal dimensions (e.g. different time slots), an alternative implementation might use a special beamforming configuration that leverages spatial diversity of the channel such that the plurality of the indicated paths is used at the same time. This might be applicable especially for large antenna arrays (many antennas), which allows to form beams that consolidate properties of multiple beamformer configurations at the same time.
In another embodiment (linear or non-linear) combinations of message portions of a message may be transmitted using the methods described above to avoid decoding of portions of the message if the eavesdropper can decode a message portion (e.g. WiFi frames).
Another embodiment how to direct a given radio frequency (RF) power from A to B, while ensuring that other locations (A to E) obtain a lower power, may apply parabolic phase shifter settings at the PAA. Conventionally, linear phases are used, where the gradient of the linear phases relates to the angle of departure (AOD). The beam can then be steered into a desired direction. If E is intercepting the signal between A and B, i.e., if the path from A to E is shorter than from A to B, a negative secrecy rate may occur. However, with quadratic phase shifter settings (so called parabolic beamforming), not only the direction of the beam can be controlled, but also its focal point If the distance from A to B is known, e.g. via some distance measurement (e.g. by a time of flight by FTM (fine time measurement) procedure), the focal point can be set accordingly. Even if the path from A to E is shorter than from A to B, the captured power at E may be lower than at the focal point B.
More generally, parabolic or non-linear phase-shifting beamforming may be used by A for communicating with B to control the focal point of the one or more antenna beams onto the position of B or to control the one or more antenna beams into a single direction. Hence, beamforming with single beam (i.e., linear antenna weights) may be used to focus the radiated/received power in a single direction or beamforming with non-linear antenna weights may be used to focus the radiated/received power onto a single point in space.
In the following further embodiments exploiting spatial hopping, either subsequent hopping or simultaneously transmitting the different hops (into different spatial directions), will be described.
One embodiment uses network coding according to which several subsequent signals/packets, which should be transmitted from A to B are combined prior to transmission, e.g., via a linear combination. For instance, if message portion P1, P2, P3 are to be transmitted at three time instances or using other orthogonal dimensions, in an embodiment the combinations 2*P1+3*P2+5*P3, then 1*P1+2*P2+4*P3, and then 7*P1+4*P2+1*P3 are transmitted. At the receiver B, these three superimposed messages are captured, then decomposed (e.g. by matrix inversion) to the original packets P1, P2, P3). If an eavesdropper E captures a few of the transmitted packets, it cannot compute (without bruteforce attacks) the original packets. Only the complete set of transmitted packets, which may only cumulate at the receiver B, does allow so.
Another embodiment uses partial transmission in-phase (I) and quadrature-phase (Q). For instance, half of the spatial beams, which can be used for A to B communication, may carry the I component of a QAM constellation, while the other half may carry only the Q component. Thus, instead of using quadrature amplitude constellations, only (single or partial side-band) real-valued signals may be transmitted per selected beam. Alternatively, the unused component could carry the information of other packets (from other time instances). Alternatively, the beams carrying the I component and the beams carrying the Q component could be transmitted simultaneously. The I and Q signals could be transmitted with such a phase difference that only in focal point B the signals superimpose to a conventional QAM constellation (I and Q having 90° phase difference). In other locations, the signals may even cancel each other out most of the time.
Another embodiment uses spatial jamming approaches, which controls another parameter that influences the secrecy metric defined above. It focuses on decreasing SNRE|dB by increasing the received noise (or interference by jamming) power of E PN.E|dBm, while
SNRA|dB remains as high as possible:
SNRA|dBPTX|dbm−PL|dB−PN,A|dbm
SNRE|dB=PTX|dbm−PL|dB−PN,E|dBm+α|dB
This can be reached by transmitting spatially focused artificial noise (ideally Gaussian distributed) using a separate PAA at A, while transmitting the actual message as visualized in
Then A transmits an artificial noise signal while transmitting the message to B via one of the paths. As it is not known by A which beam actually effects E's SNR, A switches its noise transmit beams recurrently, but is leaving out those that would influence B's SNR. Alternatively, all other beams can be used for jamming, if the induced (“collateral”) interference level from A to B can be estimated and proper transmit power adjustment can be applied. For instance, as shown in
In more detail, according to
In another embodiment full duplex jamming is applied according to which jamming signals are transmitted by A, using one of its RF chains, receiving signals with another RF chain, while B is sending actual information in a communication session, e.g. in an uplink (UL) operation. Vice versa, if A transmits to B in a downlink (DL) operation, a full duplex device B could receive the transmitted information, while transmitting jamming information into other directions. A combination is also possible, where both A and B perform jamming, while communicating, leaving out the intended path (A to B, with/without reflections) that are not jammed to avoid self-jamming of the intended paths.
According to embodiments of the present disclosure, to take effect of the above mentioned security criterion, the ratio between received power of the information signal and the power of noise observed at the potential eavesdropper can be controlled. Besides controlling transmit power, the sender or receiver of confidential information can influence the power of noise at the potential eavesdropper. This can be done by sending signals with artificial noise or (pseudo-) random signal sequences either on transmitter side or receiver side. Hereby, “noise” shall be understood broadly as any kind of jamming signal.
In general, one or more beam parameters (such as transmit power and/or antenna weight) of the one or more antenna beams used for transmitting the noise signals may be controlled by A such that interference at B is minimized and/or signal-to-interference-plusnoise ratio (SNIR) at B is maximized.
The embodiments described above assume that the position and orientation of A, B and E are unknown to A and E, that knowledge about the dedicated channel (A to B) is only known to A and B, and that there is no a priori knowledge about channel properties and potential locations of E. Any a priori knowledge about one or more of these parameters might be used to improve these embodiments. An example to illustrate three potential use cases is that A wants to transmit its secret information (e.g. position information) x to B′, B″, or B″, which are distributed antennas of B (those antennas can represent e.g. a network of base stations or distributed antennas of an access point); E wants to eavesdrop this information; and A has knowledge about its own location and knowledge about locations of B's distributed antennas.
One embodiment to transmit the secret message with a minimized eavesdropping probability is illustrated in
Another embodiment to transmit the secret message with a minimized eavesdropping probability is illustrated in
Still another embodiment to transmit the secret message with a minimized eavesdropping probability is illustrated in
The prior information about involved participants might be provided by any or multiple of the following options:
The above mentioned embodiments are also applicable in the context of multi-hop networks. In such scenarios the secret information may be fed forward across multiple combinations of transmitter and receiver. Conceptually, each hop can be represented as a configuration like the ones explained above, where the initial receiver B becomes a transmitter A for the next hop. As secrecy and therefore minimization of eavesdropping probability may be provided across all hops from the initial transmitter to the final receiver, the proposed methods can be applied across all hops.
To indicate generalized applicability of the disclosed embodiments an indoor scenario is illustrated in
In an implementation that provides one of the above mentioned secret communication modes besides regular communication modes (also called normal modes where the rate between A and B, or—in multi user scenarios—the rates between A and B, C, . . . are maximized) a selection function may be implemented that allows to switch between both modes as required.
According to embodiments of the present disclosure, to take effect of the above mentioned security criterion, the ratio between received power of the information signal and the power of noise observed at the potential eavesdropper can be controlled. Besides controlling transmit power, the sender or receiver of confidential information can influence the power of noise at the potential eavesdropper. This can be done by sending signals with artificial noise or (pseudo-) random signal sequences either on transmitter side or receiver side. Hereby, “noise” shall be understood broadly as any kind of jamming signal.
Antenna weights in terms of beamforming in the context of this disclosure describe how the signals of multiple subantennas of the same antenna array are modified before superposition in receive operation and how those signals are modified before radiation via multiple subantennas in transmit operation, respectively. In the mmWave domain this modification is typically implemented with arrays of phase shifters that allow adjusting the phase of each subantennas' signal. Typically, those phase shifter settings (also named antenna weight vectors) are linearly dependent on the position of respective subantennas (either in one dimension, in case of a uniform linear array (ULA) or in two dimensions in case of an uniform rectangular array (URA)) to synthesize planar wave fronts. Thus, they are called linear antenna weight vectors or linear phase shifter settings. In general, it is also possible to use non-linear phase shifter settings (e.g. parabolic) that allow adjusting the focus of radiated/received power not only into a certain direction but also into a certain point in space. Generally, any phase shifter setting can be applied, even if it has no direct physical interpretation like linear or parabolic.
To enable MIMO communication, the AP 10 may be equipped with multiple antennas and multiple RF chains, allowing it to transmit multiple streams simultaneously to multiple STAs 20 . Each STA 20 device may have multiple antennas and multiple RF chains to simultaneously receive multiple streams from the AP 10 or simultaneously transmit multiple streams to the AP 10.
For example, as illustrated in
As a part of a communication device 30, the data processing unit 31 performs a process on data for transmission and reception. Specifically, the data processing unit 31 generates a frame on the basis of data from a higher layer of the communication device 30, and provides the generated frame to the wireless communication unit 32. For example, the data processing unit 31 generates a frame (in particular a MAC frame) from the data by performing processes such as fragmentation, segmentation, aggregation, addition of a MAC header for media access control (MAC), addition of an error detection code, or the like. In addition, the data processing unit 31 extracts data from the received frame, and provides the extracted data to the higher layer of the communication device 30. For example, the data processing unit 31 acquires data by analyzing a MAC header and performing a reorder process, or the like with regard to the received frame.
The wireless communication unit 32 has a signal processing function, a wireless interface function, and the like as part of a communication unit. Further, a beamforming function is provided. This unit generates and sends PHY layer packets (or, in particular for a WLAN standard, PHY layer protocol data units (PPDU)), which have the physical representation of electric waveforms that can be radiated from one or multiple antennas and propagate in space.
The signal processing function is a function of performing signal processing such as modulation on frames. Specifically, the wireless communication unit 32 performs encoding, interleaving, and modulation on the frame provided from the data processing unit 31 in accordance with a coding and modulation scheme set by the control unit 33, adds a preamble and a PHY header, and generates a PHY layer packet. Further, the wireless communication unit 32 recovers a frame by performing demodulation, decoding, and the like on the PHY layer packet obtained by a process of the wireless interface function, and provides the obtained frame to the data processing unit 31 or the control unit 33.
The wireless interface function is a function to transmit/receive a signal via one or more antennas. Specifically, the wireless communication unit 32 converts a signal related to the symbol stream obtained through the process performed by the signal processing function into an analog signal, amplifies the signal, filters the signal, and up-converts the frequency (modulates the signal). Next, the wireless communication unit 32 transmits the processed signal via the antenna. In addition, on the signal obtained via the antenna, the wireless communication unit 32 performs a process that is opposite to the process at the time of signal transmission such as down-conversion of frequency (demodulation of the signal) or digital signal conversion.
The beamforming function performs analog beamforming and/or digital beamforming, including beamforming training, as will be explained below in more detail.
As a part of the communication unit, the control unit 33 (e.g., station management entity (SME)) controls entire operation of the communication device 30. Specifically, the control unit 33 performs a process such as exchange of information between functions, setting of communication parameters, or scheduling of frames (or packets) in the data processing unit 31.
The storage unit 34 stores information to be used for process to be performed by the data processing unit 31 or the control unit 33. Specifically, the storage unit 34 stores information stored in a transmission frame, information acquired from a receiving frame, information on a communication parameter, or the like.
In an alternative embodiment, the first and second communication devices, in particular each of the AP 10 and the STAs 20, may be configured by use of circuitry that implements the units shown in
All of the above described embodiments to achieve physical layer security are based on the assumption that there is no information available at A or B about position or channel state information (CSI) from A to E or E to A. Any amount of a priori information can be leveraged by A or A and E to further enhance the achievable secrecy. Therefore, the following optional methods may be applied in order to come into possession of such a priori information:
The disclosed solution is well suited to be adopted by further products according to the standard draft IEEE 802.1lay or amendments thereof, because i) it leverages the mmWave and in particular Hybrid MIMO concepts that is required for those products and ii) applications might be found in distribution networks use cases, where confidential data of many users is transported via nodes in public spaces or internet access use cases in public spaces like hotel lobbies or cafes, as well as internet of things (IOT) use cases that require physical layer security either because constraints like computational complexity or power consumption prohibit application of conventional cryptographic methods. Further, the disclosed techniques are advantageous when the signals rather than the payload information need to be protected (which is the case for conventional cryptography).
An example is transmission of the position of tracking devices. When a device A transmits its position information to a base station B, it can encrypt the position information, but when sending the encrypted message, A discloses its position (from the transmitted waveform itself). Hence, a potential eavesdropper that receives the encrypted signal at multiple positions, can triangulate A's position.
Thus, the foregoing discussion discloses and describes merely exemplary embodiments of the present disclosure. As will be understood by those skilled in the art, the present disclosure may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present disclosure is intended to be illustrative, but not limiting of the scope of the disclosure, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, defines, in part, the scope of the foregoing claim terminology such that no inventive subject matter is dedicated to the public.
In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article A or “an” does not exclude a plurality. A single element or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
In so far as embodiments of the disclosure have been described as being implemented, at least in part, by software-controlled data processing apparatus, it will be appreciated that a non-transitory machine-readable medium carrying such software, such as an optical disk, a magnetic disk, semiconductor memory or the like, is also considered to represent an embodiment of the present disclosure. Further, such a software may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems.
The elements of the disclosed devices, apparatus and systems may be implemented by corresponding hardware and/or software elements, for instance appropriated circuits or circuitry. A circuit is a structural assemblage of electronic components including conventional circuit elements, integrated circuits including application specific integrated circuits, standard integrated circuits, application specific standard products, and field programmable gate arrays. Further, a circuit includes central processing units, graphics processing units, and microprocessors, which are programmed or configured according to software code. A circuit does not include pure software, although a circuit includes the above-described hardware executing software. A circuit or circuitry may be implemented by a single device or unit or multiple devices or units, or chipset(s), or processor(s).
It follows a list of further embodiments of the disclosed subject matter:
1. A first communication device for use in a wireless communication system to communicate with a second communication device, the first communication device comprising circuitry configured to
2. The first communication device according to any preceding embodiment, wherein the circuitry is configured to select one or more of the trained antenna beam combinations that optimize the security criterion, in particular by maximization of a secrecy rate and/or maximization of the probability of transmission errors at the third communication device.
3. The first communication device according to any preceding embodiment, wherein the circuitry is configured to select a plurality of the trained antenna beam combinations and to use them simultaneously for communicating with the second communication device.
4. The first communication device according to any preceding embodiment, wherein the circuitry is configured to select a plurality of the trained antenna beam combinations and to use them in different orthogonal dimensions for communicating with the second communication device.
5. The first communication device according to any preceding embodiment wherein the circuitry is configured to select a plurality of the trained antenna beam combinations that are using different communication paths between the first and second communication devices.
6. The first communication device according to any preceding embodiment, wherein the circuitry is configured to select a plurality of the trained antenna beam combinations, to split a message to be transmitted to the second communication device into a plurality of message portions and to transmit the message portions via different antenna beams or different antenna beam sets of the selected antenna beam combinations.
7. The first communication device according to any preceding embodiment, wherein the circuitry is configured to transmit selection information to the second communication device, the selection information indicating the selected one or more antenna beam combinations and the order of their use.
8. The first communication device according to any preceding embodiment, wherein the circuitry is configured to perform parabolic linear or non-linear phase-shifting beamforming for communicating with the second communication device to control the focal point of the one or more antenna beams onto the position of the second communication device or to control the one or more antenna beams into a single direction.
9. The first communication device according to any preceding embodiment, wherein the circuitry is configured to split a message to be transmitted to the second communication device into a plurality of message portions, to form two or more different combinations of the message portions and to transmit the two or more different combinations of the message portions in different orthogonal dimensions and/or via different antenna beams of the selected antenna beam combinations.
10. The first communication device according to any preceding embodiment, wherein the circuitry is configured to modulate signals to be transmitted onto modulated complex-valued signals, each having an in-phase component and a quadrature-phase component and to transmit the these components of a modulated signal in different orthogonal dimensions and/or via different antenna beams of the selected antenna beam combinations.
11. The first communication device according to any preceding embodiment, wherein the circuitry is configured to transmit noise signals using one or more antenna beams of antenna beam combinations not selected for communication between the first communication device and the second communication device.
12. The first communication device according to embodiment 11, wherein the circuitry is configured to recurrently change the one or more antenna beams used for transmitting the noise signals.
13. The first communication device according to embodiment 11 or 12, wherein the circuitry is configured to control the transmit power and/or beam parameters of the one or more antenna beams used for transmitting the noise signals such that interference at the second communication device is minimized and/or signal-to-interference-plus-noise ratio at the second communication device is maximized.
14. The first communication device according to embodiment 11, 12 or 13, wherein the circuitry is configured to transmit the noise signals while simultaneously transmitting or receiving messages using one or more antenna beams of the selected antenna beam combinations for communication between the first communication device and the second communication device.
15. The first communication device according to any preceding embodiment, wherein the second communication device comprises two or more distributed antennas, and
16. The first communication device according to any preceding embodiment, wherein the second communication device comprises two or more distributed antennas, and
17. The first communication device according to any preceding embodiment, wherein the circuitry is configured to transmit one or more message portions that are transmitted to one or more instances of the second communication device using one or more antenna beams having a minimal required beam width and/or a minimal required transmit power.
18. The first communication device according to any preceding embodiment, wherein the circuitry is configured to transmit signals using beams selected for transmission using provided information about the one or more instances of the second communication device and/or its distributed antennas, in particular position information about position of the one or more instances of the second communication device and/or its distributed antennas,
19. The first communication device according to any preceding embodiment, wherein the circuitry is configured to switch between a secure mode using the selected one or more antenna beam combinations or a normal mode for communicating with the second communication device.
20. A second communication device for use in a wireless communication system to communicate with a first communication device, the second communication device comprising circuitry configured to
21. The second communication device according to embodiment 20, wherein the circuitry is configured to
22. The second communication device according to embodiment 20 or 21, wherein the circuitry is configured to transmit noise signals using one or more antenna beams.
23. The second communication device according to embodiment 22, wherein the circuitry is configured to transmit the noise signals while the first communication device is simultaneously transmitting messages using one or more antenna beams of the selected antenna beam combinations for communication between the first communication device and the second communication device.
24. A first communication method of a first communication device for use in a wireless communication system to communicate with a second communication device, the first communication method comprising
25. A second communication method of a second communication device for use in a wireless communication system to communicate with a first communication device, the second communication method comprising
26. A non-transitory computer-readable recording medium that stores therein a computer program product, which, when executed by a processor, causes the method according to embodiment 24 or 25 to be performed.
27. A computer program comprising program code means for causing a computer to perform the steps of said method according to embodiment 24 or 25 when said computer program is carried out on a computer.
Number | Date | Country | Kind |
---|---|---|---|
19189955.8 | Aug 2019 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/070190 | 7/16/2020 | WO |