1. Technical Field
Aspects of this document relate generally to telecommunication systems and techniques for transmitting data across a telecommunication channel.
2. Background Art
The need to provide a secure transmission channel continues to be an ongoing challenge in the communications industry. Many methods exist in the existing art, and may be brought to bear to provide both physical and data security. However, these existing methods are waveform dependent and thus, a need exists for a waveform agnostic approach to securing a transmission channel for any broadcast medium whether the transmission scheme is point-to-point, point-to-multipoint or multipoint-to-multipoint.
Implementations of a method for encrypting an information carrier signal may comprise generating a sequence of data using a sequence generator, modulating, using a first modulator an output from the sequence generator such that an interference signal results, encoding the interference generator's synchronization information using an encoder, modulating, using a second modulator, the encoded synchronization information such that a synchronization carrier signal results, spreading the synchronization carrier signal using a spreader such that a spread sub-carrier synchronization signal results, and combining a modulated information carrier signal, the interference signal, and the spread sub-carrier synchronization signal using a signal combiner such that a composite signal results, the interference signal having one or more signal characteristics that results in obfuscation of the information carrier signal when the information carrier signal and interference signal are combined.
Particular implementations may comprise one or more of the following features. The method may further comprise generating the interference signal using an interference generator that modulates the output of the sequence generator. The method may further comprise authenticating the information carried in the spread sub-carrier synchronization signal using an authentication device. The method may further comprise encrypting information carried in the spread sub-carrier synchronization signal using an encryption device. The method may further comprise providing forward error correction (FEC) to the spread sub-carrier synchronization signal using the encoder. The sub-carrier synchronization signal may be modulated using one or more modulating devices. The spreading may further comprise using spread spectrum techniques to reduce a power spectral density of the spread sub-carrier synchronization signal. The method may further comprise determining a center frequency and occupied bandwidth of the information carrier signal using one or more Fourier transform techniques. The method may further comprise determining the power level of the information carrier signal using a power detector. The method may further comprise manually configuring one or more characteristics of the information carrier signal to specify a center frequency, occupied bandwidth, or power level of the information carrier signal. The method may further comprise up-converting the interference and sub-carrier synchronization signals prior to combining these signals with the information carrier signal. The combining of the signals may occur at baseband frequency.
Implementations of a method of recovering encrypted information may comprise receiving a composite carrier signal using a receiving device, the composite carrier signal comprising a previously combined information carrier signal, interference signal, and spread sub-carrier synchronization signal, wherein the interference signal has one or more signal characteristics that results in obfuscation of the information carrier signal by the interference signal in the composite signal, despreading the spread sub-carrier synchronization signal using a despreader, demodulating the despread sub-carrier synchronization signal using a demodulator, decoding the demodulated despread sub-carrier synchronization signal using a decoder, resulting in extracted synchronization information from the sub-carrier synchronization signal, synchronizing an interference generator using the extracted synchronization information such that the interference generator creates a replica of the interference signal contained in the received composite signal, and cancelling the interference signal from the composite signal using a cancelling device that uses one or more cancellation techniques to obtain the information carrier signal.
Particular implementations may comprise one or more of the following features. The method may further comprise splitting the composite carrier signal using a signal splitter. The dispreading may further comprise spread spectrum despreading. The method may further comprise decrypting information carried in the sub-carrier synchronization signal using a decryption device. The method may further comprise authenticating information carried in the sub-carrier synchronization signal using an authentication device. The method may further comprise applying a frame parser to information carried in the sub-carrier synchronization signal. The method may further comprise generating a synchronized interference sequence using an interference sequence generator. The method may further comprise modulating the interference sequence using a modulator to generate a replica of the interference signal. The method may further comprise providing phase alignment between the replicated interference signal and the interference signal in the composite carrier signal using a memory device. The method may further comprise configuring a center frequency, occupied bandwidth, or power level of the interference carrier signal, information carrier signal, or composite carrier signal.
Implementations of a system for encrypting an information carrier may comprise a sequence generator configured to generate a sequence of data, a first modulator configured to modulate an output from the sequence generator such that an interference signal results, an encoder configured to encode the interference generator's synchronization information, a second modulator configured to modulate the encoded synchronization information such that a synchronization carrier signal results, a spreader configured to spread the synchronization carrier signal such that a spread sub-carrier synchronization signal results, and a combiner configured to combine a modulated information carrier signal, the interference signal, and the spread sub-carrier synchronization signal using a signal combiner such that a composite signal results, the interference signal having one or more signal characteristics that results in obfuscation of the information carrier signal when the information carrier signal and interference signal are combined.
Particular implementations may comprise one or more of the following features. The system may further comprise an interference generator configured to generate the interference signal and modulate the output of the sequence generator. The system may further comprise an authentication device configured to authenticate the information carried in the spread sub-carrier synchronization signal. The system may further comprise an encryption device configured to encrypt information carried in the spread sub-carrier synchronization signal. The encoder may be further configured to provide forward error correction (FEC) to the spread sub-carrier synchronization signal. The system may further comprise one or more modulating devices configured to modulate the sub-carrier synchronization signal. The spreader may be further configured to use spread spectrum techniques to reduce a power spectral density of the spread sub-carrier synchronization signal. The system may further comprise a processor configured to determine a center frequency and occupied bandwidth of the information carrier signal using one or more Fourier transform techniques. The system may further comprise a power detector configured to determine the power level of the information carrier signal. The system may be further configured for manual configuration of one or more characteristics of the information carrier signal to specify a center frequency, occupied bandwidth, or power level of the information carrier signal. The system may further comprise an upconversion device configured to up-convert the interference and sub-carrier synchronization signals prior to combining these signals with the information carrier signal. The combiner may be further configured to combine the signals at baseband frequency.
Implementations of a system of recovering encrypted information may comprise a receiving device configured to receive a composite carrier signal, the composite carrier signal comprising a previously combined information carrier signal, interference signal, and spread sub-carrier synchronization signal, wherein the interference signal has one or more signal characteristics that results in obfuscation of the information carrier signal by the interference signal in the composite signal, a despreader configured to despread the spread sub-carrier synchronization signal, a demodulator configured to demodulate the despread sub-carrier synchronization signal, a decoder configured to decode the demodulated despread sub-carrier synchronization signal, resulting in extracted synchronization information from the sub-carrier synchronization signal, an interference generator configured to be synchronized using the extracted synchronization information and create a replica of the interference signal contained in the received composite signal, and a canceling device configured to cancel the interference signal from the composite signal using one or more cancellation techniques to obtain the information carrier signal.
Particular implementations may comprise one or more of the following features. The system may further comprise a splitter configured to split the composite carrier signal. The despreader may be further configured to use spread spectrum despreading. The system may further comprise a decryption device configured to decrypt information carried in the sub-carrier synchronization signal. The system may further comprise an authentication device configured to authenticate information carried in the sub-carrier synchronization signal. The system may further comprise a frame parser configured to frame parse information carried in the sub-carrier synchronization signal. The system may further comprise an interference sequence generator configured to generate a synchronized interference sequence. The system may further comprise a modulator configured to modulate the interference sequence to generate a replica of the interference signal. The system may further comprise a memory device configured to provide phase alignment between the replicated interference signal and the interference signal in the composite carrier. The system may further comprise a configuration device that allows configuration of a center frequency, occupied bandwidth, or power level of the interference carrier signal, information carrier signal, or composite carrier signal.
Aspects and applications of the disclosure presented here are described below in the drawings and detailed description. Unless specifically noted, it is intended that the words and phrases in the specification and the claims be given their plain, ordinary, and accustomed meaning to those of ordinary skill in the applicable arts. The inventors are fully aware that they can be their own lexicographers if desired. The inventors expressly elect, as their own lexicographers, to use only the plain and ordinary meaning of terms in the specification and claims unless they clearly state otherwise and then further, expressly set forth the “special” definition of that term and explain how it differs from the plain and ordinary meaning Absent such clear statements of intent to apply a “special” definition, it is the inventors' intent and desire that the simple, plain and ordinary meaning to the terms be applied to the interpretation of the specification and claims.
The inventors are also aware of the normal precepts of English grammar. Thus, if a noun, term, or phrase is intended to be further characterized, specified, or narrowed in some way, then such noun, term, or phrase will expressly include additional adjectives, descriptive terms, or other modifiers in accordance with the normal precepts of English grammar. Absent the use of such adjectives, descriptive terms, or modifiers, it is the intent that such nouns, terms, or phrases be given their plain, and ordinary English meaning to those skilled in the applicable arts as set forth above.
Further, the inventors are fully informed of the standards and application of the special provisions of 35 U.S.C. §112, ¶6. Thus, the use of the words “function,” “means” or “step” in the Description, Drawings, or Claims is not intended to somehow indicate a desire to invoke the special provisions of 35 U.S.C. §112, ¶6, to define the invention. To the contrary, if the provisions of 35 U.S.C. §112, ¶6 are sought to be invoked to define the claimed disclosure, the claims will specifically and expressly state the exact phrases “means for” or “step for, and will also recite the word “function” (i.e., will state “means for performing the function of [insert function]”), without also reciting in such phrases any structure, material or act in support of the function. Thus, even when the claims recite a “means for performing the function of . . . ” or “step for performing the function of . . . ,” if the claims also recite any structure, material or acts in support of that means or step, or that perform the recited function, then it is the clear intention of the inventors not to invoke the provisions of 35 U.S.C. §112, ¶6. Moreover, even if the provisions of 35 U.S.C. §112, ¶6 are invoked to define the claimed disclosure, it is intended that the disclosure not be limited only to the specific structure, material or acts that are described in the preferred embodiments, but in addition, include any and all structures, materials or acts that perform the claimed function as described in alternative embodiments or forms of the invention, or that are well known present or later-developed, equivalent structures, material or acts for performing the claimed function.
The foregoing and other aspects, features, and advantages will be apparent to those artisans of ordinary skill in the art from the DESCRIPTION and DRAWINGS, and from the CLAIMS.
Implementations will hereinafter be described in conjunction with the appended drawings, where like designations denote like elements, and:
This disclosure, its aspects and implementations, are not limited to the specific components, encryption types, or methods disclosed herein. Many additional components and assembly procedures known in the art consistent with methods and systems for providing interference based physical-layer encryption are in use with particular implementations from this disclosure. Accordingly, for example, although particular implementations are disclosed, such implementations and implementing components may comprise any components, models, versions, quantities, and/or the like as is known in the art for such systems and implementing components, consistent with the intended operation.
This disclosure relates to methods and systems for providing interference based physical-layer encryption with a Low Probability of Detection (LPD) signaling channel for communications links. The described methods and systems provide a novel approach for providing a secure transmission path for a communication system while remaining agnostic to the type of data transmitted, forward error correction (FEC), or modulation type of the original signal. Particular implementations of the described methods and systems apply to wireless satellite communications, but the methods described are not limited to satellite communications and it will be clear to those of ordinary skill in the art from this disclosure, the principles and aspects disclosed herein may readily be applied to any electromagnetic (IF, RF, optical and the like) communications system, such as cellular phone, wireless networking devices, or terrestrial broadcast network without undue experimentation.
In some implementations, the interference based physical-layer encryption methods add interference to the desired waveform before transmission and use cancellation technology to cancel the interference at the receiving end.
Another novelty described in this disclosure provides a Low-Probability of Detection (LPD) channel for transmitting the cryptographic signaling information required for synchronizing the interference encryption and decryption (cancellation) devices at the respective ends.
The described methods and systems may operate independent of a feedback channel and may operate in both one-way and two-way transmission environments.
The methods and systems described provide the ability for someone skilled in the art, such as a communications software or test engineer, network operator, equipment manufacturer and the like, to utilize the described methods and systems.
The methods and systems described in this disclosure may employ digital signal processing (DSP) techniques such as, but not limited to, encapsulation, encryption/decryption, framing and packetization techniques which can easily be implemented in Field-Programmable Gate Array (FPGA), Programmable Logic Device (PLD), Programmable Integrated Circuit (PIC), Digital Signal Processor (DSP), Application Specific Integrated Circuit (ASIC) or general purpose microprocessors using conventional implementation methods known in the art with knowledge of this disclosure.
Many methods have been developed to obscure, encrypt, obfuscate, etc. data in a manner to prevent someone who is unauthorized from receiving content in a format that would be usable or exposing the user information in a format that would be useable in any manner.
This disclosure relates to methods and systems for providing interference based physical-layer encryption for a communications channel. In the existing art, encryption may be provided through the use of an encryptor 100 prior to modulating the data by a modulating device 110, or encryption is provided by a modulating device having embedded data encryption 120 prior to modulating the data as shown in
In some implementations of the systems and methods disclosed herein, encryption 210 is applied to the physical waveform post modulation and outside the modulating device 200. Additionally, in some implementations, the encryption may be performed within the modulating device at baseband I (in-phase) and Q (quadrature-phase) before up-conversion to an intermediate or radio frequency and before introduction to the transmission channel 220 as shown in
Using particular implementations of the described methods and systems provides a completely waveform-agnostic approach to the encryption of the data in a manner that uses interference techniques, which are typically undesirable, to be a benefit for obscuring the content of the information contained within the modulated signal.
Particular implementations of the described methods and systems have novelty, among other reasons, at least in the fact that they eliminate boundaries in the encryption of the waveform between where frames start, stop or transition from one state to another. In short, the entire signal including headers, payload and footers is encrypted, which results in a completely encrypted signal. Also, by obfuscating the entire signal, a standard receiver will not be able to acquire and demodulate the signal. This may provide a stronger level of encryption than exists in the current art.
In some implementations, the desired waveform containing the original signal is designated as SA 300 and is traditionally modulated and sent over the transmission channel without modification.
Upon combining the original signal, SA 300, with the interfering signal, SB 310, a 3 decibel (3 dB) power penalty is assumed because both SA 300 and SB 310 have nearly identical power spectral densities and center frequencies. The concept of stacking signals using the same occupied bandwidth is outlined in U.S. Pat. No. 6,859,641 to Collins, et. al. (hereinafter “Collins”), the disclosure of which is herein incorporated by reference. Particular implementations of the present disclosure differ from Collins, however, in that instead of the signals being transmitted and received over the same spectrum (in opposite or transmit and receive directions) for cancellation, the signals are created at the same point of origin and transmitted as co-channel signals from the same transmit device, e.g. combined and transmitted on the same spectrum where SA is the original signal 300, and SB is the interfering signal 310.
The original signal SA 300 may be any signal and may be represented as sA(t)=AI cos(ωc1t)+AQ sin(ωc1t), and, to optimally interfere with SA, SB may be represented as sB(t)=B1 cos(ωc2t)+BQ sin(ωc2t). Noting that:
AI should be nearly equal to BI
AQ should be nearly equal to BQ
ωc1 and ωc2 should be equal or nearly equal for both sA(t) and sB(t), e.g. ωc1 and ωc2 may be ωc1=ωc2, ωc1<ωc2, or ωc1>ωc2
When combining the plurality of signals to create SA+B+Sub 410, the power that is taken from SA+B 320 due to combining SSub 400 to create the composite signal SA+B+Sub 410 may be further considered. The described methods and systems may use up to 99% of the available bandwidth (3 dB bandwidth) for embedding the SSub sub-carrier signal. The power taken away from SA+B 320 may be determined by the level of spreading of the SSub carrier signal 400 and how far below the composite waveform SA+B 320 the SSub sub-carrier signal 400 is placed.
SSub 400 may be represented as sSub(t)=CSubI cos(ωct+φc)+CSubQ sin(ωwct+φc). It is noteworthy that ωc for sSub(t) may not have to be equal or nearly equal for sA(t) and sB(t), as is required for the interfering signal configuration.
As an example, if SA 300 is assumed to have a relative power of 0 dB and SB 310 is placed at the same power, the resulting composite signal would have a resulting power increase of 3.01 dB. Therefore, SA 300 and SB 310 would appear to be −3.01 dB relative to one another. With the addition of the SSub sub-carrier signal 400, the additional power is required to transmit, SB 310 and SSub 400 is as follows:
If the original carrier signal's SA 300 relative power is 0 dB, the additional power required after combining the signals may be calculated as such if SSub is 22 dB below SA (or SB):
SA=0.0 dB
SB=SA=0 dB
SSub=SA−22.00 dB=−22.00 dB
Additional power required to transmit SSub and SB=10*Log(10(0/10)+10(0/10)+10(−22/10))=3.024 dB
As shown in
The resulting interference generator or pseudo-random sequence may then be modulated by any modulating technique such as, but not limited to, Binary-Phase Shift Keying (BPSK), Quadrature-Phase Shift Keying (QPSK), etc. to produce SB(t)=BI cos(ωc2t)+BQ sin(ωc2t). SB is then combined with SA represented as SA(t)=AI cos(ωc1t)+AQ sin(ωc1t), and the resulting composite output is SA+B represented as SA(t)+SB(t)=AI cos(ωc1t)+AQ sin(ωc1t)+BI cos(ωc2t)+BQ sin(ωc2t); where ωc1 and ωc2 should be nearly equal for both sA(t) and sB(t), e.g. ωc1 and ωc2 may be ωc1=ωc2, ωc1<ωc2, or ωc1>ωc2.
The interfering signal generator's phase/sequence state and any other essential information may then be fed to the SSI encryptor 530 as a system synchronization information message. The SSI encryptor 530 may be, but is not limited to, a stream cipher, block cipher or any other method or system that may be used in the art. The next stage is the authentication module 540, where the SSI message is authenticated before transmission. In some implementations, the resulting encrypted and authenticated SSI message may then be modulated by any Binary-Phase Shift Keying (BPSK) or any modulating technique known in the art, spread using a spread spectrum technique 550 and then combined with SA+B 320. SSub 400 is represented as sSub(t)=CSubI cos(ωct+φc)+CSubQ sin(ωct+φc) and results in an LPD forward link signaling channel. The resulting composite output SA+B+Sub 410 of the encryptor and the approximately relative power levels are shown in
As shown in
From the power splitter 600, one path may be used for the SSub signal that is despread 630 using the same a priori despreading sequence that is used on the encryptor and then demodulated using the same demodulating type as was used for modulating the SSub sequence in the encryptor. In some implementations, BPSK may be used, but the modulation is not limited to BPSK. Once the SSub carrier represented as CSubI cos(ωct+φc)+CSubQ sin(ωct+φc) has been despread 630, demodulated, and decrypted 640, the authentication module 650 ensures the authenticity and integrity of the received message. Next the SSI parser 660 extracts the SSI message which may be used as part of the initial acquisition state of the decryptor to direct the synchronization of the interference generator 670. The resulting output then serves as the input to a modulator 680 to create SB, represented as sB(t)=BI cos(ωc2t)+BQ sin(ωc2t) in the encryptor. It is noteworthy that the modulation type for SB 310 does not have to be the same modulation technique that is used for SA 300. The synchronized interfering signal is then fed to the cancellation device 610 to cancel the SB 310 portion of the received composite SA+B+Sub 410 signal. An external memory device may be used to provide waveform delay of either SA+B+Sub 410 or SB 310 for alignment purpose and proper cancellation. The input of locally generated SB 690 to the canceller 610 may be close in phase, but there still may exist some phase difference with SB 310 in the received composite SA+B+Sub signal 410. The canceller 610 may allow for a minute amount of timing difference ambiguity to further align the signals, and ultimately cancelling out component SB 310 of the received composite waveform SA+B+Sub 410. The resulting output of the canceller 610 will be SA+Sub 620. It is noteworthy to state, the degradation to SA (noise contribution of SSub) is deemed insignificant and not required to be cancelled, leaving the desired output signal of SA 300. However, if the desired SSub carrier component 400 would be stored, a second canceller could be used to remove the SSub component 400 from the SA+Sub signal 410 if desired to produce a final original signal of SA 300.
For cryptographic algorithms implemented in the encryption and decryption device requiring key management, manually entered Pre-Placed Keys (PPK) may be used. The SSI SSub channel may be used for Over-The-Air-Rekeying (OTAR) or dynamic key updating. Additionally, any other method of key entry or exchange in the art may be used.
The following are particular implementations of methods and systems that may be configured for providing interference based physical-layer encryption and are provided as non-limiting examples:
The output of a data device is connected to a modulator and is transmitting over a transmission medium to a receiving device. Using an implementation of the described method and system, an external encryption device is connected to the output of the modulator. The output of the modulated data stream is matched with nearly the same center frequency, occupied bandwidth, and power level creating nearly the same PSD to create an interfering signal with the original signal. The SSI Sub channel is then added to create an LPD signaling channel that is spread within 99% (3 dB) bandwidth of the occupied bandwidth. At the receive side, the decryption device is placed before the receiving device, and set to the proper center frequency and occupied bandwidth. The decryption device extracts the SSI sub channel and synchronizes the interference generator/Pseudo-random generator sequence to create a delayed match of the SB signal. The locally generated SB and received composite signal SA+B+Sub are routed to the canceller where SB is removed from the composite signal resulting in cancellation of the interfering signal. The output of the decryption device is a nearly exact replica of the desired signal.
Using the system and method described in Example 1, the keying material may be symmetric or asymmetric independent of the key delivery mechanism.
Using the system and method as described in Example 1, an encryption device may receive an original signal of SA as QPSK. The inline encryption device may use QPSK for setting the interfering signal SB.
Using the system and method as described in Example 1, an encryption device may receive an original signal of SA as 8PSK. The inline encryption device may use 8PSK for setting the interfering signal SB.
Using the system and method as described in Example 1, an encryption device may receive an original signal of SA as N-QAM, where N may be an integer number. The inline encryption device may use N-QAM for setting the interfering signal SB.
Using the system and method as described in Example 1, an encryption device may receive an original signal of SA as N-APSK, where N may be any integer number and use Amplitude Phase Shift Keying (APSK). The inline encryption device may use N-APSK for setting the interfering signal SB.
Using the system and method as described in Example 1, an encryption device may use a stream cipher or block cipher as a source of an interference generator for creating the interfering signal SB. The SSI sub channel may be used to relay the current cryptographic state of the stream or block cipher to properly recreate SB within the decryptor.
The output of a data device is connected to a modulator and is transmitting over a transmission medium to a receiving device. Using an implementation of the described method and system, the modulated data (original signal) stream may be interfered internally (interfering signal) within the modulator at the modulated symbol level to create the same center frequency, occupied bandwidth, and power level, which creates nearly the same PSD in the interfering signal as the original signal. The SSI Sub channel may be added at the symbol level to create an LPD signaling channel that is spread within 99% (3 dB) bandwidth of the occupied bandwidth. At the receiving demodulator, the SSI sub carrier is extracted and then the output is provided to the decryption section. The output of the SSI sub channel decryption device then is used to set the proper sequence for the SB to be generated and then provided to the cancellation device. Once the SB is synchronized the proper interference generator/pseudo-random generator sequence is output to the cancellation device where the interfering signal is then removed. The output of the cancellation device is a nearly exact replica of the desired signal. It is then provided to the demodulator for demodulation, decoding and output.
Using the system and method as described in Example 8, the keying material may be symmetric or asymmetric independent of the key delivery mechanism.
Using the system and method as described in Example 8, an encryption device may receive an original signal of SA as QPSK. The inline encryption device may use QPSK for setting the interfering signal SB.
Using the system and method as described in Example 8, an encryption device may receive an original signal of SA as 8PSK. The inline encryption device may use 8PSK for setting the interfering signal SB.
Using the system and method as described in Example 8, an encryption device may receive an original signal of SA as N-QAM, where N may be an integer number. The inline encryption device may use N-QAM for setting the interfering signal SB.
Using the system and method as described in Example 8, an encryption device may receive an original signal of SA as N-APSK, where N may be any integer number and use Amplitude Phase Shift Keying (APSK). The inline encryption device may use N-APSK for setting the interfering signal SB.
Using the system and method as described in Example 8, an encryption device may use a stream cipher or block cipher as a source of an interference generator creating the interfering signal SB. The SSI sub channel may be used to relay the current cryptographic state of the stream or block cipherto properly recreate SB within the decryptor.
In places where the description above refers to particular implementations of telecommunication systems and techniques for transmitting data across a telecommunication channel, it should be readily apparent that a number of modifications may be made without departing from the spirit thereof and that these implementations may be applied to other to telecommunication systems and techniques for transmitting data across a telecommunication channel.
This document claims the benefit of the filing date of U.S. Provisional Patent Application No. 61/473,114, entitled “Methods and Systems for Providing Interference Based Physical-Layer Encryption” to Kasra Akhavan-Toyserkani, et al., which was filed on Apr. 7, 2011, the disclosure of which is hereby incorporated entirely by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
5099493 | Zeger et al. | Mar 1992 | A |
5748677 | Kumar | May 1998 | A |
5825807 | Kumar | Oct 1998 | A |
5978413 | Bender | Nov 1999 | A |
6349138 | Doshi et al. | Feb 2002 | B1 |
20030095662 | Jarosinski et al. | May 2003 | A1 |
20050055546 | Dzung | Mar 2005 | A1 |
20080198832 | Chester | Aug 2008 | A1 |
20090110197 | Michaels | Apr 2009 | A1 |
20090196420 | Chester et al. | Aug 2009 | A1 |
20090279592 | Pratt et al. | Nov 2009 | A1 |
Entry |
---|
Chorti, Arsenia. “Masked-OFDM: A Physical Layer Encryption for Future OFDM Applications”, 2010. |
Jorgensen, Morten Lisborg et al. “Shout to Secure: Physical—Layer Wireless Security with Known Interference”, 2007. |
Alan J. Michaels et al. “Efficient and Flexible Chaotic Communication Waveform Family” The 2010 Military Communications Conference, 2010 pp. 354-356; and figure 2. |
Number | Date | Country | |
---|---|---|---|
20110228929 A1 | Sep 2011 | US |
Number | Date | Country | |
---|---|---|---|
61473114 | Apr 2011 | US |