Systems and methods for key generation in wireless communication systems
First Claim
1. A method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless transmission link, the method comprising the steps of:
- receiving a data transmission at a first transceiver from a second transceiver, wherein the data transmission identifies a source of a signal in the data transmission and the signal is identified by a signal envelope;
detecting a deep fade in the data transmission, wherein the first and second transceivers are configured to sample the source of the signal in the data transmission;
based on the sampling, determining whether the received signal exceeds a predetermined threshold for deep fades, wherein the predetermined threshold is preset by the first and second transceivers;
using the threshold for deep fades, generating a bit-string corresponding to each of the transceivers based on channel fading information relating to the wireless transmission link; and
using the bit-string, generating a key.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and a method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless transmission link are disclosed. The method includes receiving a data transmission at a first transceiver from a second transceiver, wherein the data transmission identifies a source of a signal in the data transmission and the signal is identified by a signal envelope; detecting a deep fade in the data transmission, wherein the first and second transceivers are configured to sample the source of the signal in the data transmission; determining whether the received signal exceeds a predetermined threshold for deep fades, wherein the predetermined threshold is preset by the first and second transceivers; generating a bit-string corresponding to each of the transceivers based on channel fading information relating to the wireless transmission link; and, using the bit-string, generating a key.
31 Citations
35 Claims
-
1. A method for providing a secure wireless ad-hoc network in a wireless communication system having at least two transceivers coupled by a wireless transmission link, the method comprising the steps of:
-
receiving a data transmission at a first transceiver from a second transceiver, wherein the data transmission identifies a source of a signal in the data transmission and the signal is identified by a signal envelope; detecting a deep fade in the data transmission, wherein the first and second transceivers are configured to sample the source of the signal in the data transmission; based on the sampling, determining whether the received signal exceeds a predetermined threshold for deep fades, wherein the predetermined threshold is preset by the first and second transceivers; using the threshold for deep fades, generating a bit-string corresponding to each of the transceivers based on channel fading information relating to the wireless transmission link; and using the bit-string, generating a key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing private and secure communications in wireless communication networks by generating a cryptographic key between a pair of nodes communicating on a wireless link in a wireless ad-hoc network, the method comprising the steps of:
-
periodically detecting deep fades in the data transmission between transceivers, wherein said detecting includes each node sampling the signal it receives, wherein the signal is characterized by a signal envelope; and determining whether the signal exceeds an agreed-upon threshold for deep fades; generating a bit stream from the detected deep fades based on a predetermined threshold preset by both nodes of the wireless link; comparing the envelope of the received signal over a time slot with the predetermined threshold; and
,generating a secret key. - View Dependent Claims (18, 19)
-
-
20. A system for providing a secure wireless ad-hoc network in a wireless communication system, comprising
at least two transceivers coupled by a wireless transmission link, the transceivers configured to: -
receive a data transmission at a first transceiver from a second transceiver, wherein data transmission identifies a source of a signal in the data transmission and the signal is identified by a signal envelope; detect a deep fade in the data transmission, wherein the first and second transceivers are configured to sample the source of the signal in the data transmission; based on the sampling, determine whether the received signal exceeds a predetermined threshold for deep fades, wherein the predetermined threshold is preset by the first and second transceivers; using the threshold for deep fades, generate a bit-string corresponding to each of the transceivers based on channel fading information relating to the wireless transmission link; and using the bit-string, generate a key. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification