H04K1/003

Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
11540123 · 2022-12-27 · ·

A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.

JOINT RANDOM SUBCARRIER SELECTION AND CHANNEL-BASED ARTIFICIAL SIGNAL DESIGN AIDED PLS
20230082251 · 2023-03-16 ·

In the area of Joint Random Subcarrier Selection and Channel-Based Artificial Signal Design Aided PLS, a method for providing physical layer security (PLS) depending on the randomness of wireless channel is proposed. Specifically, a channel-based joint random subcarrier selection and artificial signal design are introduced to protect the communication in the presence of a passive eavesdropper which can be even stronger than the legitimate receiver. Our analysis assumes a window-based subcarrier selection method in which the strongest subcarriers in each window are selected. Chosen subcarriers are considered for secret sequence extraction. The generated channel dependent secret sequence is used for both random subcarrier selection and artificial signal design. We evaluate the efficiency of the proposed method through some representative metrics, such as secret sequence disagreement rate (SSDR), throughput and bit error rate (BER), in both perfect and imperfect channel estimation cases. Simulation results are presented and insightful discussions are drawn.

DEVICE AND METHOD FOR SOUND WAVE COMMUNICATION
20170288805 · 2017-10-05 · ·

A device for sound wave communication, including: a hardware correction table for setting a correction frequency band; a sound wave transmission unit for generating data frequencies at a predetermined base decibel level, generating separate reception filter frequencies at the base decibel level for receiving data carried by a sound wave transmitted from the nearest location when sound waves are received, and generating the correction reference frequency at the base decibel level for correcting hardware transmission; and a sound wave reception unit for receiving a sound wave signal transmitted from the sound wave transmission unit, extracting decibel levels at each of the data frequencies to form an array of decibel levels, correcting the array by shifting the array by a correction value extracted using the hardware correction table, and reconstructing data.

Radio having hybrid staring and non-staring architecture

A system may include a first radio comprising a first radio processor, a first radio modem, and a first radio transmitter configured to transmit non-hopping transmissions and hopping transmissions. The system may further include a second radio comprising a second radio processor, a second radio modem, and a second radio hopping receiver, wherein the second radio hopping receiver is a non-staring second radio receiver. The first radio may be configured to: receive a message and a destination for the message, the destination being the second radio; upon a determination that the destination has a non-staring receiver, store the message; determine a time interval start time for a cyclical hop pattern associated with the second radio; output the message from the memory to the first radio modem; output the message from the first radio modem to the first radio transmitter; and/or transmit the message to the second radio.

COMMUNICATION SYSTEM
20210376921 · 2021-12-02 ·

A system is provided where one of a first device or a second device is supplied with power by the other one of the first device or the second device. Supplying may be done via a universal serial bus cable like a universal serial bus Type-C cable.

OPERATING METHOD OF ELECTRONIC APPARATUS FOR TRANSMITTING SIGNAL AND ELECTRONIC APPARATUS SUPPORTING THE SAME
20230299868 · 2023-09-21 ·

Systems, devices, methods, and instructions for transmitting a signal by an electronic apparatus that include generating transmission data and pseudo-random data corresponding to the transmission data, setting a first pseudo time delay interval for the transmission data and a second pseudo time delay interval for the pseudo-random data, acquiring a data signal for transmitting the transmission data to correspond to the first pseudo time delay interval and a pseudo-random signal for transmitting the pseudo-random data to correspond to the second pseudo time delay interval, and transmitting an overlapping signal including the data signal and the pseudo-random signal.

RADIO JAMMING DETECTION
20210344437 · 2021-11-04 ·

There is provided a method for a first network element of a wireless communication network, the method comprising: obtaining blanked subcarrier index data indicating one or more blanked subcarriers in a time-frequency resource grid; initiating reception of a transmission from a second network element of the wireless communication network on said time-frequency resource grid; causing performing an interference measurement on said one or more blanked subcarriers to obtain interference measurement data on said one or more blanked subcarriers; and outputting the interference measurement data for detecting a presence of radio jamming.

Application of key exchange based physical layer security methods

A method making modifications during a key phase of physical layer security methods and enabling the physical layer security methods to be applicable in a wireless communication is provided. The method includes a step of generating a K common key, including steps to be carried out at a modulator during a data transmission phase.

Methods and devices for the concealment of radio identifiers and transmitter positions

Systems, devices and methods for concealing radio communications and the spatial position of radio transmitters involved therein include the use of electrotechnical signal variation and dynamic, pseudo-random radio identifier. Transmitted radio signals contain radio identifiers identifying the transmitting mobile radio device. Each radio identifier is dynamically selected for each radio signal from a sequence of radio identifiers selected from a set of predefined pseudo-random sequences. The sequence is selected based on a predetermined selection rule. The radio identifier is selected from the thus selected sequence according to a predetermined deterministic update pattern associated with the selected sequence. The associated transmission power and/or transmission frequency is dynamically varied on the transmitter side according to a predetermined deterministic variation scheme.

Protecting transmissions against jamming

This document discloses a solution for performing anti-jamming procedures. According to an aspect, a method for a terminal device comprises: receiving a first reference signal allocation from an access node, wherein the first reference signal is unique to the terminal device in a cell managed by the access node; receiving a second reference signal allocation from the access node, wherein the second reference signal is shared with at least one other terminal device in the cell; causing transmission of payload data together with the first reference signal according to a regular transmission pattern; and breaking the regular transmission pattern by transmitting dummy data together with the second reference signal in a time-frequency resource shared with the at least one other terminal device.