1. Field of the Invention
This invention relates, generally, to security measures for wireless transmissions. More particularly, it relates to methods for preventing synchronization to a transmitted signal by an unauthorized user.
2. Description of the Prior Art
Orthogonal frequency division multiplexing (OFDM) systems exhibit immunity to multipath distortion. In OFDM, the linear convolution of a transmitted signal with a channel impulse response (CIR) is converted to circular convolution by cyclically extending the transmitted OFDM symbols. The transmitted data symbols are recovered using a simple one-tap equalizer in the frequency domain. The redundancy introduced by cyclic prefix (CP) can be used for channel estimation and synchronization as well. However. CP may be undesirable for covert applications because unauthorized users may explore the periodicity introduced by the CP to synchronize to the transmitted signal.
To remove the distortion due to multipath, the length of the CP should be larger than the maximum excess delay of the channel. When the length of the CP is smaller than the maximum excess delay, previously transmitted OFDM symbols interfere with a current OFDM symbol as indicated in
Where H(k) is the channel frequency response (CFR) at kth subcarrier, N is the fast Fourier transform (FFT) size, h is the nth tap of CIR, and L is the length of the CIR.
As indicated by equation (1), the degradation depends on the ratio between the tail power of the CIR and total power of CIR, as indicated in
The redundancy introduced by the CP can be used to estimate time and frequency offsets. Synchronization algorithms based on the maximum likelihood (ML), equation [3], minimum mean-square error (MMSE), equation [4], and the maximum correlation (MC), equation [5] criteria use the periodicity introduced by the cyclic prefix to estimate the timing and frequency offsets.
The ML method is illustrated in
where r(n) is the received signal, NCP is the length of CP and ND is the length of the useful data part. Using (2), the timing position can be found as
{circumflex over (T)}n=arg max|M(m)| (3)
and frequency offset estimation as
These estimates should be averaged over different OFDM symbols to obtain reliable estimates. Adding the correlation metrics from different symbols and dividing by the number of symbols provides the needed average. As the number of available OFDM symbols increase, the estimates become more accurate. The resulting synchronization metric and the final metric obtained by averaging are shown in
The respective lengths of the OFDM symbol and CP can be estimated blindly by exhaustive searching. This knowledge gives undesired or unauthorized users the ability to synchronize to the transmitted signal.
The periodicity inherently introduced by the usage of CP can be explored by undesired users to synchronize to the transmitted signal.
Accordingly, what is needed in the art is a technique that prevents unauthorized synchronization while maintaining the advantages of the CP.
However, in view of the prior art considered as a whole at the time the present invention was made, it was not obvious to those of ordinary skill in this art how the needed additional security could be provided.
The novel methods maintain the advantages of the cyclic prefix but prevent unauthorized exploitation of the cyclic prefix (CP) for synchronization. By allowing use of the CP, the novel methods provide secure data transmission by lowering coding requirements, thus providing high data transmission rates and decreased power consumption.
In a preferred embodiment, the size of the CP is changed, adaptively, depending upon channel conditions, and random signals are appended to some of the orthogonal frequency division multiplexing (OFDM) symbols in a pseudo-random manner to scramble the correlation peaks in the time domain.
When the correlation peaks are scrambled in time, unauthorized users who are not privy to the scrambling pattern cannot combine the synchronization information with the different symbols. The novel method therefore prevents unauthorized detection of the transmitted signal even if an unauthorized user achieves an initial synchronization.
The present invention makes wireless transmission more secure so that undesired users cannot probe transmitted information. This is especially important for military/defense applications. Moreover, commercial wireless system providers may incorporate this invention for the prevention of theft of service or for increasing user privacy.
More particularly, the novel method for preventing unauthorized exploitation of a cyclic prefix for synchronization, while maintaining the advantages of the cyclic prefix, includes the step of
changing the length of OFDM symbols in a pseudo-random fashion by appending a random signal to at least one of the OFDM symbols. The invention further includes the steps of providing extra scrambling of the correlation peaks by changing the size of the random signal depending on a PN sequence, reducing bandwidth loss due to transmission of the random signal by using a known PN sequence, using the known PN sequence in an authorized receiver for synchronization, increasing the immunity to the multipath by changing the length of the CP in each OFDM symbol according to a PN sequence, thereby scrambling the correlation peaks, combining the adaptive cyclic prefix with channel coding, making the cyclic prefix smaller than a maximum excess delay of the channel, compensating for a performance loss by providing additional coding power, providing additional coding power by using very tight coding, and changing the FFT/IFFT sizes of each OFDM symbol based on a PN sequence, thereby providing two types of security by making synchronization and demodulation of a received signal difficult for unauthorized users.
For a fuller understanding of the invention, reference should be made to the following detailed description, taken in connection with the accompanying drawings, in which:
Insufficient CP causes performance degradation and enables undesired users to synchronize to the transmitted signal as the length of the CP gets larger. Therefore, the present invention changes the length of the CP adaptively depending upon channel conditions. The length of the CP should be just enough to prevent ISI. By using a small CP, the present invention prevents synchronization of undesired users to the transmitted signal.
This adaptation requires knowledge of the maximum excess delay of the wireless channel that can be estimated using CFR [6] or channel frequency correlation (CFC) [7]. The length of the CP can be constant over a burst and the length information can be conveyed to the receiver by signaling. Changing the length of the CP adaptively also provides efficient channel utilization since the overall CP time is minimized.
In practical applications, extraction of the synchronization parameters by using the CP with only one OFDM symbol is difficult if not impossible, because the CP is perturbed by multipath components and additive noise. Moreover, the presence of frequency offset decreases the correlation between the repeated parts. To overcome this problem, averaging over a number of OFDM symbols is performed.
Averaging over different OFDM symbols can be done if the length of each OFDM symbol is precisely known.
The present invention changes the length of OFDM symbols in a pseudo-random fashion by appending a totally random signal to some of the OFDM symbols. An integrated circuit having a processor generates the totally random signal and appends it to more than one OFDM symbol of a plurality of OFDM symbols in a frame so that the OFDM symbols in said plurality of OFDM symbols in said frame do not have a common length and so that correlation peaks are scrambled. The resulting frame structure and correlation peaks in a noiseless static channel is illustrated in
A pseudo noise (PN)-based preamble is used for synchronization. Since only an authorized user knows the transmitted signal, unauthorized users cannot synchronize to the transmitted signal. Furthermore, the receiver can use the knowledge of scrambling pattern and the redundancy contained in the CP to obtain synchronization information by combining the correlation outputs from each OFDM symbol. Authorized users combine the synchronization information from the preamble and from the CP using an appropriate technique.
The decision on whether to append a random signal to a specific OFDM symbol or not can be made by using the transmitted preamble sequence, or by using the spreading and/or scrambling codes of users in MC-CDMA. If none of those are available, the transmitter must select some specific codes and convey the required information to the receiver.
The following novel method steps enhance the basic method:
1. Provide extra scrambling of the correlation peaks by changing the size of the random signal depending on a PN sequence.
2. Reduce the bandwidth loss due to the transmission of the random signal by using a known PN sequence Instead of a totally random signal. The known PN sequence is used in an authorized receiver for synchronization.
3. Increase the immunity to the multipath by changing the length of the CP in each OFDM symbol according to a PN sequence, thereby scrambling the correlation peaks.
4. Combine the adaptive cyclic prefix with channel coding. The cyclic prefix does not have to be the same as the maximum excess delay of the channel. It can be smaller but not larger (for security purposes). If it is smaller, the performance loss must be compensated for by additional coding power. In the limiting case, no CP is used and the 1 51 is compensated by using very tight coding.
5. Change the FFT/IFFT sizes of each OFDM symbol based on a PN sequence. This provides two types of security by making synchronization and demodulation of received signal difficult for unauthorized users.
It will thus be seen that the advantages set forth above, and those made apparent from the foregoing description, are efficiently attained and since certain changes may be made in the above construction without departing from the scope of the invention, it is intended that all matters contained in the foregoing description or shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
It is also to be understood that the following claims are intended to cover all of the generic and specific features of the invention herein described, and all statements of the scope of the invention that, as a matter of language, might be said to fall therebetween. Now that the invention has been described,
This disclosure is a non-provisional patent application based upon provisional patent application 60/522,235, filed Sep. 3, 2004 by the same inventors and bearing the same title.
This work has been supported by Raytheon, Inc. grant CHARTFIELD STRING: USF01 TPA 22000 210600 000000 0000000 210610060.
Number | Name | Date | Kind |
---|---|---|---|
6038321 | Torigai et al. | Mar 2000 | A |
6438367 | Crawford | Aug 2002 | B1 |
6546065 | Shimosakoda | Apr 2003 | B1 |
7010687 | Ichimura | Mar 2006 | B2 |
7072289 | Yang et al. | Jul 2006 | B1 |
7203158 | Oshima et al. | Apr 2007 | B2 |
20020054585 | Hanada et al. | May 2002 | A1 |
20040037215 | Hwang et al. | Feb 2004 | A1 |
20050100077 | Rosen et al. | May 2005 | A1 |
20050180315 | Chitrapu et al. | Aug 2005 | A1 |
20050259758 | Razzell | Nov 2005 | A1 |
20050265220 | Erlich et al. | Dec 2005 | A1 |
Number | Date | Country |
---|---|---|
9730531 | Aug 1997 | WO |
Number | Date | Country | |
---|---|---|---|
20060050626 A1 | Mar 2006 | US |
Number | Date | Country | |
---|---|---|---|
60522235 | Sep 2004 | US |