Transmission security based on adaptive multiresolution modulation
10826746 ยท 2020-11-03
Assignee
Inventors
Cpc classification
H04L27/0008
ELECTRICITY
International classification
H04L27/34
ELECTRICITY
H04L27/18
ELECTRICITY
Abstract
A transmitter adjustment value for adjusting modulations at a transmitter may be determined. The transmitter may be configured to transmit in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value. A legitimate receiver may be provided with a receiver adjustment value corresponding to the determined transmitter adjustment value. At the transmitter, scrambled transmissions may be transmitted, based on transmitting using the determined transmitter adjustment value.
Claims
1. A method comprising: determining a transmitter adjustment value for adjusting modulations at a transmitter; configuring the transmitter to transmit in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value; providing a legitimate receiver with a receiver adjustment value corresponding to the determined transmitter adjustment value; and transmitting, at the transmitter, scrambled transmissions, based on transmitting using the determined transmitter adjustment value.
2. The method of claim 1, wherein configuring the transmitter includes modifying a shape of a current signal constellation in use for transmitting at the transmitter.
3. The method of claim 1, wherein configuring the transmitter includes modifying a size of a current signal constellation in use for transmitting at the transmitter.
4. The method of claim 1, wherein configuring the transmitter includes modifying a shape of a current symmetric signal constellation in use for transmitting at the transmitter, to the asymmetric signal constellation.
5. The method of claim 1, wherein configuring the transmitter includes configuring the transmitter to transmit in accordance with adaptive multiresolution modulation.
6. The method of claim 1, wherein configuring the transmitter includes configuring the transmitter to transmit in accordance with encryption and adaptive multiresolution modulation.
7. The method of claim 1, wherein configuring the asymmetric signal constellation is based on a representation of signals modulated by a digital modulation scheme.
8. A method comprising: receiving, at a network receiver, from a transmitter, a receiver adjustment value corresponding to a transmitter adjustment value; configuring the network receiver to demodulate signals received from the transmitter, in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value; receiving, at the network receiver, a scrambled transmission from the transmitter; and unscrambling the received scrambled transmission by demodulating the received scrambled transmission, based on demodulating using the received receiver adjustment value corresponding to the transmitter adjustment value.
9. The method of claim 8, wherein configuring the network receiver includes modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver.
10. The method of claim 8, wherein configuring the network receiver includes modifying a shape of a current decision region in use for demodulating received transmissions at the network receiver.
11. The method of claim 8, wherein configuring the network receiver includes modifying a size of a current decision region in use for demodulating received transmissions at the network receiver.
12. The method of claim 8, wherein configuring the network receiver includes modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver, to the asymmetric signal constellation.
13. The method of claim 8, wherein configuring the network receiver includes configuring the network receiver to unscramble received scrambled transmissions in accordance with adaptive multiresolution modulation.
14. The method of claim 8, wherein configuring the network receiver includes configuring the network receiver to unscramble received scrambled transmissions in accordance with decryption and adaptive multiresolution modulation.
15. The method of claim 8, wherein unscrambling the received scrambled transmission includes demodulating the received scrambled transmission, based on a predetermined decision region.
16. A system comprising: a transmitter in a network, the transmitter including: at least one hardware device processor; and a non-transitory computer-readable storage medium storing instructions that are executable by the at least one hardware device processor to: scramble transmissions from the transmitter by: determining a transmitter adjustment value for adjusting modulations at the transmitter; configuring the transmitter to transmit in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value; providing a legitimate receiver with a receiver adjustment value corresponding to the determined transmitter adjustment value; and transmitting, at the transmitter, scrambled transmissions, based on transmitting using the determined transmitter adjustment value.
17. The system of claim 16, wherein configuring the transmitter includes modifying a shape of a current signal constellation in use for transmitting at the transmitter.
18. The system of claim 16, wherein configuring the transmitter includes modifying a size of a current signal constellation in use for transmitting at the transmitter.
19. The system of claim 16, wherein configuring the transmitter includes modifying a shape of a current symmetric signal constellation in use for transmitting at the transmitter, to the asymmetric signal constellation.
20. The system of claim 16, wherein configuring the transmitter includes configuring the transmitter to transmit in accordance with adaptive multiresolution modulation.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION
(10)
(11)
(12) At a receiver, demodulation, symbol-to-bit translation, may be based on pre-defined decision regions.
(13) As mentioned above, conventionally, practical communications systems have used symmetric modulation. Thus, it is highly likely that any eavesdropping node(s) will use a receiver optimized for symmetric modulations.
(14) If the transmitter adapts the shape () of the constellation, then as shown in
(15) AMM may permit adaptation of both the shape and the size of the asymmetric signal constellation, improving the throughput for multi-service data while fulfilling distinct Quality of Service (QoS) packet error rate (PER) requirements for each traffic type under different channel conditions.
(16) In symmetric modulation signal constellations, the minimum distance between any one symbol and all others may be the same. Such a constellation design may provide each bit within a modulated symbol with approximately the same level of protection. Consequently, data encoded to each bit within a modulated symbol has approximately the same bit error rate (BER) characteristics. Symmetric modulations may be acceptable for conventional stove-piped communications systems dedicated to only one function and QoS requirement. In such a system, symmetric modulation constellations may be optimal, because the QoS requirement for all transmitted data is homogeneous.
(17) In asymmetric modulation, the signal constellation may be pre-distorted, for example, to increase resource utilization efficiency when transmitting multi-service, heterogeneous data. By pre-distorting the signal constellation, heterogeneous QoS requirements may be satisfied while not wasting resources. In asymmetric modulation, the shape of the signal constellation may be dictated by the QoS requirements at the application (APP) layer. For cases in which the QoS BER or PER requirements are closer to one another, the optimal signal constellation shape is more symmetric. For cases in which the QoS BER or PER requirements are farther apart from each other, the optimal signal constellation shape may be more asymmetric.
(18) As discussed above, at the receiver, demodulation, symbol-to-bit translation, is based on pre-defined decision regions. In
(19) As mentioned above, eavesdropping node(s) may use a receiver optimized for symmetric modulations. Thus, if the transmitter adapts the shape () of the constellation, the correct decision regions will change at a receiver. If the receiver does not adjust the decision regions accordingly, some bits may be demodulated incorrectly. As the mismatch becomes larger, the number of demodulation errors due to incorrect decision region mapping may increase. Eventually, the mismatch may become sufficiently large to effectively scramble the received data.
(20) For each modulation mode (QPSK (Quadrature Phase Shift Keying), 8-PSK, and 16-QAM (Quadrature amplitude modulation)), tests have been performed to evaluate the performance to determine the effects of the mismatch between the transmitter and receiver. In accordance with test results, for all three modes, the error-free signal-to-noise ratio (SNR) for asymmetric and symmetric modulation was established to be 20 decibels (dB). By performing the characterization at this SNR, it may be assured that the major contributor to degradation is the mismatch and not some other phenomena. (
(21) Tables 1, 2, and 3 include the BER measured for each modulation mode using mismatched-. For example, Table 1 shown below, illustrates BER measured over-the-air for QPSK using mismatched- between the transmitter (Tx) and receiver (Rx).
(22) TABLE-US-00001 TABLE 1 BER Measured Over-the-Air for QPSK using Mismatched- between the Tx and Rx SNR (dB) Tx Beta () Rx Beta () BER Bit 1 BER Bit2 20 0.50 0.50 0.00E+00 0.00E+00 20 0.45 0.50 0.00E+00 0.00E+00 20 0.40 0.50 0.00E+00 0.00E+00 20 0.35 0.50 0.00E+00 0.00E+00 20 0.30 0.50 2.52E01 2.07E01
(23) For example, Table 2 shown below, illustrates BER measured over the air for 8-PSK using mismatched- between the Tx and Rx.
(24) TABLE-US-00002 TABLE 2 BER measured over the air for 8-PSK using mismatched- between the Tx and Rx SNR Tx Beta Rx Beta (dB) () () BER Bit 1 BER Bit2 BER Bit3 20 0.50 0.50 0.00E+00 0.00E+00 0.00E+00 20 0.48 0.50 0.00E+00 0.00E+00 0.00E+00 20 0.46 0.50 3.92E04 1.51E04 1.29E04 20 0.44 0.50 1.40E01 7.29E02 6.78E02 20 0.42 0.50 4.72E01 4.72E01 4.68E01 20 0.40 0.50 5.04E01 5.00E01 4.97E01
(25) For example, Table 3 shown below, illustrates BER measured over the air for 16-QAM using mismatched- between the Tx and Rx.
(26) TABLE-US-00003 TABLE 3 BER measured over the air for 16-QAM using mismatched- between the Tx and Rx SNR Tx Beta Rx Beta (dB) () () BER Bit 1 BER Bit2 BER Bit3 BER Bit4 20 0.50 0.50 0.00E+00 0.00E+00 0.00E+00 0.00E+00 20 0.45 0.50 2.69E05 0.00E+00 8.97E06 0.00E+00 20 0.40 0.50 4.24E04 0.00E+00 1.03E04 0.00E+00 20 0.35 0.50 5.12E02 4.79E02 4.80E02 4.55E02 20 0.30 0.50 3.43E01 5.02E01 3.34E01 5.02E01
(27) In accordance with test results, for QPSK, performance was substantially degraded at a forty percent (40%) mismatch (TX =0.3, RX =0.5). For this case, one out of every four bits was received in error. For 8-PSK, performance was substantially degraded at a twelve percent (12%) mismatch (TX =0.44, RX =0.5). At a sixteen percent (16%) mismatch (TX =0.42, RX =0.5), performance was completely degraded. In this case, one out of every two bits was received erroneously. For 16-QAM, performance was severely degraded at a thirty percent (30%) mismatch (TX =0.35, RX =0.5). At a forty (40%) mismatch (TX =0.3, RX =0.5), performance was completely degraded with one out of every two bits being received incorrectly. Given this, AMM may be employed to increase transmission security in the presence of an eavesdropping node. Through the testing, it was demonstrated that mismatches between a transmitter and receiver may cause a degradation of receiver performance. From the results, one may also conclude that lower order modulations may need a larger mismatch to affect the performance of the receiver, because sparser constellations have larger decision regions. Consequently, more shape distortion may be needed to alter the decision regions sufficiently to cause a substantial number of demodulation errors.
(28) In summary, AMM may advantageously enhance transmission security without increasing transmission power or bandwidth. mismatches between a transmitter and receiver may cause severe and/or complete degradation of (symmetrically configured) receiver performance.
(29) Other techniques for providing transmission security include low probability of interception (LPI), low probability of detection (LPD), and antijam (AJ) schemes. LPI, LPD, and AJ techniques all use additional bandwidth for direct sequence spread spectrum (DSSS) or frequency hopping. However, bandwidth (spectrum) may be a highly limited and expensive resource. Consequently, AMM may provide increased transmission security without a necessity for additional bandwidth.
(30) Additionally, transmission security may be provided through encryption. However, AMM may be employed with encryption to provide more robust transmission security than encryption alone.
(31) Example aspects discussed herein may be implemented as a series of modules, either functioning alone or in concert with physical electronic and computer hardware devices. Example techniques discussed herein may be implemented as a program product comprising a plurality of such modules, which may be displayed for a user. As used herein, the term module generally refers to a software module. A module may be implemented as a collection of routines and data structures that performs particular tasks or implements a particular abstract data type. Modules generally are composed of two parts. First, a software module may list the constants, data types, variables, and routines that may be accessed by other modules or routines. Second, a module may be configured as an implementation, which may be private (i.e., accessible only to the module), and which contains the source code that actually implements the routines or subroutines upon which the module is based. Such modules may be utilized separately and/or together locally and/or remotely to form a program product thereof, that may be implemented through non-transitory machine readable recordable media.
(32) Various storage media, such as magnetic computer disks, optical disks, and electronic memories, as well as non-transitory computer-readable storage media and computer program products, can be prepared that can contain information that can direct a device, such as a micro-controller, to implement the above-described systems and/or methods. Once an appropriate device has access to the information and programs contained on the storage media, the storage media can provide the information and programs to the device, enabling the device to perform the above-described systems and/or methods.
(33) For example, if a computer disk containing appropriate materials, such as a source file, an object file, or an executable file, were provided to a computer, the computer could receive the information, appropriately configure itself and perform the functions of the various systems and methods outlined in the diagrams and flowcharts above to implement the various functions. That is, the computer could receive various portions of information from the disk relating to different elements of the above-described systems and/or methods, implement the individual systems and/or methods, and coordinate the functions of the individual systems and/or methods.
(34) Features discussed herein are provided as example techniques that may be implemented in many different ways that may be understood by one of skill in the art of computing, without departing from the discussion herein. Such features are to be construed only as example features, and are not intended to be construed as limiting to only those detailed descriptions.
(35)
(36) The transmitter may be configured to transmit in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value (804). A legitimate receiver may be provided with a receiver adjustment value corresponding to the determined transmitter adjustment value (806). At the transmitter, scrambled transmissions may be transmitted, based on transmitting using the determined transmitter adjustment value (808).
(37) For example, configuring the transmitter may include modifying a shape of a current signal constellation in use for transmitting at the transmitter.
(38) For example, configuring the transmitter may include modifying a size of a current signal constellation in use for transmitting at the transmitter.
(39) For example, configuring the transmitter may include modifying a shape of a current symmetric signal constellation in use for transmitting at the transmitter, to the asymmetric signal constellation.
(40) For example, configuring the transmitter may include configuring the transmitter to transmit in accordance with adaptive multiresolution modulation.
(41) For example, configuring the transmitter may include configuring the transmitter to transmit in accordance with encryption and adaptive multiresolution modulation.
(42) For example, configuring the asymmetric signal constellation is based on a representation of signals modulated by a digital modulation scheme.
(43)
(44) The network receiver may be configured to demodulate signals received from the transmitter, in accordance with an asymmetric signal constellation, based on the determined transmitter adjustment value (904). At the network receiver, a scrambled transmission may be received from the transmitter (906). The received scrambled transmission may be unscrambled by demodulating the received scrambled transmission, based on demodulating using the received receiver adjustment value corresponding to the transmitter adjustment value (908).
(45) For example, configuring the network receiver may include modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver.
(46) For example, configuring the network receiver may include modifying a shape of a current decision region in use for demodulating received transmissions at the network receiver.
(47) For example, configuring the network receiver may include modifying a size of a current decision region in use for demodulating received transmissions at the network receiver.
(48) For example, configuring the network receiver may include modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver, to the asymmetric signal constellation.
(49) For example, configuring the network receiver may include configuring the network receiver to unscramble received scrambled transmissions in accordance with adaptive multiresolution modulation.
(50) For example, configuring the network receiver may include configuring the network receiver to unscramble received scrambled transmissions in accordance with decryption and adaptive multiresolution modulation.
(51) For example, unscrambling the received scrambled transmission may include demodulating the received scrambled transmission, based on a predetermined decision region.
(52) One skilled in the art of computing will appreciate that many other types of techniques may be used for examples discussed herein, without departing from the discussion herein.
(53) Features discussed herein are provided as example techniques that may be implemented in many different ways that may be understood by one of skill in the art of computing, without departing from the discussion herein. Such features are to be construed only as example features, and are not intended to be construed as limiting to only those Detailed descriptions.
(54) For example, the one or more processors (e.g., hardware device processors) may be included in at least one processing apparatus. One skilled in the art of computing will understand that there are many configurations of processors and processing apparatuses that may be configured in accordance with the discussion herein, without departing from such discussion.
(55) In this context, a component or module may refer to instructions or hardware that may be configured to perform certain operations. Such instructions may be included within component groups of instructions, or may be distributed over more than one group. For example, some instructions associated with operations of a first component may be included in a group of instructions associated with operations of a second component (or more components). For example, a component herein may refer to a type of functionality that may be implemented by instructions that may be located in a single entity, or may be spread or distributed over multiple entities, and may overlap with instructions and/or hardware associated with other components.
(56) In this context, a memory may include a single memory device or multiple memory devices configured to store data and/or instructions. Further, the memory may span multiple distributed storage devices. Further, the memory may be distributed among a plurality of processors.
(57) One skilled in the art of computing will understand that there may be many ways of accomplishing the features discussed herein.
(58) It will be understood that many additional changes in the details, materials, steps and arrangement of parts, which have been herein described and illustrated to explain the nature of the invention, may be made by those skilled in the art within the principle and scope of the invention as expressed in the appended claims.