Processing

Please wait...

Settings

Settings

Goto Application

1. US20120174187 - SYSTEMS AND METHODS FOR PROVIDING PHYSICAL LAYER SECURITY

Office United States of America
Application Number 13382715
Application Date 09.07.2010
Publication Number 20120174187
Publication Date 05.07.2012
Publication Kind A1
IPC
G06F 21/00
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
CPC
H04K 1/00
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
1Secret communication
H04B 17/309
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
BTRANSMISSION
17Monitoring; Testing
30of propagation channels
309Measuring or estimating channel quality parameters
H04K 3/827
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
3Jamming of communication; Counter-measures
80Jamming or countermeasure characterized by its function
82related to preventing surveillance, interception or detection
827using characteristics of target signal or of transmission
Applicants Argon Cenk
Mclaughlin Steven William
Kling Demijan
Inventors Argon Cenk
Mclaughlin Steven William
Kling Demijan
Title
(EN) SYSTEMS AND METHODS FOR PROVIDING PHYSICAL LAYER SECURITY
Abstract
(EN)

The present invention describes systems and methods for providing physical layer security. An exemplary embodiment of the present invention provides a method of providing physical layer security involving receiving message data at a pre-processing device in a wireless transmission device. Furthermore, the method of providing physical layer security involves pre-processing the message data into channel data with the pre-processing device and transmitting the channel data from the wireless transmission device over a wireless transmission link having a path loss. Subsequently, the method of providing physical layer security involves receiving the channel data at a post-processing module in a reception device. Additionally, the method involves post-processing the channel data into the message data with the post-processing module, such that an unauthorized reception device is unable to post-process the channel data when a path loss experienced over the transmission link is greater than a predetermined value.

Also published as