H04K1/006

Application of key exchange based physical layer security methods

A method making modifications during a key phase of physical layer security methods and enabling the physical layer security methods to be applicable in a wireless communication is provided. The method includes a step of generating a K common key, including steps to be carried out at a modulator during a data transmission phase.

METHOD, TRANSMITTER DEVICE AND RECEIVER DEVICE FOR SECURING CHANNEL TRAINING ON A POWER DOMAIN NON-ORTHOGONAL MULTIPLE ACCESS SYSTEM

Secure channel training to enhance the confidentiality level of a power domain non-orthogonal multiple access (NOMA) communication system when impaired by eavesdropping attacks coming from inside and outside of the network. In a first scenario, a cooperative jammer available in the system defines an external source of entropy that is independent of the channel variation rate. While the jammer provides secrecy inside the network, the proposed invention is configured to secure the network from outside, encoding the system information, which is exchanged during the training phase, using only the channel state. In a second scenario, the cooperative jammer is not available; with the secrecy inside and outside of the network ensured through a different parameterization. That parameterization is done in a way that the required system information is encoded using not only the channels, but also a random phase defined in the data communication phase.

APPLICATION OF KEY EXCHANGE BASED PHYSICAL LAYER SECURITY METHODS

A method making modifications during a key phase of physical layer security methods and enabling the physical layer security methods to be applicable in a wireless communication is provided. The method includes a step of generating a K common key, including steps to be carried out at a modulator during a data transmission phase.

SYSTEM AND METHOD FOR TRANSMITTING A DATA STREAM IN A NETWORK

In one embodiment, a method includes receiving, by a network controller and from a first node of a network, information associated with a data stream of the network and determining, by the network controller, a segmentation for the data stream. The segmentation includes a plurality of data segments and the plurality of data segments includes a first data segment. The method further includes determining, by the network controller, a data flow path for each of the plurality of data segments and determining, by the network controller, a first wavelength to assign to the first data segment. The first wavelength is one of a plurality of wavelengths spanning between the first node and a second node of the network.

SAFE WIRELESS POWER TRANSFER AND SECURE COMMUNICATIONS THROUGH DISTRIBUTED PHASE ALIGNMENT

Various embodiments comprise systems, methods, architectures, mechanisms or apparatus for wireless secret communication with a device.

System and method for transmitting a data stream in a network

In one embodiment, a method includes receiving, by a network controller and from a first node of a network, information associated with a data stream of the network and determining, by the network controller, a segmentation for the data stream. The segmentation includes a plurality of data segments and the plurality of data segments includes a first data segment. The method further includes determining, by the network controller, a data flow path for each of the plurality of data segments and determining, by the network controller, a first wavelength to assign to the first data segment. The first wavelength is one of a plurality of wavelengths spanning between the first node and a second node of the network.

SCRAMBLING FOR WIRELESS COMMUNICATIONS

Aspects of the present disclosure describe scrambling of information for wireless communications to prevent deciphering or altering by unintended recipients. An example method may include generating, by a first device, a scrambling key based on at least one of a freshness parameter or a private key. The private key is known by the first device and a second device. The method also includes scrambling a payload based on the scrambling key at a physical layer. A packet includes the payload for wireless transmission from the first device to the second device via a shared channel.

RANDOM PHASE MODULATION METHOD DEPENDING ON COMMUNICATION DISTANCE

A random phase modulation method depending on a communication distance is provided. In the method, time synchronization is carried out by means of a transmitter and a receiver, a local random signal is generated, and an original signal to be sent is pre-coded according to a transmission delay and the generated local random signal, such that random phase modulation depending on a communication distance is realized, potential security brought about by positions of the transmitter and the receiver is fully utilized, a receiver at an expected distance position can receive a signal with a correct phase, and a receiver at another distance position receives a signal with a scrambled phase, thereby improving the secure communication capability of a wireless communication system in terms of the dimension of space.

Secure and efficient orthogonal frequency division multiplexing transmission system with disguised jamming

A securely pre-coded orthogonal frequency division multiplexing (SP-OFDM) system includes a transmitter configured to transmit a secure transmit signal through a dynamic constellation and a receiver configured to recover the original signal from the received secure transmit signal. It is aimed to reinforce the physical layer security of wireless communications under hostile interference. Potential applications include 4G and 5G communication systems, ASTC3.0 HDTV systems, WiFi systems, and any future wireless systems that utilize OFDM.

Secure control and operation of drones

Techniques are described for the exchange of control signals between a controlled unmanned aircraft (i.e. drone) and a ground control station and for the transmission of communication signals, such as video, from the drone to the ground control station so that the signals are more difficult to intercept or jam. The video signal transmitted from the drone can be an analog RF signal employing one or more of video scrambling, RF signal inversion, hopping, usage of a wide frequency range and other techniques. To secure the control signals between the drone and the ground control station, techniques can include hopping, encryption and use of a wide frequency range.