As is known in the art, physical layer encryption (PLE) is a set of techniques that rely on information theory and the concept of channel capacity for security. Unlike traditional encryption, such as private- and public-key systems, PLE is not vulnerable to computational attacks and can offer perfect forward security. Many PLE techniques work by artificially degrading the eavesdropper's channel so that their channel capacity is not sufficient to recover the infonnation being sent. For example, a masking signal may be added to a communication signal such that it has a null in the direction of an intended receiver. For all other directions spatially separated from the intended receiver, an eavesdropper will receive a combination of the communication and masking signals, with the masking signal dominant. This degrades the information capacity of the eavesdropper channel, making it difficult or impossible to recover the transmitted information.
PLE is generally quantified by a measure called secrecy capacity. This represents the difference in channel capacity between the intended receiver and the eavesdropper. A positive secrecy capacity means that the intended receiver has a higher capacity than the eavesdropper and the communication link can be configured so that the receiver can demodulate the data and the eavesdropper cannot by choosing an appropriate rate and encoding scheme. If the secrecy capacity is negative, then the eavesdropper will be able to demodulate any message that the intended receiver can and secrecy fails.
One example a PLE technique is called Additive Artificial Noise (AAN) in which a transmitted signal is expressed as:
where
Another family of techniques is called Directional Modulation (DM), in which a different weighting vector is chosen for each symbol in the transmit constellation in order to form the desired vector at the intended receiver. This causes receivers in other positions to receive a constellation with distorted but still distinct symbols. Determining the necessary weighting vector is an unbounded problem and generally requires the use of matrix inversion or optimization techniques. An improvement on this technique chooses a different weighting vector each time a given symbol appears. This is sometimes called Dynamic DM. This addresses the vulnerability of so-called Static DM systems to eavesdropping techniques which can resolve the distorted constellation by changing the pattern of distortion continuously.
It has been appreciated herein that existing physical layer encryption (PLE) techniques, such as Additive Artificial Noise (AAN) and Directional Modulation (DM), do not provide a sufficiently high degree of secrecy, are difficult to implement, and/or are computationally expensive.
Disclosed herein are concepts, structures, and techniques to provide a high degree of secrecy while being relatively easy to implement in a practical system. The disclosure provides an implementation of PLE using a transmit antenna array and a novel beamforming scheme. The techniques are based on the principles of Linear Amplification with Nonlinear Components (LINC), are computationally simple relative to existing PLE techniques, and provide secrecy comparable to noise-based masking and produces a signal with limited dynamic range.
According to one aspect of the disclosure, a method for generating an physical layer encrypted communication, comprises: receiving a modulated data signal; generating a structured masking signal based upon the modulated data signal; selecting a plurality of mask coefficients, each of the plurality of mask coefficients selected from a set of possible mask coefficients; applying the mask coefficients to the structured masking signal to generate a plurality of masking signals; combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals; and applying at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction.
In some embodiments, the method further comprises applying noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals.
In certain embodiments, generating a structured masking signal based upon the modulated data signal comprises selecting a point on a circle having predetermined radius based upon the data signal. The method may further comprise receiving a mask power level (Rmax), wherein the radius of the circle is determined based upon the mask power level. Generating a structured masking signal based upon the modulated data signal (a[k]) may comprise computing
To improve efficiency, the method can include generating a table of solutions to
for various values a[k], wherein generating a structured masking signal based upon the modulated data signal comprises selecting a value from the table of solutions.
In various embodiments, selecting a plurality of mask coefficients comprises selecting a plurality of random numbers. In some embodiments, selecting a plurality of mask coefficients comprises selecting a plurality of mask that sum to zero. In certain embodiments, the method further comprises generating a plurality of possible mask coefficient vectors, wherein selecting a plurality of mask coefficients comprises randomly selecting a mask effective vector from the plurality of possible mask coefficient vectors. In some embodiments, applying the mask coefficients to the structured masking signal to generate a plurality of masking signals comprises modulating the structured masking signal by ones of the plurality of mask coefficients. In various embodiments, combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals comprises summing the modulated data signal with ones of the plurality of masking signals.
In certain embodiments, the method further comprises transmitting each of the transmit signals via a respective transmit antenna, which may include transmitting via a phased array.
According to another aspect of the disclosure, a system for physical layer encrypted communication, comprises a data source, a plurality of transmit antennas, and a processor coupled to the input source and the transmit antennas. The processor may be configured to: receive a modulated data signal from the data source; generate a structured masking signal based upon the modulated data signal; select a plurality of mask coefficients, each of the plurality of mask coefficients selected from a set of possible mask coefficients; apply the mask coefficients to the structured masking signal to generate a plurality of masking signals; combine the modulated data signal with the masking signals to generate a plurality of masked data signals; apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the plurality transmit signals having a null in a predetermined direction; and transmit each of the plurality of transmit signals via a corresponding one of the plurality of transmit antennas.
In some embodiments, the processor is further configured to apply noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals. In various embodiments, the processor is configured to generate a structured masking signal by selecting a point on a circle having predetermined radius. In certain embodiments, the processor is configured to select a plurality of mask coefficients that sum to zero. In some embodiments, the transmit antennas are provided within a phased array.
According to another aspect of the disclosure, a system for physical layer encrypted communication comprises: a data source to generate a modulated data signal; a mask generator coupled to receive the data signal and configured to generate a structured masking signal based upon the modulated data signal; a mask coefficient generator coupled to receive the structured masking signal and configured to multiple the structured masking signal by each of a plurality of mask coefficients to generate a plurality of masking signals, each of the plurality of mask coefficients selected from a set of possible mask coefficients; a combiner coupled to combine the modulated data signal with each of the plurality of masking signals to generate a plurality of masked data signals; a pulse-shaping module coupled to receive the plurality of masked data signals and configured to apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction; and a plurality of transmit antennas, each of the plurality of transmit antennas coupled to transmit a correspond one of the plurality of transmit signals.
The concepts, structures, and techniques sought to be protected herein may be more fully understood from the following detailed description of the drawings, in which:
The drawings are not necessarily to scale, or inclusive of all elements of a system, emphasis instead generally being placed upon illustrating the concepts, structures, and techniques sought to be protected herein.
Referring to
The masking transmitter 102 may correspond to a wireless transmit platform, such as a node in a cellular or Wi-Fi network, a base station, or a satellite transmit platform. The transmitter 102 is configured to wirelessly communicate with the intended receiver 104 by generating and transmitting the signals in free space. In some embodiments, the transmitter 102 generates a masking signal which is added to the communication signal such that the resulting mask 110 has a null 111 in the direction of intended receiver 104. An eavesdropper 106 receives a combination of the communication and masking signals (as illustrated by mask 110), with the masking signal dominant to degrade the information capacity of the eavesdropper channel.
In some embodiments, the masking transmitter 102 comprises a conventional radio frequency (RF) transmitter adapted to utilize PLE techniques disclosed herein. Advantageously, the PLE techniques disclosed herein can be added to transmitters of existing communication systems without having to modify the receivers (e.g., an RF receiver at intended receiver 104). Existing cellular and Wi-Fi transmitters make extensive use of powerful signal processing and multiple-antenna systems already and, thus, can be adapted to perform the relatively low-complexity PLE techniques disclosed herein. In addition, existing cellular and Wi-Fi systems have a relatively large quantity of deployed receivers, which would benefit from this technology without requiring upgrades.
The receiver 104 may correspond to a wireless receiver platform. In embodiments, the receiver 104 comprises a conventional radio receiver. The receiver may be located on a mobile platform, including but not limited to an aerial platform, a ground-based platform, or a water-based platform (e.g. an aircraft, a ground-based vehicle, or a watercraft). As mentioned, the PLE techniques disclosed herein can be used without requiring any changes to the intended receiver 104. To the intended receiver, the communication signal appears unchanged (as illustrated beam 108) whether the transmitter is a masking transmitter or a conventional transmitter. This has the benefit of allowing existing transmitters to be upgraded individually and for staged deployment.
In some embodiments, the masking transmitter 102 tracks the relative position of the intended receiver 104 and uses beam steering to direct the main beam 108 thereto. For example, masking transmitter 102 may include a phased array which provides adjustable phase relationships among the antenna elements to direct the main beam 108.
Referring to
The data source 202 generates, or otherwise provides, a modulated data signal. The modulated data signal can be represented as a vector of complex-valued data symbols, where a[k] denotes the complex data symbol at time k. The mask generation network 204 is coupled to receive the modulated data signal and configured to generate a plurality of masking signals. The masking signals are selected (or “structured”) based upon the data signal using techniques disclosed herein. The masking symbols can also be represented as a vector of symbols, where Mn[k] denotes the symbol for the nth masking signal at time k. The modulated data signal is combined with the masking signals to generate a plurality of masked data signals. As shown in
The pulse-shaping and beamforming network 206 receives the masked data signals and generates a plurality of transmit signals which can be transmitted into free space via antenna array 208. The number of generated masking signals and masked data signals may be equal to the number of transmit antennas (N).
In the embodiment shown, the network 206 applies a beamforming weight wn to each masked signal n, which is then filtered using a continuous-time band-liming pulse. In some embodiments, the filters, denoted g(t), are provided as square-root Nyquist filters with bandwidth 1/T, where T is a selected signaling interval. Thus, the signal transmitted on the nth of N antenna elements may be a continuous-time signal expressed as
sn(t)=Σk=−∞∞wn(a[k]+Mn[k])g(t−kT). (3)
In general, the weights wn determine the boresight of the antenna array 208. In this example, the weights are selected to be wn=1 so that the array boresight is directed along the x-axis 210 where an intended receiver 212 is located.
If the antenna elements are evenly spaced at a distance d wavelengths apart, the received signal at an angle θ off the x-axis can be expressed as
r(t;θ)=γΣn=0N−1sn(t)ej2πd cos θ+φ(t) (4)
where γ is a constant path-loss component due to propagation and φ(t) is additive white Gaussian noise (AWGN) with a power spectral density N0/2. From equations (3) and (4) it will be appreciated that the choice of the masking signal Mn[k] can have a significant effect the signal fidelity of a receiver as a function of θ.
In various embodiments, the restriction Σn=0N−1Mn[k]=0 is imposed such that the masking signals impart no interference on the intended receiver 212. A simple choice for the mask is to set Mn[k]=0 for all n and k which reduces the system to a traditional beamforming array. This method suffers from side-lobes 216 off the main beam 218 which are vulnerable to an eavesdropper 214 employing a high-gain antenna. Existing PLE techniques, such as Additive Artificial Noise (AAN), may improve upon traditional beamforming by selecting Mn[k] to be AWGN such that the power level makes decoding off the beam difficult (or even impossible). The constraint Σn=0N−1Mn[k]=0 must still be met to satisfy the cancellation requirement at the intended receiver and the standard deviation of the noise, σM can be chosen to satisfy the security requirements. Note that this condition is a subset of the more general null-space formulation described in (2) in the Background section above. While this approach provides security, the transmitter efficiency is greatly diminished as the signal's peak-to-average power ratio (PAPR) increases significantly.
The mask generation network 204 generates masking signals using a technique based on the principles of outphasing amplification techniques and, more particularly, of linear amplification using non-linear components (LINC). LINC systems include a signal component separator which produces constant-envelope branch signals by combining the communication signal with a linearizing signal. Likewise, mask generation network 204 generates masking signals based upon the definition of an envelope correction factor. Given a complex-valued data signal a, a linearizing signal (also referred to herein as a “structured masking signal”) can be computed as
and can be used to create two sub-components of the original signal,
a+[k]=a[k](1+e[k]) (6)
a−[k]=a[k](1−e[k]). (7)
These sub-components have properties of note:
The first property provides the masking condition to prevent distortion for the intended receiver 212. The second property provides a constant amplitude signal, which reduces PAPR and thus reduces the required amplifier performance.
The nth masked data signal can be defined as:
Mn[k]=a[k]e[k]rn[k] (8)
where rn[k] is the nth element of mask coefficient vector, sometimes referred to as a “scrambling vector.” In some embodiments, the mask coefficient vector is selected such that:
{rn[k]=±1, Σn=0N−1rn[k]=0∀k} (9)
The mask coefficients may be randomly generated on a per-symbol basis to randomly assign either a+[k] or a−[k] to each data signal value with the condition that there must always be an equal number of each. This maintains the condition Σn=0N−1Mn[k]=0∀k, guaranteeing that the masked signal cancels at the intended receiver 212.
It is appreciated that the masking technique described hereinabove is a generalization on conventional LINC, which can be expressed using the formulation above by setting N=2 and rT=[−1,1] for two branches with r fixed. Moreover, randomly generating the mask coefficients for each symbol has the same effect of generating a different distortion for each symbol as in Dynamic Directional Modulation (DM).
The transmitted signals can be seen to be a superposition of a standard beamformed signal with the noise-like vector (i.e., a mask). Based on the structure of the masking signals described hereinabove, the masking signals cancel at the intended receiver's 212 location. For a receiver away from the main lobe 218, this cancellation does not occur and so the signal is corrupted. This degrades an eavesdropper's 214 channel capacity and ensures a positive secrecy capacity so that the transmission can be protected from interception.
Using the techniques and structures described above, a transmitter can produce two distinct areas of reception: a ciphertext region 220 and a plaintext region 222. These two regions differ in the fact that within the plaintext region 222 the communication signal 218 dominates, while in the ciphertext region 220 the masking signal 224 dominates. In terms of system security, the plaintext region 212 can be treated as though it is an area denied to the adversary; that is, the adversary is limited to only placing eavesdroppers 214 in the ciphertext region 220. It is noted that while the terms “ciphertext” and “plaintext” are usually used to denote cryptographic solutions, here they are used to denote whether or not a communication signal is obfuscated by the masking signal.
It will be appreciated that the PLE techniques described herein can be used to make it difficult (or even impossible) for an eavesdropper 214 within a ciphertext region 220 to recover a communications signal, even if the eavesdropper is a highly capable adversary (e.g., even if an eavesdropper has perfect knowledge of the transmitter and waveform, including knowledge of the modulation scheme, the encoding, the frame structure and any other transmitter-specific parameters required, can estimate the correct time and phase offsets to recover the symbols, and has better gain than the intended receiver 212).
It should be understood that the concepts, and structures, and techniques sought to be protected herein are not limited to the specific masking signal formulations described hereinabove and that other formulations may be used. For example, quad LINC, which is described by Hegazi et al. (“Improved LNC power transmission using a quadrature outphasing technique,” Microwave Symposium Digest, 2005 IEEE MTT-S International, 12-17 Jun. 2005) is similar to the standard LINC formulation previously discussed except that it is performed separately on the I and Q components of the data signal. This results in four different branch signals which would then be randomized among the array elements.
Another possible choice of masking signal is a multi-level LINC formulation, such as the multi-level LINC formulation described within the aforementioned Hegazi et al. paper. The basic concept of multi-level LINC is to form branch signals with multiple discrete amplitude levels, as opposed to a single level for standard LINC.
In addition, multiple masking signal techniques may be implemented within a single masking transmitter. For example, both standard LINC and quad LNC can be implemented in parallel and share some resources. Such a transmitter can switch between standard and quad for different modulation types. The transmitter could also interleave the two masking signals at the symbol rate, which would increase the number of combinations for an improvement in the secrecy capacity.
Referring to
It should be appreciated that masking transmitter 300 generally conforms to the architecture 200 and, thus, the concepts and techniques described above in conjunction with
The data source 302 generates (or otherwise provides) modulated data signal 314. For simplicity of explanation, signal paths and respective signals carried on those signal paths are shown using common reference designators in
The mask generator 304 is coupled to receive the modulated data signal 314 and configured to generate a structured masking signal 316 based upon the data signal 314. In some embodiments, the mask generator 304 also receives a mask power level 318, used to control the ratio between signal and mask power. To generate the structured masking signal 316, the mask generator 304 may utilize an implementation of equation (5), where Rmax corresponds to mask power level 318 and a[k] corresponds to a complex data symbol associated with data signal 314 at time k. In some embodiments, the square-root function of equation (5) is tabulated and stored within the transmitter 300 to reduce computation costs.
The mask coefficient generator 306 generates a plurality of mask coefficients 320, which are combined with structured masking symbol 316 to generate a plurality of masking signals 322. As discussed about in conjunction with
In particular embodiments, a set of possible mask coefficient vectors may be tabulated and stored within the transmitter 300 to reduce computational costs. However, it may be impractical to pre-compute and/or store all such possible vectors. Thus, the mask coefficient generator 306 may choose to tabulate a subset of all possible mask coefficient vectors; choosing the population of this table can provide an optimization for various characteristics. For example, a subset of vectors can be chosen to provide a null in the masking signal at a particular angular location or to modulate the width of the null at the intended receiver. The subset chosen may be static or could be updated as the environment changes. So long as the size of the subset is not too small, security will not be significantly degraded. Alternatively, because all possible mask coefficient vectors are permutations of each other, the mask coefficient generator 306 may be initialized with a random vector and then perform a random shuffling routine, such as the Fisher-Yates algorithm, to generate a new random permutation for each update.
In some embodiments, the masking transmitter 300 includes a noise source 312. As discussed below in conjunction with
The masking signals 322 are combined with the modulated data signal 314 (or with the noisy data signal 314′) to generate a plurality of masked data signals 326. The ratio between the power of data signal 314 and mask signal 322 may be varied by changing the mask power 318 (Rmax). The mask power 318 may be fixed or may vary, typically on a long time-scale. It is appreciated that diverting additional transmit power to the masking signal will degrade the eavesdropper's ability to demodulate the transmitted signal, but may also reduce the intended receiver's channel capacity.
The interpolation/pulse-shaping module 308 and beamformer 310 are coupled to receive the masked data signals 326 and configured to generate a plurality of transmit signals 328, here N transmit signals. A conventional interpolation/pulse-shaping module 308 and/or beamformer 310 may be used. In a typical implementation, symbols are up-sampled to the required digital-to-analog converter (DAC) sample rate, which may be many times the symbol rate, and filtered by a pulse-shaping filter such as a root-raised cosine. In many applications this filter will sharply limit the spectrum of the transmitted signal for spectral efficiency; this does not impact the security of the masking transmitter 300 but will re-introduce some amplitude variation into the output signal. Some applications may omit the pulse-shaping filter or replace it with a less-sharp low-pass filter. The beamformer 310 applies appropriate phase weights to the transmit elements to steer the beam in the desired direction. It should be noted that, although the beamformer 310 is shown immediately before the antenna elements here, the implementation is equivalent if phase weights are applied to the data signal 314 and masking signals 322 separately.
Each transmit signal 328 may be coupled to a respective transmit antenna (not shown) for transmission into free space. In some embodiments, the transmit antennas are provided as an antenna array (e.g., a phased array), with each transmit signal 328 coupled to a respective one of N array antenna elements. In some embodiments, the number of antenna elements N is even.
In particular embodiments, one or more of the components 302-312 are resident within a digital signal processor (DSP) of the transmitter 300. A data signal may be generated elsewhere in the transmitter, supplied in digital form, and modulated to generate modulated signal 314. The transmit signals 328 can be supplied digitally to individual antenna elements (not shown). To retrofit an existing system, the transmitter 300 may include a analog-to-digital converter to convert an analog data signal to digital data signal 314 and/or may include digital-to-analog converters to convert digital transmit signals 328 to analog transmit signals.
The security of a masking transmitter 300 may be linked to the number of transmit antennas N. A noise-like masking signal 322 has a discrete set of M possible values based on the two available signs and the number of possible combinations of the mask coefficients 320. For example, if N=8, M=70. For an eavesdropper, each transmitted symbol will take on M discrete values in the corrupted constellation. This is referred to as re-mapping, and results in a 16-QAM constellation being re-mapped into a relatively large number (e.g., 1120) of different points. This re-mapping process is a function of the eavesdropper channel, such that two eavesdroppers in different locations will see different constellations. Assuming that the masking signal is synchronous to the data symbols, each symbol will appear at the eavesdropper in one of the M possible locations.
It can be seen from
If the eavesdropper has knowledge of the masking technique and the channel, it can determine the re-mapped constellation and attempt to recover the original transmitted symbols. There are also blind channel estimation and multi-user detection techniques that may allow estimation of the re-mapped constellation from the received signal at the eavesdropper. Thus, it is understood that an optimum eavesdropper could exist which would have perfect knowledge of the constellation re-mapping process along with other knowledge about the modulation and waveform structure being used.
Without any noise, knowledge of the re-mapped constellation will allow the eavesdropper to recover the original symbols and drive the secrecy capacity towards zero. However, the structure of the re-mapped constellation puts even the optimum eavesdropper at a disadvantage relative to the intended receiver. The re-mapped constellation has many more points than the original (by a factor of M, which may be very large) and so the average distance between points will be much smaller than in the transmitted constellation. Further, as seen in
As discussed above, for the purpose of security analysis, it is assumed that an eavesdropper can achieve arbitrarily high SNR. This may be a result of the eavesdropper has a relatively sensitive receiver (i.e., having a relatively high antenna gain and/or low noise temperature to achieve a relatively high gain-over-temperature figure-of-merit), being much closer than the intended receiver, or both. To mitigate the ability of such an eavesdropper to recover the original modulation under high-SNR conditions, a relatively small amount of noise (e.g., Gaussian white noise) can be added to the data signal, e.g., using noise source 312 in
Referring to
At block 606, a structured masking signal is generated based upon the data signal (or “noisy” data signal). At block 608, a plurality of mask coefficients are selected from a set of possible mask coefficients and, at block 610, the mask coefficients are applied to the structured masking signal to generate a plurality of masking signals. Illustrative techniques for generating a structured mask signal, selecting mask coefficients, and generating masking signals are described above in conjunction with
At block 612, the data signal (or “noisy” data signal) is combined (e.g., summed) with the masking signals to generate a plurality of masked data signals. At block 614, a plurality of transmit signals are generated by applying at least one of a weighting signal and a phasing signal to each of the masked data signals. At block 616, each of the transmit signals may be transmitted via a respective transmit antenna (e.g., an element of an antenna array). In some embodiments, blocks 614 and 616 are performed by a phased array.
All references cited herein are hereby incorporated herein by reference in their entirety.
Having described certain embodiments, which serve to illustrate various concepts, structures, and techniques sought to be protected herein, it will be apparent to those of ordinary skill in the art that other embodiments incorporating these concepts, structures, and techniques may be used. Elements of different embodiments described hereinabove may be combined to form other embodiments not specifically set forth above and, further, elements described in the context of a single embodiment may be provided separately or in any suitable sub-combination. Accordingly, it is submitted that scope of protection sought herein should not be limited to the described embodiments but rather should be limited only by the spirit and scope of the following claims.
This application is a U.S. National Stage of PCT application PCT/US2015/030085 filed in the English language on May 11, 2015, and entitled “PHYSICAL LAYER ENCRYPTION USING OUT-PHASED ARRAY LINEARIZED SIGNALING,” Which claims the benefit under 35 U.S.C. § 119 of provisional application No. 61/991,824 filed May 12, 2014, and provisional application No. 61/992,354 filed May 13, 2014, both of which applications are hereby incorporated be reference herein in their entireties.
This invention was made with Government support under Contract No. FA8721-05-C-0002 awarded by U.S. Air Force. The Government has certain rights in the invention.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/030085 | 5/11/2015 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2015/175374 | 11/19/2015 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4949289 | Stephens et al. | Aug 1990 | A |
6311046 | Dent | Oct 2001 | B1 |
7664274 | Graumann | Feb 2010 | B1 |
7957712 | Sjoland | Jun 2011 | B2 |
20030091184 | Chui | May 2003 | A1 |
20060153375 | Yi | Jul 2006 | A1 |
20110246854 | McLaughlin et al. | Oct 2011 | A1 |
Entry |
---|
Cepheli, et al.; “Efficient PHY Layer Security in MIMO-OFDM: Spatiotemporal Selective Artificial Noise”; 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM); Jun. 4-7, 2013; pp. 1-6; 6 pages. |
Chorti, et al.; “On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers”; IEEE Journal on Selected Areas in Communication; vol. 31; No. 9; Sep. 2013; 14 pages. |
Hokai, et al.; “Wireless Steganography using MIMO System”; 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE); Jul. 30-Aug. 1, 2014; 6 Pages. |
Hong, et al.; “Design of Directional Modulation Signal Based on Multi-objective Genetic Algorithm for Physical Layer Secure Communication”; Abstract Only; 2014 Journal Home; vol. 32; Issue (1); Dec. 12, 2011; 1 Page. |
Hong, et al.; “Directional spread-spectrum modulation signal for physical layer security communication applications”; Security and Communication Networks; May 10, 2012; 12 Pages. |
Hong, et al.; “Dual-Beam Directional Modulation Technique for Physical-Layer Secure Communication”; IEEE Antennas and Wireless Propagation Letters; vol. 10; Dec. 7, 2011; 4 Pages. |
Li, et al.; “Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation”; IEEE Communications Letters; vol. 19; No. 2; Feb. 2015; 4 Pages. |
Li, et al.; Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks; IEEE Transactions on Signal Processing; vol. 63, No. 1, Jan. 1, 2015; 15 Pages. |
Li, et al.; “Achieving Secure Transmission with Equivalent Multiplicative Noise in MISO Wiretap Channels”; IEEE Communications Letters; vol. 17; No. 5; May 2013; 4 Pages. |
Lu; “An SLNR-based precoding scheme for secure downlink multigroup multicast MIMO systems”; Abstract Only; Jan. 2012; 1 Page. |
Schaefer, et al.; “Physical Layer Service Integration in Wireless Networks”; IEEE Signal Processing Magazine; vol. 31; Issue 3; Apr. 7, 2014; pp. 147-156; 10 Pages. |
Shi, et al.; “Secure Physical-Layer Communication Based on Directly Modulated Antenna Arrays”; Antennas and Propagation Conference (LAPC), 2012 Loughborough; Nov. 12-13; 4 Pages. |
Song, et al.; “A Cooperative Jamming Based Security Algorithm for Multi-User MIMO Systems”; 2013 International Conference on Information Science Technology (ICIST); Mar. 23-25, 2013; 4 Pages. |
Van Nguyen, et al.; “Secure multiple-input single-output communication—Part I: secrecy rates and switched power allocation”; IET Communications; vol. 8; Issue 8; Jun. 12, 2014; pp. 1217-1226; 10 Pages. |
Wang, et al.; “Enhancing Physical Layer Security Through Beamforming and Noise Injection;” 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP); Oct. 23-25, 2014; 6 pages. |
Xiong, et al.; “Achieving Secrecy Capacity of MISO Fading Wiretap Channels with Artificial Noise”; 2013 IEEE Wireless Communications and Networking Conference (WCNC); Apr. 7-10, 2013; 5 pages. |
Yamaguchi, et al.; “Physical Layer Network Coding with Multiple Untrusted Relays for Physical Layer Security”; 2014 Annual Summit and Conference Asia-Pacific Signal and Information Processing Association; Dec. 9-12; 5 Pages. |
Yao, et al.; “A QPSK Modulation Scheme Based on Four Dimensional Antenna Arrays”; 2012 IEEE International Workshop on Electromagnetics; Applications and Student Innovation (iWEM) Aug. 6-9, 2012; 2 Pages. |
Yang, et al.; “Achievable rate region with secrecy constraints for secure communication in two-way relay networks”; IEEE Transactions on Vehicular Technology; vol. 65; Issue 8; Sep. 19, 2013; 19 pages. |
Zhao, et al.; “A Secure Method of Physical Layer Transmission Based on Multi-beam and Artificial Noise”; Abstract Only; Dianxun Jishu/Telecommunications Engineering; 51(7); Jan. 2011; pp. 30-33; 1 Page. |
Zhu, et al.; “Relay Precoding in Multiuser MIMO Channels for Physical Layer Security”; 2014 IEEE/CIC International Conference on Communications in China (ICCC); Oct. 13-15, 2014; 5 Pages. |
PCT International Preliminary Report dated Nov. 24, 2016 corresponding to International Application No. PCT/US2015/030085; 9 Pages. |
Air Force Research Laboratory; Information Transmission; Security Classification Guide; May 31, 1997; 24 pages. |
Abdelaal; “LINC Based Amplifier Architecture for Power Efficient Wireless Transmitters”—Abstract Only; Ecole Polytechnique; 2 pages; 2009. |
Alrabadi, et al.; “Directional Space-Time Modulation: A Novel Approach for Secured Wireless Communication;” IEEE ICC Jun. 10-15, 2012; Signal Processing for Communication Symposium; pp. 3554-3558; 5 pages. |
Bateman, et al.; “Implementation of the LINC Transmitter Using the Combined Analogue Locked Loop Universal Modulator (CALLUM);” Mobile and Personal Communications; Conference Publication No. 387; Dec. 13-15, 1923; pp. 31-37; 7 pages. |
Bateman; “The Combined Analogue Locked Loop Universal Modulator (CALLUM);” IEEE 42nd Vehicular Technology Conference Center; May 10-13, 1992; pp. 759-763; 5 pages. |
Birafane, et al.; “Analyzing LINC System;” IEEE Microwave Magazine; Aug. 2010; pp. 59-71; 13 pages. |
Cepheli, et al.; “Analysis on the Effects of Artificial Noise on Physical Layer Security;” 21st Signal Processing and Communications Applications Conference; Apr. 24-26, 2013; 4 pages. |
Chae, et al.; “Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone;” IEEE Transactions on Information Forensics and Security; Vo. 9; No. 10; Oct. 2014, pp. 1617-1628; 12 pages. |
Chiw, et al.; “Compact Power Combining Patch Antenna;” Electronics Letter; Nov. 7, 2002; vol. 38; No. 23; pp. 1413-1414; 2 pages. |
Chiw, et al.; “Stacked Common Mode Power Combining Patch Antenna for LINC Transmitter;” 33rd European Microwave Conference; Oct. 2-10, 2003; pp. 691-694; 4 pages. |
Choffrut, et al.; “Traveling Wave Tube-Based LINC Transmitters;” IEEE Transactions on Electron Devices; vol. 50; No. 5; May 2003; pp. 1405-1407; 3 pages. |
Chowdhury, et al.; “A New Symmetric Key Encryption Algorithm based on 2-d Geometry;” 2009 International Conference on Electronic Computer Technology; IEEE Computer Society; Feb. 27, 2009; pp. 541-544; 4 pages. |
Cox; “Linear Amplification with Nonlinear Components;” IEEE Transactions on Communications; Dec. 1974; pp. 1942-1945; 4 pages. |
Daly, et al.; “Directional Modulation and Coding in Arrays;” Antennas and Propagation (APSURSI); 2011 IEEE International Symposium; Jul. 3-8, 2011; pp. 1984-1987; 4 pages. |
Daly; “Physical Layer Encryption Using Fixed and Reconfigurable Antennas;” Dissertation; 2012; 119 pages. |
Ding, et al.; “A Vector Approach for the Analysis and Synthesis of Directional and Modulation Transmitters;” IEEE Transactions on Antennas and Propagation; vol. 62; Issue 1; Jan. 2014; 11 pages. |
Ding, et al.; “Directional Modulation Transmitter Synthesis using Particle Swarm Optimization;” Antennas and Propagation Conference (LAPC); Nov. 11-12, 2013; pp. 500-503; 4 pages. |
Ding, et al.; “Establishing Metrics for Assessing the Performance of Directional Modulation Systems;” Queen's University Belfast—Research Portal; IEEE Transactions on Antennas and Propagation; vol. 62; Issue 5; May 2015; 12 pages. |
Ding, et al.; “Improved Physical Layer Secure Wireless Communications Using a Directional Modulation Enhanced Retrodirective Array;” General Assembly and Scientific Symposium (URSI GASS); Oct. 20, 2014; 4 pages. |
Ding, et al.; “Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters;” Queen's University Belfast—Research Portal; vol. 14; Feb. 19, 2015; 5 pages. |
Ding, et al.; “Polarization Distortion as a Means for Securing Wireless Communication;” The 8th European Conference on Antennas and Propagation; Apr. 6-11, 2014; pp. 1454-1458; 5 pages. |
Elaal, et al.; “ACPR Performance Study for Modified LINC Amplifier;” 13th IEEE International Conference on Electronics, Circuits and Systems; Dec. 10-13, 2006; pp. 435-438; 4 pages. |
Gao, et al.; “Slot-Coupled Integrated Antenna for LINC Transmitters;” 12th International Conference on Antennas and Propagation; Mar. 31-Apr. 3, 2003; pp. 241-244; 4 pages. |
Garcia, et al,; “Nonlinear Distortion Cancellation Using LINC Transmitters in OFDM Systems;” IEEE Transactions on Broadcasting; vol. 51, No. 1; Mar. 2005; pp. 84-93; 10 pages. |
Goel, et al.; “Guaranteeing Secrecy Using Artificial Noise;” IEEE Transactions on Wireless Communications; vol. 7; No. 6; Jun. 2008; pp. 2180-2189; 10 pages. |
Goel, et al.; “Secret Communication in Presence of Colluding Eavesdroppers;” MILCOM2005; IEEE Military Communications Conference; Oct. 17-20, 2005; 6 pages. |
Hegazi, et al.; “Improved LINC Power Transmission Using a Quadrature Outphasing Technique;” MTT-S International Microwave Symposium Digest; Jun. 17, 2005; pp. 1923-1926; 4 pages. |
Hegazi, et al.; “Linear Wideband VHF/UHF Quad LINC Transmitter System;” MILCOM 2007; IEEE Military Communications Conference; Oct. 29-31, 2007; pp. 1-6; 6 pages. |
Hong, et al.; Directional Sensitive Modulation Signal Transmitted by Monopulse Cassegrain Antenna for Physical Layer Secure Communication; Progress in Electromagnetics Research M; vol. 17; Jan. 2011; pp. 167-181; 15 pages. |
Hong, et al.; “RF Directional Modulation Technique Using a Switched Antenna Array for Physical Layer Secure Communication Applications;” Progress in Electromagnetics Research; vol. 116; Mar. 2011; pp. 363-379; 17 pages. |
Hur, et al.; “Highly Efficient Uneven Multi-Level LINC Transmitter;” Electronics Letters; Jul. 30, 2009; vol. 45; No. 16; pp. 837-838; 2 pages. |
Li, et al.; “Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming;” IEEE Transactions on Signal Processing; vol. 59; Issue 8; Dec. 20, 2010; 31 pages. |
Li, et al.; “Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization;” IEEE Transactions on Signal Processing; vol. 61; Issue 10; Mar. 2013; 30 pages. |
Liang, et al.; “Transmitter Linearization by Beamforming;” IEEE Journal of Solid-State Circuits; vol. 46; No. 9; Sep. 2011; pp. 1956-1969; 14 pages. |
Liang; “Transmitter Linearization by Beamforming;” Thesis; University of California; 2009; 128 pages. |
Liang; “Transmitter Linearization by Beamforming;” Abstract Only; University of California; 2009; 2 pages. |
Liao, et al.; “Qos-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach;” IEEE Transactions on Signal Processing; vol. 59, No. 3; Mar. 2011; 15 pages. |
Liefer; “Signal Processing Design of Low Probability of Intercept Waveforms Via Intersymbol Dither;” Thesis; Department of the Air Force; Air Force Institute of Technology; Mar. 2008; 107 pages. |
Lim, et al.; “Compensation of Path Imbalance in LINC Transmitters Using EVM and ACPR Look Up Tables;” Proceedings of Asia-Pacific Microwave Conference 2010; Microwave Conference Proceedings (APMC); Dec. 7-10, 2010; pp. 1296-1299; 4 pages. |
Ma, et al.; “A New Approach to Null Space-Based Noise Signal Generation for Secure Wireless Communications in Transmit-Receive Diversity Systems;” 2010 IEEE International Conference on Wireless communications, Networking and Information Security (WSCNIS); Jun. 25-27, 2010; pp. 406-410; 5 pages. |
Mukherjee, et al.; “Principles of Physical Layer Security in Multiuser Wireless Networks; A Survey;” IEEE Communications Surveys & Tutorials; vol. 16; Issue 3; Feb. 13, 2014; 23 pages. |
Mukherjee, et al.; “Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI;” IEEE Transactions on Signal Processing; vol. 59; Sep. 20, 2010; Issue 1; 10 pages. |
Mustafa, et al.; “Bandwidth Limitation for the Constant Envelope Components of an OFDM Signal in a LINC Architecture;” IEEE Transactions on Circuits and Systems—1: Regular Papers; IEEE Transactions on Circuits and Systems; vol. 60; Issue 9; Feb. 20, 2013; 9 pages. |
Newman; “Chapter VII—Receiver Optimization Using Error Vector Magnitude Analysis;” Analog Devices; ADI Wireless Seminar 2006; pp. VII-1-VIII-5; 5 pages. |
Ohno, et al.; “Optimization of Transmit Signals to Interfere Eavesdropping in a Wireless Lan;” 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP); May 4-9, 2014; pp. 6093-6097; 5 pages. |
Papadias, “Globally Convergent Blind Source Separation Based on a Multiuser Kurtosis Maximization Criterion”; IEEE Transactions on Signal Processing, vol. 48. No. 12.; Dec. 2000; pp. 3508-3519; 12 pages. |
Pearson, et al.; “Software Radio Performance Improvement through Combined RF and Digital Design;” IEEE Radio and Wireless Symposium; Jan. 22-24, 2008; pp. 291-294; 4 pages. |
Pellegrini, et al,; “Cryptographically Secure Radios Based on Directional Modulation;” IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP); May 4-9, 2014; 5 pages. |
Shannon, “Communication Theory of Secrecy Systems;” The Bell System Technical Journal; vol. 28, Issue 4; Oct. 1949; pp. 656-715; 60 pages. |
Simoneau et al,; “Digital Augmentation of RF Component Performance in Software-Defined Radio;” IEEE Transactions on Microwave Theory and Techniques; vol. 57, No. 3.; Mar. 2009; p. 573-581; 9 pages. |
Strandberg, “CALLUM Linear Transmitter;” Architecture and Circuit Analysis; Department of Electroscience; Lund University; Jan. 1, 2004; 262 pages. |
Tippenhauer, et al.; “On Limitations of Friendly Jamming for Confidentiality;” 2013 IEEE Symposium on Security and Privacy; May 19-22, 2013; pp. 160-173; 14 pages. |
Wang, et al.; “Secure MISO Wiretap Channels with Multi-Antenna Passive Eavesdropper via Artificial Fast Fading;” IEEE International Conference on Communications; Jun. 10-14, 2014; 6 pages. |
Wyner; “The Wire-Tap Channel;” The Bell System Technical Journal; vol. 54, No. 8; Oct. 1975; 34 pages. |
Yang, et al,; “Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks;” IEEE Transactions on Signal Processing, vol. 62, No. 8; Apr. 15, 2014; pp. 2111-2126; 16 pages. |
Zhang,; “An Improved Outphasing Power Amplifier System for Wireless Communications;” University of California; Dissertation in Electrical Engineering; 2001; 218 pages. |
Zhang, et al,; “A Secure MQAM Scheme Based on Signal Constellation Hopping;” KSII Transactions on Internet and Information Systems; vol. 8, No. 7; Jul. 2014; p. 2246-2260; 15 pages. |
Zhang, et al.; “Collaborative Relay Beamforming for Secrecy;” IEEE International Conference on Communications (ICC); May 23-27, 2010; 5 pages. |
Zhang, et al.; “Sidelobe Modulation Scrambling Transmitter Using Fourier Rotman Lens;” IEEE Transactions on Antennas and Propagation; vol. 61; Issue 7; Jul. 2013; pp. 3900-3904; 5 pages. |
Zhou, et al.; “Physical Layer Security with Artificial Noise: Secrecy Capacity and Optimal Power Allocation;” 3rd International Conference on Signal Processing and Communication System; Sep. 28-30, 2009; 5 pages. |
Zhu, et al.; “Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks;” Journal—Ad Hoc Networks; Jan. 24, 2014; p. 26. |
Zhu, et al.; “Secure Transmission in Multi-Cell Massive MIMO Systems;” IEEE Globecom Workshops; May 28, 2014, 2013; 33 pages. |
Zou, et al.; “Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques;” IEEE Network; vol. 29, Issue 1; May 16, 2014; 17 pages. |
PCT International Search Report of the ISA for PCT/US2015/030085 dated Aug. 5, 2015; 4 pages. |
PCT Written Opinion of the ISA for PCT/US2015/030085 dated Aug. 5, 2015; 8 pages. |
Number | Date | Country | |
---|---|---|---|
20170026146 A1 | Jan 2017 | US |
Number | Date | Country | |
---|---|---|---|
61991824 | May 2014 | US | |
61992354 | May 2014 | US |