System and Method for Securing Wireless Communications
First Claim
1. A method for secure communications by a first user, the method comprising:
- estimating a channel between the first user and a second user, thereby producing a first channel estimate comprising a first gain estimate and a first phase estimate of the channel;
transmitting a first public information regarding the first channel estimate to the second user; and
generating a first block of secret bits based on the first channel estimate.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user based on a pilot signal transmitted by the second user, determining a first threshold and a second threshold based on the estimate of channel, selecting a first subset of channel estimates, signaling the first subset of channel estimates to the second user, receiving a second subset of channel estimates from the second user, for each channel estimate in the second subset of channel estimates, quantizing the channel estimate based on a relationship between a gain of the channel estimate and the first threshold and the second threshold, generating a first secret key based on quantized channel estimates, verifying that the first secret key matches a second secret key generated by the second user, and transmitting information to the second user.
20 Citations
32 Claims
-
1. A method for secure communications by a first user, the method comprising:
-
estimating a channel between the first user and a second user, thereby producing a first channel estimate comprising a first gain estimate and a first phase estimate of the channel; transmitting a first public information regarding the first channel estimate to the second user; and generating a first block of secret bits based on the first channel estimate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for secure communications by a second user, the method comprising:
-
receiving a first public information from a first user; estimating a channel between the second user and the first user, thereby producing a second channel estimate comprising a second gain estimate and a second phase estimate of the channel; and generating a second block of secret bits based on the first public information and the second gain estimate and the second phase estimate of the channel. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A communications device comprising:
-
a channel estimate unit configured to estimate a channel between the communications device and a remote communications device; a threshold unit coupled to the channel estimate unit, the threshold unit configured to determine one or more thresholds based on the channel estimate; a channel select unit coupled to the channel estimate unit, the channel select unit configured to select channel estimates; and a key generate unit coupled to the channel estimate unit, the key generate unit configured to generate secret bits based on a gain of the channel estimate and a phase of the channel estimate. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A device for secure communications, the device comprising:
-
a channel estimator configured to estimate a channel between the device and a second device, thereby producing a first channel estimate comprising a first gain estimate and a first phase estimate of the channel; a transmitter configured to transmit a first public information regarding the first channel estimate to the second device; and a generator configured to generate a first block of secret bits based on the first channel estimate. - View Dependent Claims (27, 28, 29)
-
-
30. A device for secure communications, the device comprising:
-
a receiver, configured to receive a first public information from a second device; a channel estimator, configured to estimate a channel between the second device and the device, thereby producing a second channel estimate comprising a second gain estimate and a second phase estimate of the channel; and a generator, configured to generate a second block of secret bits based on the first public information and the second gain estimate and the second phase estimate of the channel. - View Dependent Claims (31, 32)
-
Specification