Physically secure digital signal processing for wireless M2M networks
09648444 ยท 2017-05-09
Inventors
Cpc classification
H04B1/692
ELECTRICITY
International classification
H04B1/00
ELECTRICITY
Abstract
A method and apparatus for physically secure communication over machine-to-machine (M2M) networks is claimed, through the use of frequency-hop and random access spread spectrum modulation formats employing using truly random spreading codes and time/frequency hopping and receiver selection strategies at the transmitters in the M2M network, blind signal detection and linear signal separation techniques at the receivers in the M2M network, completely eliminating the ability for an adversary to predict and override M2M transmissions. Additional physical security protocols are also introduced that allow the network to easily detect and identify spoofing transmissions on uplinks and downlinks, and to automatically excise those transmissions as part of the despreading procedure, even if those transmissions are received at a much higher power level than the intended transmissions. Extensions to weakly and strongly macrodiverse networks are also described, which provide additional efficiency and security improvements by exploiting the route diversity of the network.
Claims
1. A method for physically secure digital signal processing for intercommunication between members, of a wireless Machine-to-Machine (M2M) network comprising at least one Signaling Machine (SM) and one Data Aggregation Point (DAP), with each SM and DAP individually comprising at least one transceiver, at least one antenna, and digital signal processing means, by exchanging wireless transmissions between a first member and a second member, said method comprising: first, for each intended intercommunication between any first member and second member, selecting for each transmission of that intercommunication a Cyclic-Prefix Direct-Sequence (CPDS) differentiator by any of randomly, pseudorandomly, or a varying selection method; then, modifying the intended intercommunication by said CPDS differentiator; transmitting the intended intercommunication that has been modified to an intended second member; receiving at the antenna of the second member the intended communication and: identifying, through use of a blind, time-channelized despreading algorithm, the intended intercommunication from other non-intended signals; identifying the selected CPDS differentiator modifying the intended intercommunication; and, restoring the received intended intercommunication by removing the selected CPDS differentiator.
2. The method for physically secure digital signal processing for intercommunication between members of the wireless M2M network as in claim 1, wherein the selected CPDS differentiator further comprises a combination of a transformation of the intended communication by a receive mask, a source mask, and a cyclic prefix for any of a set of symbols comprising the intercommunication to be transmitted.
3. A method for wireless intercommunication between at least one Signaling Machine (SM) and one Data Aggregation Point (DAP) each belonging to a set of like devices, all transmitting and receiving and belonging to the same network, of which each said device is a node, said method further comprising: effecting within a selected frequency range a frequency-hop direct-sequence (FHDS), spread-spectrum modulation format further comprising time slots, frequency channels, at least one data burst and guard intervals; providing through said FHDS modulation format, cyclic chip-level and symbol-level cyclic prefixes to control channel multipath and interference loading; and, employing transmission information that is randomly determined at any node in the network, not provisioned by the network nor known to receivers in the network; incorporating a spreading code for every uplink and downlink; including in said randomly determined transmission information on each uplink, and randomly varying over every time frame: the time slots and frequency channels used for that specific uplink and by that specific node; the spreading code used for that specific uplink and by that specific node; and, elements of a source symbol mask applied to the data bursts prior to spreading; including in said randomly determined transmission information on each downlink: the spreading code used for that specific downlink and by that specific node and randomly varied in every time slot of each time frame; and, elements of a source symbol mask applied to the data bursts prior to spreading also randomly varied over every time frame; transmitting from each downlink transmit node, over a downlink frequency channel using an algorithm that is any of the set of providable, known to, and learnable by each downlink receiver allowed to communicate with that downlink transmit node, said algorithm being further locally and independently set at said downlink transmit node.
4. The method for wireless intercommunication as in claim 3, wherein the step of transmitting from each downlink transmit node, over the downlink frequency channel, varies the frequency channel pseudorandomly over each time slot of each time frame.
5. The method for wireless intercommunication between at least one Signaling Machine (SM) and one Data Aggregation Point (DAP) each belonging to a set of like devices as in claim 3, wherein the step of employing transmission information that is randomly determined at any node in the network, not provisioned by the network nor known to the receivers in the network, is provisioned at and by each transmitter with each intended receiver being blind to the choice of that randomly determined transmission information, and utilizing only rudimentary provisioning from any specific transmitter in the network to only its intended set of receivers in the network of a commonly-known and shared receive symbol mask for all signals intended for a given set of receivers so as to differentiate them from transmissions by that specific transmitter intended for other nodes in the network, as well as transmissions from other transmitters in the network intended for that particular set of receivers.
6. A method for physically secure digital signal processing for wireless Machine-to-Machine (M2M) networks, said networks comprising at least one set of transceivers comprising at least one Signaling Machine (SM) and one Data Aggregation Point (DAP) with each SM and DAP comprising at least one antenna and one transceiver for exchanging wireless transmissions, said method comprising: transforming each transmission by incorporating into each transmission at each transceiver a Cyclic-Prefix Direct-Sequence (CPDS) differentiator for that transmission with time-channelized despreading; fitting each transmission into a series of frames of Upload Transmissions (UpLink) and Download Transmissions (DownLink); transmitting from the SM on any UpLink; transmitting from the DAP on any DownLink; and, after receiving each transmission at an antenna, for each such transmission: downconverting the transmission; demultiplexing the downconverted transmission into physical dwells which are separated into time slots and frequency channels and accessible to the receiver, thus forming for each time slot, frequency channel, and frame a received signal; and, adaptively despreading the received signal to create an incoming and received digital symbol stream.
7. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, where in the step of then fitting each transmission into the series of frames of Upload Transmissions (UpLink) and Download Transmissions (DownLink) further comprises: for information intended for transmission in a single UpLink slot of each frame and thus passing through an UpLink transmitter: first passing said information through baseband encoding utilizing any of a set of baseband encoding algorithms and adding Physical Layer (PHY) signatures including any of training preambles and Unique Words, to create a baseband source symbol stream output from any encoder, at each symbol index used by the UpLink transmitter; passing the baseband source symbol stream to a cyclic-prefix direct-sequence (CPDS) spreader; segmenting the baseband source symbol stream into symbol-source data segments; modulating each symbol-source data segment to generate the spread source data stream output from the CPDS spreader at each chip index; then subsequently pulse-amplitude modulating the spread source data stream output; converting this subsequently pulse-amplitude modulated spread source data stream output to an analog signal-in-space (SiS); upconverting this analog SiS to a desired source frequency selected by the uplink transmitter within each time-frame n.sub.frame; for information intended for transmission in a single DownLink slot of each frame, and thus passing through a DownLink transmitter: first passing said information through baseband encoding to create a baseband source symbol stream; then passing the baseband source symbol stream to a cyclic-prefix direct-sequence (CPDS) spreader which modulates each data segment to generate the spread source data stream output from the CPDS spreader at each chip index; then subsequently pulse-amplitude modulating the spread source data stream output; converting this subsequently pulse-amplitude modulated spread source data stream output to an analog signal-in-space (SiS); and, upconverting this analog SiS to a desired source frequency selected by the downlink transmitter over each time slot and transmitting this analog SiS over the desired source frequency over each time slot at a source power level that is held constant over every time slot.
8. The method for physically secure digital signal processing for wireless M2M networks as in claim 7, wherein the step of selecting a desired source frequency by the uplink transmitter within time-frame n.sub.frame further comprises utilizing any of a set of fixed, provisioned, pseudo-randomly directed, and randomly-directed selection methods within each frame.
9. The method for physically secure digital signal processing for wireless M2M networks as in claim 7 wherein the step of upconverting this analog SiS to a desired source frequency selected by the uplink transmitter over time slot n.sub.slot; and transmitting this analog SiS over the desired source frequency over time slot n.sub.slot further comprises: selecting randomly a source transmit time t.sub.S(n.sub.frame) and transmit frequency f.sub.S(n.sub.frame) within each frame, by randomly selecting dwell index k.sub.dwell(n.sub.frame) for that frame, without any prior scheduling or coordination between the uplink transmitter and the uplink receivers in the network; mapping k.sub.dwell(n.sub.frame) to time slot k.sub.slot(n.sub.frame) and frequency channel k.sub.chan(n.sub.frame); and, selecting t.sub.S(n.sub.frame) from k.sub.slot(n.sub.frame) and f.sub.S(n.sub.frame) from k.sub.chan(n.sub.frame) via a look-up table.
10. The method for physically secure digital signal processing for wireless M2M networks as in claim 7, wherein the step of selecting a desired source frequency f.sub.S(n.sub.slot) by the downlink transmitter over time slot n.sub.slot further comprises selecting a frequency channel k.sub.chan(n.sub.slot) and using the selected frequency channel to set a source frequency f.sub.S(n.sub.slot) using a pseudorandom selection algorithm based on the slot index n.sub.slot and the source index l.sub.S.
11. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, further comprising, for any DownLink transmission, selecting a transmit frequency known to each intended DownLink receiver in the network over at least a subset of slots within each frame, without coordinating the selection with any other set of downlink transmitters in the network.
12. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, further comprising, for any DownLink transmission, detecting the transmit frequency over any of each slot and a subset of monitored slots and frequency channels, without coordination with the DownLink transmitter.
13. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the cyclic-prefix direct-sequence (CPDS) spreader produces a CPDS uplink spreading structure using the following steps: passing the baseband source symbols intended for transmission over time-frame n.sub.frame through a 1:M.sub.sym serial-to-parallel (S/P) convertor to form a M.sub.sym 1 source symbol vector
14. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein the source and receive masks each possess a constant modulus.
15. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein the source and receive masks are both designed to be circularly symmetric and cross-scrambling.
16. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein: the source symbol mask is a complex sinusoid with a cyclic source frequency offset .sub.S(n.sub.frame) chosen randomly and communicated to the receiver, said source symbol mask given by m.sub.S(n.sub.sym;n.sub.frame)=exp{j2.sub.S(n.sub.frame)n.sub.sym}.
17. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein at least one receive symbol mask has been made unique to each DAP in the network, and each DAP uses the receive symbol mask to identify those SM's intending to communicate with it.
18. The method for physically secure digital signal processing for wireless M2M networks as in claim 11, wherein the receive symbol mask has been made common to every DAP in the network, allowing any DAP to despread any SM in that DAP's field of view.
19. The method for physically secure digital signal processing for wireless M2M networks as in claim 18, wherein the network is macrodiverse and the symbol streams which are any of the set received and despread at multiple DAP's, are further processed at deeper aggregation sites in the network.
20. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, further comprising applying a modulation-on-symbol direct-sequence spread spectrum (MOS-DSSS) operation, in which the spreading code is repeated over every baseband symbol within each hop and is used to spread the symbol vector d.sub.S(n.sub.frame) using a spreading code c.sub.S(n.sub.frame).
21. The method for physically secure digital signal processing for wireless M2M networks as in claim 13 wherein: the step of performing an element-wise multiplication of this source symbol vector and an M.sub.sym1 symbol mask vector is applied in the time domain if the cyclic symbol prefix duration=0; and, a cyclic chip prefix is added to the spreading code.
22. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein the step of performing an element-wise multiplication of the source symbol vector and an M.sub.sym1 symbol mask vector
23. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein: the source symbol mask is the complex sinusoid with the cyclic source frequency offset .sub.S(n.sub.frame) chosen pseudorandomly over frame n.sub.frame and communicated to the receiver, said source symbol mask given by m.sub.S(n.sub.sym;n.sub.frame)=exp{j2.sub.S(n.sub.frame)n.sub.sym}.
24. The method for physically secure digital signal processing for wireless M2M networks as in claim 13, wherein: the source symbol mask is a complex sinusoid with a chosen cyclic source frequency offset .sub.S(n.sub.frame) communicated to the receiver, said source symbol mask given by m.sub.S(n.sub.sym;n.sub.frame)=exp{j2.sub.S(n.sub.frame)n.sub.sym}; and, the receive symbol mask is tied to the specific time slot and hop channel used by the SM over each time frame.
25. The method for physically secure digital signal processing for wireless M2M networks as in claim 13; wherein: the step of performing an element-wise multiplication of this source symbol vector and an M.sub.sym 1 symbol mask vector, is applied in the frequency domain using a discrete Fourier transform (DFT) if the cyclic symbol prefix duration >0; and, that resultant masked symbol vector is then converted back to the time domain utilizing an inverse DFT.
26. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of adaptively despreading the received signal to create an incoming and received digital symbol stream further comprises: passing the received signal, for each physical dwell the demultiplexed and downconverted transmission, through an UpLink CPDS despreader; adaptively despreading the received signal by applying to it an adaptation algorithm using the received signal's weighting WR observed by the receiver; and, passing the adaptively despread digital stream to a symbol demodulator which also uses the adaptation algorithm using for any combination of environmental delay and degradation effects, frequency offset estimates from the observed weighting by the receiver, to create a resulting symbol stream.
27. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of transforming each transmission further comprises: utilizing input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel from real-world chance events to randomly generate a spreading code over every transmit opportunity which is every frame on the uplink, and every time slot on the downlink; and then providing that spreading code to a CPDS spreader that generates the CPDS differentiator.
28. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of transforming each transmission further comprises: utilizing input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel from real-world chance events to randomly generate a physical dwell index which is time slot and frequency channel over every time frame; and then providing that physical dwell index to a CPDS spreader that generates the CPDS differentiator for the uplink transmission.
29. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of transforming each transmission further comprises: utilizing input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel from real-world chance events to randomly generate at least one element of the source symbol mask over every time frame; and then providing said randomly generated at least one element to a CPDS spreader that generates the CPDS differentiator for the uplink transmission.
30. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of transforming each transmission further comprises: utilizing input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel from real-world chance events to randomly select an intended uplink receiver from a set of candidate uplink receivers over every time frame; and then providing that selection of uplink receiver to a CPDS spreader that generates the CPDS differentiator for the uplink transmission.
31. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the step of transforming each transmission further comprises: using utilizing input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel from real-world chance events to select any combination of the set of spreading code, physical dwell index, source signal mask, cyclic frequency offset, and intended receiver; and then providing that selected combination to a CPDS spreader that generates the CPDS differentiator for that transmission.
32. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, whereby whenever a node is duplicated an original source and intended recipient can, each independently or together, compare any of the Physical Layer (PHY) data bits in the received transmissions and use any discrepancy from previously observed values to identify an adversarial node; and then ignore that now-identified adversarial node, alert other nodes in the network to both the presence, and the PHY observable characteristics, of that now-identified adversarial node, and otherwise respond.
33. The method for physically secure digital signal processing for wireless M2M networks as in claim 6, wherein the cyclic-prefix direct-sequence (CLAUS) spreader produces a CPDS uplink spreading structure using the following steps: passing the baseband source symbols intended for transmission over time-frame n.sub.frame through a 1:M.sub.sym serial-to-parallel (SIP) convertor to form a M.sub.sym1 source symbol vector
34. A device for adaptively despreading a received signal to create an incoming and received digital symbol stream comprising: at least one antenna which receives an incoming analog signal-in-space, and passes it to; a downconverter connected to at least one lowpass filter (LPF) and then at least one analog-to-digital converter (ADC); a clock connected and signaling for a time slot to a channel identifying element which provides a frame for receipt for the time slot to a Local Oscillator (LO) that also is connected to and receives a timing signal from the clock, with the LO also connected to and passing that combination to the downconverter; said at least one ADC connected to and passing the received signal to; a Cyclic-Prefix Direct-Sequence (CPDS) despreader which is further connected to and passing a despread series to a symbol demodulator, said despread series being modified with a feedback loop through an adaptation algorithm element which uses the received signal's weighting observed by the receiver, said adaptation algorithm element being connected to both the CPDS despreader and the symbol demodulator; said symbol demodulator then incorporating frequency offset estimates also provided by the adaptation algorithm for environmental delay/degradation effects actually observed by the receiving device, to produce a series of symbols.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The present invention is illustrated in the attached presentation explaining some aspects of the present invention, which include Signaling Machine networks (SM's and DAP's) working under various loads of interfering, same-band signals from non-network sources as well as potentially-interfering within-network signals from the sets of SM's and DAP's.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)
(37)
(38)
DETAILED DESCRIPTION OF THE DRAWINGS
(39)
(40)
(41)
(42)
(43)
(44)
(45)
(46)
(47) In one embodiment,
(48) In one embodiment,
(49) For each frame, from both the intended receiver index l.sub.R(n.sub.frame) and physical dwell index k.sub.dwell(n.sub.frame) are used to generate its receive symbol mask (60) which in one embodiment takes the form of M.sub.sym1 vector m.sub.R(n.sub.frame), k.sub.dwell(n.sub.frame)) to which a generated source symbol mask (61) of the form of M.sub.sym1 vector m.sub.S(n.sub.frame) is combined (62), producing the symbol mask of the form of M.sub.sym1 m.sub.RS(n.sub.frame) formed by the element-wise (Schur) product
m.sub.RS(n.sub.frame)=m.sub.R(n.sub.frame,k.sub.dwell(n.sub.frame))m.sub.S(n.sub.frame);
to which the converted baseband source symbol stream b.sub.S(n.sub.sym), after serial-to-parallel (S/P) conversion (63) to M.sub.sym1 source baseband vector b.sub.S(n.sub.frame)=
(50)
for frame n.sub.frame, has applied on a framewise basis for each n.sub.frame(64), producing M.sub.sym1 source data vector d.sub.S(n.sub.frame), to which the cyclic symbol prefix is added (65) thus producing N.sub.sym1 extended source data vector d.sub.S(n.sub.frame); and a code is generated for each n.sub.frame(66), to which the cyclic chip prefix is applied (67), producing N.sub.chp1 spreading code vector c.sub.S(n.sub.frame) for each n.sub.frame; after which the twin streams with applied cyclic prefixes are combined (68) producing the N.sub.chpN.sub.sym source signal matrix S.sub.S(n.sub.frame) of the form
S.sub.S(n.sub.frame)=c.sub.S(n.sub.frame)d.sub.S.sup.T(n.sub.frame);
which is then fed to N.sub.chpN.sub.sym:1 Matrix/Serial converter (69) to produce the source signal stream s.sub.S(n.sub.chp) (70).
(51)
(52)
(53) Preferentially, the symbol mask is applied to the source baseband vector in the time domain if a cyclic symbol prefix is not inserted in to the source data vector (step (65) shown in
(54)
(55) In one embodiment,
(56) In one embodiment,
(57) In one embodiment,
(58) In one embodiment,
(59) In one embodiment,
(60) In one embodiment,
(61) In one embodiment,
(62)
(63)
output from the dwell demultiplexer (shown in
(64)
and removing the K.sub.smp-sample cyclic chip prefix and (if applied at the transmitter) the K.sub.sym-symbol cyclic symbol prefix from the N.sub.smpN.sub.sym matrix resulting from that serial/matrix conversion operation (111), resulting in M.sub.smpM.sub.sym received signal matrix X.sub.R(n.sub.frame,k.sub.dwell), given mathematically by
(65)
for general received data sequence
(66)
and where K.sub.smp=N.sub.smpM.sub.smp is the number of demultiplexer output samples covering the cyclic chip prefix. Removing the M.sub.sym1 receive symbol mask vector m.sub.R (n.sub.frame,k.sub.dwell) mask vector over dwell k.sub.dwell and time frame n.sub.frame from the received signal matrix X.sub.R(n.sub.frame,k.sub.dwell) (112), given mathematically by
X.sub.R(n.sub.frame,k.sub.frame)X.sub.R(n.sub.frame,k.sub.frame)diag{m.sub.R*(n.sub.frame,k.sub.frame)}
where diag{} is the vector-to-diagonal matrix conversion operation and ()* is the complex conjugation operation, resulting in M.sub.smpM.sub.sym demasked signal matrix X.sub.R(n.sub.frame,k.sub.dwell). Perform a linear combining operation on demasked signal matrix (113), given mathematically by
{circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell)=W.sub.R(n.sub.frame,k.sub.dwell)X.sub.R(n.sub.frame,k.sub.frame),
where W.sub.R(n.sub.frame,k.sub.dwell) is an L.sub.portM.sub.smp linear combining matrix, computed as part of the adaptation procedure shown in
(67)
(68)
(69)
(70)
(71)
input to the despreader is despread by the steps of: Passing
(72)
through a 1:N.sub.smpN.sub.sym serial-to-parallel (S/P) converter (115), and removing the first K.sub.sym symbols (N.sub.smpK.sub.sym samples) encompassing the cyclic symbol prefix from the resultant N.sub.smpN.sub.sym1 S/P output vector (116), resulting in N.sub.smpM.sub.sym1 received data vector x.sub.R. Performing a N.sub.smpM.sub.sym-point discrete Fourier transform (DFT) operation (117) on x.sub.R (thereby converting it to the frequency domain); reshaping the N.sub.smpM.sub.sym1 DFT output vector into an N.sub.smpM.sub.sym matrix using a 1:M.sub.sym S/P converter and matrix transpose operation (118), resulting in N.sub.smpM.sub.sym received data matrix X.sub.R. Removing the M.sub.sym1 receive symbol mask vector m.sub.R mask vector from X.sub.R (112), given mathematically by
X.sub.RX.sub.Rdiag{m.sub.R*}
where diag{} is the vector-to-diagonal matrix conversion operation and ()* is the complex conjugation operation, resulting in M.sub.smpM.sub.sym demasked signal matrix X.sub.R. Perform a separate linear combining operation to each column of demasked signal matrix X.sub.R (119), given mathematically by
{circumflex over (D)}.sub.R(:,k.sub.sym)=W.sub.R(k.sub.sym)X.sub.R(:,k.sub.sym), k.sub.sym=0, . . . , M.sub.sym1,
where W.sub.R(k.sub.sym) is an L.sub.portM.sub.smp linear combining matrix, computed as part of the adaptation procedure shown in
(73)
(74)
(75)
in that set is identical, i.e., m.sub.R(n.sub.frame,k.sub.dwell;l.sub.R)m.sub.R(n.sub.frame,k.sub.dwell) for every receiver in that set.
(76) At uplink receiver l.sub.R used for weakly-macrodiverse uplink despreading, and if the symbol mask is inserted into the baseband source symbols using the time-domain method shown on the upper path of
(77)
output from the dwell demultiplexer (96) is passed through a serial/matrix converter (110) and a matrix thinning operation to remove the cyclic prefixes from the serial/matrix converted symbol matrix (122), and the common receive symbol mask is removed from the resultant data matrix using the multiplicative operation (112) shown in
(78)
where {circumflex over ()}.sub.R(n.sub.frame,k.sub.dwell;l.sub.port;l.sub.R) is an estimate of the frequency offset of the signal detected on port l.sub.port; estimates and substantively despreads the signal detected on each output port, resulting in L.sub.portM.sub.sym despread data matrix {circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell; l.sub.R).
(79) The despread data matrix and frequency offset vector from every uplink receiver engaged in weakly-macrodiverse despreading is then uploaded to a central site (125), where the signal ports from each such receiver are sorted by dwell, frequency offset estimate, and other source observables, e.g., cross-correlation properties and known symbol fields, e.g., Unique Words, to associate signals detected at each port with the same source (126), and each sorted source is demodulated into source symbol estimates using a multidimensional demodulation algorithm (127).
(80) If the symbol mask is inserted in the frequency domain, as shown on the lower path of
(81)
(82)
(83) The network data matrix is then passed to a network-level despreader (97), which employes the adaptation procedure (98) shown in
(84)
where {circumflex over ()}.sub.R(n.sub.frame,k.sub.dwell;l.sub.port) is an estimate of the frequency offset of the signal detected on port l.sub.port; and compute L.sub.portM.sub.smpL.sub.R linear combiner weights W.sub.R(n.sub.frame,k.sub.dwell). Those weights are then used to despread the stacked receive data vector (97), resulting in L.sub.portM.sub.sym despread data matrix {circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell. It should be noted that the number of output ports L.sub.port achievable at the central site can be much higher than the number of output ports achievable at any single site, due to the higher number of linear combiner degrees of freedom M.sub.smpL.sub.R available in the stacked receive signal matrix.
(85) In one embodiment,
(86) In one embodiment,
(87) In one embodiment,
(88)
(89)
The source symbol vector is then spread over time (144) using an N.sub.chp1 spreading code vector c.sub.RS(n.sub.frame), mathematically given by
S.sub.S(n.sub.frame)=d.sub.S(n.sub.frame)c.sub.RS.sup.T(n.sub.frame),
resulting in N.sub.DACN.sub.chp data matrix S.sub.S(n.sub.frame), followed by an N.sub.DACN.sub.chp:1 matrix-to-serial conversion operation (145) to convert S.sub.S(n.sub.frame) to a (N.sub.DACN.sub.chp)-chip scalar data stream s.sub.S(n.sub.DAC), in which each column of S.sub.S(n.sub.frame) is serially converted to a scalar data stream, moving from left to right across the matrix.
(90) This Figure also shows c.sub.RS(n.sub.frame) being constructed from the element-wise multiplication (142) of an N.sub.chp1 source spreading code c.sub.S(n.sub.frame)(140) that is unique to the uplink transmitter and randomly varied between time frames, and an N.sub.chp1 receive spreading code c.sub.R(n.sub.frame,k.sub.dwell(n.sub.frame)) (141) that is pseudorandomly varied based on the time frame n.sub.frame, the physical dwell k.sub.dwell(n.sub.frame) employed by the receiver over time frame n.sub.frame, and the intended uplink receiver l.sub.R(n.sub.frame). However, if the baseband source vector has known or exploitable structure, the entire code vector can be constructed locally using random spreading code.
(91)
(92) In one embodiment,
(93) In one embodiment,
(94) In one embodiment,
(95) In one embodiment,
(96) In one embodiment
(97)
received in k.sub.dwell over time frame n.sub.frame by performing the sequential steps of: Performing a 1:N.sub.smpN.sub.chp serial-to-matrix conversion operation (154) on the demultiplexer output signal sequence
(98)
resulting in N.sub.smpN.sub.chp matrix X.sub.R(n.sub.frame,k.sub.dwell, given mathematically by
(99)
(100)
X.sub.R(n.sub.frame,k.sub.frame)X.sub.R(n.sub.frame,k.sub.frame)diag{c.sub.R*(n.sub.frame,k.sub.frame)} where diag{} is the vector-to-diagonal matrix conversion operation and ()* is the complex conjugation operation. Computing N.sub.smpL.sub.port despread baseband signal matrix Y.sub.R(n.sub.frame,k.sub.dwell) (156), given mathematically by
Y.sub.R(n.sub.frame,k.sub.dwell)=X.sub.R(n.sub.frame,k.sub.frame)W.sub.R(n.sub.frame,k.sub.dwell), where W.sub.R(n.sub.frame,k.sub.dwell) is an N.sub.chpL.sub.port linear combining matrix computed using the procedure shown in
(101)
by applying an N.sub.smp:1 parallel-to-series (P/S) conversion operation (157) to each row of Y.sub.R(n.sub.frame,k.sub.dwell).
(102) In one embodiment,
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
(103) While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail several specific embodiments with the understanding that these specific embodiments of the present disclosure are to be considered as individual exemplifications of the principles of the invention and not intended to limit the invention to the embodiments illustrated.
(104) The embodiments described herein presume a hardware implementation that uses a single antenna per transceiving element, to which any of a set of spatial excision/separation methods of digital signal processing may be applied, including: Linear demodulators (which provide the benefits, among others, of low complexity, simpler network coordination); blind and/or uncalibrated adaptation algorithms; and Subspace-constrained partial update (SCPU) (in order to minimize adaptation complexity). In a further embodiment, more than one antenna may be used and additional dimensions of diversity (spatial, polarization, or any combinations thereof) thus enabled, applied to the excision/separation/security DSP.
(105) The embodiments further provide physical security as an intended but ancillary benefit to overall network efficiency, as the method enables any or all of the following in individual elements, sub-sets of elements, or the entire set comprising the network, while sending messages: Pseudorandom or truly random spreading to prevent exploitation of compromised codes; Fast code replacement (code hopping) to prevent exploitation of detected codes; and Low-power transmission modes to minimize detect footprint, defeat remote exploitation methods.
(106) There are further network enhancements as an intended ancillary benefit, which include: Coordinated/simultaneous SM uplink transmission, DAP reception; the Elimination/enhancement of slotted ALOHA, TDMA protocols; Reduced interference presented to co-channel users; and Provable improvement using information theoretic arguments. Plus, the overall effect enables the network to function with both Blind/uncalibrated SM downlink reception and, consequently, the elimination/minimization of network coordination (and the required signal overhead to effect the same) at each SM.
(107) In one embodiment, a method is provided for wireless intercommunication between at least one Signaling Machine (SM) and one Data Aggregation Point (DAP) each belonging to a set of like devices (all capable of both transmitting and receiving) and with all said devices belonging to the same network of which each said device is a node. Because this method is extremely flexible and adaptable, as described herein all embodiments disclosed in the present description must be understood to be used by collections of devices where members of a specific collection may be both like (e.g. multiple SM's in Collection A) and disparate (a single DAP also in Collection A). Intercommunication may be between a first node and a second node, or a single node and multiple nodes, or multiple nodes to single node, or multiple nodes to multiple nodes. So at least one SM and at least one DAP may intercommunicate; likewise, more than one SM with a single DAP, more than one DAP with a single SM, multiples of SM's with multiples of DAP's; and SM's may intercommunicate with other SM's and DAP's may intercommunicate with other DAP's, in any combination. Each SM and DAP may be referred to as a node, a device, and (depending on their current activity and role) may be the transmitter, receiver, or transmitter and receiver of a message (or intercommunication, or intended transmission); but calling the device a transmitter (or receiver) for its functional activity at the time, is not usage to be confused with and taken as, requiring or stating that the device as a whole be solely that specific electronic component.
(108) The FHDS spread-spectrum modulation is effected through spreading codes, and its format comprises time slots and frequency channels which combine to form a time frame; so the time slots and frequency channels are sub-divisions of the time frame. Any transmission may comprise at least one time frame (and probably more), an uplink and a downlink, and comprise both at least one data burst (a time period of active transmission) and at least one guard interval (a time period of no transmission) (as seen in
(109) As one embodiment of the method uses blind fully-despreading algorithms at each receiver, the network can implement arbitrary spreading codes (to distinguish intercommunications between each SM and DAP, or sub-sets or sets thereof); and these arbitrarily spreading codes can be chosen randomly, pseudorandomly, or locally (that is, without coordination or activation/change effort on the part of the network as a whole, i.e. without centralized network provisioning).
(110) Furthermore, and equally importantly to the continued security, even when, while, or after any attempted infiltration or interception, the selection of arbitrarily spreading codes actually used within the network as a whole can be altered (again randomly, pseudorandomly, and locally) with any timing and by any ad-hoc redivision of the network, thereby preventing any third party from learning, or predicting, and thus gaining access to, the intercommunications between any sub-set of SM's and their DAP's. By using the spreading codes to differentiate intended signaling between the SM's and DAP, this method prevents mutual interference amongst its elements.
(111) To obtain the kernel for implementing a truly randomized spreading code, in at least one further embodiment the network incorporates at least one real-world sensor which takes input from events in the real world as the source for random-number generation (a real-world, random-number, sourcing sensor, or RW-RN-SS). For example, the network may have an amplitude sensor which picks the most powerful signal within a time frame; or a photovoltaic sensor which detects the intensity of a light shining through a set of heat-variant-density liquid containers (lava lamps), or a frequency sensor which selects the mean, average, peak or low, or other calculated value, of all frequencies detected within a certain time period. The method can then be using, during said transformations, input from a real-world, random-number, sourcing-sensor element that provides a truly random kernel using real-world chance events for randomly effecting the transmission transformation, including any combination of the following set: by randomly generating the spreading code over every transmit opportunity (every frame on the uplink, and every time slot on the downlink) in a randomizer element and then providing the generated spreading code to the CPDS spreader; by randomly generating the physical dwell index (time slot and frequency channel) over every time frame in a randomizer element and then providing said randomly generated physical dwell index to the CPDS uplink transmitter; by randomly generating elements of the source symbol mask, e.g., a cyclic frequency offset, over every time frame in a randomizer element and then providing said randomly generated physical dwell index; and, by randomly selecting an intended uplink receiver from a set of candidate uplink receivers over every time frame and then providing that selection of uplink receiver to the CPDS uplink spreader.
(112) Thus the environment as a wholeincluding the noise of all other transmissionscan become a self-sourcing aspect of the network's security, using genuinely random and constantly-changing real-world events instead of a mere pseudorandom noise (PN) element.
(113) In another and further embodiment each DAP incorporates in itself a RW-RN-SS to generate for that DAP and its associated SM's, the truly randomized spreading code(s) used by that subset of the network.
(114) In yet another and further embodiment each SM incorporates in itself a RW-RN-SS to generate for that SM, the truly randomized spreading code(s) used by it.
(115) Furthermore, the successful interception and detection of one spreading code does nothing to ensure further, continued, or future interception of any messages (within the affected sub-set of the network, or any part or whole of the network. As soon as the intercepted spreading code is changed the new messages may be once again not merely encrypted, but become part of the overall noise of the total environment.
(116) As a consequence, the method completely eliminates the ability for an adversary to predict or control when, where in frequency, or even whom an SM may transmit to at any time. In the worst case scenario where the anti-spoofing protocols are compromised, an adversary can at best generate a duplicate node that is easily detected and identified by the network using PHY observables (e.g. carrier offsets, locational angles, intensity variations, timing inconsistencies, multipath imbalances, etc. as known to the state of the art, which in a transmission may be the Physical Layer (PHY) data bits), internals, or other trusted information possessed by the true SM and DAP. Whenever a node is duplicated the original source and intended recipient can, each independently or together, compare any of the PHY observables in the received transmissions and use any discrepancy from previously observed values to identify the adversarial node; and then ignore that now-identified hostile node, alert the other nodes in the network to the presence, and PHY observable characteristics, of that now-identified hostile node, and otherwise respond.
(117) One embodiment enables randomized and/or decentralized time-frequency hopping and code spreading to defeat interception/deception attacks that focus on scheduled transmissions (including, among others, the man-in-the-middle interception type of attack). Indeed, one embodiment eliminates the very existence of feedback paths needed to schedule uplink transmissions, thereby negating a critical point of attack for intruders attempting to intercept, jam, spoof, or otherwise disrupt the network, as well as reducing downlink network loading imposed by those paths.
(118) Further still, another embodiment also differs from the prior art in implementing physical security which neither depends on every element having an antennae array, nor which inherently exploits channel differences resulting from differing geographical placement of those arrays, yet which allows both signaling between a SM and a DAP (or a user and a base station) and a pair of SM's or a pair of DAP's with the same physical security and processing implementation, and without network-assigned differentiation of processing methods.
(119) One embodiment focuses on Max-SINR rather than matched-filter despreading, uses fully-blind rather than parametric despreading, and employs conventional LMMSE (Linear Minimum Mean-Squared Spreading Error), because this method greatly reduces the overhead to the network (signal-controlling and signal-defining sub-content) of its transmissions, which correspondingly increases the efficiency and capacity of the network. It also enables a back-compatible approach (to existing communication signal, e.g. 802.11 DSSS) whenever and wherever desired, enabling cost-effective implementation as signal/noise densities become problematic, rather than an entirely new generation implementation effort where the entire network must be simultaneously upgraded as a prerequisite to the attainable improvement(s).
(120) A further embodiment combines cyclic time prefixes and specific guard intervals that allow operation of any SM's-DAP network (or sub-portion), in an environment with very coarse time synchronization, without any significant loss of signal density or range of effectiveness.
(121) In one embodiment the method fits each transmission into a series of frames of Upload (UL) and Download (DL) transmissions (
(122) This frame structure enables a Point-to-Multipoint (P2MP) transmission that is compliant with intentional radiator exceptions under the FCC 15.247 requirements for the 902-928 MHz band. Moreover, the DL is broadcast from the DAP, thereby avoiding the Point-Multi-Point (P-MP) restriction and making it compliant with FCC 15.247 requirements for the 902-928 MHz band.
(123) In one embodiment, the network used a method incorporating into each transmission at each transceiver a Cyclic-Prefix Direct-Sequence (CPDS) modulation-on-symbol spreader and fully-blind despreader within each physical time-frequency channel, thus providing a differentiator for that transmission with time-channelized despreading to further support the robustness and quality of the differentiation of signal from noise within the accepted transmission band. Furthermore, this spreading format incorporates randomization features that also eliminates the need for pre-deployment network planning and enables and allows more robust (mesh, macrodiverse) network topologies, improving and increasing the stability and robustness of the actually deployed network. A reasonable estimate is that this multiplies the potential capacity for the network by a factor of 3, compared to conventional FHDS networks; or allows link connection at 10-20 dB lower power level with the same fidelity. Using a single-carrier prefix also minimizes signal loading due to multipath or in-cell group delay. In one embodiment the method may also be fitting each transmission into a series of frames of Upload Transmissions (UpLink) and Download Transmissions (Downlink), and transmitting from the SM on any UpLink and from the DAP on any DownLink.
(124) In one embodiment, in the CPDS uplink transmitter shown in
(125) The baseband source symbol stream is then passed to the cyclic-prefix direct-sequence (CPDS) spreading processor shown in
(126) As shown in
(127) Preferentially, in one embodiment, the uplink transmitter also uses knowledge of the range between itself and its nearest physical receiver, e.g., based on known geolocation information of itself and the uplink receivers in its field of view, to provide timing advancement sufficient to allow its transmission to arrive at that receiver at the beginning of its observed uplink subslot. It should be noted that the nearest physical receiver does not need to be the receiver that the uplink transmitter is intending to communicate with. Additionally, this timing advancement does not need to be precise to a fraction of a chip period; however, it should be a small fraction of the cyclic prefix used on the uplink.
(128) Preferentially, in one embodiment, the source transmit power P.sub.S(n.sub.frame) is calculated using an open-loop algorithm, e.g., by calculating pathloss between each DAP in the SM's field of view during downlink subslots, and using that pathloss estimate to calculate power required to determine the source power required to detect, despread, and demodulate subsequent uplink transmissions. The source transmit power does not need to precisely compensate for the pathloss between the transmitter and receiver, but should have sufficient margin to overcome any effects of fading between the uplink and downlink subslots, including processing gain achievable by the despreader in the presence of credible numbers of other uplink transmissions. Additionally, this power calculation is used to develop a database of candidate uplink receivers to which the transmitter can communicate without violating FCC 15.247 requirements for the 902-928 MHz band.
(129) In alternate embodiments, this algorithm can be improved using closed-loop algorithms that use feedback from the uplink receiver to adjust the power level of the transmitter. Preferentially, in one embodiment, the closed-loop algorithm should be as simple as possible, in order to reduce vulnerability to cognitive jamming measures that can disrupt this feedback loop. However, it should be noted that the blind despreading algorithms employed in one embodiment provide additional protection against cognitive jamming measures even if closed-loop power control is used in the network, due the random and unpredictable selection of frequency channels, time slots, and even intended receivers employed at the uplink transmitter, and due to the ability for the despreading algorithms to adaptively excise CPDS signals received at the uplink and downlink receivers, even if those signals are received at a much higher signal-to-noise ratio (SNR) than the signals intended for the receiver.
(130) In the downlink transmitter shown in
(131) Thus the method is: first passing said information through baseband encoding to create a baseband source symbol stream b.sub.S(n.sub.sym); then passing the baseband source symbol stream b.sub.S(n.sub.sym) to a cyclic-prefix direct-sequence (CPDS) spreading means which modulate each data segment to generate the spread source data stream s.sub.S(n.sub.chp) output from the CPDS spreading means at each chip index n.sub.chp; then subsequently pulse-amplitude modulating the spread source data stream s.sub.S(n.sub.chp) output by a raised-root-cosine (RRC) interpolation pulse;
(132) converting this result to an analog signal-in-space (SiS); upconverting this analog SiS to a desired source frequency f.sub.S(n.sub.slot) selected by the downlink transmitter over time slot n.sub.slot; and
(133) transmitting this analog SiS over the desired source frequency f.sub.S(n.sub.slot) over time slot n.sub.slot at a source power level P.sub.S that is held constant over every time slot.
(134) Preferentially, in one embodiment, each downlink transmitter is synchronized to a common network time-standard, e.g., using synchronization information provided over separate infrastructure, or a GPS time-transfer device. This synchronization should be precise enough to minimize DAP-to-DAP interference, but does not need to be precise to a fraction of a chip period.
(135) Preferentially, in one embodiment, the frequency channel k.sub.chan(n.sub.slot) used to set source frequency f.sub.S(n.sub.slot) is generated using a pseudorandom selection algorithm based on the slot index n.sub.slot and the source index l.sub.S. In other words, the method is selecting a desired source frequency f.sub.S(n.sub.slot) to be used by the downlink transmitter over time slot n.sub.slot by selecting a frequency channel k.sub.chan(n.sub.slot) using a pseudorandom selection algorithm based on the slot index n.sub.slot and the source index l.sub.S. In one embodiment, f.sub.S(n.sub.slot) is known to each downlink receiver allowed to communicate with that transmitter, over at least a subset of slots within each frame. However, in alternate embodiments the downlink receiver may detect the transmit frequency over each slot or a subset of monitored slots and frequency channels, without coordination with the downlink transmitter. Preferentially, in one embodiment, the source frequency employed by each downlink transmitter is not coordinated with other downlink transmitters in the network; however, in alternate embodiments (employed outside the 902-928 MHz ISM band, which requires uncoordinated hopping between network elements) the downlink transmitters may use the same source frequency in each slot, e.g., to minimize intrusion on out-of-network users of the same frequency band, or may use disjoint source frequencies, e.g., to minimize adjacent-network interference.
(136) In the CPDS uplink spreading structure shown in
(137)
A unique M.sub.sym1 symbol mask vector
(138)
that is randomly varied from frame to frame is then inserted onto the data (procedure shown in
(139) In one embodiment, m.sub.S(n.sub.frame) is either: known to the receiver, e.g., established during initial and/or periodic network provisioning operations; or a member of a set of sequences that is known to the receiver, e.g., a Zadoff-Chu code with unknown index and/or offset; or unknown to the receiver but estimable as part of the receive adaptation procedure.
(140) An important member of the last category of source symbol masks is the complex sinusoid given by
m.sub.S(n.sub.sym;n.sub.frame)=exp{j2.sub.S(n.sub.frame)n.sub.sym},(Eq2)
where .sub.S(n.sub.frame) is a cyclic source frequency offset chosen randomly or pseudorandomly over frame n.sub.frame. The cyclic source frequency may be communicated to the receiver, or predictable via side information provided at the time of installation of the SM or DAP, providing an additional means for validating the link.
(141) In one embodiment, the source and receive symbol masks each possess a constant modulus, i.e., |m.sub.()(n.sub.sym)|1, to facilitate removal of the symbol mask at the receiver. In addition, except for the complex sinusoidal source symbol mask given in (Eq2), the source and receive symbol masks are preferentially designed to be circularly symmetric, such that the masks have no identifiable conjugate self-coherence features (m.sub.().sup.2(n)e.sup.j2n
0), and cross-scrambling, such that the cross-multiplication of any two symbol masks results in a composite symbol mask that appears to be a zero-mean random sequence to an outside observer.
(142) In one embodiment, the receive symbol mask is a function of both the time frame index n.sub.frame, and the physical dwell index k.sub.dwell, is generated using a pseudorandom selection algorithm based on both parameters. In addition, the receive symbol mask can be made unique to each uplink receiver in the network, in which case the receivers can use that mask to identify only those uplink transmitters intending to communicate with that receiver; or it can be made common to every receiver in the network, allowing any receiver to despread any SM in its field of view. The latter property can be especially useful for network access purposes (e.g., using a special receive mask intended just for transmitter association and authentication purposes), and in macrodiverse networks where symbol streams received and/or despread at multiple uplink receivers are further aggregated and processed at higher tiers in the network.
(143) After insertion of the symbol mask, and if observed multipath time dispersion encountered by the channel is a substantive fraction of a single symbol period, a cyclic symbol prefix is then inserted into the M.sub.sym1 masked symbol vector d.sub.S(n.sub.frame), such that d.sub.S(n.sub.frame) is replaced by N.sub.sym1 data vector
(144)
where M.sub.sym, K.sub.sym and N.sub.sym=M.sub.sym+K.sub.sym are the number of encoded symbols, cyclic prefix symbols, and full data symbols transmitted over the frame. The cyclic symbol prefix protects against multipath dispersion with group delay T.sub.groupK.sub.sym T.sub.sym observed at the uplink receiver, where T.sub.sym=1/f.sub.sym and f.sub.sym are the symbol period and symbol rate for the baseband symbol stream, respectively.
(145) After insertion of the symbol mask and (optional) symbol-level cyclic prefix, the full N.sub.sym1 data vector d.sub.S(n.sub.frame) is spread by N.sub.chp1 source spreading code vector c.sub.S(n.sub.frame), chosen randomly or pseudorandomly over every time frame and not known at the intended receiver. The source spreading code vector also has an optional K.sub.chp-chip cyclic chip prefix inserted into it, such that c.sub.S(n.sub.frame) is given by
(146)
is an M.sub.chp-chip base code used for frame n.sub.frame and N.sub.chp=M.sub.chp+K.sub.chp The cyclic chip prefix protects against multipath time dispersion with group delay T.sub.groupK.sub.chpT.sub.chp observed at the uplink receiver, where T.sub.chp=1/f.sub.chp and f.sub.chp are the chip period and chip rate for the baseband symbol stream, respectively.
(147) Preferentially, if the observed multipath time dispersion is a small fraction of a source symbol period, a cyclic chip prefix is inserted into the spreading code and the cyclic symbol prefix is not implemented (K.sub.sym=0); or, if the multipath time dispersion is larger than a small fraction of a source symbol period, a cyclic symbol prefix is inserted into the masked data vector and the cyclic chip prefix length is not implemented (K.sub.chp=0). In one embodiment, and for the long-range M2M network depicted in
(148) In one embodiment, a modulation-on-symbol direct-sequence spread spectrum (MOS-DSSS) method, in which the spreading code is repeated over every baseband symbol within each hop, is used to spread the source symbol vector d.sub.S(n.sub.frame) using the spreading code c.sub.S(n.sub.frame). Mathematically, the spreading operation can be expressed as a matrix inner-product operation given by
S.sub.S(n.sub.frame)=c.sub.S(n.sub.frame)d.sub.S.sup.T(n.sub.frame),(Eq5)
in which c.sub.S(n.sub.frame) and d.sub.S(n.sub.frame) are the inner and outer components of the spreading process, respectively, followed by a matrix-to-serial or matrix flattening operation to convert the N.sub.chpN.sub.sym data matrix S.sub.S(n.sub.frame) resulting from this operation to a (N.sub.chpN.sub.sym)-chip scalar data stream s.sub.S(n.sub.chp), in which each column of S.sub.S(n.sub.frame) is serially converted to a scalar data stream, moving from left to right across the matrix. An alternative, but entirely equivalent, representation can be obtained using the Kronecker product operation
s.sub.S(n.sub.frame)=d.sub.S(n.sub.frame)c.sub.S(n.sub.frame),(Eq6)
to generate (N.sub.chpN.sub.sym)1 data vector s.sub.S(n.sub.frame), followed by a conventional (N.sub.chpN.sub.sym):1 parallel-to-serial (P/S) conversion to s.sub.S(n.sub.chp). The symbol stream may be real or complex, depending on the baseband source stream, and on the specific spreading code and symbol mask employed by the CPDS spreader.
(149) The CPDS downlink spreading operations shown in
(150) As shown in
(151) Table 1 lists the exemplary uplink (UL) and downlink (DL) parameter values used for deployment of this structure in the 902-928 MHz ISM band using one embodiment, which are further illustrated in
(152) TABLE-US-00001 TABLE 1 Exemplary Uplink and Downlink CPDS PHY, Transceiver Parameters Parameter UL Value DL Value Comments PHY symbols/slot (M.sub.sym) 480 symbols 384 symbols Cyclic symbol prefix length (K.sub.sym) 0 symbols 3 symbols Symbol-level cyclic prefix Full baseband symbols/slot (N.sub.sym) 480 symbols 387 symbols PHY baseband symbol rate (f.sub.sym) 16 symbol/ms 40 symbol/ms Rate over Tx interval Active link duration 30 ms 9.675 ms Guard time, end of link slot 75 s 250 s 40 ms hop dwell time Spreading code base length (M.sub.chp) 16 chips 8 chips Cyclic chip prefix length (K.sub.chp) 4 chips 0 chips Chip-level cyclic prefix Full spreading code length (N.sub.chp) 20 chips 8 chips Spread chip rate 320 chip/ms 320 chip/ms ~3.125 s chip period Composite cyclic prefix duration 12.5 s 75 s Max multipath dispersion Equivalent range (4/3 Earth) 3.75 km 22.5 km UL timing advance needed RRC rolloff factor 25% 25% 320 kHz HPBW, 400 kHz full BW Allowed FOA uncertainty 50 kHz 50 kHz >50 ppm LO offset, 902- 928 MHz band Frequency channel bandwidth 500 kHz 500 kHz Compliant, FCC 15.247, (a)(1)(ii) Number hop channels 50 channels 50 channels Compliant, FCC 15.247, (a)(1)(ii) Full hop bandwidth 25 MHz 25 MHz Number transmit hops/node 1 1 Compliant, FCC 15.247, (a)(1)(i) Number receive hops/node 50 hop 1 hop DAP's receive all UL hops TDD slots per frame 100 slots 100 slots 4 second frame length Slot Tx per node each frame 1 100 DL Tx every slot Hop rate each slot direction 0.25 hps 25 hps Average time occupancy over 6 ms/SM 0.2 ms/DAP Compliant, FCC 15.247, 10 s (a)(1)(i) Max Tx conducted power into ANT 30 dBm (1 W) 30 dBm (1 W) Compliant, FCC 15.247, (b)(2) Number Tx ANT's 1 ANT 1 ANT SISO links assumed Tx ANT max directivity 6 dBi 6 dBi Compliant, FCC 15.247, (4 W EIRP) (4 W EIRP) (b)(4)
(153)
(154)
(155)
(156)
(157) As shown in
(158)
where receive spreading factor N.sub.smp is the number of time samples per source symbol period at the demultiplexer output sampling rate. Note that this sampling rate can be substantively different than the chip rate employed at the transmitter; for example, if the transmitter chip rate is 320 chips/ms and the demultiplexer output rate is 400 samples/ms, then the source spreading factor employed at the transmitter N.sub.chp=16, but the receive spreading factor is N.sub.smp=20. Similarly if the cyclic chip prefix employed at the transmitter is K.sub.chp=4, encompassing a 12.5 s time duration, then the cyclic chip prefix covering the same time duration at the receiver is K.sub.smp=5.
(159) Each demultiplexed physical dwell of interest to the receiver is then passed through an uplink CPDS despreader (shown in
(160) As shown in
(161) As shown in
(162)
into N.sub.smpN.sub.sym matrix X.sub.R(n.sub.frame,k.sub.dwell), where N.sub.sym is the number of transmitted symbols in the dwell, and removing the cyclic chip prefix and (if applied at the transmitter) the cyclic symbol prefix from that matrix, given in aggregate by
(163)
for general received data sequence
(164)
X.sub.R(n.sub.frame,k.sub.frame)X.sub.R(n.sub.frame,k.sub.frame)diag{m.sub.R*(n.sub.frame,k.sub.frame)}(Eq8) where m.sub.R(n.sub.frame,k.sub.dwell) is the M.sub.sym1 receive symbol mask vector over dwell k.sub.dwell and time frame n.sub.frame, and where diag{} is the vector-to-diagonal matrix conversion operation and ()* is the complex conjugation operation. Computing L.sub.portM.sub.sym despread symbol matrix {circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell), using linear signal separation algorithm
{circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell)=W.sub.R(n.sub.frame,k.sub.dwell)X.sub.R(n.sub.frame,k.sub.frame)(Eq9) where W.sub.R(n.sub.frame,k.sub.dwell) is an L.sub.portM.sub.smp linear combining matrix, computed as part of the adaptation procedure shown in
(165)
by applying an M.sub.sym:1 parallel-to-serial (P/S) conversion operation to each column of {circumflex over (D)}.sub.R(n.sub.frame,k.sub.dwell).
(166) The despreading operations performed in the downlink CPDS despreader, shown in
(167) As shown in
(168) In one embodiment, specific partially or fully-blind adaptation algorithms can meet the criteria described above include: The FFT-enabled least-squares (FFT-LS) detection, carrier estimation, and signal extraction algorithm, which can be derived as a maximum-likelihood estimate of carrier frequency for signals with known content but unknown carrier offset which exploits known training signals inserted in the baseband symbol sequence at every source (e.g., in Unique Word fields, or more sophisticated embedded pilots) to determine the linear combining weights. FFT-LS is most useful at high symbol rates (>3 bits/symbol), as the high dimensionality of the CPDS linear combiner requires a large set-aside of non-information-bearing symbols for training purposes (e.g., 40 UL symbols, e.g., 8% of each slot, for the baseline uplink signal). The auto-self-coherence-restoral (A-SCORE) algorithm described in, which exploits nonzero (by design, perfect) temporal correlation induced as part of the embedded invariance algorithm. A-SCORE is most useful at moderate symbol rates (<3 bits/symbol), and over data bursts that are too short to allow set-aside for long training sequences (e.g., greater than 30% of the source symbols at 3 bits/symbol, or greater than 20% of the source symbols at 1 bit/symbol). The conjugate self-coherence restoral (C-SCORE) algorithm, which exploits nonzero conjugate self-coherence of the baseband symbol sequence, if it exists prior to application of the masking signal, and which estimates the twice-carrier rate of that signal (including any cyclic source frequency offset applied to the source symbol mask). C-SCORE is most useful for symbol streams with perfect conjugate self-coherence, e.g., binary phase-shift keyed (BPSK) and amplitude-shift keyed (ASK) symbol sequences.
(169) All of these algorithms are blind despreading methods that do not require knowledge of the spreading code to adapt the despreader. Moreover, except for incorporation of structure to resolve known ambiguities in the despreader output solutions, C-SCORE and A-SCORE are fully-blind despreading methods that require no knowledge of the source symbol sequence, and use the entire symbol stream to adapt the despreader. All of these methods also asymptotically converge to the max-SINR solution over data bursts with high usable time-bandwidth product (M.sub.sym/M.sub.smp large, where M.sub.sym is the number of symbols used for training purposes). Moreover, all of the receiver adaptation algorithms are assumed to operate on a slot-by-slot basis, such that despreader weights for each slot are computed using only data received within that slot. Lastly, all of these methods yield an SINR-like feature spectrum which can be used to detect and estimate the carrier offset of the symbol sequences to within a Nyquist zone ambiguity, i.e., carrier mod symbol rate for FFT-LS and A-SCORE, and twice-carrier mod symbol rate for C-SCORE.
(170) In one embodiment, the baseband source sequence is BPSK and therefore possesses a perfect conjugate self-coherence at its twice-frequency offset. Moreover, if the symbol masks applied at the spreader are circularly symmetric, the received symbol streams have no identifiable conjugate self-coherence prior to the symbol demasking operation. After the demasking operation, the symbols employing that mask, and only the symbols employing that mask, are converted to perfectly conjugate self-coherent signals that provide strong peaks at their twice-carrier frequencies. As a consequence, the despeader is ideally suited for adaptation using a C-SCORE algorithm.
(171) The full C-SCORE method is described as follows: Compute the Q component Q.sub.R of the QRD of X.sub.R.sup.T using a modified Gram-Schmidt orthogonalization (MGSO) algorithm Compute {S.sub.R(.sub.k)} from Q.sub.R at uniform trial frequencies {.sub.k}={2k/K.sub.DFT}.sub.k=0.sup.K.sup.
(172)
(173) To facilitate subsequent operations, compute and store the M.sub.smp(M.sub.smp+1)M.sub.sym unique cross-multiplications used in (Eq10) prior to the FFT operation. These cross-multiplications can also be used to compute (Eq10) for other masks. Initialize u.sub.1(.sub.k)=e.sub.M.sub.
u.sub.1(.sub.k)S.sub.R(.sub.k)u.sub.1(.sub.k)
u.sub.1(.sub.k)S.sub.R.sup.H(.sub.k)u.sub.1(.sub.k)
.sub.1(.sub.k)=u.sub.1(.sub.k).sub.2
u.sub.1(.sub.k)u.sub.1(.sub.k)/.sub.1(.sub.k).(Eq11) Select the L.sub.port strongest peaks in {.sub.1(.sub.k)}, L.sub.port=M.sub.smp. Estimate the dominant mode {.sub.1 ({circumflex over ()}),u.sub.1({circumflex over ()})} of S({circumflex over ()}) at each peak frequency {circumflex over ()}, and optimize the frequency location to subbin accuracy, using an alternating projections method that alternately optimizes {.sub.1({circumflex over ()}),u.sub.1({circumflex over ()})} given fixed {circumflex over ()} using (Eq11), and optimizes a to maximize Re{u.sub.1.sup.TS.sub.R()u.sub.1} given fixed u.sub.1 using a Newton recursion. This processing step reuses the cross-multiplication products computed in (Eq10). Estimate the maximum attainable signal-to-interference-and-noise ratio (SINR) of the despreader at peak {circumflex over ()} using {circumflex over ()}.sub.max({circumflex over ()})=.sub.1({circumflex over ()})/(1.sub.1({circumflex over ()})) and thin the C-SCORE peaks if needed. Compute the spatially whitened minimum mean-square error (MMSE) weights using the formula
(174)
(175)
(176)
where the carrier estimate and despreading weights are jointly updated using a Newton recursion.
(177) The C-SCORE algorithm generates a single feature spectrum with multiple peaks at twice the carrier (mod the symbol rate) of every source communicating with the receiver, and with peak strengths consistent with the maximum attainable SINR of the despreader. Random cyclic complex sinusoids are also completely transparent to the C-SCORE algorithm, as the complex sinusoid may simply shift the location of peaks in the feature spectrum. This may improve resistance to collisions, by randomizing the location of all of the peaks in the spectrum. This can also provide additional resistance to spoofing if the cyclic offset used by each source is partially or fully derived from information known only to the source and receiver.
(178) If a cyclic symbol prefix is inserted into the baseband symbol vector at the transmitter, and the operations shown on the lower branch of
(179)
is first converted to a N.sub.smp N.sub.sym1 vector using a 1:N.sub.smp N.sub.sym serial-to-parallel converter, and the first K.sub.sym symbols (N.sub.smpK.sub.sym samples) encompassing the cyclic symbol prefix are removed. The resulting in a N.sub.smpM.sub.sym1 data vector is then passed through an N.sub.smpM.sub.sym-point DFT, reshaped into an N.sub.smpM.sub.sym matrix, and transposed to form M.sub.symN.sub.smp matrix
(180)
where k.sub.sym is the index for each column of X.sub.R. The receive symbol mask is then removed from X.sub.R using (Eq8), and each column of X.sub.R is despread using linear combining algorithm
{circumflex over (D)}.sub.R(:,k.sub.sym)=W.sub.R(k.sub.sym)X.sub.R(:,k.sub.sym)(Eq14)
where
(181)
are a set of M.sub.sym L.sub.portM.sub.smp linear combining matrices, computed as part of an adaptation procedure, and individually applied to each column of X.sub.R. Each row of the resultant L.sub.portM.sub.sym despread data matrix {circumflex over (D)}.sub.R is then converted back to the time domain using an M.sub.sym-point inverse DFT (IDFT) operation, and converted to a sequence of L.sub.port1 despread symbol vectors
(182)
(183) It should be noted that any uplink transmitter employing the same receive symbol mask can use that mask to detect and despread emissions from neighboring uplink transmitters. As a consequence, information sent from these transmitters should possess additional encryption to protect that information from eavesdropping by neighboring network members. This can be accomplished at the physical layer, for example by adding a BPSK source symbol mask to each uplink transmission that still allows uplink despreading using C-SCORE; or by adding stronger encryption at higher layers in the OSI protocol stack; or by a combination of both strategies.
(184) It should also be noted that this capability does not compromise ability for the network to defeat man-in-the-middle attacks, as the transmission parameters of the uplink transmitters cannot be predicted. It does place increased importance on truly random choice of those parameters, as an intelligent adversary could eventually learn the keys underlying pseudorandom choices if weak enough.
(185) In fact, this capability can greatly enhance ability for the network to detect intruders, by allowing SM's to measure and transmit observables of their neighbors to the network DAP's as a normal part of their operation. Any intruder attempting to spoof an SM would be instantly identified by virtue of observables of the correct SM reported to the DAP by its neighbors.
(186) For example, an SM can simply pick an uplink dwell to listen on; intercept and demodulate any SM transmissions during that dwell; break out a MAC header containing information sent some a portion of the message known to contain the SM's Address (which might still be encrypted using keys possessed by only the DAP and SM itself), and send that information along with PHY observables of the intercepted SM, e.g., the dwell index, source frequency offset, intercepted frame index, and intended receive DAP (if non-macrodiverse usage) back to a the network in a later transmission. That information alone should be enough to eventually uncover any radio attempting to spoof transmission.
(187) This capability can also greatly facilitate the implementation of mesh networks to further improve reliability of the network, and reduce energy emitted or dissipated by the uplink transmitters.
(188) One embodiment seamlessly extends to additional transceiver and network improvements, including: Use of spatial and polarization diverse antenna arrays at any node in the network. In this case the spreading code can be repeated or randomly extended over each antenna employed at the transmitter, and the dimensionality of the despreading algorithms is simply multiplied by the number antennas employed at the receiver. Macrodiverse uplink despreading methods in which part or all of the despreading operations are performed at a higher tier of the network.
(189) Both of the above extensions can be implemented without any substantive change to the transmission and spreading structures described herein, and do not require reciprocity of the uplink and downlink channels or calibration techniques to enforce such reciprocity.
(190)
(191) In more complex systems and other embodiments, this network mask may be broken into geographic-specific zonal masks, in order to differentiate between SM's based on their proximity to different clusters of DAP's. Because the symbol masks do not disrupt the MOS-DSSS structure of the signals, they still allow signals outside that geographical region to be excised by the despreader; however, only the signals within that region may be discovered and extracted by the despreader employed that symbol mask.
(192) The CPDS method is particularly well suited to weakly-macrodiverse combining. The cyclic prefixes provide a high degree of tolerance to timing error between signals received at the DAP's in the network; in fact, it is likely that no timing error may occur at SM's that can most benefit from macrodiverse processing, e.g., SM's that are at nearly-equal range to multiple DAP's, and are therefore received at near-equal RIP at those DAP's. Moreover, because the SM uplink signals are despread at the DAP's, the bulk of operations needed to despread those signals are distributed over the network, with a relatively small number of operations needed at the network level. Lastly, the despreading performed at the DAP's also compress data needed to be transferred to the central site by a factor of 20 at least in one embodiment, much more if the despread symbols are quantized to low precision before being uploading to the central site.
(193)
(194)
are uploaded to a central processing site. In this system, the data matrices are stacked into an L.sub.RM.sub.smpM.sub.sym network data matrix X.sub.R(n.sub.frame,k.sub.dwell) given by
(195)
(196) The network data matrix is then passed to a network-level despreader that on receiving and downconverting a symbol stream for any device removes the DAP carrier offsets
(197)
(if needed); detects the sources
(198)
using that channel; estimates their carrier offsets
(199)
develops a set of linear combiner weights with L.sub.RM.sub.smp degrees of freedom, and uses those combining weights to extract all of those SM's symbol streams from the network data matrix, to be used by the network.
(200) The macrodiverse extensions can improve the security, efficiency, and complexity of M2M networks, by exploiting the additional route diversity of macrocellular and mesh networks. Large scale network analyses have established that weakly-macrodiverse networks can provide as much as 3 dB of link margin in the long-range M2M use scenario shown in
(201)
(202)
(203) In one embodiment, a possible feature of the FS embodiment is its ability to be used with any baseband modulation format. The exemplary FS system described here uses a spectrally efficient OFDM modulation format with a cyclic prefix allowing much higher tolerance to observed group delay at the uplink receiver.
(204) The algorithm used to compute the time-slot start time t.sub.S(n.sub.frame), frequency channel center frequency f.sub.S(n.sub.frame), and transmit power level P.sub.S(n.sub.frame) in each time frame n.sub.frame is computed using the operations shown in
(205)
(206) In the FS uplink spreading structure shown in
(207)
The source symbol vector is then spread over time using an N.sub.chp1 spreading code vector c.sub.RS(n.sub.frame) that is randomly or pseudorandomly generated in each time frame. Mathematically, the spreading operation can be expressed as a matrix inner-product operation given by
S.sub.S(n.sub.frame)=d.sub.S(n.sub.frame)c.sub.RS.sup.T(n.sub.frame),(Eq16)
in which d.sub.S(n.sub.frame) and c.sub.RS(n.sub.frame) are the inner and outer components of the spreading process, respectively, followed by a matrix-to-serial or matrix flattening operation to convert the N.sub.DACN.sub.chp data matrix S.sub.S(n.sub.frame) resulting from this operation to a (N.sub.DACN.sub.chp)-chip scalar data stream s.sub.S(n.sub.DAC), in which each column of S.sub.S(n.sub.frame) is serially converted to a scalar data stream, moving from left to right across the matrix. An alternative, but entirely equivalent, representation can be obtained using the Kronecker product operation
s.sub.S(n.sub.frame)=c.sub.RS(n.sub.frame)d.sub.S(n.sub.frame),(Eq17)
to generate (N.sub.DACN.sub.chp)1 data vector s.sub.S(n.sub.frame), followed by a conventional (N.sub.DACN.sub.chp):1 parallel-to-serial (P/S) conversion to s.sub.S(n.sub.DAC). The symbol stream may be real or complex, depending on the baseband source stream and the specific spreading code used by the FS spreader.
(208) Comparing (Eq16)-(Eq17) with (Eq5)-(Eq6), the FS spreading operation is seen to be the reverse or dual of the spreading operation performed in the CPDS spreader. Alternately, the baseband data modulates the code sequence, that is, the baseband data in the FSS airlink takes on the same function as the spreading code in the CPDS airlink, and vice verse.
(209) In the absence of known and exploitable structure of the baseband source vector, the spreading code c.sub.RS(n.sub.frame) is constructed from the element-wise multiplication of an N.sub.chp1 source spreading code vector c.sub.S(n.sub.frame) that is unique to the uplink transmitter and randomly varied between time frames, with an N.sub.chp1 receive spreading vector c.sub.R(n.sub.frame;k.sub.dwell(n.sub.frame)) that is randomly varied between time frames and physical dwells. This operation is depicted in
(210) In other embodiments, in the absence of known and exploitable structure of the baseband source vector, c.sub.S(n.sub.frame) is further either: known to the receiver, e.g., established during initial and/or periodic network provisioning operations; or a member of a set of sequences that is known to the receiver, e.g., a Zadoff-Chu code with unknown index and/or offset; or unknown to the receiver but estimable as part of the receive adaptation procedure, e.g., a complex sinusoid given by
(211)
(212) In the latter case, the cyclic source frequency offset may be communicated to the receiver, or predictable via side information provided at the time of installation of the SM or DAP, providing an additional means for validating the link. Except for the complex sinusoidal frequency offset, the source and receive code spreading vectors are preferentially designed to be circularly symmetric, such that the spreading vectors have no identifiable conjugate self-coherence features c.sub.().sup.2(n)e.sup.j2n
0, and cross-scrambling, such that the cross-multiplication of any two spreading vectors results in a composite spreading vector that appears to be a zero-mean random sequence to an outside observer.
(213) Note that the FS spreader does not insert a symbol mask into the spreader input signalthe source spreading code takes on the same function as the receive symbol mask in the FS format. This source frequency offset can also be generated using the symbol mask randomization network element shown in
(214) If the baseband source signal contains additional known features, e.g., structural embedding taught in U.S. Pat. No. 7,079,480 or embedded pilot signals taught in U.S. Pat. No. 8,363,744, the entire spreading code vector c.sub.RS(n.sub.frame) can be randomly generated, e.g., using the spreading code randomization network element shown in
(215) The FS downlink spreading operations shown in
(216) Table 2 lists the exemplary uplink (UL) and downlink (DL) parameter values used for deployment of this structure in the 902-928 MHz ISM band using one embodiment, which are further illustrated in
(217) TABLE-US-00002 TABLE 2 Exemplary Uplink and Downlink FS PHY, Transceiver Parameters Parameter UL Value DL Value Comments Subcarriers/symbol (N.sub.sym) 480 symbols 480 symbols Subcarrier separation 800 kHz 800 kHz 1.25 ms FFT duration Symbol cyclic prefix 250 s 250 s 1.5 ms OFDM symbol Equiv. range (4/3 Earth) 75 km 75 km Timing advance unneeded Spread code length (N.sub.chp) 20 chips 6 chips Cyclic chip prefix unneeded Active link duration 30 ms 9 ms Baseband symbol rate (f.sub.sym) 16 symbol/ms 53.33 symbol/ms Guard time, end of link slot 500 s 500 s OFDM bandwidth 384 kHz 384 kHz Allowed FOA uncertainty 50 kHz 50 kHz >50 ppm LO offset, 902- 928 MHz band Hop dwell bandwidth 500 kHz 500 kHz Compliant, FCC 15.247, (a)(1)(ii) Number hop channels 50 channels 50 channels Compliant, FCC 15.247, (a)(1)(ii) Full hop bandwidth 25 MHz 25 MHz Number transmit hops/node 1 hop Tx/SM 1 hop Tx/DAP Compliant, FCC 15.247, (a)(1)(i) Number receive hops/node 50 hop Rx/DAP 1 hop Rx/SM DAP's can receive all UL's TDD slots per frame 100 slots 100 slots 4 second frame length Slot Tx/node each frame 1 100 DAP Tx every slot, SM Tx once per frame Hop rate each slot direction 0.25 hps 25 hps Average time occupancy 6 ms/SM 0.2 ms/DAP Compliant, FCC 15.247, over 10 s (a)(1)(i) Max Tx conducted power 30 dBm (1 W) 30 dBm (1 W) Compliant, FCC 15.247, into ANT (b)(2) Number Tx ANT's 1 ANT 1 ANT SISO links assumed Tx ANT max directivity 6 dBi (4 W EIRP) 6 dBi (4 W EIRP) Compliant, FCC 15.247, (b)(4)
(218) The parameters shown in Table 2 are similar in many respects to those shown in Table 1 for the CPDS spreader, but also possess important differences. In particular, the exemplary FS spreader employs an OFDM baseband modulation format with the same number of subcarriers, cyclic prefix, subcarrier frequency spacing, and baseband information rate on each side of the link, and the exemplary FS spreader does not require timing advancement at the uplink transmitters. This can reduce the complexity of the FS transceivers, as the substantively similar processing hardware and software can be used to implement the FS transmitter and receiver at both ends of the link, and allows the FS transceivers to be used in networks with extreme long range, e.g., airborne and satellite communication networks.
(219) The FS uplink receiver shown in
(220)
comprising the L.sub.port signals that are intended for the uplink receiver over dwell k.sub.dwell and time frame n.sub.frame, and that have been substantively extracted from received environment by the FS despreader; and except for the baseband demodulator that demodulates the resultant substantively extracted baseband signals provided by the despreader. The baseband source signals transmitted from the uplink transmitters must contain sufficient information to remove any ambiguities remaining in the despreader output signals.
(221) Similarly, in another embodiment, the FS downlink receiver shown in
(222)
comprising the L.sub.port signals that are intended for the downlink receiver over time slot n.sub.slot, and that have been substantively extracted from received environment by the FS despreader; and except for the baseband demodulator that demodulates the resultant substantively extracted baseband signals provided by the despreader. The baseband source signals transmitted from the uplink transmitters must contain sufficient information to remove any ambiguities remaining in the despreader output signals.
(223) As shown in
(224)
into N.sub.smpN.sub.chp matrix X.sub.R(n.sub.frame,k.sub.dwell) where N.sub.smp is the number of received baseband samples per chip in the dwell at the demultiplexer output sampling rate, given by
(225)
for general received data sequence
(226)
X.sub.R(n.sub.frame,k.sub.frame)X.sub.R(n.sub.frame,k.sub.frame)diag{c.sub.R*(n.sub.frame,k.sub.frame)}(Eq20) where c.sub.R(n.sub.frame,k.sub.dwell) is the N.sub.chp1 receive spreading code vector over dwell k.sub.dwell and time frame n.sub.frame, and where diag{} is the vector-to-diagonal matrix conversion operation and ()* is the complex conjugation operation. Compute N.sub.smpL.sub.port despread baseband signal matrix Y.sub.R(n.sub.frame,k.sub.dwell), using linear signal separation algorithm
Y.sub.R(n.sub.frame,k.sub.dwell=X.sub.R(n.sub.frame,k.sub.frame)W.sub.R(n.sub.frame,k.sub.dwell),(Eq21) where W.sub.R(n.sub.frame,k.sub.dwell) is an N.sub.chpL.sub.port linear combining matrix. Convert the despread baseband signal matrix Y.sub.R ((n.sub.frame, k.sub.dwell) back to a sequence of 1L.sub.port despread baseband signal vectors
(227)
by applying an N.sub.smp:1 parallel-to-series (P/S) conversion operation to each row of Y.sub.R(n.sub.frame,k.sub.dwell).
(228) In one embodiment, the despreading operations performed in the downlink FS despreader, shown in
(229) If the baseband signal sequence possesses structure that can be exploited in an adaptation algorithm, then the CPDS adaptation procedure shown in
(230) If the spreading code is known except for an unknown frequency offset, then unstructured parameter estimation techniques that are well-known in the art, such as Multiple Signal Classification (MUSIC), can be used to detect and determine the frequency offset of every signal using the known receive spreading code, and equally well-known methods such as linearly-constrained power minimization (LCPM) can be used to develop linear combiner weights that can extract those signals from the received environment.
(231) If the spreading code length N.sub.chp is much larger than the number of signals impinging on the receiver, e.g., at the downlink receiver in the exemplary environment, or in extreme long-range communication scenarios where the spreading gain of the modulation format is being used to raise the signal-to-noise ratio (SNR) of the signal above a thermal noise floor, then alternative methods that exploit the duality of the FS and MOS-DSSS spreading methods can be used to jointly detect and estimate signals using the known receive spreading code using an FFT-LS algorithm applied over a subset of the baseband signal samples. In this case, the receive spreading gain is treated as the signal, and the baseband signal samples are treated as the spreading code for purposes of signal detection and frequency offset estimation. Once this step has been accomplished, then the true linear combiner weights W.sub.R(n.sub.frame,k.sub.dwell) can be constructed using an LCPM algorithm for each of the detected signals.
(232) The extension of alternate FS spreading methods to transceivers employing polarization/spatial diverse multielement antenna arrays, and to macrodiverse reception methods, is straightforward. The FS method should be especially well suited to strongly-macrodiverse networks, as the LCPM algorithm is not dependent on the time-bandwidth produce of the baseband.
(233) In yet a further embodiment, the network selects a particular implementation based on its strategic value, which is strongly influenced by the desired tradeoff between Grade of Service (GoS) and the required Codec SINR (signal-to-interference-and-noise ratio). If the network is using a fully-blind, least-squares despreader, then between 10.5 dB and 15 dB required SINR, the performance change shifts; below that noise level the GoS rises as the number of hop channels decrease, so the best strategy is to minimize hops, which means spreading has a strong benefit. However, around 12-13 dB required SINR a crossover effect is experienced, after which the GoS drops as the number of hop channels decrease, so the best strategy then becomes to maximise hops, which means there is no experienced benefit without scheduling. (This may be changed if the signalers are not experiencing the 1 bit/symbol Shannon limit of transmission capacity.) If, however, the network is using a Matched-Filter despreader (MF), the changeover point is significantly different; it occurs nearly at 0 dB require SINR. Under these conditions an 8.6 dB Forward Error Correction (FEC) coding gain (0.5 dB codec input SINR) is required before any ad hoc MF spreading provides a benefit; while above this, there is no benefit to any MF spreading without FEC (so again, scheduling is required). An FEC can be part of an error detection/correction decoder for a coded communication system in which information bits are encoded with redundant parity bits at the transmitter, which are then used to detect and (more typically) correct for errors in the received bits or signal.
(234) In one embodiment, the present description assumes the code generation process is the result of the hardware on which the method is effected performing operations outside the scope of the invention, in order to add bits to the input information stream that can be used to detect packet errors, and to correct for such errors if possible in the Symbol demodulator, which is also outside scope of the invention. The invention does not necessarily enhance this process beyond the means for doing so which are obvious extensions of the approach to those experienced and skilled in the field(s) of this invention, but can allow such enhancements to be added or incorporated.
(235) In another embodiment, one possible feature of the present description is that it provides a useable base on which further enhancements can be more effectively deployed. One such specific further enhancement is the use of macrodiverse solutions, particularly for the CPDS; and a further sub-enhancement of that therein is a weakly macrodiverse solution where the SM can be demodulated at any DAP to provide later signal improvement.
(236) Additionally, in one embodiment, another possible feature of the present description is that its use of a blind despreading algorithm renders the network's communications interference-excising, creates far greater tolerance, and operates in conditions of greater variability of transmit power ranges. Additionally, because the transmissions are open loop (no requirement for a return ack or handshake) both power management and signal feedback overheads are greatly simplified or reduced.
(237) Still yet, in another embodiment, one possible feature of the present description is that its flexible incorporation of CPDS cyclic prefixes at the symbol and chip level, and its instantiation over discrete time-frequency dwells, either with fixed time framing, or with ad hoc time slotting, allow it to be deployed over a wide range of frequency bands, and over a wider range of network topologies, transmission ranges, and use scenarios. While the parameters given in Table 1 for one embodiment have been chosen to provide full compliance with FCC 15.247 requirements for intentional radiators in that band, and for point-to-multipoint cellular network topologies, long-range transmissions, and Smart Grid use scenarios, it should be recognized that the embodiments in the present description can be applied to: other frequency bands, including ISM bands currently used for 802.11 wireless local area networks (WLAN's), 802.15 wireless personal area networks (WPAN's), or cellular telephony networks, or very low frequency bands used for near-field communications (NFC); White Spaces deployments where frequency channels are dynamically and potentially noncontiguously allocated based on spectrum availability in different geographical areas; other network topologies, including ad hoc point-to-point topologies, and mesh network topologies; other transmission ranges, including extremely short ranges consistent with WPAN's and NFC links; other M2M use scenarios, including RFID, short-range medical networks, embedded automotive networks, point-of-sale financial transaction networks, and so on; and heterogeneous cognitive networks where the modulation format is software defined and reformatted on a dynamic basis for different topologies and use scenarios;
(238) In one embodiment, the alternate frame synchronous embodiment further enhances flexibility of the embodiments in the present description, by allowing the invention to be applied over extreme long ranges, e.g., consistent with airborne and satellite communication networks, and by allowing the invention to be used with, or overlayed on top of, transceivers employing arbitrary baseband modulation formats, e.g., LTE communication networks.
(239) In another embodiment of this invention, a further possible feature of the embodiments in the present description is that networks may be formed comprising devices capable of playing different roles, so any device may be serving as at least one Signaling Machine (SM) and any other device may be serving (at the same time) as one Data Aggregation Point (DAP). This is possible with each device comprising at least one antenna and one transceiver for exchanging wireless transmissions. In this embodiment the method will be comprising: incorporating into each transmission at each transceiver a Cyclic-prefix Direct-Sequence (CPDS) differentiator for that transmission with time-channelized despreading; fitting each transmission into a series of frames of Upload Transmissions (UpLink)) and Download Transmissions (DownLink); transmitting from any device on any UpLink; and, transmitting from any device on any DownLink.
(240) Any specific subset of the method may be effected through any combination of hardware and software elements. Hardware elements already well-known and standard to the state of the are include a wide range of Central Processing Units (CPUs), Linear Processing Units (LPUs), Vector Processing Units (VPUs), and Signal Processing Units (SPUs), which in turn may comprise single, dual, quad, or higher combinations of lesser such elements. Hardware elements also include both programmable and re-programmable floating-point gate arrays (FPGAs), application-specific integrated circuits (ASICs), programmable read-only memory (PROM) units, eraseable-and-programmable read-only memory (EPROM) units, and electronically eraseable-and-programmable read-only memory (EEPROM) units. The conversion between digital and analog, and analog and digital, representations may be through DAC/ADC chips, circuitry, or other transformational means incorporating both hardware (transceivers, processors) and software elements. Accordingly all elements disclosed in the present description must be understood as being capable of being effected in a hardware-only, physically transforming device. However, as no human has either a radio (or other electromagnetic) transceiver capabilities, or the capabilities of any of the speed, precision and capacity of perception, comprehension, memorization, and continuing real-time transformation of such signals as required to effect embodiments in the present description, even though some elements may be incorporated in software, and the method as a whole can be abstractly comprehended by an individual human being, the method cannot be effected by any human being without direct, physical, and continuing assistance by an external device. Therefore the present description incorporates all existing and yet-to-be-devised hardware elements which instantiate and process the digital signals using the method herein, known to the present state of the art or effected as functional equivalents to the methods and techniques disclosed herein.
(241) Some of the above-described functions may be composed of instructions, or depend upon and use data, that are stored on storage media (e.g., computer-readable medium). The instructions and/or data may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the embodiments in the present description; and the data is used when it forms part of any instruction or result therefrom.
(242) The terms computer-readable storage medium and computer-readable storage media as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile (also known as static or long-term) media, volatile media and transmission media. Non-volatile media include, for example, one or more optical or magnetic disks, such as a fixed disk, or a hard drive. Volatile media include dynamic memory, such as system RAM or transmission or bus buffers. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes.
(243) Memory, as used herein when referencing to computers, is the functional hardware that for the period of use retains a specific structure which can be and is used by the computer to represent the coding, whether data or instruction, which the computer uses to perform its function. Memory thus can be volatile or static, and be any of a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read data, instructions, or both.
(244) I/O, or input/output, is any means whereby the computer can exchange information with the world external to the computer. This can include a wired, wireless, acoustic, infrared, or other communications link (including specifically voice or data telephony); a keyboard, tablet, camera, video input, audio input, pen, or other sensor; and a display (2D or 3D, plasma, LED, CRT, tactile, or audio). That which allows another device, or a human, to interact with and exchange data with, or control and command, a computer, is an I/O device, without which any computer (or human) is essentially in a solipsitic state.
(245) The above description of the invention is illustrative and not restrictive. Many variations of the disclosed embodiments may become apparent to those of skill in the art upon review of this disclosure. The scope of the embodiments of the present description should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
(246) While the present description has been described chiefly in connection with one embodiment, these descriptions are not intended to limit the scope of any of the embodiments to the particular forms (whether elements of any device or architecture, or steps of any method) set forth herein. It will be further understood that the elements or methods of the disclosed embodiments are not necessarily limited to the discrete elements or steps, or the precise connectivity of the elements or order of the steps described, particularly where elements or steps which are part of the prior art are not referenced (and are not claimed). To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the embodiments in the present description as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art.