Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ANTENNA SYSTEM AND METHOD FOR FULL DUPLEX WIRELESS TRANSMISSION WITH CHANNEL PHASE-BASED ENCRYPTION
Document Type and Number:
WIPO Patent Application WO/2015/023801
Kind Code:
A1
Abstract:
An antenna assembly includes a first active antenna element and a second active antenna element, each of which may be a dipole. A first set of independently-switchable radio-frequency reflectors are positioned around at least the first active antenna element. These first switchable radio-frequency reflectors may also be positioned around the second active antenna element. Alternatively, a second set of independently-switchable radio-frequency reflectors may be positioned around the second active antenna element. The switchable reflectors enable controlled perturbation of the communication channel between the antenna assembly and a remote communications node, enabling securely encrypted communications.

Inventors:
KHANDANI AMIR (CA)
Application Number:
PCT/US2014/050968
Publication Date:
February 19, 2015
Filing Date:
August 13, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KHANDANI AMIR (CA)
INV MINE LLC (US)
International Classes:
H01Q9/00; H01Q15/14; H04L9/00
Foreign References:
KR20120080231A2012-07-16
KR20070072629A2007-07-04
KR20040096404A2004-11-16
JPH10502220A1998-02-24
Other References:
See also references of EP 3033806A4
Attorney, Agent or Firm:
IRVINE, Robert (200 S. Wacker DriveSuite 310, Chicago Illinois, US)
Download PDF:
Claims:
CLAIMS

1. An apparatus comprising:

a first active antenna element having a propagation characteristic;

a plurality of radio-frequency reflectors positioned around the first active antenna element;

a plurality of switchable radio-frequency refiectors positioned around the first active antenna element configured to perturb the propagation characteristic.

2. The apparatus of claim 1, wherein each of the plurality of switchable radio -frequency reflectors comprises an array of interconnected conductive elements, the conductive elements interconnected by one or more radio-frequency switches.

3. The apparatus of claim 2 wherein each of the interconnected conductive elements are planar conductive elements.

4. The apparatus of claim 2, wherein each array is a one-dimensional array having the conductive elements serially connected by the radio-frequency switches.

5. The apparatus of claim 2, wherein the radio-frequency switches are PIN diodes.

6. The apparatus of claim 1 wherein the first active antenna element is a dipole antenna.

7. The apparatus of claim 1 wherein the first plurality of switchable radio-frequency reflectors is arranged in a substantially cylindrical array around the first active antenna element.

8. The apparatus of claim 1, wherein ones of the plurality of radio-frequency reflectors are positioned in an interleaved configuration with respect to ones of the plurality of switchable radio-frequency refiectors.

9. The apparatus of claim 1 wherein the plurality of radio-frequency reflectors positioned around the first active antenna element are positioned at a first radial distance from the first active antenna element and the plurality of switchable radio-frequency reflectors are positioned at a second radial distance from the first active antenna element.

10. The apparatus of claim 1, further comprising a second active antenna element, positioned within the plurality of radio-frequency reflectors and the plurality of switchable radio-frequency reflectors.

11. The apparatus of claim 1 , further comprising a propagation perturbation control circuit connected to the plurality of switchable radio-frequency reflectors.

12. The apparatus of claim 11, wherein the propagation perturbation control circuit is configured to selectively apply a voltage across ones of the switchable radio-frequency reflectors.

13. An antenna assembly comprising:

a first active antenna element;

a first plurality of switchable radio-frequency reflectors positioned around at least the first active antenna element;

a second active antenna element;

a transceiver including transmit circuitry and receive circuitry; and

a crossbar switch selectable between:

a first state in which the crossbar switch connects the first active antenna element to the transmit circuitry and the second active antenna element to the receive circuitry; and

a second state in which the crossbar switch connects the first active antenna element to the receive circuitry and the second active antenna element to the transmit circuitry.

14. The antenna assembly of claim 13, wherein the first plurality of switchable radio-frequency reflectors is positioned only around the first active antenna element.

15. The antenna assembly of claim 14, further comprising a second plurality of switchable radio- frequency reflectors positioned around the second active antenna element.

16. The antenna assembly of claim 13, wherein the first plurality of switchable radio-frequency reflectors is positioned around both the first active antenna element and the second active antenna element.

17. The antenna assembly of claim 13, wherein the first and second active antenna elements are dipole antennas.

18. The antenna assembly of claim 13 wherein each of the switchable radio-frequency reflectors includes a plurality of conductive segments connected by one or more switching components.

19. A method comprising:

transmitting from a first device to a second device, a first signal using a first active antenna element;

receiving at the first device, a second signal using a second active antenna element, the second signal generated by the second device in response to receiving the first signal;

measuring at the first device a channel phase value based on a phase difference between the first signal and the second signal;

receiving at the first device a third signal using the first active antenna element, the third signal generated by the second device;

transmitting from the first device to the second device, a fourth signal using the second active antenna element, the fourth signal generated based on the received third signal.

20. The method of claim 19, wherein receiving the third signal comprises demodulating the first incoming signal to generate a first demodulated signal, and wherein transmitting the fourth signal comprises re-modulating the first demodulated signal to generate the fourth signal.

Description:
Antenna System and Method for Full Duplex Wireless Transmission with Channel Phase-Based

Encryption

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] The present application claims priority under 35 U.S.C. §119(e) of U.S. Provisional Patent Application Serial No. 61/865,221 , filed Aug. 13, 2013 and of U.S. Provisional Patent Application Serial No. 61/885,603, filed October 2, 2013. The above-listed provisional applications are incorporated herein by reference in their entirety.

[0002] The present application is also related to U.S. Patent Application Serial No.

13/893,288, filed May 13, 2013, entitled Full Duplex Wireless Transmission with Self- Interference Cancellation; U.S. Patent Application Serial No. 13/893,296, filed May 13, 2013, entitled Wireless Transmission with Channel State Perturbation; and U.S. Patent Application Serial No. 13/893,297, filed May 13, 2013, entitled Full Duplex Wireless Transmission with Channel Phase-Based Encryption. Each of the foregoing non-provisional applications claims priority of U.S. Provisional Patent Application Serial No. 61/646,312, filed May 13, 2012, and of U.S. Patent Application Serial No. 61/771 ,815, filed March 2, 2013. The above-listed provisional and non-provisional applications are incorporated herein by reference in their entirety.

FIELD

[0003] The present disclosure relates to security in wireless communications. In particular, the present disclosure relates to systems and methods to use a two-way (full-duplex) link to establish a secret key, or to enhance the security.

BACKGROUND OF THE INVENTION

[0004] Full-duplex communications is used in many telecommunications technologies, e.g., ordinary wired telephones, Digital Subscriber Line (DSL), wireless with directional antennas, free space optics, and fiber optics. The impact of full-duplex links in these earlier applications is limited to doubling the rate by providing two symmetrical pipes of data flowing in opposite directions. This affects the point-to-point throughput with no direct impact on networking and security issues. In contrast, in multi-user wireless systems, due to the nature of transmission that everyone hears everyone else, security protocols are needed to access the public channels. [0005] Although full-duplex is currently used for example in wireless systems with highly directional antennas or free space optics, the underlying full-duplex radios are essentially nothing but two independent half-duplex systems separated in space. In fact, the general two-way channel is very difficult to realize in wireless communications due to excessive amounts of self- interference, i.e., the interference each transmitter generates for the receiver(s) in the same node.

[0006] Other prior art techniques to provide a type communication system that might be referred to as full-duplex are really frequency division duplex (FDD), where separate frequency ranges are used in the transmit and receive (uplink/downlink) directions. As used herein, however, the term full-duplex is intended to refer to simultaneous transmission and reception of signals within the same frequency band.

[0007] Current wireless systems are one-way and rely on either separate time slots (Time Division Duplex) or separate frequency bands (Frequency Division Duplex) to transmit and to receive. These alternatives have their relative pros and cons, but both suffer from lack of ability to transmit and to receive simultaneously and over the entire frequency band. Even in the context of Orthogonal Frequency Division Multiple Access (OFDM A), where different frequency tones are used to simultaneously service multiple users, there is no method known to use the tones in opposite directions. A similar shortcoming exists in the context of Code Division Multiple Access (CDMA) where different codes are used to separate users. It is well known that two-way wireless is theoretically possible, but it is widely believed to be difficult to implement due to a potentially large amount of interference, called self-interference, between transmit and receive chains of the same node.

SUMMARY

[0008] An antenna apparatus includes a first active antenna element having a propagation characteristic. The first active antenna element may be a dipole antenna. A plurality of radio- frequency reflectors are positioned around the first active antenna element. A plurality of switchable radio-frequency reflectors positioned around the first active antenna element and are configured to perturb the propagation characteristic. In some embodiments, each of the plurality of switchable radio-frequency reflectors includes an array of interconnected conductive elements, where the conductive elements are interconnected by one or more radio-frequency switches. The interconnected conductive elements may be planar conductive elements.

[0009] In some embodiments, the array of interconnected conductive elements is a one- dimensional array having the conductive elements serially connected by the radio-frequency switches. The radio-frequency switches may be PIN diodes. The first plurality of switchable radio-frequency refiectors may be arranged in a substantially cylindrical array around the first active antenna element.

[0010] In some embodiments, at least some of the plurality of radio-frequency reflectors are be positioned in an interleaved configuration with respect to ones of the plurality of switchable radio-frequency refiectors. The plurality of radio-frequency reflectors positioned around the first active antenna element may be positioned at a first radial distance from the first active antenna element, and the plurality of switchable radio-frequency refiectors may be positioned at a second radial distance from the first active antenna element.

[0011] The antenna apparatus may further include a second active antenna element, positioned within the plurality of radio-frequency refiectors and the plurality of switchable radio-frequency reflectors.

[0012] In some embodiments, a propagation perturbation control circuit is connected to the plurality of switchable radio-frequency reflectors. The propagation perturbation control circuit may be configured to selectively apply a voltage across ones of the switchable radio-frequency reflectors.

[0013] In another embodiment, an antenna assembly includes a first active antenna element and a first plurality of switchable radio -frequency reflectors positioned around at least the first active antenna element. In this embodiment the assembly further includes a second active antenna element. The first and second active antenna elements may be dipole antennas. A transceiver is provided including transmit circuitry and receive circuitry. The assembly further includes a crossbar switch selectable between (1) a first state in which the crossbar switch connects the first active antenna element to the transmit circuitry and the second active antenna element to the receive circuitry; and (2) a second state in which the crossbar switch connects the first active antenna element to the receive circuitry and the second active antenna element to the transmit circuitry. Each of the switchable radio-frequency reflectors may include a plurality of conductive segments connected by one or more switching components.

[0014] In a further embodiment, the first plurality of switchable radio-frequency refiectors is positioned only around the first active antenna element. In such an embodiment, there may be a second plurality of switchable radio-frequency reflectors positioned around the second active antenna element. [0015] In an alternative embodiment, the first plurality of switchable radio-frequency reflectors is positioned around both the first active antenna element and the second active antenna element.

[0016] A method according to some embodiments includes transmitting, from a first device to a second device, a first signal using a first active antenna element. A second signal is received at the first device using a second active antenna element, where the second signal is generated by the second device in response to receiving the first signal. The method further includes measuring at the first device a channel phase value based on a phase difference between the first signal and the second signal. The first device receives a third signal using the first active antenna element, where the third signal is generated by the second device. A fourth signal is transmitted from the first device to the second device using the second active antenna element, where the fourth signal generated based on the received third signal.

[0017] In some embodiments, receiving the third signal includes demodulating the first incoming signal to generate a first demodulated signal, and transmitting the fourth signal includes re-modulating the first demodulated signal to generate the fourth signal.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

[0018] The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed

description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.

[0019] FIG. 1 is a block diagram of a wireless communication system in accordance with some embodiments.

[0020] FIG. 2 depicts a phase masking operation.

[0021] FIG. 3 is a channel diagram of full-duplex transceivers in accordance with some embodiments.

[0022] FIG. 4 is a channel diagram of full-duplex transceivers in accordance with some alternative embodiments.

[0023] FIG. 5 shows schematic views of a first method for key exchange using channel reciprocity and thereby providing symmetry in the end-to-end 4-port network.

[0024] FIG. 6 shows a second method for key exchange, wherein eavesdropper in total listens to four transmissions, but also adds four unknowns (e.g. channel phase to their receive antenna(s)) and consequently cannot extract any useful information from such measurements.

[0025] FIGs. 7 and 8 show schematic views of a third method for key exchange based on cancelling self-interference and thereby providing symmetry in the end-to-end 4-port network;

[0026] FIG. 9 shows a pictorial view for a first example of an RF-mirror used to reflect RF signals, in part, with methods for adjusting the level of reflection, i.e., tunable RF-mirror.

[0027] FIG. 10 shows pictorial views for a second example of a tunable RF-mirror.

[0028] FIG. 11 shows pictorial view for a third example of an on-off RF-mirror.

[0029] FIG. 12 shows a pictorial view for two examples of tunable RF chamber surrounding transmits and/or receive antenna.

[0030] FIG. 13 shows pictorial view for a high level description for cascading several analog interference cancellation stages. [0031] FIG. 14 shows a more detailed view for cascading several analog interference cancellation stages.

[0032] FIG. 15 shows that, to reduce delay, the cascaded analog interference cancellations can be implemented in the time domain, wherein underlying filter structures can be computed by training in the frequency domain.

[0033] FIGs. 16 and 17 are block diagram of another embodiment of a self-cancellation full- duplex transceiver.

[0034] FIG. 18 shows the flow chart for the training to compute the filters used in the cascaded analog interference cancellation scheme.

[0035] FIG. 19 is a schematic diagram illustrating an antenna surrounded by objects with tunable RF properties.

[0036] FIGs. 20-23 show isometric views of pair- wise symmetrical antennas.

[0037] FIGs. 24-25 show a pictorial view of triple- wise symmetrical antenna structures.

[0038] FIGs. 26-28 show examples of MIMO antenna structures in 3-dimensional space.

[0039] FIG. 29 shows an example for the placement of one antenna set in the plane of symmetry of some other antenna(s) to support MIMO in 2-dimensions.

[0040] FIGs. 30-32 show examples of some antenna structures showing that the coupling between antennas can be very strong (-2dB) due to near field signals unless it is cancelled relying on pair- wise symmetry.

[0041] FIGs. 33 and 34 show numerical results (2.4Ghz band using HFSS) for one example of modifying the shape of the antenna.

[0042] FIGs. 35 and 36 show a schematic view of two pair- wise symmetrical antennas.

[0043] FIG. 37 is a schematic perspective view of an antenna assembly according to some embodiments.

[0044] FIG. 38 is a schematic perspective view of an antenna assembly according to some embodiments.

[0045] FIG. 39 is a schematic perspective view of an antenna assembly according to some embodiments. [0046] FIG. 40 is a schematic block diagram of an antenna assembly connected to a transceiver.

[0047] FIG. 41 is a flow chart illustrating an exemplary method of operating an antenna assembly according to some embodiments.

[0048] FIG. 42 is a schematic illustration of an antenna assembly in accordance with some embodiments.

[0049] FIG. 43 is a schematic illustration of an antenna assembly in accordance with some embodiments.

[0050] FIG. 44 is a schematic illustration of a wall component in an antenna assembly in accordance with some embodiments.

[0051] Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.

[0052] The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.

DETAILED DESCRIPTION OF THE INVENTION

[0053] Methods based on using a secret key for only time, known as one-time pad, are proven to be theoretically secure. Wireless channel between two nodes A, B is reciprocal, which means it is the same from A- B and from B- A. The phase of the channel between A and B has a uniform distribution, which means it is completely unknown. A method herein uses the phase of the channel between A and B as a source of common randomness between A and B to completely mask a Phase Shift Keying (PSK) modulation. To avoid leakage of secrecy to any eavesdropper, there should be only a single transmission by each of the legitimate units towards measuring the common phase value at the two ends. In addition, the radio channel changes very slowly over time, which makes it difficult to extract several of such common phase values. Embodiments described herein disclose methods based on a two-way link to overcome these bottlenecks.

[0054] Traditionally, wireless radios are considered to be inherently insecure as the signal transmitted by any given unit can be freely heard by eavesdroppers. This issue is due to the broadcast nature of wireless transmission. However, the same broadcast nature of wireless systems can contribute to enhancing security if nodes rely on two-way links. In this case, eavesdroppers hear the combination of the two signals transmitted by the two parties involved in a connection. Described herein are methods to enhance and benefit from this feature towards improving security.

[0055] Although embodiments herein are explained in terms of using OFDM for channel equalization similar concepts are applicable to other means of signal equalization such as time domain equalization, pre-coding plus time domain equalization and time domain signaling with frequency domain equalization.

[0056] As shown in FIG. 1 , the system 10 includes a user A (Alice) 16 communicating with user B (Bob 26) by way of wireless medium 12. In addition, each user (or either one) is able to alter the wireless channel characteristics using various antenna configurations, including configurable reflectors, etc, shown by 14 and 24. The users A and B each measure a round trip phase value Φ associated with the channel that is unique to their round trip transmission path 22, 28. An eavesdropper 20 may overhear the transmissions, but it will be through a different channel through medium 18.

[0057] In certain embodiments herein, security enhancements are provided. In a full-duplex communication link, modulo 2π addition of phase values occurring naturally in wireless wave propagation are used to mask several bits using Phase Shift Keying (PSK) modulation. A shared key is generated: in one symbol transmission, two nodes communicate one phase value using the channel between them. The exchange is repeated following a change in the channel for several rounds to generate several common phase values with which to define a sufficient key. Changes in the overall RF channel are achieved by perturbing RF properties of the environment close to transmit and/or receive antennas. In particular, RF mirrors may be used to change the path for the RF signal propagation. Having N such mirrors enables to extract 2 N phase values. This is in contrast to an NxN MIMO system, which has only N 2 degrees of freedom. Once enough number of common phase values are extracted, the channel is not changed any longer. The extracted phase values are used to encrypt a key with PSK modulation. Small discrepancies between the respective masks (phase values) at the transmitter and receiver are corrected through the underlying channel code. Key generation examples are provided. In one embodiment, antenna structures are connected to both transmit and receive chains (i.e. to transmit in one interval and receive in another) and in another embodiment, corrective signal injection is used to cancel self- interference and such that antenna structures need not be connected to both transmit and receive chains. Further operations may be performed to further enhance the security. This includes using the methods described herein as an enhancement to conventional methods of cryptography, or as a tool to enhance and realize information theoretical security.

[0058] A common method in security is based on bit-wise masking (modulo 2 addition) of a key (sequence of bits) with the message to be transmitted, which can be easily reversed if the two parties have access to a common key. The only provably secure system is the so-called Vernam Cipher, which is based on using such a key only once. Teachings herein observe and exploit the point that an operation similar to bit masking (binary addition modulo two, or XOR) occurs naturally in RF transmission in the sense that the received phase is the sum (modulo 2π) of the transmitted phase and the channel phase. If (T,C,R) are terms in such a modulo addition, i.e., R=T+C (modulo 2π), then it follows that R provides zero information about T unless C is known. Motivated by this observation, phase values can be shared between legitimate parties (as a source of common randomness) to mask phase-modulated signals. The challenge is to provide the legitimate parties with new keys while relying on the same insecure and erroneous wireless channel that exists between them.

[0059] To provide the legitimate units with such common random phase values (without the need for a public channel), methods are disclosed that utilize full-duplex links as a building block. To generate several phase values, the radio channel is intentionally perturbed after extracting a common phase value to create a fresh link towards extracting new common phase values. As legitimate units use the common phase values to mask their transmitted phase- modulated signals, then possible errors between the two keys can be compensated as part of channel coding. This is in contrast to information theoretic security that imposes strict requirements on channels, in the sense that either: 1) the channel of the eavesdropper should be inferior to the channel of the legitimate node, or 2) they require a public channel. It should be added that public channel in the language of security means a channel that is not secure in the sense that all parties can access all the data transmitted over such a channel.

[0060] With reference to FIG. 2, a conventional Vernam Cipher is based on having a mask like Z which is known at the two legitimate parties and the message X is added modulo two (XOR) to the mask Z, and this XOR operation can be reversed at the receiver end by using the same mask. In embodiments described herein: i) module 2 addition can be generalized to 2π addition of phase values, while maintaining similar independence and security properties, ii) modulo 2π addition of phase values occurs naturally as the wireless wave propagates, and consequently, it can be used to mask several bits using Phase Shift Keying (PSK) modulation. In this case, any eavesdropper will hear the PSK symbol with a different mask phase that is due to a different channel, namely the channel between transmitter and eavesdropper. Each eavesdropper antenna results in a new observation, but also introduces a new phase mask which is again uniform between zero to 2π and masks the information embedded in the transmit phase. As a result, an eavesdropper will not be able to extract any useful information, regardless of its signal-to-noise ratio and number of antennas.

[0061] An obstacle in some prior art techniques in exploiting common randomness to generate a shared key is to find a method to deal with possible errors in the shared values and consolidate the corresponding information to a smaller piece without error. In the embodiments described herein, the masks at the transmitter and at the receiver do not need to be exactly the same as small discrepancies between them can be corrected relying on the underlying channel code.

[0062] Symmetrical antenna structures and multiple stages of canceling self-interference are used to reduce the coupling between transmit and receive chain.

[0063] To further reduce the self-interference in the analog domain prior to A/D, a secondary (corrective) signal is constructed using the primary transmit signal and instantaneous

measurement of the self-interference channel, which is subtracted (in analog domain) from the incoming signal prior to A/D. This can be achieved by using multiple, in particular two, transmit antennas with proper beam- forming weights such that their signals are subtracted in the air at the receive antenna. The antenna used to transmit the corrective signal can be a fully functional transmit antenna (similar to the other antenna used in the transmission) in the sense that it is connected to a power amplifier and has a low coupling with the corresponding receive antenna.

[0064] An alternative is to use an antenna which is designed exclusively for the purpose of self-interference cancellation and consequently has a high coupling to the receive antenna and can transmit with a low power. A different approach is based on subtracting such a corrective signal in the receive chain prior to A/D using methods for RF signal combing, and in particular an RF coupler, which is an operation readily performed in the transmit chain of conventional radio systems. In one aspect, the cancellation in analog domain due to the corrective signal is performed prior to Low-Noise-Amplifier (LNA). In another aspect, this is done after the LNA, and before the A/D. Cancellation of self-interference stage can be further enhanced by a subsequent digital cancellation at the receive base-band. Generalization to MIMO will be clear to those skilled in the area. Regardless of which of the above methods for active cancelation are used, the corresponding weights may be referred to as the self-cancellation beam-forming coefficients.

[0065] To further reduce the self-interference, apparatuses and methods include embodiments for cascading multiple analog cancellation stages as explained above, equipped with a disclosed training procedure.

[0066] There are also many works on using channel reciprocity as a source of common randomness in conjunction with information theoretic approaches for key generation. However, these other works are not able to exploit security advantages offered by the channel phase due to the lack of access to a stable and secure phase reference between legitimate parties. Methods described herein for full-duplex communications provide the basis to extract such a common phase reference without disclosing useful information to a potential eavesdropper.

[0067] A full-duplex link may be useful to provide security enhancement. Traditionally, wireless radios are considered to be inherently insecure as the signal transmitted by any given unit can be freely heard by eavesdropper(s). This issue is due to the broadcast nature of wireless transmission. On the contrary, the same broadcast nature of wireless systems can contribute to enhancing security if nodes utilize full-duplex links. In this case, eavesdroppers hear the combination of the two signals transmitted by the two parties involved in a connection. In the language of Information Theory, this means eavesdropper sees a multiple access channel, and consequently faces a more challenging situation in decoding and extracting useful information.

[0068] In addition, methods described herein introduce further ambiguity in time and frequency synchronization to make it harder for the eavesdropper to perform successful decoding in the underlying multiple access channel. Wireless nodes usually rely on sending a periodic preamble to initiate the link. This periodicity is exploited by a receiving end to establish time/frequency synchronization. In the case of full-duplex radios, both nodes involved in a point- to-point two-way transmission can simultaneously send such a periodic preamble, which in turn, due to the linearity of the underlying channels, results in a combined periodic signal at an eavesdropper. This makes is more difficult for an eavesdropper to form the above-mentioned multiple access channel and perform joint decoding or successive decoding. In this case, legitimate units may intentionally introduce a randomly varying offset in their frequency, which can be tracked by their intended receiver while making eavesdropping more difficult.

[0069] Methods of the key agreement protocols described herein, and devices configured to implement them, utilize the ability to change the transmission channel. This can be achieved by changing the propagation environment around transmit and/or received antennas, for example though changing the reflections of the Radio Frequency (RF) signal from near-by objects, or changing other RF characteristics of the environment with particular emphasis on varying the phase, and/or polarization. In the literature of RF beam-forming, there have been several different alternatives proposed to steer the antenna beam and some of these methods are based on changing the channel and consequently are applicable in this new context. On the other hand, unlike these earlier works reported in the context of beam-forming, there is no interest in creating a pattern for flow of RF energy (antenna pattern, or antenna beam), nor in the ability to move such a pattern in a controlled manner (beam steering).

[0070] The methods described herein create multiple (preferably) independent options for the underlying multi-path channel. This is significantly easier as compared to traditional antenna beam-forming as in a rich scattering environment, a small perturbation in the channel interacts with many reflections from the surrounding environment and thereby results in a significant change. In other words, a transmission channel in a rich scattering environment has many stable states (depending on the details of the propagation environment) and the system jumps from one such stable state to a totally different one with slightest change in the propagation environment. As an example, if there are M reflectors that could be individually turned on/off (i.e.,

mirror/transparent states), we could create in total 2 M possibilities for the channel (could be specified by an -bit index and capable of carrying bits of data in media-based setup). This mirror/transparent states can be realized using plasmas, inducing charge in semi-conductors, or mechanical movements, e.g., using Micro-Electro-Mechanical systems (MEMS).

[0071] Note that without a full-duplex link, it would not be possible to use the phase as a source of providing security. In particular, when the transmitter and the receiver are far from each other, it would be very difficult to use the same wireless channel that is between them to agree on a common phase value without disclosing relevant information to eavesdropper. The reason is that measured phase depends on the time of transmit/receive, and even imperfections like frequency offset can cause large variations in phase. In other words, in ordinary point-to- point communication based on one-way transmission, phase is defined relative to some preamble, which is extracted locally at each unit. Full-duplex makes it possible to establish a global reference of phase between legitimate units.

[0072] There are some prior works aiming to use channel reciprocity to create keys for security. These earlier works differ in the following ways: 1) They rely on channel magnitude which has a probability distribution that makes it relatively easy to guess. 2) They do not rely on masking through phase addition in the channel. 3) They do not change the channel from transmission to transmission to enable generating new keys. Indeed, to produce larger keys in these earlier setups, it has been argued that the use of multiple antennas and beam- forming would be a viable option, but having a KxK antenna system results in only K 2 independent values, regardless of how the beam-forming is performed, which is usually not adequate to generate a key of a reasonable size.

[0073] Techniques herein account for any remaining self-interference when it comes to using the channel complex gain values to generate key. This is equivalent to a linear system with feedback, and as long as there are adjustments to gain values, the system will remain stable. The leakage channel may even work to an advantage and add another level of ambiguity for the eavesdropper.

[0074] In summary, in one symbol transmission, the two legitimate parties (Alice and Bob) communicate one phase value using the wireless channel that is between them (no public channel required), and then they will locally change the channel. It is relatively easy to change the channel phase, because small perturbations in the rich scattering environment will result in a new phase value of received RF signal for all parties, including for the eavesdropper. This process continues until Alice and Bob have enough number of such keys, and subsequently the channels are not changed any longer, and the extracted phase values are used to encrypt the message with PSK modulation. In case there are errors between these two keys, the channel code on top of the message symbols will correct it.

[0075] In one embodiment illustrated in FIG. 3, Alice 118 and Bob 102 each have two antennas (126, 124, and 104, 106, respectively) with very low coupling between the two antennas, using the methods described herein based on cascading multiple stages of analog cancellation. Prior to exchanging a phase value to be used as a key, Alice and Bob, the first the two legitimate parties, measure the filter coefficient to be used in multi-stage analog cancellation. This measurement is performed by sending a low power pilot such that any eavesdropper does not hear it. [0076] Then, one of the two legitimate parties acts master and the other one as slave. For example, if Alice is the master, her full-duplex transceiver 118 generates a sinusoidal signal of a known frequency and transmits it via channel 114 to Bob. Bob, the slave, forwards it from his receiver to his transmitter as shown by path 126, and amplifies it and forwards the received back to Alice via transmission channel 112. Each unit operates in full-duplex mode to cancel their respective self-interference signals (116, 103) caused by the transmissions.

[0077] Both units may use continuous filtering in time to mitigate the delay problem associated with looping back the received signal back to the originating master. Note that the initial channel measurements can be still performed in OFDM domain, with filter structure translated into time domain implementations.

[0078] The roles are then reversed, and Bob initiates a transmission 112, and Alice loops it back to Bob via transmission channel 114. Then, each unit accounts for its internal phase shift associated with its internal processing 126, 128 by accounting for its value and use the resulting phase as a PSK mask. That, while providing the loopback signal, each node may determine its own internal delay, or may even impose a pseudo random delay that is not known to the distant end master. When the units receive the masked signal from the distant end, they may first remove that pseudo random value, leaving only the common channel phase, which will be the same for each end. In this way, both transceivers 102, 118 are able to measure and obtain the same total channel round trip phase value.

[0079] Then, either one of the transceivers, or both of them, may then alter their transmit antenna characteristics and initiate another phase measurement, taking turns as master and slave to mutually measure a round trip phase value. Upon obtaining enough such phase values, one of the units may be configured to convey data using the sequence of shared-secret round-trip phase values. In one embodiment, the system may be configured to generate a random key such as a random binary sequence, apply FEC to the key value, and then PSK modulate the coded bits. The resulting PSK symbols may then be masked with the sequence of phase values (accounting for its internal phase shift) and transmits them to the other party. The recipient accounts for its internal phase shift (by subtracting it), then removes the mask by subtracting its estimate of the sequence of phase values, and finally demodulates the PSK symbols and decodes the FEC.

[0080] Now assume eavesdropper Eve has a large number of antennas, each with a very high signal to noise ratio. Each of eavesdropper's antennas will hear two signals, but these signals are received through a channel of an unknown phase. Due to the fact that when phase values are added module 2π, the result conveys zero information about each of them, eavesdropper will not be able to extract any useful information about the phase value exchanged between Alice and Bob. Note that in FIG. 3, the interference signals are generally referred to as 108, 110, 120, 122, but in reality, each transmit 104, 124 has a unique channel to each of the eavesdroppers 124 antennas.

[0081] In a second setup illustrated in FIG. 4, the initial transmission by the master occurs in the same manner as described with respect to FIG. 3, and is not depicted in FIG .4. Rather, FIG. 4 shows an alternative message transmission and loopback associated with the second measurement of the common phase once the role of master and slave is reversed, where Bob initiates the transmission. In particular, each transceiver reversed the roles of its antennas, and instead of transmitting with antenna 104, transceiver 102 initiates its transmission with antenna 106, which is the antenna that it had previously used to receive the signals from Alice during the prior first phase measurement. Similarly, Alice receives the signal on antenna 124 and retransmits the loopback signal using antenna 126.

[0082] In the process of exchanging a phase value to be used as a key in this embodiment, Alice and Bob collectively have four antennas and have thus used each of them only once for a single transmission. Now assume eavesdropper Eve has a large number of antennas, each with a very high signal to noise ratio. Each of eavesdropper's antennas will hear four signals, but these signals are received through a channel of an unknown phase. Due to the fact that when phase values are added module 2π, the result conveys zero information about each of them, eavesdropper will not be able to extract any useful information about the phase value exchanged between Alice and Bob.

[0083] In the embodiment of FIG. 4, antenna structures are connected to both transmit and receive chains (transmit in one interval and receive in another one). This feature enables a reliance on the reciprocity of the channel, and thereby reduces the total number of transmissions between Alice and Bob such that an eavesdropper is not able to gather enough equations to solve for the unknowns. Consequently, eavesdropper 124 cannot obtain useful information about the exchanged phase value. The disadvantage of this setup is that each antenna should be connected to both transmit and receive chains, but in return, it is robust with respect to any remaining amount of self-interference.

[0084] With reference to FIG. 5, at OFDM symbol t-1 , Alice and Bob measure their loop-back interference channels from Bob/TXl to Bob/RX2 and from Alice/TX2 to Alice/RXl (send low power pilots after scrambling and loop back in each unit). At OFDM symbol t, Alice/TXl sends pilots (after scrambling) to Bob/RX2, who (using Bob/TXl) forwards it to Alice/RX2. At OFDM symbol t+1 , Bob/TX2 sends pilots (after scrambling) to Alice/RXl , who (using Alice/TX2) forwards it to Bob/RXl . The two units, knowing their loop-back channels and relying on reciprocity, compute the channel: (Alice/TXl- Bob/RX2) x (Bob-loop-back) x

(Bob/TXl- Alice/RX2) x (Alice-loop-back) to be used a key. Note that multiplication is used, but it is understood that multiplication of the channel measurement values results in addition of the phase angles. This is possible as up/down conversion at each unit is performed using the same carrier/clock.

[0085] FIG. 6 shows that in the second method for key exchange, eavesdropper in total listens to four transmissions, but also adds four unknowns (e.g. channel phase to their receive antenna(s)) and consequently cannot extract any useful information from such measurements.

[0086] In a further embodiment illustrated in FIG. 7, legitimate units locally impose stricter requirements on the level of self-interference cancellation at their respective units. For example, this can be achieved if each node locally examines multiple channel perturbations and select those one that result in the lowest amounts of self-interference. This in return enables a relaxation of the requirement of each antenna being connected to both transmit and receive chains. In this embodiment, the input and output signals (/,, O I 2 , 0 2 ) of Alice and Bob in baseband form a four-dimensional vector that spans a two-dimensional sub-space (two equations are dictated by the overall structure). For linear systems: 1 G 21

≡ a o 2 G 12

G 12 G 21 G 12 G 21

_ o 2

Y

¾ -o 1 - G 12 G 21

0 1 = / j + al 2

0 2 = βΙ 1 + γΙ 2

[0087] Note that, due to the cancellation of self-interference, the gain from l 1 to Oj is the same as the gain from I 2 to 0 2 . This feature, which acts as a counterpart to the channel reciprocity in the earlier embodiments, enables agreement on a key using only two transmissions, instead of four. In both of these embodiments each transmit antenna is used only once.

[0088] In a further embodiment, two pilots are transmitted simultaneously, which can be considered as unit vectors, from Alice and Bob. Then, in the next transmission, one of them, say Bob, sends the negative of the same pilot. These two steps provide enough equations to Alice and Bob to compute two common phase values corresponding to the transmitted pilots times their corresponding channel gains. For better security, only one of these (or a function of the two) is used as the key. After this exchange of common phase value, the environment (channels) at the neighborhood of both Alice's and Bob's transmit antenna(s) are perturbed, possibly with local selection among multiple perturbations to reduce the amount of self-interference. Then, Bob and Alice send low power and scrambled pilots to measure their self-interference channels to be used towards cancellation of self-interference and the process continues to obtain another common phase value.

[0089] Full-duplex links also provide a means to enhance information theoretical security. It should be added that information-theoretical security has its own challenges in term of

implementation, but it has been the subject extensive research in the recent years, and if it is not a replacement for traditional security, it can be an addition to it. Note that feedback does not increase the capacity of an ordinary memory-less channel, but it does increase its secure capacity, because eavesdropper would be listening to a multiple access channel, and therefore, it is possible to enhance the secure capacity.

[0090] Inherently, eavesdropper Eve receives the sum of Alice's and Bob's signals which would make eavesdropping more difficult. Depending on where in the capacity region of the underlying multiple access channel it is desired to operate, there will be different options. One extreme option of maximizing the rate form Alice to Bob is that Bob transmits a secret key to be used by Alice, as a complete key or as a partial key, in its next block transmission.

[0091] To further enhance the security, an embodiment relies on the following principle. In practical OFDM systems, there is always the need for using a periodic preamble for the purpose of frequency synchronization between transmitter and receiver. This frequency synchronization is important because the slightest mismatch in frequency will make it significantly more difficult for the receiver to detect the signal. To exploit this feature towards enhancing security, after the initial stages that the connection has been established, Alice starts sending a periodic sequence to Bob, and Bob also sends a similar periodic sequence with high power. An eavesdropper will receive the sum of these periodic sequences passed through their respective channels and the received signal remains periodic. In each transmission, say each OFDM symbol, Alice

introduces a random frequency offset in its carrier. As Bob has transmitted the periodic sequence with high power, it will be difficult for eavesdropper to detect the random offset that is introduced in Alice's carrier frequency. However, Bob will have no problem in detecting that, and Alice knows its frequency offset with Bob. So, Alice and Bob will be able to create some additional confusion for eavesdropper without disrupting the legitimate link. Following this phase, when it comes to the transmission of the actual OFDM symbol, it can contain a secret key to be used in the next transmission.

[0092] As described above, the ability to change the channel from symbol to symbol is used in the key generation protocols. This is achieved by changing the RF environment around transmit antenna(s). In general, beam-forming using tunable RF, usually based on changing the dielectric or conductivity property by applying voltage, is an active area of research. Note that for the specific scenarios of interest, the channel may be changed from one random state to another random state. This means, unlike the case of beam- forming, it is not necessary to know what the current state is and what the next state will be, there is no intension to control the details of the channel state either, and any variation in channel phase will be sufficient to satisfy the needs. In traditional beam- forming applications, the intension is usually to focus the energy in a directional beam, and preferably to be able to steer the energy beam. Due to natural inertia that exists, it is usually more difficult to modify the energy density, rather than just changing the phase. Particularly, in the case of rich scattering environments, it is relatively easy to change the channel phase, to move from one stable point to a totally different point with independent values.

[0093] Hereafter, an RF-mirror is defined as an object, which would pass, reflect, partially pass/partially reflect an RF signal. An RF-mirror can have static parts with fixed RF properties, as well as dynamic parts with RF proprieties that are dynamically adjusted through digital (on- off) or analog control signals. Such a constriction will be called a tunable RF-mirror hereafter. RF-mirrors and tunable RF-mirrors will be useful components in inducing channel variations.

[0094] FIG. 9 shows an example for the realization of an RF-mirror. Material releasing electrons or holes, referred to as a charge-releasing-object hereafter, releases charge, typically electrons, in response to the energy absorbed from a source of energy, typically a laser, which in turn reacts to the control signals. An example of charge-releasing-object to be used with a light source is a semi-conductor, e.g., structures used in solar cells, Gallium Arsenide, materials used as photo-detectors in imaging applications such as a Charge-Coupled-Device (CCD), materials used to detect light in free space optics, materials used to detect light in fiber, or high resistivity silicon, typically with a band-gap adjusted according to the light wave-length. Another example is plasmas with their relevant excitation signaling as the energy source. For the example in FIG. 9, the intensity of light, which is typically controlled by the level of input current to the laser and number of lasers that are turned on, contributes to the amount of light energy converted into free electrons and consequently affects the conductivity of the surface. This feature can be used to convert the corresponding RF-mirror to a tunable RF-mirror. We can also place a mirror to reflect light, called a light-mirror hereafter, on top to increase contact of the light with the surface of the charge-releasing-object underneath, and even adjust such a light-mirror towards tuning of the overall RF-mirror.

[0095] FIG. 10 shows a second example 1000 where a light-mirror 1006 is placed around the charge-releasing-object. The objective for this light-mirror is to confine the light to increase the amount of energy absorbed by the charge-releasing-object. In addition, through adjusting the angle of different light sources, it is possible to control the number of reflections for any given source and thereby the amount of energy from that source releasing charges. This feature can be further enhanced by creating cuts in the light-mirror to stop reflections for any given light source at a point of interest. These cuts can be controllable as well (pieces of on-off light-mirrors) to enhance the controllability of the amount of released charges and thereby the behavior of the RF- mirror in response to the RF signal. 1002 shows material with a band-gap adjusted according to the light wavelength (called a charge releasing object). Light source 1004, such as a laser runs through or on the surface of the material. The circular, or polygon, region 1006 with material reflecting light except for the places shown as cuts 1008 (referred to as a light mirror).

[0096] The device 1020 of FIG. 10 shows a closer look at the example for the light-mirror around the charge-releasing-object 1030. Note that the light from each laser 1022, 1026, and 1028, depending on its angle, can go through many reflections at distinct points, covering several turns around the loop, until it hits the mirror at one point for the second time. This completes one cycle of reflection as shown by path 1032. After this second incidence, the same path will be covered again and again with subsequent cycle overlapping in space. By adjusting the starting angle of the beam light, the number of such reflections in a cycle can be adjusted which in turn affects the area of the charge-releasing-object that is exposed to light. This feature can be used to have a tunable RF-mirror (depending on the combination of light sources that are turned on), even if all sources have a constant power. Additionally, it is possible to adjust the level of input current driving the laser(s) for tuning purposes. Note that path 1024 is such that the angle of the laser and positions of the cuts are such that the beam from source 1028 ends by exiting through the cut prior to completing a cycle.

[0097] FIG. 11 shows a different approach to create an RF mirror. The switches on any one surface will be either all closed, or all open, which results in an on-off RF mirror. FIG. 12 illustrates methods to surround a transmit or receive antenna with objects capable of RF perturbation, e.g., on-off RF mirror, including methods to enhance the inducted channel variations. [0098] Next, some additional methods of using "induced channel variations" are explained.

[0099] Methods explained herein use the induced channel variations to increase a number of extracted common phase values. Once this capability is present, it can serve some other objectives as well, e.g., reducing transmit energy for a given transmit rate and coverage, or a combination of these two objectives. Examples include increasing diversity to combat fading; increasing error correction capability to combat multi-user interference or other factors degrading transmission; and avoiding poor channels in terms channel impulse response.

Obviously, saving in transmit energy translates into larger coverage and/or less multiuser interference. In the context of selecting a channel with a good impulse response, the objective, for example, can be to improve Signal-to-Interference-Ratio (SINR) including the effect of multi-user interference, enhance diversity in OFDM domain, or improve link security in key exchange. Methods herein may use the observation that the channel impulse response affects the structure of the receiver match filter, and thereby affects the level of multi-user interference at the base-band of the desired receiver. If the purpose is enhancing diversity, channel can be varied between OFDM symbols (kept the same during each OFDM symbol). This induces channel variations over subsequent OFDM symbols, which can be exploited to increase diversity, e.g., by coding and/or modulation over several such OFDM symbols. In this setup, receiver needs to learn the OFDM channel for each OFDM symbol. This can be achieved through inserting pilots in each OFDM symbol and/or through inserting training symbols. In the latter case several OFDM symbols can be grouped together to reduce training overhead, i.e., each group of OFDM symbols relies on the same training and channel is varied between such groups. Furthermore, pilots can be inserted among OFDM tones to facilitate training, fine-tuning and tracking.

[00100] Another method to exploit induced channel variation is to use the feedback link, e.g., the one present in two-way links, to select the channel configuration with a preferred impulse response towards increasing received signal energy as well as reducing interference. It should be noted that the details of the impulse response affects the receiver structure, which normally relies on a matched receiver. As a result, the impulse response from a node T to a node R affects both the gain from T to R as well as the amount of interference at R from an interfering transmitter, say T'. Conventional methods usually rely on multiple antennas and antenna selection to improve received signal strength and reduce received multi-user interference. However, in these conventional methods antenna selection at the transmitter T only affects the forward gain from T to R and does not have any impact on the interference from T' on R. To affect both signal and interference, conventional methods require antenna selection to be performed at R and this results in some limitations. These conventional methods need a separate antenna to provide additional independent gain values over the links connected (starting from or ending to) to that antenna. Methods of this disclosure realize similar advantages while avoiding some of the disadvantages associated with these earlier approaches. One advantage is that it is fairly easy to induce channel variations resulting in different impulse responses. For example, by relying on Q on-off RF -mirrors, methods of some embodiments of this disclosure can create 2 Q different impulse responses. This feature makes it possible to increase the number of candidates available for the selection at an affordable cost. Methods of this disclosure also benefit from the

observation that changing the channel impulse response by inducing variations around

transmitter T in communicating to R also affects the interference received at R from an interfering transmitter node T' (selection is based on considering both signal and interference). In contrast, in traditional methods using multiple antennas, selecting a different antenna at the transmitter side T does not affect the level of interference from T' on R. In the case of using OFDM, methods of this disclosure based on channel impulse selection and matched filtering (to improve signal and reduce interference) are still applicable as these involve processing in time prior to taking the received signal to frequency domain. In the case of OFDM, an additional criterion for channel impulse selection can be based on the level of frequency selectivity in the resulting OFDM channel to increase diversity in the frequency domain.

[00101] Methods described herein in the context of using induced channel variations were explained in terms of changing propagation properties around transmit antenna(s). However, similar techniques can be applied if the channel is changed around the receive antenna(s), or a combination of the two, i.e., RF properties of environments around both transmit and receive units are perturbed to enhance the induced channel variations.

[00102] Inducing channel variations in areas close to transmit and/or receive antenna(s), in particular in the near field, can have a particularly strong influence on the channel impulse response. To enhance this feature, and in some sense realize rich scattering environments, some embodiments also include methods in which static objects (called parasitic elements hereafter) that can affect the propagation properties, e.g., pieces of metal to reflect RF signal, are placed in the vicinity of the transmit and/or receive antenna(s) to enhance the induced channel variations.

[00103] In addition to features of the channel impulse response that affect the energies of the received signal and/or interference terms, the length of the impulse response also plays a role in separating signals and exploiting advantages offered by the induced channel variations.

Placement of parasitic elements affects the length of the channel impulse response. In particular, to enhance frequency selectivity, a longer channel impulse response is needed. To realize this, methods of some embodiments include placing parasitic elements in the form of reflectors;

transparent, or semi-transparent delay elements, forming walls around transmit and/or receive antenna(s). This construction will be called a chamber, hereafter. FIG. 10 shows a pictorial view (viewed from top) for an example of such a chamber. Walls of the chamber can be, for example, construed using constructions disclosed in FIGs. 9 and 10. The size of walls and placement of openings for the chamber can be static or dynamically tuned to adjust the channel impulse response. Openings may include air and/or delay elements formed from materials with proper (preferably tunable) conductivity, proper (preferably tunable) permittivity, or proper (preferably tunable) permeability. Example for tunable conductivity include: 1) Injecting electron into a semi-conductor, e.g., using a metal-semiconductor junction, 2) Freeing electrons in semiconductors, e.g., through light, laser or heath, and 3) Ionizing (plasma). Tunable permittivity can be realized using ferroelectric materials (tuned using an electric field/voltage). Tunable permeability can be realized using ferromagnetic materials (tuned using a magnetic field/current). Another design disclosed herein concerns the use of RF MEMS to adjust the position and angle of the energy sources, typically lasers, in the tunable RF mirror to adjust the impulse response, or create effects similar to an RF dish to guide the RF signal in far field, e.g., for the purpose of beam-forming. Another aspect of some disclosures involves stacking several such tunable RF mirrors in parallel to provide more flexibility in realizing a desired RF channel characteristic. In particular, such a construction can be used to provide the effect of an RF dish by adjusting the energy source, typically lasers, to end their cycle such that different layers in the stacked structure act as reflectors contributing to steering the RF signal in a desired direction. Note that the path covered by a laser beam will become conductive and acts as a parasitic antenna elements and knowledge developed in the context of RF beam forming using parasitic elements will be applicable. Another design disclosed herein concerns modulating the energy source, typically laser beams, to expand their spectrum to cover a high range of frequencies. This feature helps in using the energy source with a small frequency range to the wider frequency range of the charge-releasing-object. For example, the laser's original frequency range, i.e., if excited to be always on, may be too narrow with respect to the frequency range of the charge-releasing- object, and this limits the amount of absorbed energy. Typically, a charge-releasing-object has a wider frequency range, even if it is designed to match a particular laser. For example, such a modulation can be simply a periodic switching of the laser (i.e., using a rectangular pulse train to excite the laser), or using some other time signals for switching. Another complementary option is to use several lasers, each covering part of the frequency range of the charge-releasing-object. Anti-Refection (AR) coating of parts relevant to both RF frequencies and light frequencies can be useful addition(s) to this design.

[00104] Walls of the chamber trap the RF signal and cause a varying number of reflections and delays for different parts of the RF signal before these get into the air for actual transmission (on the transmit side), or before actual reception after arriving from the air (on the receive side). In this sense, this construction acts as a wave-guide and consequently can rely on structures known in the context of wave-guides to cause or enhance effects required in the methods disclosed herein for inducing channel variations. Note that such walls can be combination of static elements and some that are dynamically adjusted (tuned) at speeds required to adapt the channel impulse response (this is typically much less than the rate of signaling). Walls may have openings or be composed of pieces with different conductivity and/or permittivity and/or permeability to let some of the trapped wave to exit the chamber after delay and phase/amplitude changes caused by traveling within the chamber.

[00105] Other embodiments concern the situation that some or all the control signaling can affect the propagation environment in small increments. In this case, relying on a full duplex link, this disclosure includes methods to form a closed loop between a transmitter and its respective receiver wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing. The criterion in such adaptive algorithms can be maximizing desired signal, and/or minimizing interference, and/or increasing frequency selectivity for diversity purposes. In such a setup, or in other closed loop setups disclosed earlier in the context of key generation, stability may be compromised due to three closed loops. These are one local loop at each node (between transmitter and receiver in the same node due to the remaining self-interference) and the third one is the loop formed between transmitter/receiver of one node and receiver/transmitter of the other node. It should be clear to those skilled in the area that transmit gain, receive gain and gains in local loops of the two units can be adjusted to avoid such undesirable oscillations.

[00106] Aspects of this disclosure relate to the design of a full-duplex radio. In its simplest from, a full-duplex radio has separate antennas for transmission and reception. The transmit and receive antennas may often be placed in the vicinity of each other and consequently a strong self- interference may be observed at the receive antenna. The description herein illustrates systems and methods for practical implementation of full-duplex wireless using a primary transmit signal and auxiliary transmit signal to reduce interference, and a residual self-interference cancellation signal. To this aim, new self-interference cancellation techniques are deployed. [00107] In one embodiment, a method of full-duplex communication may comprise: in a full duplex transceiver, generating an interference-reduced signal by combining an analog self- interference cancellation signal to an incoming signal that includes a desired signal and a self- interference signal, wherein the analog self-interference cancellation signal destructively adds to the self-interference signal to create a residual self-interference signal. Then, the method may include further processing the interference-reduced signal to further reduce the residual self- interference signal using a baseband residual self-interference channel estimate.

[00108] In a further embodiment, the method may comprise: determining an estimate of a self- interference channel response from a primary transmitter of a transceiver to a receiver of the transceiver and determining an estimate of an auxiliary channel response from an auxiliary transmitter of the transceiver to the receiver. Then, the method may include determining a residual self-interference baseband channel response at a baseband processor of the receiver. Full-duplex communication is performed by preprocessing a primary transmit signal and an auxiliary transmit signal with the estimated auxiliary channel response and a negative of the estimated self-interference channel response, respectively, and transmitting the preprocessed primary transmit signal and the preprocessed auxiliary transmit signal in a transmit frequency range, while receiving a desired signal within a receive frequency range substantially

overlapping the transmit frequency range, and receiving a residual self-interference signal.

Further, the method may reduce the residual self-interference signal using the residual self- interference baseband channel response; and, further processing the desired signal.

[00109] In a further embodiment, an apparatus may comprise: a weight calculation unit configured to measure a self-interference channel and an auxiliary channel to obtain an estimate of the self-interference channel and an estimate of the auxiliary channel; a full-duplex transceiver having a primary transmitter, an auxiliary transmitter, and a receiver, wherein the primary transmitter and auxiliary transmitter are configured to preprocess a training sequence to generate two transmit signals such that the two transmit signals respectively traverse the self-interference channel and the auxiliary channel and combine to form an analog residual interference signal at the receiver of the full-duplex transceiver; an analog to digital converter and a receiver baseband processor at the receiver being configured to measure a baseband residual self-interference channel response by; and, the transceiver being further configured to cancel self-interference signals using the auxiliary channel and to cancel residual self-interference signals using the measured baseband residual self-interference channel response. In particular, the full-duplex transceiver may communicate in full-duplex by transmitting information in a first frequency band to a second receiver while simultaneously receiving information in the first frequency band from a second transmitter by cancelling self-interference signals using the auxiliary channel and cancelling residual self-interference signals using the measured baseband residual self- interference channel response.

[00110] As explained herein, several techniques in RF and base-band are provided to reduce/cancel the self-interference, as shown in FIG. 13. In a first aspect 410, antenna design is employed to reduce the incidence of self-interference 402 at a full-duplex communication node 400. Symmetrical (e.g., pair-wise, triple-wise) transmit and receive antennas are relatively positioned to reduce coupling between transmit and receive and thus reduce the incidence of self-interference. Thus, to facilitate full-duplex communications, access points and clients of the communication network are configured to reduce self-interference between a component's own respective antennas and transmit and receive chains. In the case of two-dimensional structures, it is shown that there exist pairs of symmetrical antennas with substantially zero mutual coupling over the entire frequency range. To simplify implementation and also provide support for MIMO in two dimensions, various embodiments include a second class of antenna pairs with low, but non-zero coupling. This is based on placing one set of antennas in the plane of symmetry of another set. In 3-dimensions, it is shown there exist triple-wise symmetrical antennas with zero coupling between any pair. It is also shown that in 3-dimensions, one can indeed find two sets of antennas (to be used for transmit and receive in a MIMO system) such that any antenna in one set is decoupled (zero coupling over the entire frequency range) from all the antennas in the second set. Furthermore, such three dimensional structures are generalized to the case that antenna arms are placed closely or merged, for example using two-sides or different layers of a PCB, or analogous approaches based on using Integrated Circuit (IC). An example for the implementation of such constructions is based on using patch antennas wherein one antenna arm is generated through reflection of the other antenna arm in the ground plane. Examples of such a construction are presented wherein the same patch is used as the transmit antenna, the receive antenna and the coupler necessary in analog cancellation. Examples are presented to generalize such constructions for MIMO transmission. Hereafter, such constructions are referred to as being in 2.5 dimensions, or simply 2.5 dimensional.

[00111] Most examples and aspects herein are described based on using separate antennas for transmit and receive. However, most of the techniques described for self-interference cancellation will be still applicable if the same antenna is used for transmit and receive. Known methods for isolating transmit and receive chains may be applied. To describe the systems and methods a basic setup is used herein. For this purpose, aspects relevant to issues like synchronization and equalization are described assuming OFDM, likewise aspects relevant to supporting multiple clients and networking are described assuming OFDMA. However, techniques herein will be applicable if OFDMA is replaced by some other known alternatives, e.g., CDMA, OFDM-CDMA, Direct Sequence (DS)-CDMA, Time-division Multiple Access (TDMA), constellation construction/transmission in time with pulse shaping and equalization, Space Division Multiple Access (SDMA), and their possible combinations.

[00112] In a second aspect 412, a corrective self-interference signal 404 is generated and injected into the receive signal at 412. Weighting coefficients for filtering are calculated for a primary transmit signal and an auxiliary transmit signal comprising the corrective self- interference signal 404. The corrective self-interference signal may be transmitted by the node to combine in the air with the signal to be received by the node's receive antenna. Transmission of the corrective self-interference signal can be at power levels comparable with the primary signal using an antenna with comparable functionality as the antenna used to transmit the primary signal. This can be the case if multiple high power transmit antennas are available in the unit. As an alternative, an auxiliary transmit antenna, with high coupling to the receive antenna, may be used to transmit the corrective self-interference signal with low power. The corrective self- interference signal may be coupled (e.g., in RF in the receive chain of the node without the use of an antenna) to the signal received by the receive antenna. In various embodiments, the analog cancellation may take place at an RF coupler 418, or alternatively it may take place at baseband frequencies using circuit 420.

[00113] As shown in FIG. 4, another technique for cancelling self-interference is to determine the response of a transmit- to-receive baseband channel, also referred to herein as a residual interference channel, or a residual self-interference baseband channel. The baseband version or frequency domain version of the transmit signal 408 may be provided to the receiver baseband processor 414 for a further analog subtraction 414 by processing the transmit signal with the residual self-interference response and then subtracting it from the incoming signal to obtain the received signal 416 prior to A/D conversion.

[00114] With respect to FIG. 14, one embodiment of a full-duplex transceiver is shown.

OSDN data 512 is provided to the transmitter baseband processor 510. This signal will form the basis of the primary transmit signal 526 that is propagated between the transmit antenna and receive antenna with low coupling as described herein. The baseband processor 510 generates OFDM symbols for transmission and passes them to preprocessor unit 508. Preprocessor unit 508 multiplies the OFDM symbols by the transfer function H 2 , which represents the transmission channel of the auxiliary transmit path 534. The signal is then converted to a time domain signal and passed through digital to analog converter 506. Alternatively, transmit baseband processor 510 generates the time domain signal with an IFFT module and preprocessing filter 508 is implemented in the time domain, such as by an FIR filter. The output of preprocessing unit 508 is converted to an RF signal by modulator 504, and amplified by power amplifier 502, and finally transmitted to a distant end receiver (not shown).

[00115] In the auxiliary transmit channel the OFDM data 524 is provided to the auxiliary transmit baseband processor 522. Similar to the primary transmit chain, the auxiliary

preprocessor 520 may alter the OFDM symbols by an estimate of the transfer function (- H , which is the negative of the channel response of the interference channel 536. Alternatively, the output of the auxiliary transmit baseband processor 522 may be time domain signals calculated by an IFFT module, and the preprocessor unit 520 may be an FIR filter to process signals in the time domain. The output of preprocessor 520 is provided to a digital to analog converter 518, and then to RF modulator 516, to generate the auxiliary transmit signal 514, also referred to as the self-interference cancellation signal. The self-interfering signal 526 combines with the self- interference cancellation signal 514 by way of RF addition 528.

[00116] In the embodiment of FIG. 14, the self interference is cancelled by determining the characteristics, or frequency response, of (i) the self-interference channel ^ caused by the primary transmit signal as coupled through the primary transmit antenna and the receive antenna, and (ii) the self-interference cancellation channel H 2 caused by the auxiliary transmit path, which conveys the self interference cancellation signal. The channel responses may be determined by channel sounding techniques, including transmitting predetermined tones and measuring the magnitude and phase variations of the tones in the received signal. Note that the channel responses ^ and H 2 are the responses of the complete channel from the OFDM data at the respective transmitters through their respective chains, through the analog signal propagation/ RF channels, the receiver analog front end, all the way to the receiver baseband 538. The cancellation effect in the embodiment of FIG. 5 is due to the concatenation of the two channel responses in the primary transmit chain (H 2 from preprocessor 508, and ^ from the remainder of the transmission path), and the negative of the concatenation of the two channel responses in the auxiliary transmit chain (- ^ by preprocessor 520, and H 2 from the remainder of the auxiliary transmission path). Because of these two concatenations performed by the respective

transmission/reception chains, the self-interference signal 526 is substantially reduced by the negative contribution of the self-interference cancellation signal 514, by way of RF addition 528. The remaining received signal is then demodulated by RF demodulator 530, and is sampled by analog-to-digital converter 532. The sampled signal is then processed by receive baseband processor 538/540. Receive baseband processor 538/540 performs an FFT to generate the OFDM symbols 542. Note that both preprocessors 602, 604 may apply the channel responses by operating directly on the OFDM transmit signals by altering the magnitude and phase of the symbols according to the channel response. Alternatively, the preprocessing may be performed in the time domain.

[00117] Note that in FIG. 14, it is recognized that the self-interference channel ^ and the self- interference cancellation channel H 2 as determined by the full-duplex transceiver are only estimates of the actual channel responses and may include errors ΔΗ 1 and ΔΗ 2 , respectively, as shown in preprocessing units 508, 520. After the concatenations of the primary transmit signal and the auxiliary transmit signal with their counter channel responses, a residual interference signal remains after the RF addition. This residual signal is separately measured at the receiver baseband processor, as described more fully below, and is referred to herein as the residual self- interference baseband channel response. Note that both preprocessors may apply the channel responses by operating directly on the OFDM transmit signals by altering the magnitude and phase of the symbols according to the channel response. Alternatively, the preprocessing may be performed in the time domain.

[00118] FIG. 15 shows a further alternative embodiment where the residual error channel is measured and is then cancelled using a second auxiliary transmit channel for cancellation in the analog domain. This allows the residual error signal to be removed in in the time domain without having to go through an OFDM symbol time.

[00119] FIGs. 16 and 17 show block diagrams representing transmit and receive chains, in accordance with examples of embodiments of the full-duplex transceivers. These embodiments differ in the method used to construct the axillary corrective signal from the main transmit signal and the method used to couple (add) the corrective signal with the incoming signal. In some embodiments, the cancellation in analog domain due to the corrective signal is performed prior to Low-Noise- Amplifier (LNA). In another embodiment, this is done after the LNA, and before the A/D. In some embodiments, the filtering is performed in time domain. In another

embodiment, filtering is performed in the frequency domain. In some embodiments

compensation for amplifier nonlinearities is explicitly shown. In other embodiments

compensation for amplifier nonlinearities is implicit. [00120] The construction of a secondary (corrective) signal uses the data from the primary transmit signal and an instantaneous measurement of the self-interference channel. The corrective signal, or self-interference cancellation signal, is subtracted (in the analog domain) from the incoming signal prior to A/D. This can be achieved by using multiple, in particular two, transmit antennas with proper beam-forming weights such that their signals are subtracted in the air at the receive antenna. The antenna used to transmit the corrective signal can be a fully functional transmit antenna (similar to the other antenna used in the transmission) in the sense that it is connected to a power amplifier and has a low coupling with the corresponding receive antenna. This scenario may be of interest if there are several transmit units available which can be used in different roles depending on the mode of operation. An alternative is to use an antenna that is designed exclusively for the purpose of self-interference cancellation and consequently has a high coupling to the receive antenna and can transmit with a low power.

[00121] A different approach is based on subtracting such a corrective signal in the receive chain prior to A/D using methods for RF signal coupling. Regardless of which of the above methods for active cancelation are used, the corresponding weights may be referred to as the self-cancellation beam-forming coefficients. To improve mathematical precision by avoiding dividing of numbers, it helps if the weighting is applied to both primary and secondary, while scaling both to adjust transmit energy. However, an equivalent filtering operation can be applied to only one chain, in particular to the auxiliary corrective signal. Aspects of filtering for construction of the auxiliary corrective signal are mainly explained using frequency domain realization, however, filtering can be also performed in the time domain. In particular, it is preferred that channel impulse responses are measured in the frequency domain, and then converted to a time-domain impulse response or difference equation used to implement the filter in the time domain. Time domain filters may act continually on the signal in the time domain, or account for and compensate for the initial condition due to the filter memory from the previous OFDM symbol.

[00122] FIG. 16 shows one embodiment of a full-duplex transceiver 800. The transmit data 816 is provided to transmit baseband 814 of primary transmit chain 804, which formulates OFDM symbols and forwards them to IFFT processing unit 812 for conversion to a time domain signal. The data is then converted to an analog signal by digital to analog converter 810. The analog signal is then modulated by RF modulator 808, and amplified by power amplifier 806. The signal is then transmitted to a distant end receiver (not shown), and the transmission causes a self interfering signal 802 to be received by the receive chain 832. The transmit data 816 is also provided to auxiliary transmitter 820, where the baseband processor 830 generates OFDM symbols. The OFDM symbols are converted to a time domain signal by IFFT processor 828, and then converted to a time domain signal by digital to analog converter 826. The auxiliary transmit signal is then modulated by RF modulator 824, and amplified by amplifier 822 for transmission to the receiver chain 832 via path 818.

[00123] Note that the preprocessing of the primary transmit signal and the auxiliary transmit signal may be performed by transmit baseband processor 814 and auxiliary transmit baseband processor 830, respectively. Specifically, the TX base-band component 814 and ATX base-band component 830 receive weights from weights calculation unit 846 to perform the corrective beam forming (when transmitted for combining in the air) or signal injection (i.e. when added in RF on the unit 800).

[00124] In the embodiment 800 illustrated, the amplified signal from amplifier 804 is transmitted, via a pair- wise symmetrical transmit antenna whereas the amplified signal from amplifier 820 is output for combining with a received signal from a pair- wise symmetrical receive antenna of receiver 832 via RF coupling unit 834. A low noise amplifier 836 amplifies the combined received and injected signal. The amplified signal is demodulated (by

demodulator 838) and analog to digital conversion is performed at A/D Unit 840. The digital signal is passed to FFT unit 842 and thereafter to RX base-band 844, which provides received data 848 and information (measurements) to weights calculation unit 846.

[00125] Remaining degradations in receive signal can be further reduced by forming an appropriate digital or analog corrective signal and applying it in the base-band (or IF), or even via RF transmission according to FIG. 15. This may be an attractive option to account for the degradations that are caused by non-linear operations such as rounding, lack of precision in FFT/IFFT etc.

[00126] The equivalent Transmit-to-Receive Base-band Channel (TRBC) for the remaining self-interference (residual self-interference) is measured to obtain this equivalent channel, the remaining amount of self-interference can be subtracted from the receive signal at RF.

[00127] In some embodiments, a method may comprise full duplex nodes represented as Alice and Bob configured to reduce the amount of self-interference and each node performing respective operations to exchange a key comprising:

1. Channel values for canceling self-interference are measured (quietly by transmitting low power and possibly scrambled pilots) in each node: 2. Each unit transmits the sum of its received signal and its input signal.

3. Alice/Bob simultaneously sends pilots A/B, followed by -A/B, respectively;

4. Each node obtains two equations which are used to find phase values of AG 12 and BG 21 where Gn and G 21 are the cross gains between Alice and Bob; and,

5. For higher security, only one of the two phase values, or a proper combination of them is used; and

6. Channels are perturbed (at both nodes) to change the channel phase prior to a next round to determine a further key.

[00128] In further embodiments the nodes are full duplex nodes represented as Alice and Bob, each node performing respective operations to enhance security comprising:

1. After the initial connection is established, Alice introduces a random offset in its carrier frequency for every new block of OFDM symbols;

2. Bob transmits the periodic preamble (used in OFDM for frequency

synchronization) with high power and then transmits signal from a Gaussian codebook or its practical realization containing a secret key to be used by Alice as a partial or full key in Alice's next transmission block.

[00129] In yet other embodiments, the RF channel is perturbed relying on methods known in the context of RF beam- forming said methods selected from one or more of: using meta- materials, absorber/reflector surfaces, Ferroelectric materials, changing conductivity of semiconductors by applying voltage or other forms of energy including light, electronically controlled antennas e.g., by changing impendence through switching of conducting pieces of metals, optically controlled antennas, ferrite-type dielectric antennas, and plasma antennas.

[00130] In some embodiments, the RF channel is perturbed by surrounding the antennas with walls composed of plates that have a conductive surface which is transparent to RF signal at the carrier frequency of interest, e.g., by using periodic structures, and each wall has two such plates filled with a dielectric in between, with both of the two plates separated from the dielectric material using a layer of non-conducing material, and where the RF property of the dielectric are changed by applying voltage across the two plates forming each wall.

[00131] Further embodiments include an RF channel perturbed by surrounding the antennas with walls composed of plates that have a conductive surface which is transparent to RF signal at the carrier frequency of interest, e.g., by using periodic structures, and each wall has two such plates filled with a semi-conductor in between, with one or both of the two plates separated from the semi-conductor material using a layer of non-conducing material, and where the density of charge on the surface of the semi-conductor is changed by applying voltage across the two plates forming each wall. [00132] Further embodiments include an RF channel perturbed by surrounding the antennas with walls composed of plates that have a conductive surface which is transparent to RF signal at the carrier frequency of interest, e.g., by using periodic structures, and each wall is connected to a layer of semi-conductor, with a layer of non-conducing material in between, similar to what is used in metal-oxide-semiconductor, and where the density of charge in the semi-conductor is changed by applying voltage across each wall to adjust the level of reflection for the RF signal.

[00133] Further methods may use a full duplex link to form a closed loop between a transmitter and its respective receiver wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing. Still further embodiments include a wireless communication node configured to perform a method according to the foregoing disclosure.

[00134] Various configurations of active antenna elements can be employed in different embodiments. FIGs. 20-23 show pictorial views of pair- wise symmetrical antennas for components in accordance with examples. The plane of symmetry for the vertical antenna 2002 is the plane passing through the x axis, and the plane of symmetry for the horizontal antenna 2004 passes through the y axis. Note that the dots such as dot 2000 indicate terminals, and that radiating elements 2002 and 2004 are "V" shaped to illustrate the use of physical symmetry, and are not intended to represent actual radiating element geometries. FIG. 22 shows a 3- dimensional arrangement where the horizontal antenna has its terminals in the XZ plane near the Z axis, with its plane of symmetry being the YZ plane. The vertical antenna has its terminals in the YZ plane, also close to the Z axis but closer to the origin, where the XZ plane is the plane of symmetry. FIG. 23 shows antenna 2302 is a ring (in the XY plane).

[00135] The above idea can be generalized to obtain triple-wise symmetrical antennas in 3- dimensional space (e.g. see FIGs. 24 and 25). In this case, each two antennas are pair-wise symmetrical, meaning there is theoretically zero coupling between any pair. For such a configuration, the 3x3 S -matrix is diagonal in theory, or close to diagonal in practice, independent of frequency.

[00136] FIGs. 26-28 show examples of MIMO antenna structures in 3-dimensional space where every antenna in one subset, is decoupled from all the antennas in the second subset, using pairwise symmetry. FIG. 26 utilizes the third dimension to stack the parallel and horizontal antennas along the Z axis, while FIG. 27 staggers each of the horizontal antennas 2702 and the vertical antennas 2700 along the Z axis. Multiple-Input Multiple-Output Antenna systems are based on using multiple antennas at each node and exploit the resulting spatial degrees of freedom to increase the rate and/or increase the diversity order. For a MIMO full-duplex radio, there is a set of TX antennas and a set of RX antennas. To satisfy the low coupling requirement, each antenna in TX set may be pair- wise symmetrical with respect to all antennas in RX set and vice versa. To do so, a straightforward approach is to use the symmetry planes of TX and RX antennas to generate more elements in each set, but this configuration results in unwanted distance between antenna arms and thereby affects their radiation efficiency. To improve radiation efficiency in such a configuration, antenna arms can be brought closer by placing antennas on different PCB layers or its equivalent in other forms of realizing antennas in integrated circuit, or multi-layer antennas with layers coupled through air or through other materials with desirable electromagnetic property that can guide or block the wave.

[00137] On the other hand, MIMO implementation in three dimensions is more flexible (easier to implement). This is due to the observation that a pair- wise symmetrical antenna structure requires two dimensions effectively, and as a result, it is possible to generate more

transmit/receive antennas satisfying the required symmetry condition along the third dimension. In such configurations, it is possible to change the order of antennas, and antennas can be of different lengths for multi-band operation. Some example configurations are shown in FIGs. 26, 27, and 28 of MIMO antenna structures in 3-dimensional space where every antenna in one subset is decoupled from all the antennas in the second subset.

[00138] It remains to find a better solution for implementation of MIMO in two dimensions. Since E-field of a self-symmetrical antenna is orthogonal to its plane of symmetry bisecting its feed terminals, a MIMO full-duplex radio with low (but non-zero) coupling can be realized in two dimensions by placing one set of antennas along the plane of symmetry of the other set. See FIG. 29 showing a 4x3 arrangement in two dimensions. In this configuration, shape of arms and spacing between antennas can be adjusted to compensate for lack of perfect symmetry, non-zero width of antennas, as well as for MIMO requirements (independence of gains). See FIGs. 33 and 34 showing numerical results (2.4Ghz band using HFSS) for modifying the shape of the antenna to compensate for the loss in symmetry.

[00139] Although the methods of this disclosure are primarily explained in terms of Diploe and Patch antennas, generalization to other forms such as Monopole, Folded Dipole, Loop antennas (implemented using wire, PCB, or Integrated Circuit); Microstrip antennas, Reflector Antennas, e.g. Corner Reflector, Dish Antenna; Travelling Wave Antennas, e.g., Helical Antennas, Yagi- Uda Antennas, Spiral Antennas; Aperture Antennas, e.g., Slot Antenna, Slotted Waveguide Antenna, Horn Antenna; and Near Filed Communication Antennas should be clear to individuals skilled in the art.

[00140] FIG. 29 shows examples for the placement of one antenna set in the plane of symmetry of some other antenna(s) to support MIMO in 2-dimensional antenna structures in accordance with one example. While the configuration does not contain pairwise symmetry, the four verticals are symmetrical and their associated electric field is orthogonal to plane of symmetry, and the horizontal antennas are in that plane of symmetry, thereby reducing the coupling because the E-field is orthogonal. This configuration of FIG. 29 may be used for MIMO.

[00141] FIGs. 30-32 show examples of some antenna structures showing that the coupling between antennas can be very strong (-2dB) due to near field signals unless it is cancelled relying on pair- wise symmetry where values of RF coupling are obtained using high frequency structural simulator (HFSS) at 2.4Ghz band.

[00142] FIGs. 33 and 34 show numerical results (2.4Ghz band using HFSS) for one example of modifying the shape of the antenna to compensate for the loss in symmetry. This demonstrates that the shape of the radiating elements may be adjusted so as to reduce the coupling.

[00143] FIGs. 35 and 36 show a schematic view of two pair- wise symmetrical antennas composed of a dipole and a patch antenna which has an arm above ground plane; and wherein diploe can be realized on the middle layer of a PCB sandwiched between the top and bottom surfaces forming the patch and the ground plane. This arrangement maintains pairwise symmetry.

[00144] As illustrated in FIG. 37, the active antenna elements can be enclosed within a periodic structure that includes a substantially cylindrical array of independently switchable RF reflectors, such as the switchable RF reflector illustrated in FIG. 11. Switches on a given wall, can be all or partially switched to change the channel. Reflective walls reflect the wave from an active antenna element and form a cavity internally which results in several reflection for the RF signal prior to exiting the cylinder. This adds to the richness (independence) of the various channel configurations. The substantially cylindrical array of switchable RF reflectors may also be surrounded by a set of exterior metallic strips acting as non-switchable radio-frequency reflectors. The non-switchable radio-frequency reflectors may be arranged in a substantially cylindrical fashion around the switchable RF reflectors. Reflections between these exterior metallic strips further enrich the channel variations caused by switching the switchable RF reflectors.

[00145] As illustrated in FIG. 38, an antenna assembly 3800 includes a first active antenna element 3802 and a second active antenna element 3804. Active antenna elements 3802 and 3804 are pairwise symmetric with respect to one another to minimize self-interference when one element is used as a transmit antenna and the other is used simultaneously as a receive antenna. Active antenna elements 3802 and 3804 may be, for example, dipole antennas. A plurality of switchable radio-frequency reflectors, such as reflector 3806, is positioned in a substantially cylindrical array around the active antenna elements 3802 and 3804. Each of the switchable radio-frequency reflectors, such as reflector 3806, includes a plurality of conductive segments connected by one or more switching components, such as PIN diodes. In alternative

embodiments, the switchable radio-frequency reflectors include switchable plasma components, such as switchable plasma-filled tubes. In the embodiment of FIG. 38, a plurality of non- switchable radio-frequency reflectors, such as reflector 3808, are positioned in a substantially cylindrical array around the switchable reflectors. Non-switchable reflector 3808 may be, for example, a strip of metal.

[00146] An alternative embodiment of an antenna assembly is illustrated in FIG. 39. An antenna assembly 3900 includes a first active antenna element 3902 and a plurality of switchable radio- frequency reflectors, such as switchable reflector 3904, that surround the first active antenna element 3902 in a substantially cylindrical array. The first active antenna element 3902 may be a dipole antenna or other omnidirectional antenna. The switchable radio -frequency reflectors may also be surrounded by a plurality of non-switchable radio-frequency reflectors, such as metal strip 3906.

[00147] The antenna assembly 3900 further includes a second active antenna element 3908. While the first set of switchable radio -frequency reflectors is positioned only around the first active antenna element 3902, a second plurality of switchable radio-frequency reflectors, such as switchable reflector 3910, surround the second active antenna element 3908 in a substantially cylindrical array. The second active antenna element 3902 may be a dipole antenna. The switchable radio-frequency reflectors may also be surrounded by a plurality of non-switchable radio-frequency reflectors, such as metal strip 3912. In some embodiments of the antenna assembly 3900, the first active element 3902 and the second active element 3908 may be pairwise symmetric to minimize self-interference when one element is used as a transmit antenna and the other element is used as a receive antenna at the same time. The separate active antenna elements of antenna assembly 3800 (FIG. 38) and antenna assembly 3900 (FIG. 39) may be connected to the separate transmit and receive circuitry (such as the TX and RX circuitry of FIG. 8) of a single transceiver. For example, the antenna assemblies 3800 or 3900 can be used as the transmit and receive antennas of the circuitry illustrated in FIG. 16. In particular, the transmit chain 804 (FIG. 16) may transmit through active antenna element 3802 while the receive chain 832 receives a signal from active antenna element 3804, or vice-versa. Or the transmit chain 804 may transmit through active antenna element 3902 while the receive chain 832 receives a signal from active antenna element 3908, or vice-versa.

[00148] In some embodiments, the role of the transmit antenna 124 in FIG. 3 may be performed by the active antenna element 3802, and the role of the receive antenna 126 may be performed by the active antenna element 3804, or vice-versa. Alternatively, the role of the transmit antenna 124 in FIG. 3 may be performed by the active antenna element 3902, and the role of the receive antenna 126 may be performed by the active antenna element 3908, or vice-versa. More generally, any transmit-receive antenna pair described herein can be implemented with antenna assemblies 3800 or 3900 to permit perturbation of the communication channel and to minimize self-interference during full-duplex communications.

[00149] In some embodiments, it is desirable to be able to switch the role of the transmit and receive antennas. This allows for measurement of the reciprocal of a communication channel, as illustrated in FIG. 5. As illustrated in FIG. 40, a transceiver 4000 includes transmit circuitry 4002 and receive circuitry 4004. The transceiver 4000 is connected to an antenna assembly 4006 through a 2x2 radio-frequency crossbar switch 4008. The antenna assembly 4006 includes a first active antenna element 4008 and a second active antenna element 4010. In a first state of the crossbar switch 4008, the switch connects the first active antenna element 4008 to the transmit circuitry and the second active antenna element 4010 to the receive circuitry. In a second state of the crossbar switch 4008, the switch connects the first active antenna element 4008 to the receive circuitry and the second active antenna element 4010 to the transmit circuitry. The first and second active antenna elements 4008, 4010 may be implemented by, for example, active antenna elements 3802, 3804 of FIG. 38, or by active antenna elements 3902, 3908 of FIG. 39, among other arrangements.

[00150] A method of operating an antenna assembly such as antenna assembly 3800 or 3900 is illustrated in FIG. 41. In step 4100, an outgoing signal is transmitted from a first active antenna element of an antenna assembly operated by a party (e.g., Alice, in the example given above) acting as master. The outgoing signal sent by Alice is looped back by a remote antenna operated by another party (e.g., Bob, in the example given above) acting as slave, and in step 4012, the looped-back signal is received by Alice on a second active antenna element. In step 4013, Alice measures the phase shift between the outgoing signal transmitted from the first antenna element (step 4100) and the incoming signal received on her second antenna element (step 4102). As described in the foregoing embodiments, Alice will subsequently use this measured phase shift to mask future communications with Bob.

[00151] In some embodiments, steps 4100 and 4012 may be performed simultaneously, with Alice continuing to transmit on her first active antenna element while she is receiving the looped-back signal on her second active antenna element. In other embodiments, there may be a delay between when Alice transmits the outgoing signal 4100 and when she receives the incoming signal 4102. Such a delay may occur due to travel time from Alice to Bob and back, due to delays (whether intentional or unavoidable) at Bob's node, or due to a combination of these factors. In some embodiments, the incoming and outgoing signals in steps 4100 and 4102 may have substantially the same frequency.

[00152] After measuring the phase shift of the loop-back signal, Alice reverses the roles of her transmit and receive antennas by switching a crossbar switch (such as the crossbar switch 4008 of Fig. 40) in step 4104. At this point, Bob acts as master and Alice acts as slave. Note that, in a preferred embodiment, there has been no perturbation of the communication channel when Alice and Bob change roles as master and slave. In this way, Alice and Bob each measure the phase of one communication channel before the channel is perturbed. When Bob is measuring the channel, Alice receives an incoming signal from Bob on her first active antenna element in step 4016. That is, Alice receives the incoming signal on the active antenna element that she had previously used for sending an outgoing signal in step 4100.

[00153] Alice demodulates the signal in step 4108. In step 4110, Alice remodulates the signal from Bob and transmits the remodulated signal on her second active antenna element in step 4112. That is, Alice transmits the outgoing signal on the active antenna element that she had previously used for receiving the incoming signal in step 4102. In some embodiments, the incoming signal received in step 4106 has substantially the same frequency as the signal transmitted in step 4112.

[00154] Between the demodulation of the incoming signal in step 4108 and the remodulation of the signal in step 4110, Alice may buffer the demodulated signal for a predetermined delay period that is known to Alice. This may be done so that Bob does not receive the signal from Alice (sent in step 4112) until after he is finished sending a signal to Alice.

[00155] After both Alice and Bob have had an opportunity to measure the phase shift

introduced by the communication channel between them, the communication channel is perturbed in step 4114 by switching at least one of the switchable radio-frequency reflectors of antenna assembly 3800 or 3900. In a preferred embodiment, at least one reflector is switched in each set of switchable radio frequency reflectors. For example, with reference to the antenna assembly 3900 of Fig. 39, the state of reflectors 3904 and 3910 may both be switched. Preferably, both parties (Alice and Bob) switch at least one reflector in each of their respective sets of switchable reflectors. While it is preferable that at least one such reflector is switched, it should be noted that, in general, the state of several reflectors is preferably switched within each set of switchable reflectors in order to perturb the channel around all of the active antenna elements.

[00156] In some embodiments, in conjunction with the perturbation of the channel, the crossbar switch may also be switched in step 4116 to switch the roles of the active antenna elements. In some embodiments, the operations of switching reflectivity and switching the roles of the active antenna elements are performed in a sequence such that each of the active antenna elements transmits only once for each channel configuration. Although each active antenna element may perform multiple transmissions over the course of a security setup procedure, the channel state is changed at some point between subsequent transmissions of a single active antenna element.

[00157] A plan view of an antenna assembly 4200 according to some embodiments is provided in FIG. 42. Antenna assembly 4200 includes one or more active antenna elements 4202. A plurality of switchable radio frequency reflectors, such as switchable reflector 4204, are arranged in a substantially cylindrical array around the active antenna element 4202. A plurality of non- switchable radio frequency reflectors, such as reflector 4206, are also arranged in a substantially cylindrical array around the active antenna element 4202. The non- switchable radio-frequency reflectors may be metallic strips. In some embodiments, as illustrated in FIG. 42, the non- switchable radio-frequency reflectors 4206 may be aligned with gaps between the switchable radio-frequency reflectors 4204. As is further illustrated in FIG. 42, in some embodiments, the non-switchable radio-frequency reflectors 4206 are arranged at a greater distance from the active antenna element 4202 than the distance of the switchable radio-frequency reflectors 4204.

[00158] A plan view of another antenna assembly 4300 according to some embodiments is provided in FIG. 43. Antenna assembly 4300 includes one or more active antenna elements 4302. A plurality of switchable radio frequency reflectors, such as switchable reflector 4304, are arranged in a substantially cylindrical array around the active antenna element 4302. A plurality of non-switchable radio frequency reflectors, such as reflector 4306, are also arranged in a substantially cylindrical array around the active antenna element 4302. The non-switchable radio-frequency reflectors may be metallic strips. In some embodiments, as illustrated in FIG. 43, the non-switchable radio-frequency reflectors 4306 may be spaced so as to fill gaps between the switchable radio-frequency reflectors 4304 in the cylindrical array. In such an embodiment, the switchable and non-switchable radio-frequency reflectors are arranged at substantially the same distance from the active antenna element 4302. In some embodiments, gaps between the switchable and non-switchable radio-frequency reflectors are no greater than a quarter wavelength in size.

[00159] As illustrated in FIG. 44, an antenna structure similar to that of assembly 4300 can be constructed using a plurality of wall segments. Wall segment 4400 includes a substrate 4402, which may be printed circuit board (PCB). The wall segment 4400 includes both a switchable and non-switchable radio-frequency reflector on the same substrate 4402. The non-switchable radio-frequency reflector is provided in some embodiments by a metal or other conductive strip 4404 deposited or otherwise applied to the substrate 4402. The non-switchable reflector 4404 preferably has a length greater than one-half wavelength.

[00160] The switchable radio-frequency reflector is provided with a plurality of conductive segments such as segments 4406, 4408. Each of the individual conductive segments preferably has a length less than a quarter wavelength. Switching components such as switches 4410 and 4412 are provided on the substrate 4402 to provide a switchable connection between consecutive conductive segments. The switching components 4410, 4412 may be solid-state switching components such as PIN diodes. Control circuitry for the switching components (not illustrated) may also be provided on the same substrate 4402. When the switching components 4410, 4412 are conducting, the plurality of conductive segments (including 4406 and 4408) effectively operate as a single conductor. In some embodiments, the conductive segments collectively act as a single conductor having a length of at least one-half wavelength.

[00161] As further illustrated in FIG. 44, the wall segment 4400 is in communication with propagation perturbation control circuitry 4414. In an embodiment in which the switching components 4410, 4412 are implemented by PIN diodes, the propagation perturbation control circuitry 4414 may activate the reflectivity of the switchable radio-frequency reflector by applying a forward-biasing voltage across the conductive segments. The propagation

perturbation control circuitry 4414 may deactivate the reflectivity of the switchable radio- frequency reflector by removing the forward-biasing voltage.

[00162] In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.

[00163] The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.

[00164] Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," "has", "having," "includes",

"including," "contains", "containing" or any other variation thereof, are intended to cover a nonexclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by "comprises ...a", "has ...a", "includes ...a", "contains ...a" does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms "a" and "an" are defined as one or more unless explicitly stated otherwise herein. The terms "substantially", "essentially", "approximately", "about" or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term "coupled" as used herein is defined as connected, although not necessarily directly and not necessarily

mechanically. A device or structure that is "configured" in a certain way is configured in at least that way, but may also be configured in ways that are not listed.

[00165] It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or "processing devices") such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.

[00166] Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer- readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM

(Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation .

[00167] The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.