Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PHYSICAL LAYER ENCRYPTION USING OUT-PHASED ARRAY LINEARIZED SIGNALING
Document Type and Number:
WIPO Patent Application WO/2015/175374
Kind Code:
A1
Abstract:
Systems and techniques for physical layer encryption (PLE) using beamforming. The techniques are based on the principles of Linear Amplification with Nonlinear Components (LINC) to produce a transmit signal with limited dynamic range. A masking signal is structured based upon a source data signal to produce a transmit signal with limited dynamic range, while providing a high degree of secrecy.

Inventors:
TOLLEFSON ERIC R (US)
JORDAN JR BRUCE R (US)
Application Number:
PCT/US2015/030085
Publication Date:
November 19, 2015
Filing Date:
May 11, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MASSACHUSETTS INST TECHNOLOGY (US)
International Classes:
H04K1/02
Foreign References:
US20030091184A12003-05-15
US4949289A1990-08-14
US20060153375A12006-07-13
US20110246854A12011-10-06
Other References:
HONG ET AL.: "RF Directional Modulation technique Using a Switched Antenna Array for Physical Layer Secure Communication Applications.", PROGRESS IN ELECTROMAGNETICS RESEARCH, vol. 116, 2011, pages 363 - 379, XP055237544, Retrieved from the Internet [retrieved on 20150723]
GARCIA ET AL.: "Nonlinear Distortion Cancellation Using LINC Transmitters in OFDM systems.", IEEE TRANSACTIONS ON BROADCASTING, vol. 51, no. 1., March 2005 (2005-03-01), pages 84 - 93, XP011127920, Retrieved from the Internet [retrieved on 20150723]
GOEL ET AL.: "Secret Communication in Presence of Colluding Eavesdroppers.", MILITARY COMMUNICATIONS CONFERENCE., 2005, XP010901387, Retrieved from the Internet [retrieved on 20150723]
CHOWDHURY ET AL.: "A New Symmetric Key Encryption Algorithm based on 2-d Geometry.", INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY., 2009, XP031434082, Retrieved from the Internet [retrieved on 20150723]
Attorney, Agent or Firm:
LANGE, Kristoffer, W. et al. (Crowley Mofford & Durkee, LLP,354A Turnpike Street,Suite 301, Canton Massachusetts, US)
Download PDF:
Claims:
CLAIMS

1. A method for generating an physical layer encrypted communication, comprising: receiving a modulated data signal;

generating a structured masking signal based upon the modulated data signal; selecting a plurality of mask coefficients, each of the plurality of mask coefficients selected from a set of possible mask coefficients;

applying the mask coefficients to the structured masking signal to generate a plurality of masking signals;

combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals; and

applying at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction.

2. The method of claim 1 further comprising applying noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals.

3. The method of claim 1 wherein generating a structured masking signal based upon the modulated data signal comprises selecting a point on a circle having predetermined radius based upon the data signal.

4. The method of claim 3 further comprising receiving a mask power level (Rmax), wherein the radius of the circle is determined based upon the mask power level.

5. The method of claim 4 wherein generating a structured masking signal based upon the modulated data signal (a[k]) comprises computing

6. The method of claim 5 further comprising generating a table of solutions to vames αΜ> wherein generating a structured masking signal

based upon the modulated data signal comprises selecting a value from the table of solutions.

7. The method of claim 1 wherein selecting a plurality of mask coefficients comprises selecting a plurality of random numbers.

8. The method of claim 1 wherein selecting a plurality of mask coefficients comprises selecting a plurality of mask that sum to zero.

9. The method of claim 1 further comprising generating a plurality of possible mask coefficient vectors, wherein selecting a plurality of mask coefficients comprises randomly selecting a mask effective vector from the plurality of possible mask coefficient vectors.

10. The method of claim 1 wherein applying the mask coefficients to the structured masking signal to generate a plurality of masking signals comprises modulating the structured masking signal by ones of the plurality of mask coefficients.

1 1. The method of claim 1 wherein combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals comprises summing the modulated data signal with ones of the plurality of masking signals.

12. The method of claim 1 further comprising transmitting each of the transmit signals via a respective transmit antenna.

13. The method of claim 12 wherein transmitting each of the transmit signals comprises transmitting via a phased array.

14. A system for physical layer encrypted communication, comprising:

a data source;

a plurality of transmit antennas; and

a processor coupled to the input source and the transmit antennas, the processor configured to:

receive a modulated data signal from the data source;

generate a structured masking signal based upon the modulated data signal; select a plurality of mask coefficients, each of the plurality of mask

coefficients selected from a set of possible mask coefficients; apply the mask coefficients to the structured masking signal to generate a plurality of masking signals;

combine the modulated data signal with the masking signals to generate a plurality of masked data signals;

apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the plurality transmit signals having a null in a predetermined direction; and

transmit each of the plurality of transmit signals via a corresponding one of the plurality of transmit antennas.

15. The system of claim 14 wherein the processor is further configured to apply noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals.

16. The system of claim 14 wherein the processor is configured to generate a structured masking signal by selecting a point on a circle having predetermined radius.

17. The system of claim 14 wherein the processor is configured to select a plurality of mask coefficients that sum to zero.

18. The system of claim 14 wherein the transmit antennas are provided within a phased array.

19. A system for physical layer encrypted communication, comprising:

a data source to generate a modulated data signal;

a mask generator coupled to receive the data signal and configured to generate a structured masking signal based upon the modulated data signal;

a mask coefficient generator coupled to receive the structured masking signal and configured to multiple the structured masking signal by each of a plurality of mask coefficients to generate a plurality of masking signals, each of the plurality of mask coefficients selected from a set of possible mask coefficients; a combiner coupled to combine the modulated data signal with each of the

plurality of masking signals to generate a plurality of masked data signals;

a pulse-shaping module coupled to receive the plurality of masked data signals and configured to apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction; and a plurality of transmit antennas, each of the plurality of transmit antennas coupled to transmit a correspond one of the plurality of transmit signals.

Description:
PHYSICAL LAYER ENCRYPTION USING OUT-PHASED ARRAY

LINEARIZED SIGNALING

CROSS REFERENCE TO RELATED APPLICATION

This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. 61/991 ,824 filed May 12, 2014, and of U.S. Provisional Application No. 61/992,354 filed May 13, 2014, which applications are incorporated herein by reference in their entireties.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH

This invention was made with Government support under Contract No. FA8721-05-C- 0002 awarded by the U.S. Air Force. The Government has certain rights in the invention.

BACKGROUND

As is known in the art, physical layer encryption (PLE) is a set of techniques that rely on information theory and the concept of channel capacity for security. Unlike traditional encryption, such as private- and public-key systems, PLE is not vulnerable to computational attacks and can offer perfect forward security. Many PLE techniques work by artificially degrading the eavesdropper's channel so that their channel capacity is not sufficient to recover the information being sent. For example, a masking signal may be added to a communication signal such that it has a null in the direction of an intended receiver. For all other directions spatially separated from the intended receiver, an eavesdropper will receive a combination of the communication and masking signals, with the masking signal dominant. This degrades the information capacity of the eavesdropper channel, making it difficult or impossible to recover the transmitted information.

PLE is generally quantified by a measure called secrecy capacity. This represents the difference in channel capacity between the intended receiver and the eavesdropper. A positive secrecy capacity means that the intended receiver has a higher capacity than the eavesdropper and the communication link can be configured so that the receiver can demodulate the data and the eavesdropper cannot by choosing an appropriate rate and encoding scheme. If the secrecy capacity is negative, then the eavesdropper will be able to demodulate any message that the intended receiver can and secrecy fails.

One example a PLE technique is called Additive Artificial Noise (AAN) in which a transmitted signal is expressed as:

XAAN O) = w s(t) + z(t) · n(t) 0) z(t) 6 N(h), \\z(t) || = 1 (2) where z(t) is a basis vector in the null space of the complex channel vector, vector h, s(t) is the communication signal, w is the set of complex beam-forming weights, and n(t) is a Gaussian random variable with variance selected according to the desired power division between signal and artificial noise. The choice of a basis vector in the null space of the channel ensures that the artificial noise does not appear in the intended receiver.

Another family of techniques is called Directional Modulation (DM), in which a different weighting vector is chosen for each symbol in the transmit constellation in order to form the desired vector at the intended receiver. This causes receivers in other positions to receive a constellation with distorted but still distinct symbols.

Determining the necessary weighting vector is an unbounded problem and generally requires the use of matrix inversion or optimization techniques. An improvement on this technique chooses a different weighting vector each time a given symbol appears. This is sometimes called Dynamic DM. This addresses the vulnerability of so-called Static DM systems to eavesdropping techniques which can resolve the distorted constellation by changing the pattern of distortion continuously.

SUMMARY

It has been appreciated herein that existing physical layer encryption (PLE) techniques, such as Additive Artificial Noise (AAN) and Directional Modulation (DM), do not provide a sufficiently high degree of secrecy, are difficult to implement, and/or are computationally expensive.

Disclosed herein are concepts, structures, and techniques to provide a high degree of secrecy while being relatively easy to implement in a practical system. The disclosure provides an implementation of PLE using a transmit antenna array and a novel beamforming scheme. The techniques are based on the principles of Linear

Amplification with Nonlinear Components (LINC), are computationally simple relative to existing PLE techniques, and provide secrecy comparable to noise-based masking and produces a signal with limited dynamic range.

According to one aspect of the disclosure, a method for generating an physical layer encrypted communication, comprises: receiving a modulated data signal; generating a structured masking signal based upon the modulated data signal; selecting a plurality of mask coefficients, each of the plurality of mask coefficients selected from a set of possible mask coefficients; applying the mask coefficients to the structured masking signal to generate a plurality of masking signals; combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals; and applying at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction.

In some embodiments, the method further comprises applying noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals.

In certain embodiments, generating a structured masking signal based upon the modulated data signal comprises selecting a point on a circle having predetermined radius based upon the data signal. The method may further comprise receiving a mask power level (R m a.x) > wherein the radius of the circle is determined based upon the mask power level. Generating a structured masking signal based upon the modulated data signal (a[k]) may comprise computing / ^^z 1· To improve efficiency, the method can include generating a table of solutions to / I„ 2 — 1 for various values

° ° ^ ll aW II 2

a[k], wherein generating a structured masking signal based upon the modulated data signal comprises selecting a value from the table of solutions.

In various embodiments, selecting a plurality of mask coefficients comprises selecting a plurality of random numbers. In some embodiments, selecting a plurality of mask coefficients comprises selecting a plurality of mask that sum to zero. In certain embodiments, the method further comprises generating a plurality of possible mask coefficient vectors, wherein selecting a plurality of mask coefficients comprises randomly selecting a mask effective vector from the plurality of possible mask coefficient vectors. In some embodiments, applying the mask coefficients to the structured masking signal to generate a plurality of masking signals comprises modulating the structured masking signal by ones of the plurality of mask coefficients. In various embodiments, combining the modulated data signal with the plurality of masking signals to generate a plurality of masked data signals comprises summing the modulated data signal with ones of the plurality of masking signals.

In certain embodiments, the method further comprises transmitting each of the transmit signals via a respective transmit antenna, which may include transmitting via a phased array.

According to another aspect of the disclosure, a system for physical layer encrypted communication, comprises a data source, a plurality of transmit antennas, and a processor coupled to the input source and the transmit antennas. The processor may be configured to: receive a modulated data signal from the data source; generate a structured masking signal based upon the modulated data signal; select a plurality of mask coefficients, each of the plurality of mask coefficients selected from a set of possible mask coefficients; apply the mask coefficients to the structured masking signal to generate a plurality of masking signals; combine the modulated data signal with the masking signals to generate a plurality of masked data signals; apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the plurality transmit signals having a null in a predetermined direction; and transmit each of the plurality of transmit signals via a corresponding one of the plurality of transmit antennas.

In some embodiments, the processor is further configured to apply noise to the modulated data signal to increase a bit error rate (BER) associated with the transmit signals. In various embodiments, the processor is configured to generate a structured masking signal by selecting a point on a circle having predetermined radius. In certain embodiments, the processor is configured to select a plurality of mask coefficients that sum to zero. In some embodiments, the transmit antennas are provided within a phased array. According to another aspect of the disclosure, a system for physical layer encrypted communication comprises: a data source to generate a modulated data signal; a mask generator coupled to receive the data signal and configured to generate a structured masking signal based upon the modulated data signal; a mask coefficient generator coupled to receive the structured masking signal and configured to multiple the structured masking signal by each of a plurality of mask coefficients to generate a plurality of masking signals, each of the plurality of mask coefficients selected from a set of possible mask coefficients; a combiner coupled to combine the modulated data signal with each of the plurality of masking signals to generate a plurality of masked data signals; a pulse-shaping module coupled to receive the plurality of masked data signals and configured to apply at least one of a weighting signal and a phasing signal to each of the plurality of masked data signals to generate a plurality of transmit signals, the transmit signals having a null in a predetermined direction; and a plurality of transmit antennas, each of the plurality of transmit antennas coupled to transmit a correspond one of the plurality of transmit signals.

BRIEF DESCRIPTION OF THE DRAWINGS

The concepts, structures, and techniques sought to be protected herein may be more fully understood from the following detailed description of the drawings, in which:

FIG. 1 is a diagrammatic view illustrating operation of a masking transmitter;

FIG. 2 is a block diagram of a masking transmitter architecture for use within the communications system;

FIG. 3 is a block diagram of an illustrative masking transmitter for use within a communications system;

FIGS. 4A-4J, 5 A, and 5B are constellation plots illustrating the security provided by the techniques and structures disclosed herein; and

FIG. 6 is a flow diagram of an illustrative method for use within a masking transmitter.

The drawings are not necessarily to scale, or inclusive of all elements of a system, emphasis instead generally being placed upon illustrating the concepts, structures, and techniques sought to be protected herein. DETAILED DESCRIPTION

Referring to FIG. 1 , an illustrative operational scenario includes a masking transmitter 102, an intended receiver 104, and one or more eavesdroppers 106. The masking transmitter 102 transmits information in the direction of the intended receiver 104 via a main beam 108, while transmitting a mask 110 in other directions to prevent eavesdroppers 106 from receiving the information. Thus, the transmitter 102 uses physical layer encryption (PLE) to securely communications with the intended receiver 104.

The masking transmitter 102 may correspond to a wireless transmit platform, such as a node in a cellular or Wi-Fi network, a base station, or a satellite transmit platform. The transmitter 102 is configured to wirelessly communicate with the intended

receiver 104 by generating and transmitting the signals in free space. In some embodiments, the transmitter 102 generates a masking signal which is added to the communication signal such that the resulting mask 110 has a null 1 11 in the direction of intended receiver 104. An eavesdropper 106 receives a combination of the communication and masking signals (as illustrated by mask 1 10), with the masking signal dominant to degrade the information capacity of the eavesdropper channel.

In some embodiments, the masking transmitter 102 comprises a conventional radio frequency (RF) transmitter adapted to utilize PLE techniques disclosed herein.

Advantageously, the PLE techniques disclosed herein can be added to transmitters of existing communication systems without having to modify the receivers (e.g., an RF receiver at intended receiver 104). Existing cellular and Wi-Fi transmitters make extensive use of powerful signal processing and multiple-antenna systems already and, thus, can be adapted to perform the relatively low-complexity PLE techniques disclosed herein. In addition, existing cellular and Wi-Fi systems have a relatively large quantity of deployed receivers, which would benefit from this technology without requiring upgrades.

The receiver 104 may correspond to a wireless receiver platform. In embodiments, the receiver 104 comprises a conventional radio receiver. The receiver may be located on a mobile platform, including but not limited to an aerial platform, a ground-based platform, or a water-based platform (e.g. an aircraft, a ground-based vehicle, or a watercraft). As mentioned, the PLE techniques disclosed herein can be used without requiring any changes to the intended receiver 104. To the intended receiver, the communication signal appears unchanged (as illustrated beam 108) whether the transmitter is a masking transmitter or a conventional transmitter. This has the benefit of allowing existing transmitters to be upgraded individually and for staged deployment.

In some embodiments, the masking transmitter 102 tracks the relative position of the intended receiver 104 and uses beam steering to direct the main beam 108 thereto. For example, masking transmitter 102 may include a phased array which provides adjustable phase relationships among the antenna elements to direct the main beam 108.

Referring to FIG. 2, a masking transmitter architecture 200 can be used within a masking transmitter, such as masking transmitter 102 of FIG. 1. The illustrative architecture 200 includes a data source 202, a mask generation network 204, a pulse- shaping and beamforming network 206, and an antenna array 208. The antenna array 208 includes an arbitrary number (N) of antenna elements, which may be evenly spaced as shown. Those of ordinary skill in the art will appreciate after reading the disclosure provided herein that the antenna array 208 may be provided having even element spacing. In some embodiments, the antenna array 208 is provided as a phased array.

The data source 202 generates, or otherwise provides, a modulated data signal. The modulated data signal can be represented as a vector of complex-valued data symbols, where a[k] denotes the complex data symbol at time k. The mask generation network 204 is coupled to receive the modulated data signal and configured to generate a plurality of masking signals. The masking signals are selected (or

"structured") based upon the data signal using techniques disclosed herein. The masking symbols can also be represented as a vector of symbols, where M n [k] denotes the symbol for the n th masking signal at time k. The modulated data signal is combined with the masking signals to generate a plurality of masked data signals. As shown in FIG. 2, the data signal may be summed with each of the masking signals on a symbol-by-symbol basis. The pulse-shaping and beamforming network 206 receives the masked data signals and generates a plurality of transmit signals which can be transmitted into free space via antenna array 208. The number of generated masking signals and masked data signals may be equal to the number of transmit antennas (N).

In the embodiment shown, the network 206 applies a beamfonning weight w n to each masked signal n, which is then filtered using a continuous-time band-liming pulse. In some embodiments, the filters, denoted g(t), are provided as square-root Nyquist filters with bandwidth where T is a selected signaling interval. Thus, the signal transmitted on the n th of N antenna elements may be a continuous-time signal expressed as

¾(t) = w n (a[k] + M n [k])g(t - kT) . (3)

In general, the weights w n determine the boresight of the antenna array 208. In this example, the weights are selected to be w n = 1 so that the array boresight is directed along the x-axis 210 where an intended receiver 212 is located.

If the antenna elements are evenly spaced at a distance d wavelengths apart, the received signal at an angle Θ off the x-axis can be expressed as r(t; 0) = Y∑^ s n (t) e^ d cos e + <p(t) (4) where y is a constant path-loss component due to propagation and φ(ί) is additive white Gaussian noise (AWGN) with a power spectral density ^ 0 / 2■ From equations

(3) and (4) it will be appreciated that the choice of the masking signal M n [k] can have a significant effect the signal fidelity of a receiver as a function of Θ.

In various embodiments, the restriction∑^=o M n [k] = 0 is imposed such that the masking signals impart no interference on the intended receiver 212. A simple choice for the mask is to set M n [k] = 0 for all n and k which reduces the system to a traditional beamforming array. This method suffers from side-lobes 216 off the main beam 218 which are vulnerable to an eavesdropper 214 employing a high-gain antenna. Existing PLE techniques, such as Additive Artificial Noise (AAN), may improve upon traditional beamforming by selecting M n [k] to be AWGN such that the power level makes decoding off the beam difficult (or even impossible). The constraint∑n=o W n W = 0 must still be met to satisfy the cancellation requirement at the intended receiver and the standard deviation of the noise, σ Μ can be chosen to satisfy the security requirements. Note that this condition is a subset of the more general null-space formulation described in (2) in the Background section above. While this approach provides security, the transmitter efficiency is greatly diminished as the signal's peak-to-average power ratio (PAPR) increases significantly.

The mask generation network 204 generates masking signals using a technique based on the principles of outphasing amplification techniques and, more particularly, of linear amplification using non-linear components (LINC). LINC systems include a signal component separator which produces constant-envelope branch signals by combining the communication signal with a linearizing signal. Likewise, mask generation network 204 generates masking signals based upon the definition of an envelope correction factor. Given a complex-valued data signal a, a linearizing signal (also referred to herein as a "structured masking signal") can be computed as

0 < \\a[k] \\ < R r

e[k] = S UalkW

o, otherwise

and can be used to create two sub-components of the original signal,

a + [k] = a[k] (l + e[k]) (6) a ~ [k] = a[k] l - e[k]) . (7)

These sub-components have properties of note:

1. summing them together produces a scaled version of the original sample, viz a + [k] + a ' [k] = 2a[k]; and

2. \\a + [k] \\ = \\a- [k] \\ = R max provided that ||a[fc] || < R max .

The first property provides the masking condition to prevent distortion for the intended receiver 212. The second property provides a constant amplitude signal, which reduces PAPR and thus reduces the required amplifier performance.

The n th masked data signal can be defined as:

M n [k] = a[k]e[k]r n [k] (8) where r n [k] is the n th element of mask coefficient vector, sometimes referred to as a "scrambling vector." In some embodiments, the mask coefficient vector is selected such that: ir n [k] = ±l, r n [k] = 0 Vk] (9)

The mask coefficients may be randomly generated on a per-symbol basis to randomly assign either a + [k] or a ~ [k] to each data signal value with the condition that there must always be an equal number of each. This maintains the condition∑^=o M n [k] = 0 V/, guaranteeing that the masked signal cancels at the intended receiver 212.

It is appreciated that the masking technique described hereinabove is a generalization on conventional LI C, which can be expressed using the formulation above by setting N = 2 and r T = [—1, 1] for two branches with r fixed. Moreover, randomly generating the mask coefficients for each symbol has the same effect of generating a different distortion for each symbol as in Dynamic Directional Modulation (DM).

The transmitted signals can be seen to be a superposition of a standard beamformed signal with the noise-like vector (i.e., a mask). Based on the structure of the masking signals described hereinabove, the masking signals cancel at the intended

receiver's 212 location. For a receiver away from the main lobe 218, this cancellation does not occur and so the signal is corrupted. This degrades an eavesdropper's 214 channel capacity and ensures a positive secrecy capacity so that the transmission can be protected from interception.

Using the techniques and structures described above, a transmitter can produce two distinct areas of reception: a ciphertext region 220 and a plaintext region 222. These two regions differ in the fact that within the plaintext region 222 the communication signal 218 dominates, while in the ciphertext region 220 the masking signal 224 dominates. In terms of system security, the plaintext region 212 can be treated as though it is an area denied to the adversary; that is, the adversary is limited to only placing eavesdroppers 214 in the ciphertext region 220. It is noted that while the terms "ciphertext" and "plaintext" are usually used to denote cryptographic solutions, here they are used to denote whether or not a communication signal is obfuscated by the masking signal. It will be appreciated that the PLE techniques described herein can be used to make it difficult (or even impossible) for an eavesdropper 214 within a ciphertext region 220 to recover a communications signal, even if the eavesdropper is a highly capable adversary (e.g., even if an eavesdropper has perfect knowledge of the transmitter and waveform, including knowledge of the modulation scheme, the encoding, the frame structure and any other transmitter-specific parameters required, can estimate the correct time and phase offsets to recover the symbols, and has better gain than the intended receiver 212).

It should be understood that the concepts, and structures, and techniques sought to be protected herein are not limited to the specific masking signal formulations described hereinabove and that other formulations may be used. For example, quad LINC, which is described by Hegazi et al. ("Improved LINC power transmission using a quadrature outphasing technique," Microwave Symposium Digest, 2005 IEEE MTT-S

International, 12-17 June 2005) is similar to the standard LINC formulation previously discussed except that it is performed separately on the I and Q components of the data signal. This results in four different branch signals which would then be randomized among the array elements.

Another possible choice of masking signal is a multi-level LINC formulation, such as the multi-level LINC formulation described within the aforementioned Hegazi et al. paper. The basic concept of multi-level LINC is to form branch signals with multiple discrete amplitude levels, as opposed to a single level for standard LINC.

In addition, multiple masking signal techniques may be implemented within a single masking transmitter. For example, both standard LINC and quad LINC can be implemented in parallel and share some resources. Such a transmitter can switch between standard and quad for different modulation types. The transmitter could also interleave the two masking signals at the symbol rate, which would increase the number of combinations for an improvement in the secrecy capacity.

Referring to FIG. 3, an illustrative masking transmitter 300 includes a data source 302, a mask generator 304, a mask coefficient generator 306, an interpolation/pulse-shaping module 308, and a beamformer 310. In some embodiments, the transmitter 300 further includes a noise source 312. The components 302-312 may be coupled together as shown, or in any other suitable configuration. Each connection may be provided as a hardware-based connection, a software-based connection, or a connection provided from a combination of both hardware and software.

It should be appreciated that masking transmitter 300 generally conforms to the architecture 200 and, thus, the concepts and techniques described above in conjunction with FIG. 2 may apply herein. In particular, data source 302 may correspond to data source 202; mask generator 304 and mask coefficient generator 306 may collectively correspond to mask generation network 204; and interpolation/pulse-shaping module 308 and beamformer 310 may collectively correspond to pulse-shaping and

beamforming network 206.

The data source 302 generates (or otherwise provides) modulated data signal 314. For simplicity of explanation, signal paths and respective signals carried on those signal paths are shown using common reference designators in FIG. 2. For example, the modulated data signal may be carried on a respective signal path 314, as shown.

The mask generator 304 is coupled to receive the modulated data signal 314 and configured to generate a structured masking signal 316 based upon the data signal 314. In some embodiments, the mask generator 304 also receives a mask power level 318, used to control the ratio between signal and mask power. To generate the structured masking signal 316, the mask generator 304 may utilize an implementation of equation (5), where R max corresponds to mask power level 318 and a[k] corresponds to a complex data symbol associated with data signal 314 at time k. In some embodiments, the square-root function of equation (5) is tabulated and stored within the transmitter 300 to reduce computation costs.

The mask coefficient generator 306 generates a plurality of mask coefficients 320, which are combined with structured masking symbol 316 to generate a plurality of masking signals 322. As discussed about in conjunction with FIG. 2, a vector of mask coefficients (or "scrambling vector") can be randomly generated on a per-symbol basis subject to certain constraints. For example, as shown in formula (9), the mask coefficients should sum to zero so that cancellation that cancellation occurs at an intended receiver. The mask coefficient generator 306 can be synchronous with the data source 302, but this is not necessarily required. In some embodiments, the mask coefficient generator 306 generates a vector of randomly selected values using a pseudo-random number generator (PRNG) or other suitable device.

In particular embodiments, a set of possible mask coefficient vectors may be tabulated and stored within the transmitter 300 to reduce computational costs. However, it may be impractical to pre-compute and/or store all such possible vectors. Thus, the mask coefficient generator 306 may choose to tabulate a subset of all possible mask coefficient vectors; choosing the population of this table can provide an optimization for various characteristics. For example, a subset of vectors can be chosen to provide a null in the masking signal at a particular angular location or to modulate the width of the null at the intended receiver. The subset chosen may be static or could be updated as the environment changes. So long as the size of the subset is not too small, security will not be significantly degraded. Alternatively, because all possible mask coefficient vectors are permutations of each other, the mask coefficient generator 306 may be initialized with a random vector and then perform a random shuffling routine, such as the Fisher- Yates algorithm, to generate a new random permutation for each update.

In some embodiments, the masking transmitter 300 includes a noise source 312. As discussed below in conjunction with FIGS. 4 and 5, introducing noise into the data signal can improve security. As shown, the noise source 312 generates a noise signal 330 which is added to the modulated data signal 314 to generate a "noisy" data signal 314'. The noise source 312 may use a PRNG, or other suitable device, with the amplitude fixed or variable for different modulation types. The noise source 312 may generate AWGN or any other suitable type of noise. As shown in FIG. 3, the structured signal 316 generated by mask generator 304 may be based upon the data signal 314 without noise added. In other embodiments, the noise source 312 is coupled such that the structured masking signal is based upon the "noisy" data signal. In other words, noise 330 can be added either "before" or "after" the mask is generated. It should be appreciated that, if the processing described herein is performed digitally, truncation noise due to the finite number of bits can act as an additive noise source and thus, an explicitly noise source 312 may be unnecessary to provide the desired security.

The masking signals 322 are combined with the modulated data signal 314 (or with the noisy data signal 314') to generate a plurality of masked data signals 326. The ratio between the power of data signal 314 and mask signal 322 may be varied by changing the mask power 318 (R max ). The mask power 318 may be fixed or may vary, typically on a long time-scale. It is appreciated that diverting additional transmit power to the masking signal will degrade the eavesdropper's ability to demodulate the transmitted signal, but may also reduce the intended receiver's channel capacity.

The interpolation/pulse-shaping module 308 and beamformer 310 are coupled to receive the masked data signals 326 and configured to generate a plurality of transmit signals 328, here N transmit signals. A conventional interpolation/pulse-shaping module 308 and/or beamformer 310 may be used. In a typical implementation, symbols are up-sampled to the required digital-to-analog converter (DAC) sample rate, which may be many times the symbol rate, and filtered by a pulse-shaping filter such as a root-raised cosine. In many applications this filter will sharply limit the spectrum of the transmitted signal for spectral efficiency; this does not impact the security of the masking transmitter 300 but will re-introduce some amplitude variation into the output signal. Some applications may omit the pulse-shaping filter or replace it with a less- sharp low-pass filter. The beamformer 310 applies appropriate phase weights to the transmit elements to steer the beam in the desired direction. It should be noted that, although the beamformer 310 is shown immediately before the antenna elements here, the implementation is equivalent if phase weights are applied to the data signal 314 and masking signals 322 separately.

Each transmit signal 328 may be coupled to a respective transmit antenna (not shown) for transmission into free space. In some embodiments, the transmit antennas are provided as an antenna array (e.g., a phased array), with each transmit signal 328 coupled to a respective one of N array antenna elements. In some embodiments, the number of antenna elements N is even.

In particular embodiments, one or more of the components 302-312 are resident within a digital signal processor (DSP) of the transmitter 300. A data signal may be generated elsewhere in the transmitter, supplied in digital form, and modulated to generate modulated signal 314. The transmit signals 328 can be supplied digitally to individual antenna elements (not shown). To retrofit an existing system, the

transmitter 300 may include a analog- to-digital converter to convert an analog data signal to digital data signal 314 and/or may include digital-to-analog converters to convert digital transmit signals 328 to analog transmit signals.

FIGS. 4A-4J, 5A, and 5B show a series of constellation plots (or, more simply, "constellations") wherein x-axes correspond to in-phase amplitude of a signal and the y-axes correspond to the quadrature amplitude of a signal.

FIGS. 4A-4J show a series of constellation plots illustrating the security provided by a masking transmitter, such as masking transmitter 300 of FIG. 3. The top row of plots, corresponding to FIGS. 4A, 4B, 4C, 4D, and 4E, illustrate 16-QAM constellations produced by a conventional transmitter as seen by a receiver at 0, 2, 5, 15, and 45 degrees off boresight, respectively. The bottom row of plots, corresponding to FIGS. 4F, 4G, 4H, 41, and 4J, illustrate 16-QAM constellations produced by a masking transmitter (e.g., masking transmitter 300 of FIG. 3) as seen by a receiver at 0, 2, 5, 15, and 45 degrees off boresight, respectively.

The security of a masking transmitter 300 may be linked to the number of transmit antennas N. A noise-like masking signal 322 has a discrete set of M possible values based on the two available signs and the number of possible combinations of the mask coefficients 320. For example, if N=8, M=70. For an eavesdropper, each transmitted symbol will take on M discrete values in the corrupted constellation. This is referred to as re-mapping, and results in a 16-QAM constellation being re-mapped into a relatively large number (e.g., 1 120) of different points. This re-mapping process is a function of the eavesdropper channel, such that two eavesdroppers in different locations will see different constellations. Assuming that the masking signal is synchronous to the data symbols, each symbol will appear at the eavesdropper in one of the M possible locations.

It can be seen from FIGS. 4F^J that an eavesdropper with a standard 16-QAM receiver will suffer an increasingly high error rate as it moves away from boresight (i.e., FIG. 4A) towards increasing off-angle positions (e.g., FIGS. 4G- J). However, because the masking signal is partially a function of the data signal, a security analysis must consider whether there is still information content useful to the eavesdropper.

If the eavesdropper has knowledge of the masking technique and the channel, it can determine the re-mapped constellation and attempt to recover the original transmitted symbols. There are also blind channel estimation and multi-user detection techniques that may allow estimation of the re-mapped constellation from the received signal at the eavesdropper. Thus, it is understood that an optimum eavesdropper could exist which would have perfect knowledge of the constellation re-mapping process along with other knowledge about the modulation and waveform structure being used.

Without any noise, knowledge of the re-mapped constellation will allow the eavesdropper to recover the original symbols and drive the secrecy capacity towards zero. However, the structure of the re-mapped constellation puts even the optimum eavesdropper at a disadvantage relative to the intended receiver. The re-mapped constellation has many more points than the original (by a factor of M, which may be very large) and so the average distance between points will be much smaller than in the transmitted constellation. Further, as seen in FIGS. 4F-4J, the distances between points are not equal and some are relatively close together. In order to recover the transmitted data without errors, the signal-to-noise ratio (SNR) must be very high, based upon the minimum point-to-point distance.

As discussed above, for the purpose of security analysis, it is assumed that an eavesdropper can achieve arbitrarily high SNR. This may be a result of the

eavesdropper has a relatively sensitive receiver (i.e., having a relatively high antenna gain and/or low noise temperature to achieve a relatively high gain-over-temperature figure-of-merit), being much closer than the intended receiver, or both. To mitigate the ability of such an eavesdropper to recover the original modulation under high-SNR conditions, a relatively small amount of noise (e.g., Gaussian white noise) can be added to the data signal, e.g., using noise source 312 in FIG. 3. This noise may be randomly added independently to each transmit signal so it appears uniformly to all receivers, including the intended receiver. The variance of the noise may be chosen so that the resulting SNR is well above what the intended receiver requires, but below the SNR required to recover the re-mapped constellation. In some embodiments, the variance is chosen to set the added noise point approximately twenty (20) to thirty (30) dB below the signal power, and may depend on the modulation being used.

FIGS. 5A and 5B show a standard constellation (i.e., a constellation produced by a conventional transmitter) and a re-mapped constellation (i.e., a constellation produced by masking transmitter 300), respectively, in the presence of modest noise. In this example, the noise represents an SNR of about twenty eight (28) dB, which from FIG. 5A can be seen to be easily high enough for essentially error- free reception of 16- QAM. FIG. 5B shows what an eavesdropper at 5 degrees offset would receive. Even with knowledge of the re-mapping, this eavesdropper would suffer a high error rate because many of the points are "smeared" together. This effect is known as

equivocation and illustrates the notion of information-theoretic security in that there is not enough information present in the signal even when an adversary (e.g., an eavesdropper) knows the technique being used. Other techniques may also be used individually or in conjunction to increase equivocation to an eavesdropper. Examples include but are not limited to varying R max over time, varying the rate at which the scrambling vector is updated, and switching between different masking signal designs over time.

FIG. 6 is a flow diagram showing illustrative processing that can be provided within a masking transmitter, such as masking transmitter 300 of FIG. 3. Rectangular elements (typified by element 602), herein denoted "processing blocks," represent computer software instructions or groups of instructions. Alternatively, the processing blocks may represent steps performed by functionally equivalent circuits such as a digital signal processor circuit or an application specific integrated circuit (ASIC). The flow diagram does not depict the syntax of any particular programming language. Rather, the flow diagram illustrates functional information one of ordinary skill in the art requires to fabricate circuits or to generate computer software to perform the processing required of the particular apparatus. It should be noted that many routine program elements, such as initialization of loops and variables and the use of temporary variables are not shown. It will be appreciated by those of ordinary skill in the art that unless otherwise indicated herein, the particular sequence of blocks described is illustrative only and can be varied without departing from the spirit of the concepts, structures, and techniques sought to be protected herein. Thus, unless otherwise stated the blocks described below are unordered meaning that, when possible, the functions represented by the blocks can be performed in any convenient or desirable order.

Referring to FIG. 6, a method 600, begins at block 602, where a modulated data signal is received, such as from data source 302. In some embodiments, at block 604, noise is added to the data signal. As discussed above, such noise can be added explicitly via a noise source 312 and/or implicitly as a result of digital signal processing (e.g., truncation noise). In other embodiments, noise is added to the data signal "after" a masking signal is generated, as illustrated with block 611.

At block 606, a structured masking signal is generated based upon the data signal (or "noisy" data signal). At block 608, a plurality of mask coefficients are selected from a set of possible mask coefficients and, at block 610, the mask coefficients are applied to the structured masking signal to generate a plurality of masking signals. Illustrative techniques for generating a structured mask signal, selecting mask coefficients, and generating masking signals are described above in conjunction with FIGS. 2 and 3.

At block 612, the data signal (or "noisy" data signal) is combined (e.g., summed) with the masking signals to generate a plurality of masked data signals. At block 614, a plurality of transmit signals are generated by applying at least one of a weighting signal and a phasing signal to each of the masked data signals. At block 616, each of the transmit signals may be transmitted via a respective transmit antenna (e.g., an element of an antenna array). In some embodiments, blocks 614 and 616 are performed by a phased array.

All references cited herein are hereby incorporated herein by reference in their entirety.

Having described certain embodiments, which serve to illustrate various concepts, structures, and techniques sought to be protected herein, it will be apparent to those of ordinary skill in the art that other embodiments incorporating these concepts, structures, and techniques may be used. Elements of different embodiments described hereinabove may be combined to form other embodiments not specifically set forth above and, further, elements described in the context of a single embodiment may be provided separately or in any suitable sub-combination. Accordingly, it is submitted that scope of protection sought herein should not be limited to the described

embodiments but rather should be limited only by the spirit and scope of the following claims.