A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The reference signal generating section generates a first reference signal to enable a communicating party to estimate a propagation environment. The transmitting section transmits the first reference signal. The propagation estimating section estimates a first propagation estimation value of the propagation environment using a second reference signal transmitted from the communicating party. The first data acquiring section generates first data using the first propagation estimation value. The decoding section decodes a transmission signal encoded using a second propagation estimation value that is estimated by the communicating party using the first reference signal, to obtain second data using the first data.
|
0. 8. A communication apparatus comprising:
a receiver that receives two signals, transmitted with a same frequency band at a same timing, the two signals having been subjected to a precoding process; and
a transmitter, which in operation, transmits a signal used for a determination of a phase of each of the two signals,
wherein at least a phase of each of the two signals is a modified phase that is based on the determined phase, and
wherein the modified phase of data of the two signals is different from phases of reference signals of the two signals; and
a demodulator that demodulates the two signals generated by the determined phase.
0. 7. A reception method performed by a communication apparatus, the reception method comprising:
receiving two signals, transmitted with a same frequency band at a same timing, the two signals having been subjected to a precoding process,
wherein a phase is selected in each of the two signals that were transmitted based on a signal from the communication apparatus,
wherein the precoding process is performed, after the phase for each of the two signals is selected, based on the signal from the communication apparatus,
wherein the precoding process includes changing at least a phase of each of the two signals in response to the selected phase, and
wherein the phase of data of the two signals is different from phases of reference signals of the two signals; and
demodulating a data signal included in the two signals.
0. 6. A communication apparatus comprising:
a transmission modulator that
generates two transmission signals by dividing a data signal,
selects a phase for each of the two transmission signals to be transmitted based on a signal from another communication apparatus, and
performs a precoding process on the two transmission signals, after the phase for each of the two transmission signals is selected, based on the signal from the other communication apparatus, wherein the precoding process includes changing at least a phase of each of the two transmission signals in response to the selected phase, and wherein the phase of data of the two transmission signals is different from phases of reference signals of the two transmission signals; and
a transmitter that transmits the two transmission signals subjected to the precoding process via different antennas, respectively, with a same frequency band at a same timing.
0. 5. A transmission method performed by a communication apparatus, the transmission method comprising:
generating two transmission signals by dividing a data signal;
selecting a phase for each of the two transmission signals to be transmitted based on a signal from another communication apparatus;
performing a precoding process on the two transmission signals, after the phase for each of the two transmission signals is selected, based on the signal from the other communication apparatus, wherein the precoding process includes changing at least a phase of each of the two transmission signals in response to the selected phase, and wherein the phase of data of the two transmission signals is different from phases of reference signals of the two transmission signals; and
transmitting the two transmission signals subjected to the precoding process via different antennas, respectively, with a same frequency band at a same timing.
0. 1. A communication apparatus, comprising:
a reference signal generating section that generates a first reference signal to enable a communicating party to estimate a propagation environment;
a transmitting section that transmits the first reference signal;
a storing section that stores a known signal known between the apparatus and the communicating party
a propagation estimating section that obtains correlation between the known signal and a second reference signal transmitted from the communicating party, and generates a delay profile as an estimation value of propagation environment;
a first data acquiring section that reads out first data associated with the delay profile generated in the propagation estimating section, from a reference table that associates the delay profile with the first data; and
a decoding section that decodes a transmission signal encoded and transmitted using an estimation value of the propagation environment estimated by the communicating party using the first reference signal, to obtain second data using the first data read out by the first data acquiring section.
0. 2. The communication apparatus according to
0. 3. The communication apparatus according to
0. 4. A communication method, comprising:
generating, in a first communication apparatus, a first reference signal to enable a second communication apparatus to estimate a propagation environment;
transmitting the first reference signal from the first communication apparatus to the second communication apparatus;
storing, in the first communication apparatus, a known signal known between the first communication apparatus and the second communication apparatus;
obtaining, in the first communication apparatus, correlation between the known signal and a second reference signal transmitted from the second communication apparatus, and generating, in the first communication apparatus, a delay profile as an estimation value of the propagation environment;
reading out, in the first communication apparatus, first data associated with the generated delay profile, from a reference table that associates the delay profile with the first data; and
decoding, in the first communication apparatus, a transmission signal encoded and transmitted using an estimation value of the propagation environment estimated by the second communication apparatus using the first reference signal, to second data using the first data read out.
|
The present invention relates to a technique used in a digital communication, and more particularly, to a security technique.
Digital wireless communications have occupied an important position in communication fields due to developments of the techniques. However, wireless communications use public controlled radio-signal spaces, and thus, include a fundamental problem that a third party can receive data. Therefore, there is always a risk that the communication content is intercepted by a third party and the information leaks.
In order to overcome the problems, the processing is performed currently for encrypting the communication information to prevent information from leaking when the information is intercepted.
Encryption of information is studied in various fields, and is applied in a variety of fields. This is principally based on a significant feature that security is ensured to a certain extent without varying the communication system.
However, since it is not possible to prevent encrypted communication information from being intercepted by a third party, a problem arises that the third party decrypts the encrypted communication information from the intercepted received information by consuming time.
It is an object of the present invention to ensure high security without varying the communication system greatly.
The object is achieved by acquiring, as confidential information, information of propagation environment estimated using a reference signal transmitted from a communicating party.
Embodiments of the present invention will be specifically described below with reference to accompanying drawings.
The invention using propagation information as encryption key information of security will be described below with reference to
The apparatus in
Receiving section 102 receives the RF signal and propagation information, controls the RF signal to be in a suitable reception state, and outputs a received signal. Propagation estimating section 103 estimates a propagation characteristic from the received signal to output the propagation information. Demodulation section 104 performs appropriate demodulation using the received signal and propagation information, and outputs demodulated information. Encryption key generating section 151 receives the propagation information, outputs encryption key information, and has coding section 105 and buffer section 106.
Coding section 105 extracts a characteristic from the propagation information, and generates and outputs the encryption key (first data). Buffer section 106 stores the coded encryption key, and outputs the stored encryption key information. Decoding section 107 receives the encryption key information and demodulated information, decodes the encryption of the demodulated information from the encryption key information, and outputs security data (second data). Reference signal generating section 108 generates a predetermined reference signal to output. Transmission modulation section 109 receives the reference signal, and modulates the signal into an RF signal to output.
The apparatus in
Transmission modulation section 252 modulates selected communication information to output an RF signal, and has modulation section 211 and transmitting section 212. Reference signal generating section 208 generates a predetermined reference signal to output. Encrypting section 209 receives the encryption key information and security data, encrypts the security data using the encryption key information, and generates and outputs encrypted information. Switch section 210 receives the reference signal and encrypted information, and selects either one to output communication information. Modulation section 211 modulates the selected communication information to output a modulated signal. Transmitting section 212 converts the modulated signal into an RF signal to transmit, and outputs the RF signal.
The base station (the encryption transmitting/receiving apparatus as illustrated in
The operation of the apparatus as illustrated in
Each state is output to receiving section 102 and demodulation section 104 as propagation information for reception demodulation parameters, and also output to encryption key generating section 151. Demodulation section 104 receives the received signal and propagation information, removes a multipath component from the received signal or adjusts the phase according to the propagation information to demodulate, and outputs demodulated. Encryption key generating section 151 extracts the characteristic of the propagation state from the propagation information output from reception demodulation section 150, and generates and stores an encryption key to output the encryption key information.
Coding section 105 receives the propagation information output from propagation estimating section 103, and extracts the characteristic of the propagation state of the received signal from the propagation information. For example, using a multipath state as an example, in multipath propagation formed of a plurality of propagation paths, the multipath characteristic can be detected using the correlation function.
Among thus obtained multipath electric field information, according to a predetermined method using a delay time and power of a path component with the detected maximum power, coding is carried out, and an encryption key used in encrypting is generated and output. Buffer section 106 receives and stores the generated encryption key, and outputs the encryption key information. Decoding section 107 receives the demodulated information and encryption key information, decodes the demodulated information according to a predetermined method, and outputs the security data. Transmitting section 152 generates a reference signal, and modulates the signal to output an RF signal. Reference signal generating section 108 generates the reference signal to estimate a propagation state for a communicating terminal targeted for communication to output. Transmission demodulation section 109 receives the reference signal, and performs modulation and frequency conversion on the signal to output an RF signal. The output RF signal is transmitted from antenna 101.
The operation of the apparatus as illustrated in
Encryption receiving section 253, where the RF signal input from antenna 201 is decoded in decoding section 207 and the security data is output, has the same configuration as that of the corresponding section in
Switch section 210 selects either the reference signal input from reference signal generating section 208 or the encrypted information input from encrypting section 209, and outputs the selected communication information. Transmission modulation section 252 modulates the selected communication information, and converts the resultant signal into an RF signal to output as a transmission signal. In other words, modulation section 211 receives the communication information, and performs predetermined modulation on the information to output as a modulated signal. Transmitting section 212 converts the input modulated signal into an RF signal to output. The RF signal is transmitted from antenna 201.
The above-mentioned operation will be described in terms of communication procedure with reference to
(0) Base Station and Terminal: Initialization
The base station and terminal are set for the initial state immediately after the power is supplied or a specific signal is received. At the same time, the frequency, time-synchronization, etc. is set according to predetermined procedures.
A predetermined time later after finishing the initial operation, the base station transmits control information in a control signal at predetermined time intervals.
Meanwhile, the terminal starts a search for the control signal after finishing the initial operation. When receiving the control signal transmitted from the base station, the terminal detects the time, frequency, etc. for synchronization with the time, frequency, etc. that the system has (system synchronization). After the system synchronization is finished properly, the terminal transmits a registration request signal for notifying the base station of existence of the terminal. In response to the registration request from the terminal, the base station transmits a registration permission signal and thus performs registration permission of the terminal.
(1) Base Station: Transmission of First Reference Signal
The base station transmits a reference signal for propagation estimation performed in the terminal as a first reference signal. Specifically, switch section 210 selects the reference signal generated in reference signal generating section 208 to output to transmission modulation section 252. Transmission modulation section 252 converts the selected communication information into an RF signal, and the signal is transmitted from antenna 201.
In the terminal awaiting the signal from the base station, propagation estimating section 103 detects the first reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal. Coding section 105 receives the propagation information from propagation estimating section 103, extracts the characteristic of the propagation state, and converts the extracted characteristic information into an encryption key. This operation will be described specifically later. The base station and terminal are assumed to share in advance the characteristic extracted in coding section 105 and a method of converting the characteristic into an encryption key. The converted encryption key is stored in buffer section 106, and encryption key information is output. The base station uses the encryption key as a first encryption key for subsequent communications.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal in the same way as described in procedure (1).
Upon receiving a signal from the terminal, the base station detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in (1), coding section 205 converts the propagation information output from propagation estimating section 203 into an encryption key, and buffer section 206 stores the encryption key information to output. The terminal uses the encryption key as a second encryption key for subsequent communications.
(3) Base Station: Transmission of Encryption
The base station switches switch section 210 to select encrypted information output from encrypting section 209. Using the second key obtained in procedure (2), encrypting section 209 encrypts the security data according to a predetermined method, and outputs the encrypted information. Switch section 210 selects the encrypted information, and outputs the communication information to transmission modulation section 252. Transmission modulation section 252 modulates the communication information, and the encrypted signal is transmitted from antenna 201 as an RF signal.
When the terminal receives the encrypted signal, reception demodulation section 150 demodulates the received signal to demodulated information. Decoding section 107 uses the demodulated information and the first key obtained in (1), and decodes the encryption according to a predetermined method to output the security data. Subsequently, the terminal repeats the encryption communication in procedure (3) and general communication.
A propagation path formed between communication terminals is determined uniquely corresponding to relative positions of the terminals, spatial form, reflectors and so on, and it is known that the propagation state formed from the base station to the terminal is the same as the propagation state formed from the terminal to the base station due to the reverse characteristic of optical propagation. Therefore, the same result is obtained in the propagation state (for example, delay profile) obtained in (1) and the propagation state obtained in (2). Further, the base station and terminal share procedures for converting the propagation information into an encryption key in advance. In other words, the encryption key (first key) obtained in (1) is the same as the encryption key (second key) obtained in (2), and can be used as common keys between communication terminals. As a result, in the communication procedure of (3), encryption and decoding is carried out using the common keys, and the information encrypted in the base station is decoded properly in the terminal.
A case is considered that all communications are intercepted by a third party using a third terminal in this situation. As described earlier, the propagation path is determined by a propagation space formed between the base station and terminal. Therefore, when communications of procedures (1) to (3) are observed in a position physically different from the base station or terminal, the propagation characteristic obtained between the third terminal and base station, or the third terminal and the terminal is different from that obtained in (1) or (2). Further, since the base station and terminal do not provide/receive a key for encryption, the third terminal cannot know the key.
In this way, it is understood that high security can be ensured in a physical layer of communication. Further, since it is possible to perform the processing basically independently of encryption and decoding using conventional arithmetic methods, there is an advantage that high security is expected by implementing the present invention in addition to conventional techniques.
In the above description, procedure (0) that is of initialization operation is explained under the assumption that the general operation is carried out, but is not a procedure required for the present invention.
Further, the propagation state is estimated by transmitting a reference signal in (1) or (2). This is because using the reference signal that is a known signal generally improves accuracy in estimation, and it is needless to say that propagation estimation can be carried out without using a reference signal particularly. In other words, for example, it is possible to perform propagation estimation using a control signal, registration request signal and registration permission signal performed in (0).
The invention as described above has a feature of using the propagation state as an encryption key, and therefore, there is a fear of occurrence of a problem when the base station or terminal moves. In this case, by repeating transmission and reception of reference signal as indicated by (1′), (2′) and (3′) in
Thus, according to the communication apparatus and communication system of Embodiment 1, propagation estimating section 103 estimates the propagation environment based on the reference signal, and outputs an estimation value that is a propagation parameter such as a correlation function, while coding section 105 outputs data obtained from the estimation value, whereby the base station and terminal do not need to provide/receive a key for encryption, the third terminal cannot know the key, and it is possible to ensure high security in a physical layer of communication without changing the communication system greatly. Further, according to the communication apparatus and communication system of Embodiment 1, since it is possible to ensure the security by the processing independent from encryption and decoding using conventional arithmetic methods, extremely high security can be ensured by using the conventional encryption and decoding techniques together. Furthermore, according to the communication apparatus and communication system of Embodiment 1, since a coding pattern can be varied corresponding to the propagation state, it is possible to perform communications resistant to changes in environment. Still furthermore, according to the communication apparatus and communication system of Embodiment 1, since an encryption key can be acquired by obtaining a propagation parameter from the estimated propagation environment, it is possible to transmit/receive information using a non-modulated signal.
In addition, in Embodiment 1, decoding section 107 uses the encryption key information output from buffer section 106 as an encryption key to decode the security key, but the present invention is not limited to such a case. It may be possible to use the encryption key information output from buffer section 106 as an encryption key to decode security data other than the security data decoded in decoding section 107. In this case, the need of decoding section 107 is eliminated. Although in Embodiment 1 the delay profile is used as a parameter indicating the propagation state, it is considered using a polarization state such as a polarization plane and circulating direction, phase information, propagation delay time, direction of arrival estimation information, reception power information, or a combination of various parameters. In this way, observation in the third terminal becomes more complicated, and it is thereby possible to ensure security to a high extent. In particular, using the polarization and phase which are varied greatly due to the propagation environment provides a feature that makes estimation by another terminal more difficult.
Further, by applying an array antenna structure comprised of a plurality of antenna elements as a plurality of antennas 201, it is possible to add the direction of arrival as a parameter for propagation estimation. It is thereby possible to construct a more flexible system.
In the foregoing, a modulation scheme and multiplexing scheme are not explained, but it is apparent that the present invention is applied to any modulation schemes principally. The present invention is applicable to PSK, QAM, Star QAM, TDMA, FDMA, SS (FH and CDMA), OFDM, spatial multiplexing (SDM and MIMO), etc.
Further, in the communication procedures, when reference signals are transmitted, the first reference signal and second reference signals are transmitted. However, it is obvious that whether to first transmit the first reference signal or the second reference signal does not affect the system of this Embodiment. Furthermore, while reference signals are transmitted separately in the communication procedures, by inserting reference signals to a data stream as in frame structures (b) and (c) in
A communication apparatus according to Embodiment 2 of the present invention is to describe a method of converting the propagation estimation into an encryption key, and has configurations of propagation estimating section 103 and coding section 105 as illustrated in
Herein, it is assumed to use a delay profile as a representative example of parameter indicating a propagation state. The delay profile includes a delay time, power and phase of each path component. An example will be described that the delay time and power of a path component is used.
Propagation estimating section 103 in
Coding section 105 extracts a characteristic of thus obtained propagation information. As an example of characteristic extraction, it is considered using a vector quantization method. A number of templates of representative delay profiles are prepared in a reference table as quantization vectors, and encryption keys are stored in the reference signal in association with the quantization vectors respectively. Coding section 105 compares a result estimated in propagation estimating section 103 with a template in thus prepared reference table, and selects and outputs an encryption key associated with a template of a delay profile with the highest similarity.
The method is described above of estimating a propagation state to convert into an encryption key, and will be described more specifically with reference to
Propagation estimating section 103 has buffer 401, reference signal sequence storing section 402, convolver 403 and buffer 404. Coding section 105 has quantizing section 405, converting section 406 and codebook 407. Buffer 401 temporarily holds an input signal of a certain length. Reference signal sequence storing section 402 stores predetermined reference signal sequences to output sequentially. Convolver 403 calculates the convolution of the temporarily stored received signal and reference signal sequence to output the correlation value. Buffer 404 temporarily stores a calculated correlation sequence. Quantizing section 405 searches quantization vectors stored in codebook 407 for the most similar one to an input vector string, and outputs a code. Converting section 406 selects an encryption key (first data) corresponding to the code output from quantizing section 405 from the codebook to output.
Codebook 407 stores quantization vectors and encryption keys.
Next, the operations of propagation estimating section 103 and coding section 105 will be described.
Propagation estimating section 103 holds a received signal including a reference signal in buffer 401. Convolver 403 outputs as a correlation sequence results obtained by performing sliding correlation between the reference signal sequence from reference signal sequence storing section 402 and the received signal sequence held in buffer 401, and holds results sequentially in buffer 404. The correlation sequence held in buffer 404 has correlation values between the reference signal sequence and received signal sequence, i.e., data corresponding to the delay profile. The delay profile information is provided to coding section 105 as a series of input vector.
Quantizing section 405 compares an input vector from buffer 404 with each quantization vector stored in codebook 407, extracts a vector with the highest similarity, and outputs a code associated with the vector. Specifically, assuming an input vector is Xin, and quantization vector of code m is Xqm (m:1˜M), Xqm that minimizes the following equation is obtained:
d=|Xin−Xqm|2 (1)
The section 405 outputs code m associated with the thus obtained quantization vector.
Converting section 406 outputs an encryption key associated with code m of the delay profile referring to the content of the encryption key table in the codebook. Thus determining an encryption key enables flexible setting of encryption key to be implemented in simple circuitry.
In this way, according to the communication apparatus and communication system of Embodiment 2, in addition to the effects of Embodiment 1, propagation estimating section 103 generates a delay profile and obtains a correlation function with the reference signal as an estimation value, while coding section 105 reads encryption key information corresponding to the estimation value input from propagation estimating section 103 using the codebook associating the correlation function with the encryption key, and it is thereby possible to implement flexible setting of encryption key in simple circuitry.
In addition, in Embodiment 2, the method is described of using a quantization vector technique as a coding method of delay profile in coding section 105. However, various methods are considered such as a method of approximating a data string of delay profile with an evaluation equation and using coefficients of the obtained approximation equation to code, a method of dividing the delay profile into a number of blocks to perform coding according to the size or the order, or to code according to the delay time and the size of a path with the maximum power.
Communication apparatus 700 according to Embodiment 3 has the same configuration as that of communication apparatus 200 according to Embodiment 1 as illustrated in
The invention of a stable communication method by propagation control will be described below with reference to
Communication apparatus 700 in
Transmission modulation section 709 has propagation control section 701, modulation section 704, and transmitting section 705. Propagation control section 701 receives propagation information output from propagation estimating section 203 and propagation characteristic information (first data) obtained by coding section 703 extracting a characteristic from the propagation information, and outputs a modulation control signal and transmission control signal so as to control the propagation state to be optimal for a terminal as a communicating party. Demodulation section 704 receives the demodulation control signal output from propagation control section 701 and communication information, modulates the communication information while performing fine adjustment on a phase, output timing and amplitude based on the modulation control signal, and outputs a modulated signal for each of the antenna elements.
Transmitting section 705 receives the transmission control signal and modulated signal, converts the modulated signal into an RF signal for each of the antenna elements while controlling the frequency and output timing based on the transmission control signal, and outputs the RF signal to antenna 201.
The communication apparatus with the above-mentioned configuration will be described more specifically with reference to communication procedures in
(0) Base Station and Terminal: Initialization
The same operation as in Embodiment 1 is carried out.
(1) Base Station: Transmission of First Reference Signal
The base station transmits a reference signal for propagation estimation performed in the terminal as a first reference signal. Specifically, switch section 210 selects the reference signal generated in reference signal generating section 208 to output to transmission modulation section 709. Transmission modulation section 709 receives the selected communication information, propagation information and propagation characteristic information, and outputs an RF signal while controlling the propagation state for the terminal as a communicating party, and the signal is transmitted from antenna 201. The propagation control will be described specifically later.
In the terminal awaiting the signal from the base station, propagation estimating section 203 detects the first reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal. The propagation information that is an estimation value is provided to coding section 703 and propagation control section 701. Coding section 703 receives the propagation information from propagation estimating section 203, extracts the characteristic of the propagation state, outputs the propagation characteristic information to propagation control section 701, and at the same time, converts the extracted propagation characteristic information to an encryption key. The converted encryption key is held in buffer section 206, and the encryption key information is output. The base station uses the encryption key as a first encryption key for subsequent communications.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal in the same way as described in procedure (1). At this point, propagation control section 701 transmits the second reference signal while controlling modulation section 704 and transmitting section 705 so that the propagation state becomes a state corresponding to the encryption key (first key) for the base station that is a communicating party, using the propagation information obtained in (1) and propagation characteristic information.
Upon receiving a signal from the terminal, the base station detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in (1), propagation estimating section 203 outputs the propagation information, coding section 703 extracts the propagation characteristic information from the propagation information to output, and converts the propagation characteristic information into an encryption key, and buffer section 206 holds the encryption key information. The terminal uses the encryption key as a second encryption key for subsequent communications.
(3) Base station: Transmission of Encryption
The base station switches switch section 210 to select encrypted information output from encrypting section 209. Using the second key obtained in procedure (2), encrypting section 209 encrypts the security data according to a predetermined method, and outputs the encrypted information. Switch section 210 selects the encrypted information, and outputs the selected communication information to transmission modulation section 709. In transmission modulation section 709, propagation control section 701 controls modulation section 704 and transmitting section 705 so that the propagation state becomes a state corresponding to the encryption key (second key) for the terminal that is a communicating party, using the propagation information obtained in (1) and propagation characteristic information, while the encrypted signal is transmitted from antenna 201 as an RF signal.
When the terminal receives the encrypted signal, reception demodulation section 708 demodulates the received signal to demodulated information. Decoding section 207 uses the demodulated information and the first key obtained in (1), and decodes the encryption according to a predetermined method to output the security data.
(4) Terminal: Transmission of Encryption
In the same way as in (3), the terminal performs encryption using the first key, and outputs encrypted information. In transmission modulation section 709, modulation section 704 and transmitting section 705 are controlled so that the propagation state becomes a state corresponding to the encryption key (first key) for the base station that is a communicating party, using the propagation information obtained in (1) and (3) and propagation characteristic information corresponding to the encryption key selected in (1), while the encrypted signal is transmitted from antenna 201 as an RF signal. In the same way as in (3), the base station uses the second key obtained in (2), decodes the encryption according to a predetermined method, and outputs the security data.
As described in Embodiment 1, encryption keys (first key and second key) generated in the base station and terminal can be used as common keys. In other words, it is understood that encryption and decoding in (3) and (4) is processed without any problems.
Thus, according to the communication apparatus and communication system of Embodiment 3 of the present invention, in addition to the effects of Embodiment 1, propagation control section 701 controls modulation section 704 and transmitting section 705 so that the same encryption key as that generated in coding 703 can be obtained in the communicating party, and thus controls the propagation environment in transmitting a reference signal, whereby it is possible to decrease the error in propagation environment between transmitting a reference signal from the communicating party and transmitting a reference signal to the communicating party, and to decrease the error in generating common encryption keys. Further, according to the communication apparatus and communication system of Embodiment 3, using propagation information obtained in reception and propagation characteristic information indicative of a propagation state corresponding to an encryption key, transmission modulation section 709 controls the propagation state for the terminal that is a communicating party to be of the propagation characteristic information. Thus, the error is decreased between the propagation state in reception and estimated propagation state (corresponding to the encryption key), and there provides an advantage that the communication quality is largely improved.
Further, it is possible to improve the stability of communication by performing propagation control even when the propagation state varies.
Furthermore, when a plurality of similar templates exists in templates searched by coding section 703 in selecting an encryption key, by the transmitting side explicitly controlling the propagation state, it is possible to eliminate the ambiguity.
In addition, in Embodiment 3, in the communication procedures, when reference signals are transmitted, the first reference signal and second reference signals are transmitted. However, it is obvious that whether to fir transmit the first reference signal or the second reference signal does not affect the system of this Embodiment. Also in the procedures of encryption communication, the order in which the reference signal is transmitted does not affect the system of this Embodiment.
In the system of this Embodiment, encryption keys are provided and received through communications of reference signals, and with respect to encrypted signals subsequent to the reference signal, it is only required that an encryption key matches one that is communicated earlier. In other words, although the transmitting side performs the propagation control for the receiving side while communicating in (3) and (4), it is not required to match the propagation state indicated by the encryption key.
Further, while reference signals are transmitted separately in the communication procedures, by inserting reference signals to a data stream, such an advantage is provided that procedures of (1) and (3) or procedures of (2) and (4) are carried out at the same time.
Referring to
The operation in
Convolver 403 generates a delay profile for each received signal using a reference signal, and buffer 404 stores four kinds of delay profiles. The delay profiles are assumed to be Ds1 to Ds4. Further, using the received signal and reception weighting coefficients (Wr1 to Wr4) delay profile (Ds0) of received signal RO expressed by the following equation is calculated and output.
R0=ΣRm·Wrm (2)
Among these delay profiles (Ds0 to Ds4), Ds0 is input to coding section 105, and encryption key K0 and corresponding code m0 are output.
In addition, it is assumed that reception weighting coefficients Wr1 to Wr4 are set at respective initial values, for example, in the initial state.
Referring to
Antenna 901 in
Buffer 904 holds transmission weighting coefficients, and codebook 905 stores corresponding codes and quantization vectors. Transmission modulation section 910 has modulation section 906, weighting sections 907, and transmitting section 908. Modulation section 906 receives the communication information, modulates the information in a predetermined modulation scheme, and outputs a modulated signal. Weighting sections 907 multiply the modulated signal by respective weighting coefficients corresponding to the antenna elements to output weighted modulated signals. Transmitting section 908 receives the weighted modulated signals corresponding to the antenna elements, and converts the signals to RF signals corresponding to the antenna elements to output.
Receiving apparatus 1000 will be described below with reference to
Characteristic extracting section 1001 receives the propagation information obtained from the received signal, and extracts a characteristic from the information.
Buffer 1002 temporarily stores the extracted characteristic extraction information. Buffer 1002 outputs the stored characteristic extraction information as first data.
The function of each block explained in
Antenna 901 has four antenna elements (AN1 to AN4) and outputs four received RF signals respectively from the antenna elements, and at the same time, outputs reception weighting coefficients (Wr1 to Wr4) for the elements used in reception. The received signals (R1 to R4) respectively corresponding to AN1 to AN4 are input to propagation estimating section 103. As described above, propagation estimating section 103 outputs propagation states (Ds1 to Ds4) corresponding to received signals (R1 to R4), and coding section outputs encryption key K0 and corresponding code m0.
Coefficient calculating section 903 searches codebook 905 for the code m0 corresponding to the encryption key K0, and reads a quantization vector (Xqm0) associated with the code m0 to store. Using the quantization vector (Xqm0) and input propagation information (Ds0 to Ds4), the section 903 obtains Wm (m:1 to 4) that minimizes the square error obtained by the following equation:
d=|Wm·Dsm−Xqm0|2 (3)
The least square method is famous as the method of calculating such an error.
Using thus obtained weighting coefficients (W1 to W4) and reception weighting coefficients (Wr1 to Wr4), the section 903 calculates transmission weighting coefficients (Wt1 to Wt4) given with the following equation (4):
Wtm=Wm/Wrm(m:1 to 4) (4)
Buffer 904 holds the transmission weighting coefficients.
Meanwhile, modulation section 906 having received the communication information modulates the communication information according to a predetermined modulation scheme, and outputs a modulated signal. The modulated signal is branched to modulated signal strings (S1 to S4) corresponding to antenna elements (AN1 to AN4), and output to weighting sections 907. Weighting sections 907 multiply modulated signals (S1 to S4) corresponding to AN1 to AN4 respectively by transmission weighting coefficients (Wt1 to Wt4) from buffer 904.
Swm=Wtm·Sm(m:1 to 4) (5)
The section 906 outputs thus obtained weighted modulated signals (Sw1 to Sw4). Transmitting section 908 receives the weighted modulated signals, and converts the signals respectively into RF signals (Srf1 to Srf4) to output to antenna 901.
Transmission modulation section 910 multiplies transmission weighting coefficients while performing calculations as described above, and it is thereby possible to control the propagation characteristic indicated by Xqm0 in a terminal receiving the signals.
Then, in receiving apparatus 1000 having received transmission signals transmitted from antenna 901, propagation estimating section 103 estimates the propagation state from the received signals, and outputs the estimated propagation state information to characteristic extracting section 1001. Characteristic extracting section 1001 extracts a characteristic corresponding to the propagation state from the propagation state information to output as first data.
Thus, according to the communication apparatus and communication system of Embodiment 4, in addition to the effects of Embodiment 1, transmitting/receiving apparatus 900 adjusts the weighting coefficients used in transmitting the communication information, based on the propagation environment estimated in propagation estimating section 103, so as to enable transmitting/receiving apparatus 900 and receiving apparatus 1000 to acquire the same first data, whereby it is possible to prevent occurrences of a situation that transmitting/receiving apparatus 900 and receiving apparatus 1000 cannot acquire the same first data due to effects of noise or the like in estimating the propagation environment, and to eliminate the ambiguity of the first data. Further, according to the communication apparatus and communication system of Embodiment 4, transmitting/receiving apparatus 900 varies weighting coefficients in transmitting the communication information based on the propagation environment estimated in propagation estimating section 103, and thereby is capable of intentionally varying the first data that receiving apparatus 1000 acquires, whereby it is possible to prevent occurrences of harmful effects such that the confidential information is interpreted caused by using the same first data for the long term. In this way, since it is possible to change an encryption key when the first data is the encryption key, it is possible to ensure high security.
In addition, while Embodiment 4 describes controlling the delay profile, the present invention is not limited to the foregoing. It may be possible to use a polarization state (polarization plane and/or circulating direction), phase state or propagation delay time to perform propagation estimation. Further, in Embodiment 4 codebook 905 is the same as that in coding section 105, and it is enough that either codebook only exists in terms of structure. Further, while Embodiment 4 describes the case where antenna 901 has four antenna elements, the present invention is not limited to the case, and it is needless to say that two or more antenna elements have the same effectiveness. Furthermore, each sigh indicated in the equations is applicable irrespective of a natural number or complex number. When each value is of complex number, since the signal control is performed in amplitude and phase, higher control is expected.
A communication apparatus according to Embodiment 5 is capable of selecting an arbitrary encryption key by performing propagation control, and
In Embodiments 1 to 4 as described above, an encryption key is selected corresponding to the estimated propagation state, and therefore, when the propagation state is constant, the same encryption key is used for a long time. There arises a fear of facilitating estimation of the encryption key. Further, since the same encryption keys are used in both communication apparatuses, there is a fear that when either encryption key is determined, the other encryption key is also determined. Embodiment 5 enables a transmitter to select an encryption key, and in this respect, differs from Embodiments 1 to 3 where the first and second keys are the same.
(5) Base Station: Transmission of Third Reference Signal
The base station selects a third key as an encryption key, and determines weighting coefficients from the propagation characteristic information corresponding to the encryption key and last estimated propagation information of the communication. Propagation control section 701 (second data selecting means) performs propagation control on the reference signal for propagation estimation performed in the terminal using the weighting coefficients to output as a third reference signal.
In the terminal awaiting the signal from the base station, propagation estimating section 203 detects the third reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal. The propagation information that is an estimation value is provided to coding section 703 and propagation control section 701. Coding section 703 receives the propagation information from propagation estimating section 203, extracts the characteristic of the propagation state, outputs the propagation characteristic information to propagation control section 701, and at the same time, converts the extracted propagation characteristic information into an encryption key. The converted encryption key is held in buffer section 206, and the encryption key information is output. The base station uses the encryption key as a third key for subsequent communications.
(6) Terminal: Transmission of Fourth Reference Signal
As in procedure (5), the terminal selects a fourth key as an encryption key, and determines weighting coefficients from the propagation characteristic information corresponding to the encryption key and last estimated propagation information of the communication. Then, the terminal performs propagation control on the reference signal for propagation estimation performed in the base station using the weighting coefficients to output as a fourth reference signal.
Upon receiving a signal from the terminal, the base station detects the fourth reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in procedure (5), propagation estimating section 203 outputs the propagation information, and coding section 703 extracts the propagation characteristic information from the propagation information to output. The propagation characteristic information is converted into an encryption key, and buffer section 206 holds the encryption key information. The terminal uses the encryption key as a fourth encryption key for subsequent communications.
(7) Base Station: Transmission of Encryption
Using the third key selected in (5), the base station encrypts the security data according to a predetermined method, and transmits an encrypted signal.
When the terminal receives the encrypted signal, reception demodulation section 708 demodulates the received signal into demodulated information. Using the demodulated information and the third key obtained in (5), the terminal decodes the encryption according to a predetermined method, and outputs the security data.
(8) Terminal: Transmission of Encryption
Using the fourth key selected in procedure (6), the terminal encrypts the security data, and transmits an encrypted signal.
As in procedure (7), using the fourth key obtained in (6), the base station decodes the encryption according to a predetermined method, and outputs the security data.
The aforementioned operation will be described below using equations.
Assuming propagation function indicative of a characteristic of radio-signal propagation is H, received signal is Sr and transmission signal is St, the following equation is obtained:
Sr=H·St (6)
Assuming the number of antenna elements is N, H is a square matrix of N×N, and each of Sr and St is a matrix of 1×N. The terminal is capable of calculating using a base-station transmitted signal (first reference signal in
Sr_b=Hu·St_m (7)
Sr_m=Hd·St_b (8)
Hu and Hd indicate uplink propagation function and downlink propagation function, respectively. St_b and Sr_b indicate transmission signal and reception signal in the base station, respectively. St_m and Sr_m indicate transmission signal and reception signal in the terminal, respectively. Since St_b and St_m are known signals (respectively first and second reference signals) the propagation functions are obtained by following equations:
Hu=Sr_b·St_m−1 (9)
Hd=Sr_m·St_m−1 (10)
Since the propagation functions are the same in transmission and reception due to the inverse characteristics of propagation, the following equation is obtained:
H≡Hu=Hd (11)
Embodiment 1 describes using thus obtained propagation function H as an encryption key (first key (=second key)).
Meanwhile, a method will be described below of controlling the propagation state using transmission weighting coefficients Wb and Wm. When an error E exists between propagation function H′ represented by the quantization vector obtained in selecting the encryption key (first key (=second key)) and actual propagation function H, Sr is expressed by the following equation:
Sr=(H′·ϵ)·St (12)
Therefore, the error component E is obtained by the following equation:
ϵ=H·−1(Sr·St−1) (13)
Substituting weighting coefficients Wm and Wb, correction can be carried out as described below:
Sr_b=(H′·Wm)·St_m (14)
Sr_m=(H′·Wm)·St_b (15)
Embodiment 4 describes performing encrypted communication while correcting the propagation state using the weighting coefficients in this way. Extending the correction function enables an encryption key to be set on transmitting side. A case will be described below of using the third and fourth keys that are different from the first key (=second key). The base station performs control using the weight W3_b so as to obtain propagation function H3 corresponding to the third key, and transmits the third key via the third reference signal. In other words, when Sr is:
Sr_m=(H·W3_b)·St_b (16)
H3 is:
H3=H·W3_b (17)
Subsequently, the base station performs the encrypted communication while using the third key to encrypt.
The terminal receives the third reference signal, analyzes the propagation state, thereby obtains propagation function H3, and using the encryption key (third key) corresponding to H3, decodes subsequent encrypted information. As in the base station, the terminal selects the fourth key (that is assumed to correspond to propagation function H4), and transmits the fourth key via the fourth reference signal while performing control using the weighting coefficient W4_m.
Sr_b=(H·W4_m)·St_m (18)
H4=H·W4_m (19)
The terminal performs the encrypted communication while using the fourth key to encrypt. As in the terminal, the base station is capable of performing decoding using the fourth key.
Thus, according to the communication apparatus and communication system of Embodiment 5, in addition to the effects of Embodiment 1, since propagation control section 701 controls transmitting section 705 and modulation section 704 in transmitting a reference signal so as to vary the propagation environment, it is possible to vary the encryption key at arbitrary timing. Therefore, the possibility is eliminated that the third party decrypts the encryption key, and high security is provided.
Frame structures explained in Embodiments 1 to 5 are based on that in
Meanwhile,
Provision and receipt of the encryption key is carried out using reference signals, as explained in communication procedures in the other Embodiments, and corresponds to procedures (1) and (2) in
The operation of the propagation control in response to communication procedures will be described with reference to
The communication in the frame structure in
In transmitting a reference signal in (1a) in
Communications in the frame structure (b) in
As illustrated in (1b) in
Meanwhile, as a matter of course, it is possible to use the same propagation control scheme in reference signal communications and data communications. In this case, it is possible to use the reference signal in decoding in data communications, and increases in communication quality are expected.
In the above descriptions, the reference signal is assumed to be a known signal. However, the reference signal does not need to be a known signal. In this case, a variation in propagation is estimated while demodulating, and an encryption key is determined. In this way, information for determining the encryption key is increased, and it is made possible to detect the encryption key with stability. Further, as the reference signal, it is possible to use a pilot signal used in QAM or the like, a synchronization signal sequence for burst synchronization used in TDMA or the like, and so on. Using such a signal provides a feature of providing communications with high security and with little changes in the conventional configuration.
As illustrated in frame structures (b) and (c) in
In the above descriptions, beam forming, precoding (equalization on transmitting side) and transmission diversity is considered as the propagation control scheme in data communications. Further, it is considered using control of MIMO (Multi-Input Multi-Output) and Space Division Multiplexing. In particular, MIMO multiplexing technique and Space Division Multiplexing technique are to increase the channel capacity using the propagation characteristic actively, and are good consistent with the technique described in the present invention where the propagation characteristic is actively used. For example, after the confidential communication is performed using the technique described in one of Embodiments as described above, the propagation control is changed to the control for MIMO (or Space Division Multiplexing) to succeed, and it is thereby possible to perform MIMO or Space Division Multiplexing. In this way, without adding a specific technical constitution, it is possible to increase the confidentiality of important information, while increasing the channel capacity in data communications.
Thus, according to the communication apparatus and communication system of Embodiment 6, in addition to the effects of Embodiments 1 to 5, propagation environments are changed between the time of transmitting a signal to cause a communicating party to acquire an encryption key (first data) based on the propagation environment and the time of transmitting signals other than such a signal, whereby it is possible to transmit signals other than the signal to transmit to cause a communicating party to acquire an encryption key, in optimal control scheme corresponding to the communication environment.
In addition, in Embodiment 6 the reference signal is assumed to be a known signal. However, the reference signal does not need to be a known signal. In this case, a change in propagation is estimated while demodulating, and an encryption key is determined. In this way, information for determining the encryption key is increased, and it is made possible to detect the encryption key with stability. Further, as the reference signal, it is possible to use a pilot signal used in QAM or the like, a synchronization signal sequence for burst synchronization used in TDMA or the like, and so on. Using such a signal provides a feature of providing communications with high security and with little changes in the conventional configuration.
A method is described herein of applying the present invention to a multiplexed signal. CDMA is described as an example of a multiple access system.
Reception demodulation section 150 outputs a received signal of a received RF signal and demodulated information. Reception demodulation section 150 has receiving section 1401, despreading section 1402, propagation estimating section 1405 and demodulation section 1403.
Receiving section 1401 receives an RF signal and propagation information, and controls the RF signal in a suitable reception state to output a received signal. Despreading section 1402 calculates the convolution of the received signal and a spreading code in response to the channel, and outputs a despread signal. Demodulation section 1403 performs suitable demodulation using the received signal and propagation information, and outputs demodulated information. Decoding section 1404 receives the encryption key information and demodulated information, decodes the encryption of the demodulated information using the encryption key information, and outputs security data. Propagation estimating section 1405 performs propagation estimation on each channel, and outputs propagation information for each channel. Demodulation section 1403 performs suitable demodulation using the received signal and propagation information, and outputs demodulated information. Comparing section 1406 compares the propagation information between channels, and outputs a comparison result (first data). Encryption key generating section 1407 receives the propagation information, and outputs the encryption key information (first data).
Data supplying sections 1501 and 1502 hold data of respective channels. Modulation spreading sections 1503 and 1504 modulate data of respective channels, spread the data with respective spreading codes of the channels, and outputs spread signals. Weighting section 1505 multiplies the transmission signal by each transmission weighting coefficient. Transmitting section 1506 converts the modulated signal into an RF signal to be transmitted to output. Antenna 1507 transmits the transmission signal. Data supplying section 1508 stores the first data. Reference propagation buffer 1509 holds the reference information of propagation state. Propagation control section 1510 receives an encryption key, second data and propagation information, and calculates the transmission weighting coefficient.
The operation of transmitting apparatus 1500 will be described below.
In transmitting apparatus 1500, data of a plurality of channels are provided from data supplying sections 1501 and 1502, modulated, and spread with respective spreading codes set in advance, thereby generating spread signals for each channel. Data supplying section 1508 outputs first data, and propagation control section 1510 receives the first data, and performs propagation control in response to the first data using the transmission weighting coefficients, based on the information from reference propagation buffer 1509 that holds the propagation information estimated previously. Weighting section 1505 performs weighting calculation using the transmission weighting coefficients, and the signals are transmitted through transmitting section 1506.
For simplicity in description, it is assumed that data supplying section 1508 does not output data. The control in propagation control section 1510 is the same as that in propagation control section 701 as illustrated in
It is understood from the forgoing that propagation control can be carried out corresponding to the encryption key as in Embodiment 5.
When a plurality of channels is multiplexed, it is possible to control reception power at the receiving end by performing propagation control for each channel. For example, it is possible to perform control such that which channel is set for the highest power corresponding to the state of an encryption key, and the receiving apparatus is capable of determining the encryption key from the relationship between the channel number and reception power. Further, as described above, since, for example, a delay profile is set as a propagation parameter, it is understood that more pieces of secure information can be transmitted by using, for example, the delay profile for the encryption key information and further using the first data for the relationship between the channel and reception power (or, it may be possible to use the information and data in the inverse way, or use only the encryption key information or only the second data).
Further, it is possible to set data stored in either data supplying section 1501 or 1502 as a reference signal. In this way, the receiving apparatus is capable of performing propagation estimation using a reference signal at the same time as that of the first data and second data, and thus has a feature of enabling transmission that is remarkably high in efficiency.
The operation of the receiving apparatus will be described below.
A method of providing/receiving the encryption key information using the propagation parameter (delay profile) can be performed in the same way as described above except the despreading processing. A case is only described herein that the information is superimposed on the relationship between the multiplexed channels and reception power.
Receiving section 1401 receives an RF signal input from antenna 101, and outputs a received signal. Despreading section 1402 calculates the convolution of the received signal with spreading codes predetermined for each channel, and outputs a number of despread signals the same as the number of channels. Propagation estimating section 1405 receives the despread signals, and estimates the propagation state. It is assumed herein to use the reception power among propagation states. When propagation estimating section 1405 outputs reception power for each channel, comparing section 1406 compares the reception power with one another, and outputs the result as the encryption key information (or first data).
Using thus determined encryption key, decoding section 1404 decodes subsequent demodulated information, and obtains security data.
In this way, according to the communication apparatus and communication system of Embodiment 7, in addition to the effects of Embodiment 1, comparing section 1406 is capable of providing a result of comparison of propagation parameter such as reception power of each channel signal in the multiplexed received signal, and it is thereby possible to increase the information amount in the case of transmitting a multiplexed signal. Further, according to the communication apparatus and communication system of Embodiment 7, in the case of multiplexing a plurality of channels, performing propagation estimation for each channel enables controlling the reception power at the receiving end. For example, it is possible to perform control such that which channel is set for the highest power corresponding to the state of an encryption key, and the receiving apparatus is capable of determining an encryption key using the relationship between the channel number and reception power, whereby it is possible to maintain the security of data of a plurality of channels. Furthermore, according to the communication apparatus and communication system of Embodiment 7, it is possible that the encryption key is included in a propagation parameter such as a delay profile in the first data, and is set as the second data different from the first data using the relationship between the channel and reception power, thus enabling transmission of more pieces of secure information.
In addition, in Embodiment 7 CDMA is described as an example, it is naturally apparent using OFDM obtains the same effectiveness. In the case of OFDM, in the above descriptions, channels are replaced with subcarriers, the despreading processing in
Embodiment 8 describes a scheme using information of the direction of arrival as the propagation information.
Propagation estimating section 203 has buffer 1601, correlation matrix manipulation section 1602, matrix manipulation section 1603, angle spectrum calculating section 1604 and buffer 1605.
Buffer 1601 temporarily holds an input signal. Correlation matrix manipulation section 1602 obtains a correlation matrix of the input signal. Matrix manipulation section 1603 receives the calculated correlation matrix, outputs a characteristic vector obtained in matrix manipulation (herein, characteristic vector). Angle spectrum calculating section 1604 receives the characteristic vector, calculates the angle spectrum, and outputs the information of direction-of-arrival estimation. Buffer 1605 temporarily holds the calculation result.
The aforementioned configuration uses MUSIC method knows as a method of estimating the direction of arrival. In addition to the method, there are known Fourier method and CAME method, which are sorted according to the content of manipulation in matrix manipulation section 1603.
The operation of propagation estimating section 203 performing the direction of arrival estimation as the propagation information in the aforementioned configuration will be described specifically below.
Buffer 1601 holds received signals input from a plurality of antenna elements. Correlation matrix manipulation section 1602 obtains correlation matrixes of the held received signals, and calculates the characteristic vectors. Angle spectrum calculating section 1604 calculates arrival pattern information of received signal from the characteristic vectors to output. Buffer 1605 holds thus obtained arrival pattern information of received signal.
Procedures as shown in
(1) Base Station: Transmission of First Reference Signal
The base station transmits a first reference signal for propagation estimation to the terminal. At this time, the base station performs beam steering using a plurality of antenna elements, and transmits the signal while varying a radiation pattern.
In the terminal, upon detecting the reference signal transmitted from the base station, propagation estimating section 203 performs the direction-of-arrival estimation, and stores in a reference table data of comparison of the radiation direction that the base station controls and the arrival pattern information of received signal in the terminal. The aforementioned operation generates the reference table of the radiation pattern and the reception arrival pattern in the base station and terminal.
(2) Terminal: Transmission of Second Reference Signal
The terminal selects the encryption key (first key), and outputs the direction-of-arrival information corresponding to the key from the codebook. Using the direction-of-arrival information, the terminal detects the most similar radiation pattern stored in the reference table, and sets the arrival pattern information corresponding to the most similar one as a radiation pattern in transmission. Then, the terminal transmits the second reference signal for propagation estimation in the base station while controlling so as to obtain the set radiation pattern.
In the base station, propagation estimating section 203 performs the direction-of-arrival estimation, and outputs the reception arrival pattern. Coding section 703 selects an encryption key (second key) from the reception arrival pattern and codebook to output to decoding section 207 via buffer 206.
(3) Base Station: Transmission of Encrypted Signal
Using the reception arrival pattern obtained in (2), the base station sets a radiation pattern such that the reception state in the terminal is excellent. Then, the base station encrypts the security data using the second key, and transmits the encrypted signal while controlling so as to obtain the set radiation pattern.
The terminal demodulates the RF signal in reception demodulation section 708, decodes the demodulated signal using the first key in decoding section 207, and outputs the security data.
(4) Terminal: Transmission of Encrypted Signal
Using the reception arrival pattern obtained in (1), the terminal sets a radiation pattern such that the reception state in the base station is excellent. Then, the terminal encrypts the security data using the first key, and transmits the encrypted signal while controlling so as to obtain the set radiation pattern.
The base station demodulates the RF signal in reception demodulation section 708, decodes the demodulated signal using the second key in decoding section 207, and outputs the security data.
Thus, according to the communication apparatus and communication system of Embodiment 8, in addition to the effects of Embodiment 1, angle spectrum calculating section 1604 uses a result of the direction-of-arrival estimation of received signal as an estimation value of propagation environment, the reception arrival pattern arriving at the third party greatly changes, and it is thereby possible to ensure extremely high security.
In addition, in Embodiment 8 the encryption key information is generated using the reception arrival pattern. However, the present invention is not limited to such a case, and has a feature of expecting higher security in a combination with a scheme using the delay profile as the propagation information. Further, in Embodiment 8 it may be possible to superimpose information on the direction of arrival of received signal, or to multiplex communications on the direction of arrival. Further, as in other Embodiments, the communication procedures are not limited to those described in this Embodiment.
Embodiment 9 describes a security communication scheme using polarization.
Antenna 1812 has vertical polarization antenna 1801 and horizontal polarization antenna 1802. Propagation estimating section 203 has phase difference detecting section 1803, electric field strength detecting section 1804 and propagation estimating section 1805. Polarization control section 1813 has coefficient calculating section 1806, codebook 1807 and buffer section 1808. Transmission modulation section 252 has modulation section 1809, weighting section 1810 and transmitting section 1811.
Vertical polarization antenna 1801 receives a vertically polarized component. Horizontal polarization antenna 1802 receives a horizontally polarized component. Phase difference detecting section 1803 detects a phase difference from the polarized received signals. Electric field strength detecting section 1804 detects respective electric field strengths from the vertically polarized received signal and horizontally polarized received signal. Polarization estimating section 1805 estimates a polarization state from the phase difference and electric field strengths. Coefficient calculating section 1806 receives the propagation information and polarization code indicated in the codebook, performs control of a phase difference and electric field strengths between/of the vertically polarized transmission signal and horizontally polarized transmission signal, and calculates coefficients to perform polarization control of transmission signal. Codebook 1807 stores the relationship between the coefficient and polarization code. Buffer section 1808 temporarily holds the data input from coefficient calculating section 1806 to output to weighting section 1810.
Modulation section 1809 receives the communication information, modulates the information with a predetermined modulation scheme, and outputs a modulated signal.
Weighting section 1810 multiplies the modulated signal by a weighting coefficient corresponding to each antenna element, and outputs weighted modulated signals.
Transmitting section 1811 receives the weighted modulated signals corresponding to the antenna elements, and converts the signals to respective RF signals corresponding to the antenna elements to output.
The operation of transmitting/receiving apparatus 1800 will be described below.
Vertical polarization antenna 1801 and horizontal polarization antenna 1802 select respective polarized components of received signal selectively, and output respective RF signals to reception demodulation section 250. Reception modulation section 250 outputs received signals corresponding to respective polarized components to propagation estimating section 203. In propagation estimating section 203, polarization estimating section 1805 receives the reception phase difference information and reception electric field strength information respectively output from phase difference detecting section 1803 and electric field strength detecting section 1804, and outputs the polarization information of received signal.
Coding section 205 codes thus obtained polarization information into polarization code to select an encryption key. The polarization code is input to polarization control section 1813. In polarization control section 1813, coefficient calculating section 1806 retrieves the polarization state corresponding to the polarization code from codebook 1807, calculates transmission weighting coefficients while performing the phase control and electric field strength control, and holds the weighting coefficients in buffer section 1808. Using the transmission weighting coefficients held in buffer section 1808, transmission modulation section 252 performs weighting on the vertically polarized transmission signal and horizontally polarized transmission signal, and the RF signals are transmitted from corresponding antenna elements.
Operating as described above enables information such as vertically polarized wave, horizontally polarized wave, angle of the major axis, phase between polarized components, and circulating direction to be used as an encryption key.
Among propagation states, the polarization wave has a feature of being separated only by antennas.
In addition, it is assumed that codebook 1807 stores quantization vectors corresponding to polarization states (such as polarization plane and circulating direction). Communication procedures are almost the same as in other Embodiments. Detection of delay profile or propagation control is replaced with polarization information or polarization control, respectively.
Thus, according to the communication apparatus and communication system of Embodiment 9, in addition to the effects of Embodiment 1, polarization estimating section 1805 estimates the polarization state from the electric field strengths and phase difference to obtain an estimation value of propagation environment, and the polarized waves are only separated by antennas. Therefore, even if another receiving apparatus intercepts the radio signal, the apparatus needs corresponding antennas, and high security is thus expected.
In addition, in Embodiment 9, it may possible to use information together with such as the delay profile, reception power and the direction of arrival.
In addition to the methods as described in Embodiments 1 to 9, a method will be described of making the interception by third party impossible using a method of controlling the communication state in a reception terminal and superimposing the information on the controlled state.
Embodiment 5 describes enabling the propagation state on the receiving side to be controlled arbitrarily. Using this method enables physically confidential communications, which is explained briefly.
Embodiment 5 indicates the case that the propagation state can be controlled using weighting coefficients of transmission signal, which is equivalent to conveying an arbitrary reception state to the receiving side, i.e, which means that communications can be carried out through propagation parameters.
In other words, it is suggested that communications can be carried out through propagation parameters, by substituting the information for the content (encryption key in the figure) in the codebook as illustrated in
The communication using this method uses, as a base, propagation environments formed between communicating parties as described above, and therefore has a feature of having high confidentiality in principle over apparatuses different in physical position. Further, using propagation parameters specifies a propagation path, i.e., a place of the communicating party, and is applicable to specification and authentication of a communicating party.
This method is applicable irrespective of conventionally used modulation schemes (such as ASM, FSK, PSK and QAM), and expects sheer increases in data capacity.
Further, this method has a feature of being applicable irrespective of multiplexing methods (such as TDMA, FDMA, CDMA and OFDM). The method enables the multiplexing using the spatial orthogonality. In other words, combining the multiplexing method using the spatial orthogonality and the above-mentioned multiplexing method expects the effectiveness of increasing the conventional channel capacity greatly.
It is apparent that when an apparatus does not require particularly the processing of encryption and decoding as described in either Embodiment, such functions are not essential to the apparatus, and the apparatus operates without such functions.
Further, when it is not necessary to transmit the encryption key information in procedures as described in either Embodiment, increases in communication quality are expected by performing the propagation control to be optimal in communications (for example, by removing the multipath component, or setting the reception power at a maximum value).
Furthermore, also at the time of reception, by performing the control (as in the foregoing) such that a received signal is optimal using the reception weighting coefficients, increases in communication quality are also expected.
A configuration of the receiving apparatus in Embodiment 10 will be described with reference to
Propagation estimating section 103 estimates the propagation characteristic from the received signal input from receiving section 102, and outputs the estimated propagation information as data. The propagation information output from propagation estimating section 103 is information of whether or not to discard the data output from demodulation section 104.
In the case of the receiving apparatus that outputs the propagation characteristic as the communication information, the configuration as illustrated in
Thus, according to the communication apparatus and communication system of Embodiment 10, in addition to the effects of Embodiment 1, since propagation estimating section 103 uses the estimated propagation information as data, it is possible to increase the information amount to transmit, improve the transmission efficiency, and transmit the information with high confidentiality as the propagation information, thus enabling reliable security to be ensured. Further, according to the communication apparatus and communication system of Embodiment 10, it is possible to transmit information with low confidentiality using the conventional communication scheme, thereby enabling a communication apparatus with versatility to be provided.
Coding section 105 encodes the estimated propagation information input from propagation estimating section 103 as the first data. As a technique of coding the estimated propagation information, it is possible to code the information, for example, using a vector quantization method, and to output as the transmission information. In this way, such a feature is provided that coded data can be output with simplicity and with stability on inputs of various parameters.
Thus, according to the communication apparatus and communication system of Embodiment 11, in addition to the effects of Embodiments 1 and 10, since coding section 105 encodes the propagation information to extract as data, increases in communication quality are expected.
Despreading section 2201 calculates the convolution of a received signal and a spreading code associated with the channel, and outputs a despread signal.
Comparing section 2202 encodes the propagation information for each channel, compares coded propagation information of each channel with one another, and outputs a result of comparison as the first data.
Thus, according to the communication apparatus and communication system of Embodiment 12, in addition to the effects of Embodiment 1, comparing section 2202 compares data of a plurality of channels with one another, and obtains the first data from a result of comparison, resulting in features that the confidentiality is enhanced and that more items of data can be transmitted.
In addition, in Embodiment 12, a despreading section is provided to obtain the data using a CDMA signal. The present invention is not limited to the foregoing, and it may be possible to obtain data by receiving a signal subjected to orthogonal frequency division multiplexing and comparing each of signals assigned to subcarriers with one another. Further, the communication apparatus of Embodiment 12 is applicable to a case of performing communications using MIMO (Multi-Input Multi-Output) signals.
In Embodiment 13,
Receiving apparatus 2300 will be described first.
Reception demodulation section 150 receives a received RF signal, and outputs the estimated propagation information and demodulated signal. Coding section 105 receives the propagation information to extract its characteristic, and outputs propagation characteristic code (first data). Decoding section 107 receives the code indicating the characteristic of the propagation information and demodulated signal, performs deinterleaving using an interleaving pattern associated with the propagation characteristic code, adds null information (depuncturing), decodes the signal, outputs security data (second data), and has deinterleaver 2301 that receives the demodulated signal and performs deinterleaving based on the interleaving pattern associated with the propagation characteristic code, depuncturing section 2302 which receives the deinterleaved signal, and adds neutral information (in judging a code in the decoder disposed subsequently) to a signal of a portion removed based on the puncturing pattern associated with the propagation characteristic code, and decoder 2303 which receives the depuncutured signal, and decodes the signal corresponding to the convolutional code associated with the propagation characteristic signal.
Transmitting/receiving apparatus 2400 will be described below.
Reception demodulation section 250 receives a received RF signal, and outputs the propagation information indicative of the estimated propagation state and demodulated information. Decoding section 207 receives the code indicating the characteristic of the propagation information and demodulated signal, performs deinterleaving using an interleaving pattern associated with the propagation characteristic code, adds null information (depuncturing), decodes the signal, outputs data, and has deinterleaver 2401 that receives the demodulated signal and performs deinterleaving based on the interleaving pattern associated with the propagation characteristic code, depuncturing section 2402 which receives the deinterleaved signal, and adds neutral information (in judging a code in the decoder disposed subsequently) to a signal of a portion removed based on the puncturing pattern associated with the propagation characteristic code, and decoder 2403 which receives the depunctured signal, and decodes the signal corresponding to the convolutional code associated with the propagation characteristic signal. Coding section 205 receives the propagation information to extract its characteristic, and outputs a propagation characteristic code (first data). Propagation control section 2404 outputs transmission weighting coefficients to control the propagation state to be brought close to the input propagation characteristic code. Coding section 2409 receives the data, encodes the data, outputs the coded information subjected to puncturing and interleaving, and has encoder 2405 that receives the data and outputs a convolutional code, puncturing section 2406 that receives the convolutional code and outputs a punctured code where part of the code is removed, and interleaver 2407 which rearranges the punctured code in a predetermined order to output coded information. Transmission modulation section 2410 receives the coded information, modulates the information, performs the propagation control, outputs an RF signal to transmit, and has modulation section 211 which receives the coded information, performs predetermined modulation on the information, and outputs a modulated signal, transmission weighing section 2408 which receives the modulated signal, and performs propagation control by multiplying the signal by each of the weighting coefficients, and transmitting section 212 which receives transmission weighted signals, and outputs RF signals to transmit.
The operation of transmitting/receiving apparatus 2400 will be described with reference to
In the operation of transmitting/receiving apparatus 2400 of Embodiment 13, sections that have the same operations as in
Interleaving patterns, puncturing patterns and encoding pattern associated with propagation states re prepared in advance, and the base station and terminal share the information.
The terminal estimates the propagation state, using a reference signal transmitted from the base station, and sets various patterns based on the estimated state. Similarly, the base station estimates the propagation state, using a reference signal transmitted from the terminal, and sets various patterns based on the estimated state. At this point, among set interleaving patterns, puncturing patterns and encoding patterns, the same patters are selected in the base station and terminal, as described earlier.
As in the foregoing, when encoding patterns are set for the base station and terminal, the base station and terminal start communications. In the base station, encoder 2405 performs convolutional coding on the information based on the encoding pattern. Puncturing section 2406 performs puncturing on the resultant. Interleaver 2407 performs interleaving on the resultant. Thus obtained coded information is provided to transmission modulation section 2410. Propagation control section 2404 receives the propagation characteristic code output from coding section 205, and outputs transmission weighting coefficients. Transmitting section 212 outputs RF signals to transmit. The calculation of transmission weighting coefficients is the same as in described in Embodiment 3.
In the terminal having received the signal from the base station, reception demodulation section 250 receives the signal, performs the propagation estimation, demodulates the signal, and outputs the propagation information and demodulated signal. Based on the input propagation characteristic code, decoding section 207 selects the interleaving pattern, puncturing pattern, and encoding pattern. Decoding section 207 receives the propagation characteristic code and demodulated signal. Deinterleaver 2401 performs deinterleaving corresponding to the inverse pattern of interleaving, and outputs a deinterleaved signal. Depuncturing section 2402 receives the deinterleaved signal, and outputs a depunctured signal where a null signal (of a neutral value in judgment in the decoder disposed subsequently) is inserted (depancturing) to a portion corresponding to the puncturing pattern. Decoder 2403 decodes the depunctured signal based on the input encoding pattern, and outputs data.
The transmitting side and receiving side share various encoding patterns as described above, and it is understood that data transmitted from the base station is provided to the terminal properly.
(0) is the Same Operation in
(1) Base station: Transmission of First Reference Signal
The base station outputs a reference signal for propagation estimation performed in the terminal as a first reference signal. In the terminal awaiting the signal from the base station, propagation estimating section 203 detects the first reference signal from the received signal, and performs the propagation estimation from the received signal and the reference signal that is a known signal. Coding section 205 receives the propagation information from propagation estimating section 203, extracts a characteristic of the propagation state, and outputs the propagation characteristic code. Deinterleaver 2401, depuncturing section 2402 and decoder 2403 respectively have a table of interleaving pattern, table of puncturing pattern and a table of encoding pattern, where each table is associated with the propagation characteristic code, and select patterns (encoding patterns) corresponding to the input propagation characteristic code.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal as in (1).
Upon receiving the signal from the terminal, the base station detects the second reference signal, and propagation estimating section 203 performs propagation estimation from the received signal and the reference signal that is a known signal. As in (1), coding section 205 converts the propagation information output from propagation estimating section 203 into a propagation characteristic code, and decoding section 207 selects an encoding pattern corresponding to the propagation characteristic code.
(3) Base station: Transmission of Coded Signal
In the base station, coding section 2409 outputs coded information obtained by performing encoding, puncturing and interleaving on the data using coding parameters obtained in item (2). The coded information is output to transmission modulation section 2410, and the RF signal is transmitted as a coded signal via modulation section 211, transmission weighting section 2408, and transmitting section 212.
In the terminal, upon receiving the coded signal, reception demodulation section 250 demodulates the RF signal into the demodulated signal via receiving section 202 and demodulation section 204. Decoding section 207 performs deinterleaving, depuncturing, and decoding in this order using the demodulated signal and coding parameter obtained in (1), and outputs the data.
(4) Terminal: Transmission of Coded Signal
In the terminal, coding section 2409 outputs the coded information obtained by performing encoding, puncturing and interleaving on the data using coding parameters obtained in item (1). The coded information is output to transmission modulation section 2410, and the RF signal is transmitted as a coded signal via modulation section 211, transmission weighting section 2408, and transmitting section 212.
In the base station, upon receiving the coded signal, reception demodulation section 250 demodulates the RF signal into the demodulated signal via receiving section 202 and demodulation section 204. Decoding section 207 performs deinterleaving, depuncturing, and decoding in this order using the demodulated signal and coding parameter obtained in (2), and outputs the data. Communicating as described above enables data to be provided and received.
Thus, according to the communication apparatus and communication system of Embodiment 13, in addition to the effects of Embodiment 1, coding section 205 encodes control information such as interleaving pattern and puncturing pattern from the estimation value of the propagation environment to obtain, and decodes the data using the obtained control information, whereby the optimal code (decoding) is made possible corresponding to the propagation state, and increases in communication quality are expected. Further, according to the communication apparatus and communication system of Embodiment 13, the conventional need is eliminated of providing and receiving the coding parameter by handshake in communication, and therefore, significant features are provided that enable a quick response to the propagation environment, as well as increased efficiency.
In addition, in Embodiment 13, methods are described that communications are carried out by varying a coding parameter corresponding to the propagation state, and that the propagation control is carried out at the time of transmission. However, the present invention is not limited to such methods, and as described in other Embodiments, the methods are not inevitable, and an arbitrary method may be used of transmitting signals without performing the propagation control.
Further, while Embodiment 13 describes using convolutional code as a coding scheme, the present invention is not limited to such a coding scheme, and an arbitrary coding scheme is applicable such as block coding.
Moreover, Embodiment 13 describes the case of varying encoding pattern, puncturing pattern, and interleaving pattern as coding parameters corresponding to the propagation state. However, the present invention is not limited to such a case, and part of encoding pattern, puncturing pattern, and/or interleaving pattern may be fixed to use. It is thereby possible to simplify configurations of the coding section and decoding section. In this case, it is important to select a pattern effective in increasing the communication quality. For example, the puncturing pattern is one of important parameters that affect the data capacity and error rate greatly, and changes in the puncturing pattern are often the most effective. Further, it is apparent in Embodiment 13 that procedures of (1) and (2) or procedures (3) and (4) in
The coded signal is provided and received after providing and receiving a reference signal. However, for example, it may be possible to dispose a reference signal and coded signal on the same format, and perform decoding (or coding) after the coding parameter is selected. Thus associating the data with a reference signal for coding parameter estimation has a feature of enabling fine selection of coding parameter.
Further, the method is described above of varying an optimal coding parameter corresponding to the propagation parameter. However, it is apparent that the modulation scheme (such as QPSK and 16QAM) or a spreading code length in CDMA can be varied as well as the coding parameter. In this way, advantages are obtained of providing communications with the same flexibility as in using the coding parameter and with higher efficiency.
The above-mentioned Embodiments describe primarily data communications using the propagation state, where accuracy in estimating the propagation state is required. Generally, the accuracy in estimation is proportional to the data amount used in calculation, and the increased data amount decreases the efficiency. Further, a result of propagation estimation is affected by auto-correlation of a reference signal used in the propagation estimation. The means for solving the aforementioned issues will be described below with reference to
Receiving apparatus 2600 will be described first.
Reception demodulation section 2604 has receiving section 102, propagation estimating section 103, equalizing section 2602 and demodulation section 2603.
Equalizing demodulation section 2605 has equalizing section 2602 and demodulation section 2603.
Coding section 2601 extracts a characteristic from input propagation information, and outputs a propagation characteristic code (first data).
Equalizing section 2602 receives the estimated propagation information and the propagation characteristic code indicative of the characteristic, and outputs an equalized signal obtained by removing unnecessary components from the received signal.
Demodulation section 2603 receives the equalized signal to demodulate, and outputs a result of demodulation as demodulated information (second data).
Propagation estimating section 103 will be described next.
Auto-correlation section 2701 receives a reference signal sequence, and outputs the auto-correlation function of the sequence. Component removing section 2702 receives a first delay profile and the auto-correlation function, and outputs a second delay profile obtained by removing the auto-correlation function component from the first delay profile. Average calculating section 2703 receives the delay profile, and averages estimation results for a predetermined period.
The operation of receiving apparatus 2600 will be described below.
The basic operation is the same as in
In this way, the propagation information and propagation characteristic code is input to equalizing demodulation section 2605, and is used in equalizing or demodulation, and it is thereby possible to perform effective equalizing and demodulation using the information and code, thus resulting in a feature that increases in communication quality are expected.
In particular, when equalizing section 2602 that removes an unnecessary component (for example, multipath component) from the received signal is provided with a table of tap coefficient corresponding to the propagation characteristic code, and performs equalizing using the tap coefficient corresponding to the code, a significant feature is provided of reducing the calculation amount greatly. Then, performing equalizing on a difference between the propagation characteristic code and propagation information simplifies a configuration of the equalizing section.
The operation of propagation estimating section 103 will be described below.
In the section 103, the input received signal is temporarily held, and convolver 403 calculates the correlation value of the received signal and reference signal sequence, and outputs a first delay profile. Auto-correlation section 2701 calculates the auto-correlation of the reference signal sequence to output.
The delay profile is calculated by the following equation:
Ds(t)=Σ(Sr(t+n)R·(n)) (20)
Ds is an estimated delay profile, Sr is a received signal, and R is a reference signal sequence. The received signal is expressed using transmission signal St and propagation distortion Pd:
Sr(t)=Σ(St(t−n)·Pd(n)) (21)
=St(t)*Pd(t)
(where ‘*’ indicates the convolution)
Further, since transmission signal St is the reference signal:
Ds(t)=Σ((St(t+n)*Pd(t+n))·R(−n)) (22)
=(R(t)*Pd(t))*R(t)
=R(t)*Pd(t)*R(t)
Using the following equation:
AR(t)=R(t)*R(t) (23)
equation (22) is transformed:
Ds(t)=AR(t)*Pd(t) (24)
As an example, a case is considered of using maximal-length sequences (M sequences) as a reference signal. Codes of M sequences are 2{circumflex over ( )}n−1 when t=0 (0≤t<2{circumflex over ( )}n−1) in auto-correlation function AR(t) of equation (23), while being —1 except t=0 (
In this way, as indicated by equation (20), since the delay profile obtained herein includes the auto-correlation function of the reference signal sequence, and the function affects the characteristic of the reference signal sequence. Component removing section 2702 performs calculation for removing a component of auto-correlation function (AR(t)) calculated in auto-correlation section 2701 from the first delay profile. Specifically, it is known that the removal can be carried out by setting the impulse train given by the auto-correlation function as tap coefficients of IIR filter.
Further, average calculating section 2703 averages results (second delay profile) of a plurality of calculations, and it is thereby possible to suppress errors caused by distortion and/or noise.
Thus, according to the communication apparatus and communication system of Embodiment 14, in addition to the effects of Embodiment 1, since equalizing section 2602 performs equalizing on the security data and then demodulates the data, it is possible to obtain the security data with high quality. Further, according to the communication apparatus and communication system of Embodiment 14, since component removing section 2702 removes the frequency component of the reference signal, it is possible to obtain an estimation value of the propagation environment with high accuracy which is not affected by the frequency component of the reference signal.
In addition, in Embodiment 14, it is possible to incorporate propagation estimating section 103 as illustrated in
Buffer 3001 temporarily stores the delay profile. Vector quantization section 302 compares the stored delay profile with the content of codebook 3008, and outputs the most similar code. Code transforming section 3003 receives the vector quantized code, and obtains a code corresponding to the code from code storing section 3007 in codebook 3008. Auto-correlation section 3004 receives a reference signal sequence and outputs the auto-correlation function. Convolution calculating section 3005 calculates the convolution of the auto-correlation function and the content of quantization vector in codebook 3008. Codebook 3008 stores quantization vectors to be compared in vector quantization and codes corresponding to the quantization vectors, and has a configuration as illustrated in
The operation of propagation estimating section 103 will be described below.
Buffer 401 temporarily stores a received signal. Convolver 403 receives the received signal sequence and reference signal sequence output from reference signal sequence storing section 402, and performs sliding correlation calculation of the reference signal sequence and received signal sequence to obtain delay profiles. Buffer 401 temporarily stores the delay profiles to output to vector quantization section 3002. Meanwhile, auto-correlation section 3004 calculates the auto-correlation of the reference signal sequence output from reference signal sequence storing section 402, and outputs the value to convolution calculating section 3005. Vector quantization section 3002 calculates a metric amount of the input delay profile and each vector in quantization vector storing section 3006 in codebook 3008, and selects a vector that minimizes the amount, while performing metric calculation using the vector of which the convolution with the auto-correlation function is calculated by auto-correlation section 3004. Vector quantization section 3002 outputs thus selected vector code. Code transforming section 3003 selects a code corresponding to the vector code output from vector quantization section 3002, from code storing section 3007 in codebook 3008, and outputs the propagation estimation information.
Thus, according to the communication apparatus and communication system of Embodiment 15, in addition to the effects of Embodiment 1, since convolution calculating 3005 calculates the convolution of the auto-correlation function and the quantization vector in vector quantization, it is possible to obtain impulse response characteristics with high accuracy. Further, according to the communication apparatus and communication system of Embodiment 15, there is provided the effectiveness of obtaining the propagation estimation information with high accuracy. Furthermore, according to the communication apparatus and communication system of Embodiment 15, the auto-correlation function of a reference signal sequence undergoes the convolution with a vector in quantization vector storing section 3006, which is equivalent to giving a component of auto-correlation function AR(n) to a vector to search. Therefore, it is possible to perform a search without being affected by AR(n) in Ds(t) given by equation (20), and to set quantization vectors that are not affected by the auto-correlation function of the reference signal sequence. Moreover, according to the communication apparatus and communication system of Embodiment 15, since a component of the auto-correlation function is added to the quantization vector, it is only required to calculate the convolution for the auto-correlation function, and there is a significant feature of enabling implementation with ease.
Transforming section 3101 performs Fourier transform on the delay profile, and selects primary coefficients from among coefficients obtained by Fourier transform to output.
Configurations of propagation estimating section 103, transforming section 3101 and coding section 105 will be described below with reference to
Propagation estimating section 103 will be described first.
Buffer 3201 holds an input received signal of a predetermined length.
Reference signal sequence storing section 3202 stores predetermined reference signal sequences to output sequentially.
Convolver 3203 calculates the convolution of the temporarily held received signal and reference signal sequence to output correlation values.
Buffer 3204 temporarily holds calculated correlation sequences.
Transforming section 3101 will be described below.
Fourier transform section 3205 receives a delay profile to perform orthogonal transform such as Fourier transform.
Coefficient extracting section 3206 receives the coefficients subjected to Fourier transform and selects only primary coefficients.
Coding section 105 will be described below.
Vector quantization section 3207 searches quantization vectors stored in codebook 3209 for a quantization vector that is the most similar to an input vector train, and outputs the code.
Code transforming section 3208 selects from codebook 3209 an encryption key corresponding to the code output from vector quantization section 3207.
Codebook 3209 stores quantization vectors and encryption keys as illustrated in
Sr′(t)=Fr(t)*Sr(t) (25)
=Fr(t)*(St(t)*Pd(t))
Since transmission signal St(t) in equation (25) results from a reference signal sequence passed through band limitation filter 3302 (F(t)), Sr′ (t) is:
Sr′(t)=Fr(t)*((Ft(t)*Rs(t))*Pd(t)) (26)
Since the delay profile is obtained by calculating the convolution of the correlation sequence and reference signal sequence Rs(t) as described, Ds(t) is given as described below:
Ds(t)=Sr′(t)*Rs(t) (27)
=Fr(t)*Ft(t)*Rs(t)*Rs(t)*Rs(t)*Pd(t)
=F(t)*ARs(t)*Pd(t)
Herein, F(t) is impulse response indicated by synthesis characteristic using band limitation filter 3302 and band limitation filter 3306, and the filtering characteristic is referred to as band limitation filter. Meanwhile, ARs(t) represents the auto-correlation function of reference signal sequence Rs (t). Thus obtained equation (27) represents the characteristic obtained by performing band limitation on a signal in which propagation characteristic Pd(t) is superimposed on auto-correlation function ARs(t) using the band limitation filter. When auto-correlation function ARs(t) is impulse characteristic, the characteristic of equation (27) is equivalent to the characteristic of propagation characteristic Pd(t) subjected to the band limitation filter.
When propagation characteristic Pd(t) is considered as a frequency characteristic, it is understood that Ds (t) is obtained as the propagation characteristic given the frequency characteristic expressed by F(t). For example, when F(t) is a band limitation filter of −½fbw to +½fbw, propagation characteristic Pd−bw(t) is obtained which is subjected to band limitation of fbw. In the environment of interior propagation, since bands of 1 MHz or more are dominant in the frequency characteristic of propagation characteristic, and therefore, it is efficient particularly in communications with a symbol rate of 1 MHz or more. Meanwhile, in the case of exterior propagation, since bands of 10 kHz or more are dominant in the frequency characteristic of propagation characteristic, and therefore, it is efficient particularly in communications with a symbol rate of 10 kHz or more.
Since only propagation characteristic component limited to the frequency band given as F(t) is obtained as propagation characteristic Ds (t) calculated from the received signal, by transforming Ds(t) into the frequency domain in Fourier transform section 3205 in transforming section 3101, parameters condense into low frequencies. By using coefficient extracting section 3206 for selecting and extracting low frequencies from signal sequence transformed into the frequency domain, it is possible to represent primary components of the propagation characteristic with a small number of parameters. Specifically,
Thus, according to the communication apparatus and communication system of Embodiment 16, in addition to the effects of Embodiment 1, since transforming section 3101 performs Fourier transform on the propagation estimation value and extracts only primary coefficients, it is possible to represent the propagation environment with numerals in the most obvious way. Further, according to the communication apparatus and communication system of Embodiment 16, since vector quantization section 3207 performs vector quantization on primary coefficients extracted by performing Fourier transform on the propagation estimation value in transforming section 3101, vector quantization can be implemented with an extremely simple configuration. Furthermore, according to the communication apparatus and communication system of Embodiment 16, since only primary coefficients are selected by Fourier transform and encoded, it is possible to obtain the first data efficiently with a small number of propagation parameters. Moreover, according to the communication apparatus and communication system of Embodiment 16, by inserting transforming section 3101 between propagation estimating section 103 and coding section 105, there is provided a remarkably significant feature of enabling great reduction in construction.
In addition, while in Embodiment 16 transforming section 3101 uses Fourier transform, the present invention is not limited to Fourier transform. It is known that the same effectiveness is obtained when using DCT (Discrete Cosine Transform), wavelet transform, and Hilbert transform.
Transmitting apparatus 3500 will be described first.
Modulation section 3501 temporarily holds the first transmission data, and outputs channel modulated signals corresponding to the number of channels. Spreading code storing section 3502 stores spreading codes corresponding to the number of channels to output. Spreading section 3503 calculates the convolution of channel data with a spreading code corresponding to the channel to perform spectrum spreading. Propagation control section 3504 receives the first transmission data, and calculates an antenna coefficient for each channel. Synthesis section 3505 multiplies a spread signal by the antenna coefficient to output an antenna signal. Transmitting section 3506 performs frequency conversion on the weighted signal to amplify. Antenna section 3507 transmits a signal of corresponding sequence.
Receiving apparatus 3600 will be described below.
Antenna section 3601 outputs a received RF signal. Receiving section 3602 receives the received RF signal, amplifies the power of the signal and converts the frequency of the signal. Spreading code storing section 3603 stores spreading codes corresponding to the number of spreading codes. Despreading section 3604 calculates the convolution of the received signal with the spreading code corresponding to the channel to despread, and outputs a channel signal. Demodulation section 3605 receives channel signals and outputs demodulated channel signals. Power detecting section 3606 detects reception power for each channel, and outputs reception power information. Buffer 3607 temporarily holds demodulated channel signals and outputs the second data. Comparing section 3608 receives the reception power information, compares the power level with one another, and outputs the first data.
The operation of transmitting apparatus 3500 and receiving apparatus 3600 will be described with reference to
In
(0) Initialization
The transmitting apparatus and receiving apparatus perform the predetermined initial operation, and set various parameters, etc. at predetermined values after the power is supplied to the apparatuses.
(1) Transmission of Reference Signal
The receiving apparatus transmits a reference signal to detect a propagation state. Upon detecting the reference signal, the transmitting apparatus calculates the propagation state from the receiving apparatus based on the signal.
(2) Transmission of Encryption
Using the propagation state obtained in (1), the transmitting apparatus superimposes the information on power control at the receiving end, and outputs a communication signal. The receiving apparatus receives the communication signal, detects the reception power of the signal concurrently with demodulation of the received signal, and detects the information superimposed on the reception power. Subsequently, the receiving apparatus performs similar procedures.
According to the procedures in
It is herein assumed that the number of channels is three (channel A, channel B and channel C) and that the number of antennas is four (antenna 1, antenna 2, antenna 3 and antenna 4). It is further assumed that the transmitting apparatus has calculated the propagation state from the receiving apparatus according to communication procedure (1) as described earlier.
Upon receiving the first data and second data, modulation section 3501 temporarily holds the second data, and outputs modulated channel signals corresponding to three channels. Spreading section 3503 receives the modulated channel signals, performs spectrum spreading by the convolution of the signals with respective spreading codes provided from spreading code storing section 3502, and outputs spread channel signals. Propagation control section 3504 outputs antenna coefficients such that the power at the receiving end becomes a predetermined state, using the propagation state obtained in communication procedure (1) and the first data.
Among methods of superimposing information on the power are considered a method of superimposing the information on the order of the power of channels and a method of superimposing the information on differences between the power of channels or on ratio of the power of channels.
The method of superimposing the information on the order of power is described herein.
For example, when the first data is superimposed on the order of power of channels, six pieces of information can be superimposed as described below:
Power of channel A>Power of channel B>Power of channel C
Power of channel A>Power of channel C>Power of channel B
Power of channel B>Power of channel A>Power of channel C
Power of channel B>Power of channel C>Power of channel A
Power of channel C>Power of channel A>Power of channel B
Power of channel C>Power of channel B>Power of channel A
The six patterns are respectively assigned codes, which the transmitting apparatus and receiving apparatus share in advance.
Corresponding to the power information associated with the first data, propagation control section 3504 determines antenna coefficients corresponding to the modulated channel signals.
A method of controlling the power using the antenna coefficients will be described below with reference to
Srx(t)=ΣStn·hn (28)
=Σ(ΣScm·Cmn)·hn
The transmitting apparatus adjusts values of C11 to C23 from h1 to h4 obtained using the reference signal in communication procedure (1), and thereby is capable of adjusting the reception power of received signal Srx received in antenna Ar for each spread channel signals Sc1 to Sc3 independently. In particular, controlling only by varying phases of C11 to C34 has such a feature that the power transmitted from each antenna does not vary.
For example, with respect to channel A (Sc1), C11 to C14 are calculated such that signals transmitted from A1 to A4 provide the maximum power in Ar by spatial synthesis. With respect to channel B (Sc2), C21 to C24 are calculated such that a notch is formed in the same way. With respect to channel C (Sc3), C31 to C34 are calculated such that the power is set at a value between channels A and B.
Synthesis section 3505 receives the antenna coefficients and modulated channel signals, and synthesizes antenna signals for antennas 1 to 4. The antenna signals undergo the frequency conversion and power amplification in transmitting section 3506, and are transmitted in antenna section 3507.
Antenna section 3601 in the receiving apparatus receives thus transmitted encrypted signals, and outputs the received RF signals to receiving section 3602. Receiving section 3602 receives the received RF signal, and outputs a received signal subjected to power amplification and frequency conversion. Despreading section 3604 receives the received signal, and calculates the convolution of the signal with a spreading code input from spreading code storing section 3603. Despreading is carried out corresponding to the number of channels (herein, three channels), and a channel signal divided for each channel is output. Demodulation section 3605 receives the channel signal to demodulate, and outputs the demodulated channel signal, while detecting a channel detection signal for power detection. Buffer 3607 temporarily holds the demodulated channel signal input from demodulation section 3605 to output as the first data. Power detection section 3606 receives the channel detection signal, estimates the reception power for each channel, and outputs channel power information. Comparing section 3608 compares a power level given from the channel power information with one another, and transforms the result into a code assigned in advance based on the order of power of channels to output as the first data.
The first data transmitted from transmitting apparatus 3500 can be used as the first data in receiving apparatus 3600, and in particular, the second data is of communications using actively the propagation path formed between transmitting apparatus 3500 and receiving apparatus. Therefore, such a feature is provided that another receiving apparatus cannot interpret the reception, and as a matter of course, there is provided effective communication means for information requiring high security.
In addition to aforementioned descriptions, differences between the present invention and conventional technique will be described below with reference to
Further, it is possible to control a null point where the reception power is 0, using weighing coefficients C11 to C34 in
In
When using the method of thus controlling a null point, since information to be received is only received in reception, the receiving terminal may have the conventional configuration. In other words, there is a significant feature that varying only a transmitting terminal enables implementation of communications with assured security.
Thus, according to the communication apparatus and communication system of Embodiment 17, in addition to the effects of Embodiment 1, synthesis section 3505 on the transmitting side transmits the first data to a communicating party on different propagation paths using a plurality of antennas, and comparing section 3608 on the receiving side receives incoming signals passed through different propagation paths, and obtains the first data from a result of comparison of estimation values of propagation environments of the paths, whereby it is possible to make it remarkably difficult that the first data is intercepted using a communication apparatus of a third party, thus enabling high security to be provided. Further, according to the communication apparatus and communication system of Embodiment 17, transmitting apparatus 3500 performs spectrum spreading on signals of a plurality of channels, multiplies the signals by antenna coefficients in multiplexing to control propagation states for each antenna, and thereby is capable of superimposing the information on the propagation states (herein, signal power, i.e., propagation loss). Further, according to the communication apparatus and communication system of Embodiment 17, as distinct from amplitude modulation typified by ASK as a method of superimposing information on signal power, propagation states are used actively. In other words, since signal power in a reception antenna end is used, propagation characteristics are different in other reception points and signals are not received properly, and in this respect, this embodiment is significantly different from conventional amplitude modulation. For example, since it is possible to vary the signal power at the receiving end without varying the output power from antennas as described above, it is impossible to demodulate the second data even when a third party intercepts communications to demodulate, resulting in the significant feature that the high security is provided. Moreover, according to the communication apparatus and communication system of Embodiment 17, since communications are carried out noting differences in signal power between carriers using multicarrier signals, there is a significant advantage that detection can be carried out from received signals at the same time. The propagation conditions are assumed to be the same because of the same time and same frequency, and it is thereby possible to provide stable communications. For example, when using a spread signal on which two channels (assumed as channel R and channel S) are multiplexed, it is considered assigning a code to whether the signal power of channel S is higher or lower than the signal power of channel R that is set as a reference. In the case of superimposing information on signal phases, it is similarly considered detecting a reference phase of channel S based on a reference signal of channel R.
In addition, Embodiment 17 describes Spectrum Spread communications as an example. However, the present invention is not limited to such communications, and is applicable to multicarrier signals such as OFDM and to singlecarrier signals. OFDM communications can be implemented with spreading, despreading and channel respectively replaced with IFFT, FFT, and subcarrier. In the case of OFDM, since propagation characteristics appear in power of subcarriers, codes may be assigned using the envelop as a parameter.
Further, while Embodiment 17 describes the scheme of superimposing information on the signal power synthesized through propagation, the present invention is not limited to such a case. It is possible to superimpose information on a phase and frequency of signal, and further it is possible to superimpose information on polarization and delay profile.
Furthermore, in Embodiment 17, by arranging antennas with different polarization planes (for example, perpendicular to one another) as an antenna configuration, it is also possible to superimpose signals on polarized waves as described earlier. In this case, although a multicarrier signal is not required particularly, it is considered superimposing information on an angle of the polarization plane of channel S using the polarization plane of channel R as a reference when the multicarrier signal is used.
Still furthermore, in the case of superimposing information on the delay profile, by using the multicarrier signal, it is considered superimposing information on a difference of the delay profile obtained from channel S from the delay profile obtained from channel R as a reference. In this way, since the consistency of propagation state for the delay profile is maintained, it is possible to expect communications with high accuracy. Moreover, in Embodiment 17, superimposing the confidential information and pseudo information at the same time in the same frequency enables communications only in a target receive position, and further enables the communication system with high confidentiality.
Embodiment 18 extends the invention as described in Embodiment 17, and has a feature of superimposing information on propagation parameters obtained from a plurality of received signal sequences.
Receiving apparatus 4300 that is the communication apparatus according to Embodiment 18 of the present invention has receiving sections 4302a and 4302b substituting for receiving section 3602, despreading sections 4303a and 4303b substituting for despreading section 3604, and demodulation sections 4304a and 4304b substituting demodulation section 3605 in the configuration of receiving apparatus 3600 according to Embodiment 17 of the present invention as illustrated in
Receiving apparatus 4302 is comprised of receiving sections 4302a and 4302b. Despreading apparatus 4303 is comprised of despreading sections 4303a and 4303b. Demodulation apparatus 4304 is comprised of demodulation sections 4304a and 4304b.
Receiving section 4302a performs power amplification and frequency conversion on a received RF signal input from antenna 4301a to output to despreading section 4303a.
Receiving section 4302b performs power amplification and frequency conversion on a received RF signal input from antenna 4301b to output to despreading section 4303b.
Despreading section 4303a calculates the convolution of the received signal input from receiving section 4302a with a spreading code corresponding to the channel to despread, and outputs the channel signal to demodulation section 4304a.
Despreading section 4303b calculates the convolution of the received signal input from receiving section 4302b with a spreading code corresponding to the channel to despread, and outputs the channel signal to demodulation section 4304b.
Demodulation section 4304a demodulates the channel signal input from despreading section 4303a, and outputs the modulated channel signal to synthesis selection section 4305, while outputting the demodulated signal to power detecting section 3606 according to an output instruction signal from communication control section 4306.
Demodulation section 4304b demodulates the channel signal input from despreading section 4303b, and outputs the modulated channel signal to synthesis selection section 4305, while outputting the demodulated signal to power detecting section 3606 according to an output instruction signal from communication control section 4306.
Based on a selection synthesis signal input from communication control section 4306, synthesis selection section 4305 selects (or synthesizes) a branch received signal (or branch received data) received from either antenna, and outputs a result of selection or synthesis as the second data. In this way, since the effect is obtained of switching the propagation space with time, the gain like spatial diversity is obtained.
Communication control section 4306 outputs the selection synthesis signal for instructing to select/synthesize a branch received signal (or branch received data) from a predetermined antenna at predetermined time to selection synthesis section 4305. The section 4306 further outputs the output instruction signal for instructing demodulation section 4304a or 4304b to output to power detecting section 3606 the demodulated signal of antenna 4301a or 4301b that receives a signal including confidential information, respectively. In this way, since a third party cannot estimate the propagation space nor divide communication signals of antennas 4301a and 4301b, there is provided an advantage of implementing higher security.
Comparing section 3608 (propagation parameter difference calculating means) calculates a difference (propagation parameter difference) between the reception power of a received signal received in antenna element 4301a and reception power of a received signal received in antenna element 4301b, and outputs the calculated difference information as the first data.
In the system configured as described above, received signals in antennas Ar1 and Ar2 are given by the following equations:
Srx1(t)=ΣStn·h1n (29)
=Σ(ΣScm·Cmn)h1n
Srx2(t)=ΣStn·h2n (30)
=Σ(ΣScm·Cmn)·h2n
As is apparent from equations (29) and (30), since Srx1 and Srx2 are different from each other in the configuration of propagation path, propagation parameters h1n and h2n are also different from each other. The reception states of Srx1 and Srx2 are controllable by the operation of Cmn indicated in equations (29) and (30). It is considered that the receiving terminal uses a result of comparison of the propagation state obtained from Srx1 and the propagation state obtained from Srx2, as information for use in demodulation and decoding. In other words, the transmitting side superimposes information on a difference (such as a phase difference and reception power difference) of propagation parameters controlled with Srx1 and Srx2 to transmit, while the receiving side calculates the difference of propagation parameters obtained from received signals of Srx1 and Srx2, and uses the difference as part or all of the information to communicate, enabling various communications. Further, communicating in this way causes the need of estimating two-sequence propagation parameters, and thus enables high security to be provided. Naturally, increasing the number of antennas enables construction of more sophisticated system, and thus expects increases in security.
Further, it is possible to perform secure communications using a plurality of antennas Ar1 and Ar2. As descried above, antennas Ar1 and Ar2 have different propagation parameters, and receive different signals, and using this respect, controlling modulated signals for antennas Ar1 and Ar2 enables more complicated and secure communications. For example, confidential information is only transmitted to antenna Ar1, antenna Ar2, or both antennas Ar1 and Ar2, or these states are switched at predetermined time intervals.
The specific description is given below with reference to
Moreover, performing communications in this way increases the parameter elements constructing channels as illustrated in
In the foregoing, antenna coefficients (weighting coefficients) are calculated corresponding to propagation characteristics, and the calculation method will be described below. A n×m matrix H is described as an example (in other words, the number of transmission antennas is n, and the number of reception antennas is m). All the matrixes H are expressed as follows using orthogonal matrixes U (m×m) and V (n×n) and singular value matrix S (n×m):
U×S×V′=H (31)
V′ represents Hermitian transpose.
Assuming thus decomposed orthogonal matrix U (or V) to be arranged m(n) m×1 (1×n) singular value vectors which are referred to as respectively u1 to m (v1 to n). In this case, u1 to m (v1 to n) are:
ux×H=λx(or, H×vx=λx) (32)
λx is a singular value corresponding to ux(vx). In this case, the matrix H representative of propagation characteristics is subjected to singular value decomposition, and each element of characteristic vector ux with singular value λx of 0 (λx=0) is used as an antenna coefficient (weighting coefficient), whereby it is possible to control reception power at the reception antenna end to be 0.
More specific descriptions are given with reference to
Thus transmitted signals are received in the receiving apparatus via the propagation space, and expressed as follows using the characteristic (propagation matrix H) of the propagation space and modulated signal Smod:
H×Smod×vx=λx×Smod (33)
As can be seen from equation (33), modulated signal 1 multiplied by the singular value vector can arrive at the receiving apparatus. Meanwhile, modulated signal 3 is multiplied by the vector with λx of 0 (λx=0), and therefore, cannot arrive at the receiving apparatus. In other words, the receiving apparatus is capable of demodulating only demodulated signal 1 by demodulating the received signal without performing particular processing.
The foregoing is equivalent to performing null control as described in
When a third apparatus that is not the transmitting/receiving apparatus receives these signals, since the propagation matrix H′ that is the propagation characteristic shared by the transmitting apparatus is different, and equation (33) is not obtained. In other words, modulated signals 1 and 3 are given by correlation of propagation matrix H′ and the singular value vector, and it is impossible to separate modulated signal 1 and 3.
Further, with respect to a modulated signal (assuming herein communication information 2 and modulated signal 2) associated with the communication information that is not confident, as coefficients multiplied in weighting section 907, coefficients except singular value vector held in buffer 904 (or a constant vector such as [1,1, . . . 1]) are used. In this case, since coefficients different from the singular value vector are provided, equation (33) is not obtained, and the signals are received in the receiving apparatus.
As described above, the transmitting apparatus decomposes a modulated signal to transmit by the propagation state (or propagation parameter) formed between the transmitting apparatus and the terminal that is a communicating party, and transmits the decomposed signals from antennas, and the signals form the original modulated signal at the receiving end by spatial synthesis. At this point, the method of decomposing a modulated signal includes using coefficients (values corresponding to elements of a characteristic vector of equation (32)) introduced from propagation parameters as antenna coefficients (or weighting coefficients), and multiplying the original modulated signal by the antenna coefficients. In this way, since a result of spatial synthesis is different in the third terminal that cannot share the propagation parameters, and the third terminal cannot perform accurate demodulation, thus resulting in confidentiality.
Further, it is indicated that selective communications are available even in a receiving apparatus that does not have a particular configuration for the communication system. In other words, the present invention has a remarkably significant feature that security communication can be implemented only by changing the transmitting apparatus.
Thus, according to the communication apparatus and communication system of Embodiment 18, in addition to the effects of Embodiments 1 and 17, since a modulated signal to transmit is decomposed corresponding to the propagation state and the signals are transmitted from different antennas, a third terminal with a different propagation state has a different result in spatial synthesis, and cannot demodulate the signals properly, thereby ensuring the high security. Further, in Embodiment 18, superimposing the confidential information and pseudo information on the same frequency at the same time enables communications only in a target receive position, and provides the communication method with high confidentiality.
In addition, while Embodiment 18 has the premise that antennas Ar1 and Ar1 are connected to the same terminal, the present invention is not limited to such a case. Antennas Ar1 and Ar2 may be connected to different terminals (for example, terminals 1 and 2). It is thereby possible to perform secure communications concurrently with terminals land 2, and to construct efficient systems.
It is a feature of Embodiment 19 to specify a terminal using the propagation characteristic superimposed on a received signal.
Propagation characteristic extracting section 4606 is comprised of characteristic extracting section 4601 and buffer section 4602. Characteristic extracting section 4601 extracts a characteristic of the propagation state from the propagation estimation information input from propagation estimating section 103, and outputs the characteristic extraction information to buffer 4602 and terminal determining section 4603. As buffer information, buffer section 4602 outputs the characteristic extraction information corresponding to the stored propagation state to terminal determining section 4603.
Signal processing selecting section 4607 is comprised of buffer section 4604 and information processing section 4605.
Characteristic extracting section 4601 receives the propagation information obtained from the received signal, and encodes the information to extract the characteristic. Examples of elements extracted as a characteristic include a phase characteristic, gain characteristic, polarization characteristic, propagation delay characteristic, delay dispersion characteristic, and angle profile by direction-of-arrival estimation. It may be possible to sample the characteristic obtained from use one or a combination of the elements as an analogue value. In this case, it is not required particularly to extract the characteristic, and determination in terminal determining section 4603 is obtained by comparing analogue information, enabling determination with high precision accuracy. Meanwhile, examples of the characteristic extracting method include transform typified by Fourier transform, discrete cosine transform and wavelet transform, filtering using a filter and multiband filter and coefficient extraction based on linear prediction. Further, characteristic extracting section 4601 may have the same configuration as that of coding section 105 as shown in
Buffer section 4604 temporarily stores the extracted characteristic extraction information, and outputs the stored characteristic extraction information to terminal determining section 4603 as the buffer information at predetermined timing.
Terminal determining section 4603 (determining means) compares the characteristic extraction information input from characteristic extracting section 4601 with the buffer information input from buffer section 4606 to determine matching, and outputs the determination result to information processing section 4605 as a terminal determining signal (first data). Terminal determining section 4603 outputs a final terminal determination result as a terminal determination signal in a binary signal, using the propagation information obtained for a predetermined time. In this case, by using multi-valued signal such as 0 to 9 instead of using a binary signal such as 1 and 0, it is possible to construct a more flexible system. Further, when characteristic extracting section 4601 extracts coefficients, terminal determining section 4603 obtains the Euclidean distance between obtained coefficient sequences, and when the value is less than or equal to a predetermined value, determines that a terminal is the same terminal, while determining that a terminal is a different terminal, when the value is not less than the predetermined value. When a determination is not stable due to noise or fluctuations in propagation characteristic in making a determination, a method is considered of storing determination results for a predetermined period, and making a determination after averaging the results for a fixed period. In this case, it is considered providing the determination result with a range of 0 to 9 to be a likelihood value, instead of indicating the result by binary, 0 or 1, for representing the same or difference. In particular, since making a strict terminal determination causes an erroneous determination to tend to occur, stable terminal determination is carried out by making a determination based on an average of likelihood values obtained for a predetermined period. Thus, terminal determining section 4603 monitors a currently communicating terminal based on the estimated propagation environment, and observes so as to prevent the confidential information from leaking, for example, by the communicating terminal being switched maliciously before being aware.
Buffer section 4604 temporarily stores received data input from demodulation section 104.
Information processing section 4605 switches the content of information processing from the received data sequence stored and input in/from buffer section 4604 and the terminal determination result input from terminal determining section 4603. For example, among received data, the information greatly dependent on the terminal such as privacy information, charging information and confidential information may be all discarded as error processing without being processed. Further, the fact is transmitted that access from another terminal is determined from the terminal determination result, and processing for security measure is carried out.
The operation of receiving apparatus 4600 will be described.
Descriptions are given herein assuming that a communication terminal targeted for terminal specification is communication terminal 1, and the communicating party is communication terminal 2. The case is only described that communication terminal 2 transmits signals, because the operation of terminal registration and terminal determination is performed on signals transmitted from communication terminal 2.
Communication terminal 1 performs the terminal registration operation for communication terminal 2.
Communication terminal 1 receives a reference signal from communication terminal 2 using antenna 101, and receiving section 102 receives the RF signal and output a received signal. Propagation estimating section 103 receives the received signal, and estimates the propagation characteristic from the received signal and reference signal to output the propagation information. Propagation characteristic extracting section 4606 receives the propagation information, and characteristic extracting section 4601 outputs the characteristic extraction information. The characteristic extraction information is stored in buffer section 4604 as information for specifying communication terminal 2 that is a communicating party. The terminal registration operation is thus completed.
Secondly, communication terminal 1 communicates information with communication terminal X, while determining whether communication terminal X is the registered terminal (communication terminal 2).
Communication terminal 1 receives a communication signal from communication terminal X in antenna 101, and receiving section 102 receives the RF signal, and outputs a received signal. Propagation estimating section 103 receives the received signal, estimates the propagation characteristic from the received signal, and outputs the propagation information. The propagation information is output to characteristic extracting section 4601, receiving section 102 and demodulation section 104. Based on the propagation information, receiving section 102 controls the RF signal to be the received signal in an optimal state, while performing frequency correction, time correction, gain correction, etc. Demodulation section 104 receives the received signal, performs detection and demodulation while performing frequency/phase correction and time correction based on the propagation information, and outputs a received data sequence.
Communication procedures in the case of making a terminal determination will be described with reference to
(0) Base Station and Terminal: Initialization
After the power is supplied or upon receiving a specific signal, the base station and terminal are both set for the initial state. At the same time, states such as the frequency and time-synchronization are set according to predetermined procedures.
A predetermined time later after finishing the initial operation, the receiving apparatus transmits control information in a control signal at predetermined time intervals.
Meanwhile, the base station starts a search for the control signal after finishing the initial operation. When receiving the control signal transmitted from the base station, the terminal detects the time, frequency, etc. for synchronization with the time, frequency, etc. that the system has (system synchronization). After the system synchronization is finished properly, the terminal transmits a registration request signal for notifying the base station of existence of the terminal. In response to the registration request from the terminal, the base station transmits a registration permission signal and thus performs registration permission of the terminal.
(1) Terminal: Transmission of Reference Signal
The terminal outputs a reference signal for propagation estimation performed in the base station as a reference signal. Specific operation is the same as the operation in the method as described in Embodiment 1 or others. The base station extracts a characteristic from the propagation information obtained in the communication, and registers the characteristic information of the propagation characteristic obtained as the information for the terminal specification, together with the terminal information.
(2) Base station: Transmission of Communication Signal
The base station starts the communication and transmits a communication signal. When the encrypted communication is carried out, the base station may transmit an encrypted signal using the method as described in the other Embodiment.
When the terminal receives the communication signal, reception modulation section 150 demodulates the received signal into demodulated information, and outputs demodulated data. When encryption is performed in the communication, decoding is performed using the method as described in the other Embodiment.
(3) Terminal: Transmission of Communication Signal
The terminal transmits a communication signal. The base station estimates the propagation characteristic from the received signal from receiving section 102, and extracts the characteristic information from the propagation information. At the same time, the base station demodulates the received signal, and outputs received data. By comparing the characteristic information with the characteristic information registered in (1), a determination is made on the terminal. The received data is output together with right/wrong information indicative of a final determination result having thus obtained determination. Signal processing selecting section 4607 receives the received data and terminal determination signal, and stores the received data in buffer section 4604 for a predetermined time. Meanwhile, using the propagation information obtained for a predetermined time, terminal determining section 4603 outputs the final terminal determination result as a terminal determination signal in a binary signal. Information processing section 4605 switches the content of the information processing from a received data sequence stored in buffer section 4604 and terminal determination result. For example, among received data, information greatly dependent on the terminal such as privacy information, charging information and confidential information may be all discarded as error processing without being processed. Further, the fact is transmitted that access from another terminal is determined from the terminal determination result, and processing for security measure is carried out.
Subsequently, encrypted communications and general communications in (2) and (3) are repeated.
By performing communications based on the procedures as described above, it is possible to check a received signal and a terminal that outputs the signal. In particular, the method of making a terminal determination does not need procedure (2), and can be implemented only by procedures (1) and (3).
Further, it is considered changing the subsequent information processing operation based on the determination result in the operation in (3). By switching the processing based on the determination result, it is possible to maintain the safety of processing to a higher extent, and to prevent data fraud from being performed by a terminal that is not authenticated properly. Therefore, it is possible to construct an apparatus and system with distinctly high security.
The characteristic of a propagation path formed between communication terminals is determined by positions of the terminals and layout around the terminals, and it is not possible to change the characteristic to an optional one. Although the method is considered of using a plurality of antennas to control propagation, since it is impossible for a third terminal to measure the propagation path characteristic and it is difficult to predict the characteristic, it is extremely difficult to pretend as the communication terminal by operating the characteristic. Thus, the terminal specifying method using the present invention is capable of being implemented with extreme simplicity and with high accuracy.
Further, when a plurality of antennas 101 and receiving sections 102 is used and a terminal is determined by obtaining characteristics of two or more propagation paths from two or more received signal sequences, the propagation information of the terminal becomes diversity, enabling the determination to be made with higher accuracy.
The aforementioned method has a possibility that an erroneous determination result causes a significant loss to occur in communications. In order to relieve such a loss to secure stable communications, it is considered performing reconfirmation when the terminal determination results in a negative determination. The procedures will be described with reference to
(3′) Terminal: Transmission of Communication Signal
The base station makes a terminal determination using the propagation information obtained from the communication signal transmitted from the terminal (herein, it is assumed that a result is obtained that is different from the information registered in (1)). The base station determines that the information is from a terminal that is different from the registered terminal as a result of the determination, and outputs a negative terminal determination signal together with the received data.
(2′) Base Station: Request Signal
To reconfirm the terminal according to the result of terminal determination, the base station transmits an authentication request signal to the terminal as a request signal.
(1′) Terminal: Transmission of Reference Signal
Upon receiving the request signal, the terminal performs the operation in response to the signal. Herein, the terminal transmits the request signal again. Following procedures are the same as procedures (1) to (3). By performing the aforementioned procedures, when an erroneous determination occurs due to a variation in propagation environment, performing reconfirmation enables the stable communication to be provided.
Further, when the determination result is different, it is considered that signal processing selecting section 4607 in
Further, inserting a reference signal into part of communication signal of (3) and (3′) enables the base station to perform stable propagation estimation, and as a result, the base station is capable of obtaining a stable terminal determination result. At this point, the reference signal does not need to be the same reference signal as used in (1), and may be replaced with a pilot signal or known signal sequence is generally used in communications.
As described above, for example, in a session during a period of time the communication is started and then finished, the present invention enables the information during a period of time authentication is finished between the base station and terminal and then the session finishes to be provided with efficiency. There is a significant feature that it is possible to prevent adverse effects from being imposed on the communication, for example, when another terminal transmits a fraud signal during the session in communicating the charged information via the internet.
In aforementioned descriptions, while a reference signal is used to estimate the propagation, any signal sequence is available as long as using the sequence enables error detection under the communication environment. As such a signal sequence, there are known a pilot signal, known signal, silk word signal, synchronization signal, synchronization word, preamble signal, midamble signal, postamble signal, reference signal, and unique word signal. Alternatively, it is possible to use a signal sequence sufficiently protected in demodulation error, and examples include a PSK signal sequence included in a signal sequence communicated in M-ary modulation scheme and a signal sequence coded in a scheme with high error correcting capability.
Further, it is considered inserting ID for specifying a terminal into part of communications from the terminal to base station, and using the value and result from the propagation information.
Thus, according to the communication apparatus and communication system of Embodiment 19, in addition to the effects of Embodiment 1, terminal determining section 4603 determines whether a terminal with which the apparatus is currently communicating is a desired communicating party from the propagation estimation value, and when the terminal is not a desired communicating party, switches the processing of received data to processing for not demodulating the received data, based on the terminal determination result. Therefore, it is possible to maintain a higher level of safety, and to prevent a terminal that is not authenticated properly from performing data fraud, enabling construction of apparatus and system with remarkably high security.
For the sake of convenience, Embodiment 20 assumes an apparatus that transmits downlink signals as a base station, and that an apparatus that transmits uplink signals as a terminal to describe.
The case will be described first of communicating secure information in one way. In the case where the base station transmits general communication signal #4801 that is not encrypted to the terminal, the base station selects an encryption key corresponding to the propagation state based on reference signal #4802 when the terminal transmits communication signal #4803 including reference signal #4802 to the base station over the uplink, and transmits to the terminal encrypted communication signal #4804 encrypted using the selected encryption key common to the terminal. The terminal transmits a communication signal including reference signal #4802 to the base station at predetermined intervals. Whenever receiving reference signal #4802 transmitted from the terminal, the base station checks whether or not the encryption key is changed, and after the check, transmits encrypted signal #4805 to the terminal.
The case will be described next of performing bidirectional secure communications. The base station transmits communication signal #4807 including reference signal #4806 to the terminal. The terminal transmits communication signal #4809 including reference signal #4808 to the base station. The base station having received reference signal #4808 selects an encryption key corresponding to the propagation state based on reference signal #4806, and transmits encrypted signal #4810 encrypted using the selected encryption key to the terminal. Meanwhile, the terminal having received reference signal #4806 selects an encryption key corresponding to the propagation state based on reference signal #4806, and transmits encrypted signal #4811 encrypted using the selected encryption key to the base station. Then, the base station transmits encrypted signal #4812 to the terminal.
Timing at which the reference signal is transmitted will be described with reference to
In a frame structure in
In a frame structure in
In a frame structure in
Thus, according to the communication apparatus and communication system of Embodiment 20, in addition to the effects of Embodiment 1, transmission timing of reference signal is varied or a reference signal is transmitted while selecting an uplink channel or downlink channel, and it is thereby possible to transmit and receive efficiently encrypted signals.
In addition, in
A frame in
A frame in
In a frame in
Thus, according to the communication apparatus and communication system according to Embodiment 21, in addition to the effects of Embodiment 1, since a pilot signal and data are subjected to code division multiplexing, it is possible to transmit and receive encrypted signals resistant to interference.
In addition, in Embodiment 21, a pilot signal is used to be reference for a phase and amplitude of a data signal. However, the present invention is not limited to the pilot signal, and allows any reference signal besides the pilot signal to be selected.
Switching section 210 switches between encrypted security data output from encrypting section 209 and a reference signal output from reference signal generating section 208 so that desired subcarriers are assigned to transmission signals subjected to processing of orthogonal frequency division multiplexing in orthogonal frequency division multiplexing section 5101 described later.
Orthogonal frequency division multiplexing 5101 performs the processing of orthogonal frequency division multiplexing on a transmission signal input from modulation section 211 to output to transmitting section 212. In other words, orthogonal frequency division multiplexing section 5101 performs inverse fast Fourier Transform on the transmission signal input from modulation section 211, thereby converts parallel data into serial data, and outputs the resultant to transmitting section 212. Transmission signals subjected to the processing of orthogonal frequency division multiplexing are assigned to subcarriers.
A frame shown in
A frame in
In a frame shown in
Thus, according to the communication apparatus and communication system according to Embodiment 22, in addition to the effects of Embodiment 1, orthogonal frequency division multiplexing section 5101 performs the processing of orthogonal frequency division multiplexing on the encrypted data and pilot signal to assign subcarriers, and it is thereby possible to improve the spectral efficiency in transmitting encrypted signals.
In Embodiment 23, whether or not perform secure communications is determined by instructions from an upper layer.
Communication control section 5301 controls switching of communication methods and synthesis corresponding to the communication time. In other words, when communication control section 5301 receives a communication control signal to perform secure communications from upper layer 5303, the section 5301 outputs the propagation information input from coding section 703 to propagation control section 701, outputs a reception control section for performing secure communications to receiving section 202, and further outputs a transmission control signal for performing secure communications to transmitting section 705. Meanwhile, when communication control section 5301 receives a communication control signal not to perform secure communications, the section 5301 outputs a reception control section for not performing secure communications to receiving section 202, and further outputs a transmission control signal for not performing secure communications to transmitting section 704. With respect to the propagation control method, it is considered that the propagation control as described in the other Embodiments is performed when the secure communications are performed, and that the propagation control is not performed when conventional communication methods are performed, or the directivity is controlled as the propagation control to improve the communication quality.
Buffer section 5302 holds the transmission data temporarily to output to switching section 210.
Upper layer 5303 is either layer (among data link layer, network layer, transport layer, session layer, presentation layer and application layer) higher than L1 in communication layer structure. In the upper layer, received data and transmission data is input and output, and at the same time, when necessary, a communication method is selected and a control signal for the method is output as a communication control signal.
The communication method using the present invention is high in compatibility with conventional communication methods, and it is possible to switch between the communication method using the present invention and conventional communication method to use. In this way, corresponding to situations such as:
The operation of transmitting/receiving apparatus as shown in
When the upper layer section outputs a communication control signal so as to implement the security communication, the communication control section outputs transmission and reception control signals so as to perform propagation control for security communications ((1) and (4) in
Thus, according to the communication apparatus and communication system of Embodiment 23, in addition to the effects of Embodiment 1, based on instructions from upper layer 5303, communication control section 5301 switches between the conventional method and the security communication method for protecting in security the important information which is the communication scheme for performing transmission and reception of the first using the propagation estimation value, thereby enabling a versatility communication apparatus to be provided.
In addition, in Embodiment 23, using the transmission control signal and reception control signal, the propagation control in receiving section 202 and transmitting section 7095 is turned ON/OFF. However, the present invention is not limited to such a method, and when either receiving section 202 or transmitting section 705 has the same configuration as that in the conventional communication apparatus, the need of a control signal eliminated for such a section. Examples of such a section include transmitting section 152 in the communication apparatus as illustrated in
Embodiment 24 has a feature that antenna coefficients include confidential information.
Transmitting apparatus 5500 will be described first.
Modulation section 5501 temporarily holds the second data, and outputs channel phase modulated signals corresponding to the number of channels to combining section 5502.
According to modulation antenna coefficients input from propagation modulation section 5507, combining section 5502 performs combining calculation of the modulated signals input from modulation section 5501.
Transmitting section 5503 performs frequency conversion and power amplification on the input combined signal input from combining section 5502.
Antennas 5504 transmit respective signal sequences.
Propagation characteristic storing section 5505 stores propagation characteristics such as the propagation profile to output to antenna coefficient calculating section 5506.
In order to superimpose the information on the propagation state represented by antenna coefficients, antenna coefficient calculating section 5506 calculates antenna coefficients based on the propagation characteristics input from propagation characteristic storing section 5505. Antenna coefficients are obtained using various methods, and as one of the methods, singular value decomposition is known.
Propagation modulation section 5507 superimposes the first data to transmit as the confidential information on antenna coefficients input from antenna coefficient calculating section 5506, performs amplitude modulation on the resultant, and outputs the obtained modulated antenna coefficients to combining section 5502.
Receiving apparatus 5600 will be described below.
Antenna 5601 outputs a received RF signal to receiving section 5602.
Receiving section 5602 performs power amplification, frequency conversion, etc. on the received RF signal received and input in/from antenna 5601 to output to demodulation section 5603.
Demodulation section 5603 demodulates each channel signal input from receiving section 5602, and outputs a channel demodulated signal to antenna coefficient detecting section 5605 and buffer 5604. In receiving apparatus 5600, since a QAM signal (or phase·amplitude modulated signal) subjected to phase modulation and amplitude modulation is received, demodulation section 5603 performs phase·amplitude demodulation on the received signal.
Buffer 5604 temporarily holds the channel modulated signal input from demodulation section 5603, and outputs the second data.
Antenna coefficient detecting section 5605 detects an antenna coefficient for each channel from the channel demodulated signal input from demodulation section 5603, and outputs the detected antenna coefficient information to comparing section 5606.
Comparing section 5606 encodes the antenna coefficient information input from antenna coefficient detecting 5605, and outputs a result of comparison in level between encoded antenna coefficient information as received data. In addition, the operation of transmitting apparatus 5500 and receiving apparatus 5600 is the same as that in
Superimposing the information on the propagation characteristic of the present invention has a significant feature that the modulation scheme of signal output from an antenna differs from the modulation scheme of signal to be demodulated in the receiving apparatus. In other words, it is possible to set the modulation scheme of signal output from an antenna to be different from a modulation scheme that the receiving apparatus supports. In this way, the modulated signal is a proper modulated signal only in the receiving apparatus targeted for transmission, and the proper modulated signal is not obtained in the other receiving apparatuses, whereby it is possible to secure high confidentiality. Further, since it is possible to add the confidential information to the information of differences between antenna coefficients of a plurality of channel signals, it is possible to transmit signals of a plurality of channels while providing security, and to improve transmission efficiency.
Thus, according to the communication apparatus and communication system of Embodiment 24, in addition to the effects of Embodiment 1, combining section 5502 combines the first data modulated in propagation modulation section 5507 and the second data modulated in modulation section 5501 in a modulation scheme different from that in propagation modulation section 5507, and transmitting section 5503 transmits the first data and second data in a modulation scheme with phase, amplitude or frequency. Therefore, communicating parties with different modulation schemes cannot demodulate the data, and it is thereby possible to ensure high security.
In addition, Embodiment 24 describes the case where an antenna output signal is subjected to phase modulation, while the propagation modulation is amplitude modulation. However, the present invention is not limited to such a case, and the same modulation scheme may be used, and/or the modulation scheme is not limited to such modulation scheme. As each modulation scheme, there are considered frequency modulation, phase modulation, amplitude modulation, PWM, PAM, orthogonal amplitude modulation, and CCK (Complimentary Code Keying).
Embodiment 25 has a feature that antenna coefficient information is superimposed on spread signals of a plurality of channels, and the antenna coefficient information is extracted as confidential data.
Spreading code storing section 5701 stores spreading codes corresponding to the number of channels to output to spreading section 5702.
Spreading section 5702 calculates the convolution of channel data that is the first data input from modulation section 5501 and a spreading code corresponding to the channel of the data input from spreading code storing section 5701 to perform spectral spreading, and outputs the resultant to combining section 5502.
Spreading code storing section 5801 stores spreading codes corresponding to the number of channels to output to despreading section 5802.
Despreading section 5802 calculates the convolution of the spreading code corresponding to the channel input from spreading code storing section 5801 and a received signal input from receiving section 5602 to perform despreading, and outputs the resultant to demodulation section 5800. In addition, the operation of transmitting apparatus 5700 and receiving apparatus 5800 is the same as that in
Superimposing the information on the propagation characteristic of the present invention has a significant feature that the modulation scheme of signal output from an antenna differs from the modulation scheme of signal to be demodulated in the receiving apparatus. In other words, it is possible to set the modulation scheme of signal output from an antenna to be different from a modulation scheme that the receiving apparatus supports. In this way, the modulated signal is a proper modulated signal only in the receiving apparatus targeted for transmission, and the proper modulated signal is not obtained in the other receiving apparatuses, whereby it is possible to secure high confidentiality.
Thus, according to the communication apparatus and communication system of Embodiment 25, in addition to the effects of Embodiments 1 and 24, combining section 5502 combines the first data modulated in propagation modulation section 5507 and the spread second data modulated in modulation section 5501 in a modulation scheme different from that in propagation modulation section 5507, and transmitting section 5503 transmits the first data and second data in a modulation scheme with phase, amplitude or frequency. It is thereby possible to ensure high security in data with high spectral efficiency.
In addition, Embodiment 25 describes the case where, an antenna output signal is subjected to phase modulation, while the propagation modulation is amplitude modulation. However, the present invention is not limited to such a case, and the same modulation scheme may be used, and/or the modulation scheme is not limited to such modulation scheme. As each modulation scheme, there are considered frequency modulation, phase modulation, amplitude modulation, PWM, PAM, orthogonal amplitude modulation, and CCK (Complimentary Code Keying).
Embodiment 26 has a feature that first modulation is superimposed on second modulation by controlling antenna coefficients.
The system as illustrated in
Communication terminals A 6850 and B 6851 will be described below.
Reference signal storing section 6801 outputs a reference signal for providing references for time synchronization, frequency synchronization and phase/amplitude.
Modulation section 6802 receives data 2 (second data), generates a predetermined modulated signal, and outputs a modulated signal.
Channel combining section 6803 receives the modulated signal, channel parameter resulting from extraction of channel component, and data 1 (first data), performs weighting so as to perform channel combining through propagation, and outputs transmission RF signals.
Channel analysis section 6804 receives propagation coefficients extracted from a received signal to analyze, and calculates and outputs coefficients for channel combining.
Reception demodulation section 6805 receives received RF signals, and outputs propagation coefficients to channel analysis section 6804, while outputting demodulated data 1 and 2.
RF section 6806 outputs transmission RF signals to antenna 6805, while receiving a signal received in antenna 6807 and outputting the received RF signal to reception demodulation section 6805.
Antennas 6807 transmit respective sequences of transmission RF signals, while outputting a received RF signal to reception demodulation section 6805.
Switch 6808 selects a signal from reference signal storing section 6801 and a signal from modulation section 6802, as a modulated signal to output to channel combining section 6803.
Control section 6809 receives a control signal, and performs control of channel combining section 6803, channel analysis section 6804, reception demodulation section 6805, and switch 6806. Specifically, as described in Embodiment 23, control section 6809 receives a control signal from an upper layer, and sets whether or not to perform confidential communication. Further, according to communication procedures as described in Embodiment 1 or the other Embodiment, the section 6809 outputs a propagation estimation signal, and controls the operation conforming to the specified communication frame.
Modulation sections 6802 having received data (data 1 to n) respectively generate modulated signals 1 to n corresponding data to output to channel combining section 6802. Channel combining section 6803 receives modulated signals from modulation sections 6802, while receiving channel parameters from channel analysis section 6804 as antenna coefficients. Channel analysis section 6804 receives a control signal and the received signal received in RF section 6806, extracts characteristics of propagation properties such as phase, amplitude and propagation dispersion using the received signal sequence and known signal sequence such as the reference signal, and outputs the channel parameters to channel combining section 6803.
Channel combining section 6803 calculates antenna coefficients corresponding to the antenna sequence from the channel parameters and modulated signals. Further, when the propagation control is required through the control signal, the section 6803 transmits a weighted transmission signal obtained by multiplying thus calculated antenna coefficient by the modulated signal to respective RF section 6806, and the signal is amplified in power in the section 6806 and transmitted from antenna section 6807.
Meanwhile, when the propagation control is not required, the section 6803 performs control suitable for communications (i.e., such that the signal has the maximum sensitivity at a receive point), and sets weighting coefficients at predetermined values or sets at least one coefficient at 0. Performing control suitable for communications provides a feature of improving the communication quality. When weighting coefficients are set at predetermined values, there arises a feature that the communication quality is improved without performing complicated control if the situation allows communication environments to be almost fixed and the directivity to be set in advance. When the directivity is not set in advance, setting all the coefficients at the same value enhances the total transmission power, and results in increases in communication quality. Setting part of weighting coefficients at 0 suppresses the transmission power and enables reduction in power consumption.
It is possible to perform the weighting operation in the configuration as illustrated in
Herein, the antenna coefficient is given by equation (34):
H·W(x)=x (34)
x is in equation (34) is a component on which information is superimposed in second modulation, and amplitude in ASK, phase in PSK or frequency in FSK.
Thus transmitted radio signal is received in antenna 6807 in communication terminal B 6851 via propagation space 6852. The channel parameter is superimposed on the signal in channel combining 6803, and received signal Srx is represented as in equation (35) using first modulation signal st_1, second modulation signal St_2, channel property H and antenna coefficient W:
Srx=H·W(St_2)·St_1 (35)
Using equation (34) obtains the following equation:
Srx=St_2·St_1 (36)
As indicated by equation (36), at the receiving end of communication terminal B 6861, a received signal is obtained as a signal resulting from multiplication of the first modulation signal by the second modulation signal. For example, when the first modulation is PSK modulation and the second modulation is ASK modulation, reception modulation section 6805 is capable of demodulating data 2 corresponding to first modulation by detecting a phase component, and demodulating data 1 corresponding to second modulation by detecting an amplitude component.
The above explanation is described more specifically with reference to
Weighting multiplying section 7001 multiplies the first modulation signal by an antenna coefficient, and outputs a weighted transmission signal.
Coefficient storing section 7002 receives channel parameters calculated in channel analysis section 6804 to hold as basic coefficients. The section 7002 converts the held basic coefficients into antenna coefficients corresponding to the second modulation. At this point, as described above, when the number of patterns of second modulation is small, basic coefficients are prepared corresponding to the number of patterns, it is possible to implement by switching between the antenna coefficients corresponding to data 1 associated with second modulation.
It is assumed herein that first modulation is QPSK and that second modulation is ASK. Signal 7050a indicates a constellation of QPSK, and signal 7050b indicates a constellation of ASK.
Channel combining section 6803 performs weighting of the first modulation signal using an antenna coefficient output from coefficient storing section 7002, and outputs the weighted transmission signal to a respective antenna 6807. Since antenna coefficients are different in phase and amplitude between second modulation symbol “space” and “mark”, each of weighted transmission signals has eight signal points, despite the first modulation signal having four signal points.
It is herein assumed that antenna coefficients for “space” and “mark” of second modulation signal are different in phase and amplitude. However, it is possible to fix either coefficient as a constant value. Making the amplitude constant provides an advantage that the power supplied from each antenna is equal to one another. Making the phase constant provides an advantage of simplifying the configuration of weighting multiplying section 7001.
Signal 7052 indicates a signal received in communication terminal B 6851 via propagation space 6852, and as indicated in equation (36), becomes an 8-APSK signal where QPSK is multiplexed on ASK. Reception demodulation section 6805 is capable of demodulating data 2 by detecting the phase, and demodulating data 1 by detecting the amplitude.
Thus, according to Embodiment 26, first modulation is multiplexed on second modulation by controlling antenna coefficients, and the modulated signal forms a proper modulated signal only at a receive point, whereby it is possible to perform communications with high confidentiality.
Embodiment 27 describes a communication protocol for performing control of confidential communications in the physical layer in upper-layer communications.
In the communication system, communication terminal A 5950 communicates with communication terminal B 5951 via propagation space 5952. Herein, communication terminal A 5950 has the same configuration as that of communication terminal B 5951.
Communication terminal A 5950 will be described below.
Upper layer 4750 is to provide and receive transmission information and received information to/from the application (either case is considered outside or inside the terminal) respectively, outputs transmission data to transmitting section 152, outputs a control signal to communication control section 4701, and receives received data from reception demodulation section 150.
Reception demodulation section 150 receives a received RF signal from antenna 101 to demodulate, and outputs received data.
Transmitting section 152 receives the transmission data, generates a modulated signal, and outputs a transmission RF signal to antenna 101.
Communication control section 4701 receives a control signal, and outputs a transmission control signal to transmitting section 152, while outputting a reception control signal to reception demodulation section 150. Further, the section 4701 receives propagation parameters from reception demodulation section 150, and outputs the propagation parameters to transmitting section 152.
Antenna 101 receives the transmission RF signal from transmitting section 152 to transmit, while outputting a received RF signal to reception demodulation section 150.
Communication control section 4701 performs communication control such as channel control and time control essential for communications, and receives a command from an upper layer through a control signal. Upon receiving the command, communication control section 4701 performs a command issue of the physical layer and confidential communication control through a transmission control signal and reception control signal.
Based on the configuration as described above, communication procedures will be described specifically with reference to
(0) Initialization
In order to set each of communication terminals A 5950 and B 5951 for the initial state based on predetermined procedures at the time power is supplied or of starting communication, the upper layer outputs a control signal for initialization.
(0.a), (0.b) Based on the control signal received from the upper layer, communication terminal A 5950 initializes the setting state related to the physical layer.
(1) Transmission of Secure Information
(1.0) The application of the communication terminal A outputs secure information and a request for transmitting the information to the upper layer.
(1.1) Upon receiving the secure transmission request, the upper layer of the communication terminal A issues a secure transmission command to the physical layer together with the secure information.
(1.2) Upon receiving the secure transmission request command, the physical layer of the communication terminal A transmits a secure communication command to the terminal B in accordance with communication timing between the terminals A and B.
(1.3) Upon receiving the secure communication command, the physical layer of the communication terminal B transmits the secure communication request to the communication terminal A together with a propagation estimation signal in accordance with the communication timing.
(1.4) Upon receiving the secure communication request, the physical layer of the communication terminal A estimates the propagation from the propagation estimation signal, and calculates the propagation parameter. Further, the physical layer transmits the secure information input in (1.2) using the propagation parameter to the communication terminal B by using the confidential communication method.
(1.5) The physical layer of the communication terminal B receives and demodulates the secure information transmitted using the confidential communication method, and outputs the information to the upper layer.
(1.6) The upper layer of the communication terminal B outputs the secure information output from the physical layer to the application.
According to the series of operation as described above, the secure information is transmitted from the application of the communication terminal A to the application of the communication terminal B using the confidential communication of the present invention. According to the procedures, it is possible to transmit the information in the most simplified communication procedures between the applications.
In the operation as described above, a practical communication signal in the physical layer will be described with reference to
The time indicated in the figure will be described below.
“Tguard” is a time provided to avoid collision of communication signals, and is obtained generally from a support communication distance.
“Taccess” indicates a time taken to complete the secure communication after the secure command is issued, and it is possible for the upper layer to manage the communication condition using the value in performing the secure communication.
“Treply” is a time taken to finish the secure communication after the secure communication request (propagation estimation signal) is provided. As described in the other Embodiments, the present invention uses the propagation parameter, thereby has the premise that there are no changes in propagation environment, and results in deterioration of communication quality when the propagation environment changes. The effects will be descried with reference to
fd shown in
fd=(Smax/C)*Fc/Fbaud (37)
where Smax is maximum shift speed, C is the velocity of light, Fc is a carrier frequency, and Fbaud is a symbol rate frequency. When thus obtained values are substituted into fd=1/n, as can be seen from the figure, the index exceeds 0.3 near n/4 to n/3 (symbol time). In other words, in order to perform stable communications, it is necessary to meet Treply<n/4 (symbol time) Specifications of wireless LAN are considered herein. Assuming that the maximum shift speed in communications is 30 km/h, and that the carrier frequency is 2.45 GHz, a value meeting Treply is obtained from equation (36). (Since fd and Treply are specified in Fbraud, Fbraud is canceled.)
Treply=C/Smax/Fc/4 (38)
Substituting the above conditions enables communications with high communication quality when Treply is about 3.5 ms or less.
Thus, since the value of Treply has limitations, it is effective in prohibiting access from another communication terminal within Taccess in TDD (Time Division Duplex) communications where duplex transmission is performed using the same frequency band. In other words, it is considered that the upper layer sets Taccess at a value (for example, 10 ms) larger than Treply, and executes the control such that terminals that perform confidential communications only occupy communication resources for this period.
Further, when there is much information to transmit, it is possible to cope with the transmission of much information by repeating procedures (1.3) and (1.4). In this case, it is desired to reserve long Taccess in response to the communication charge.
Procedures of the case of requesting secure information will be described with reference to
(0) Initialization
The same operation as in the initialization as described earlier is performed.
(2) Reception of Secure Information
(2.0) The application of the communication terminal A outputs a request for secure information reception to the upper layer.
(2.1) Upon receiving the secure information reception request, the upper layer of the communication terminal B issues a secure reception command to the physical layer.
(2.2) Upon receiving the secure reception command, the physical layer of the communication terminal B transmits a secure communication request to the communication terminal B in accordance with communication timing together with the propagation estimation signal.
(2.3) Upon receiving the secure communication request, the physical layer of the communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameter. At the same time, the physical layer issues an information request command to the upper layer. (When the information is managed in the physical layer, the command is not issued to the upper layer, and procedures (2.4) and (2.5) are eliminated. Meanwhile, when the information is managed in the upper layer, (2.4) is eliminated.)
(2.4) Upon receiving the information request command from the physical layer, the upper layer of the communication terminal B acquires the information from the application.
(2.5) The upper layer of the communication terminal B issues an information response command to the physical layer together with the set information.
(2.6) The physical layer of the communication terminal B transmits the acquired information to the communication terminal A in the confidential communication method using the propagation parameter estimated in (2.4).
(2.7) The physical layer of the communication terminal A receives and demodulates the secure information transmitted using the confidential communication method to output to the upper layer.
(2.8) The upper layer of the communication terminal A outputs the secure information output from the physical layer to the application.
According to the series of operation as described above, it is possible that the application of the communication terminal A requests secure information to the application of the communication terminal B, and that communication terminal B transmits the secure information to the communication terminal A. According to the procedures, it is possible to receive the secure information in the most simplified procedures.
In the operation as described above, practical communication signals in the physical layer will be described with reference to
When a secure communication request is issued together with the propagation estimation signal (2.2), the secure communication is executed based on the propagation parameter calculated using the propagation estimation signal after a lapse of a predetermined interval (Tguard) (2.6).
Descriptions of the time are the same as in
As described earlier, when Treply has limitations in time, the case is considered that the information according to (2.3) is not obtained soon. Communication procedures effective in such a case will be described below with reference to
(0) Initialization
The same operation as in the initialization as described earlier is performed.
(3) Reception of Secure Information
(3.0) The application of the communication terminal
A outputs a request for secure information reception to the upper layer.
(3.1) Upon receiving the secure information reception request, the upper layer of the communication terminal A issues a secure reception command to the physical layer.
(3.2) Upon receiving the secure reception command, the physical layer of the communication terminal A transmits an information preparation request to the communication terminal B in accordance with communication timing.
(3.3) Upon receiving the information preparation request, the physical layer of the communication terminal B issues an information request command to the upper layer. (When the information is managed in the physical layer, the command is not issued to the upper layer, and procedures (3.4) and (3.5) are eliminated. Meanwhile, when the information is managed in the upper layer, (3.4) is eliminated.)
(3.4) Upon receiving the information request command from the physical layer, the upper layer of the communication terminal B acquires the information from the application.
(3.5) The upper layer of the communication terminal B issues an information response command to the physical layer together with the set information.
(3.6) When it is notified that the information is set using the information response command, the physical layer of the communication terminal B notifies the communication terminal A of completion of the information preparation.
(3.7) Upon receiving the notification of completion of the information preparation from the communication terminal B, the physical layer of the communication terminal A transmits a secure communication request to the communication terminal B in accordance with communication timing together with the propagation estimation signal.
(3.8) Upon receiving the secure communication request, the physical layer of the communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameter. The acquired information is transmitted to the communication terminal A in the confidential communication method using the estimated propagation parameter.
(3.9) The physical layer of the communication terminal A receives and demodulates the secure information transmitted using the confidential communication method to output to the upper layer.
(3.10) The upper layer of the communication terminal A outputs the secure information output from the physical layer to the application.
In the above operation, practical communication signals in the physical layer are the same as in descriptions of
According to the operation as described above, it is possible to perform confidential communications without the application needs awareness of the communication state in particular. In addition, there is a case that the application needs to provide and receive specific information in confidential communications or needs information of whether the received information is in the confidential communication. In such a case, as shown in
In this way, using Embodiment 27 enables efficient control of the confidential communication in the psychical layer from the upper layer, and provides stable communication protocols.
Embodiment 28 further extends the invention described in Embodiments 17 and 18, enables increases in the apparent number of transmission antennas that the communication terminal has, and improves the confidentiality.
Communication terminal A 7750 communicates with communication terminal B 7751 through channel 7752. Communication terminal A 7750 has a single transmission/reception antenna element, while communication terminal B 7751 has four transmission/reception antenna elements.
Communication terminal A 7750 will be described first.
Modulation section 7701 receives data to modulate, and outputs the modulated signal.
Buffer 7702 receives the modulated signal, and outputs the held modulated signal to channel combining section 7703.
Channel combining section 7703 performs combining using the modulated signal and channel parameter, and outputs a transmission signal to transmitting section 7704.
Transmitting section 7704 performs frequency conversion and power amplification on the transmission signal, and outputs a transmission RF signal to antenna 7705.
Antenna 7705 transmits the transmission RF signal, while outputting a received RF signal to receiving section 7706.
Receiving section 7706 converts the received RF signal input from antenna 7705 into a baseband signal to output to channel estimation section 7707.
Channel estimation section 7707 estimates the characteristic of channel 7752 from the baseband signal input from receiving section 7706, and outputs the estimated channel information.
Channel analysis section 7708 receives the channel estimated information, and calculates the channel parameter using a predetermined analysis method to output.
Communication terminal B 7751 will be described below.
Antennas 7709 receive transmission RF signals to transmit, while outputting a received RF signal to receiving section 7710.
Receiving section 7710 converts the received RF signal into a baseband signal to output to buffer 7711.
Buffer 7711 temporarily holds the baseband signal, and outputs a signal delayed by a predetermined time to selection synthesis section 7712.
Selection synthesis section 7712 synthesizes a signal with a time difference, and outputs a synthesized signal.
Demodulation section 7713 receives the synthesized signal to demodulate, and obtains the data.
Reference signal storing section 7714 stores reference signals for use in estimating channel 7752 to output.
Antenna selecting section 7715 receives a reference signal, and outputs the reference signal to a selected antenna as a transmission signal.
Transmitting section 7716 receives the transmission signal, and outputs the transmission RF signal to antenna element 7709.
Channels of communication propagation path are assumed to be channel matrix H comprised of h1, h2, h3 and h4. Communication terminal A 7750 estimates the propagation using the reference signal from communication terminal B 7751, and at this point, communication terminal B 7751 transmits signals orthogonal to each other from respective antennas so that communication terminal A 7750 is capable of measuring a coefficient of each of the antennas of communication terminal B 7751. Herein, as a typified example, reference signals are transmitted in Time Division. In this way, communication terminal A is capable of measuring h1, h2, h3 and h4.
In other words, antenna selecting section 7715 sequentially switches between antennas to transmit a reference signal output from reference signal storing section 7714. The transmission signal output in this way is amplified in transmitting section 7716, and transmitted from a corresponding antenna.
In the communication terminal A, antenna 7705 receives the reference signal and inputs a received RF signal to receiving section 7706, and the section 7706 converts the RF signal into a baseband signal. Channel estimation section 7707 receives the baseband signal, performs channel estimation using the reference signal, and outputs channel information. Channel analysis section 7708 receives the channel information to analyze. The analysis will be described using singular value decomposition described in Embodiment 18. Singular value vector V obtained in singular value decomposition is divided into singular value vector with the singular value being not 0, and zero vectors with the singular vector being 0. Herein, it is assumed that vectors are v1 to v4, vi is the singular value vector, v2 to v4 are zero vectors, and the singular value is λ. Further, a vector element is defined as vn=(vn1 t vn4) (n=1 . . . 4). The singular value vector and zero vectors are output as channel parameters.
Modulation section 7701 receives four sequences of data, and generates four sequences of modulated signals in a predetermined modulation scheme to output. It is assumed that the modulated signals are d1 to d4, d1 is a communication modulated signal, and that d2 to d4 are pseudo modulated signals. Buffer section 7702 receives the four sequences of modulated signals to hold. Buffer section 7702 continues to hold the same signal for four time slots.
In a first time slot, channel combining section 7703 receives the four sequences of modulated signals and channel parameters, and performs calculation as described below:
DS1=Σ(vn1·dn) (39)
(n is Σ variable, the same as in the following)
The section 7703 outputs thus obtained transmission signal to transmitting section 7704.
Subsequently, in a similar way, channel combining section 7703 receives modulated signals d1 to d4 and performs calculation in a kth time slot as described below:
DSk=Σ(vnk·dn) (40)
Transmission signals corresponding to four time slots are thus transmitted, and received in communication terminal B 7751 via propagation path 7752.
Srxjk=hj·Σ(vnk·dn) (41)
Herein, as shown in
Srj=hj·Σ(vnj·dn) (42)
Further, ΣSrn is given by the following equation using V and D, where D is [d1, d2, d3, d4]T (AT is the transpose of A).
ΣSrn=H·V·D=λd1 (43)
It is understood that according to the operation as described above, modulated signal d1 is obtained which communication terminal A 7750 intends to transmit, and the other modulated signals are canceled. Demodulation section 7713 demodulates thus obtained signal without any particular processing, and obtains the data.
Even when a third party tries to demodulate the data, as in the other Embodiments, since the channel parameter is unknown, the third party cannot separate d1 nor demodulate. In this way, there is provided a significant feature that the confidential communication is implemented without needing particular calculation in reception and demodulation.
Communication signals as described above will be described with reference to
Shaded portions in the figures indicate signals transmitted from communication terminal B 7751 to communication terminal A 7750, and the other portions indicate signals transmitted from communication terminal A 7750 to communication terminal B 7751.
As indicated in the figures, propagation estimation signals are transmitted together with secure communication request signals. In this Embodiment, the number of time slots provided to transmit is the number of antenna elements of communication terminal B 7751. However, the present invention is not limited to such a number, as long as signals transmitted from antenna elements are orthogonal to each other, as described above. P1 to P4 indicated in the figure are known signals respectively transmitted from antennas, and based on the signals, channel estimation section 7707 in communication terminal A 7750 estimates the propagation path. Then, communication terminal A 7750 prepares four time slots (DS1 to DS4) provided by equation (40) in performing the confidential communication to transmit, and the confidential communication is thereby performed.
In the above descriptions, it is assumed that antenna 7705 in communication terminal A 7750 has a single antenna element, and antenna 7709 in communication terminal B 7751 has four antenna elements, but the present invention is not limited to such a case. The present invention provides a more sophisticated communication system when m is less than n (m<n) where m is the number of elements of communication terminal A 7750 and n is the number of elements of communication terminal B 7751. When m is two or more, it is possible to perform the confidential communication as described in the other Embodiments by performing antenna selection such that k is selected among k (k<m). However, the present invention allows the confidential communication to be performed with the maximum number of channel elements, and thereby provides the communication protection of the highest degree.
In this way, using Embodiment 28 provides a feature that a communication terminal with a less number (m) of antenna elements provides the communication protection of the highest degree to a communication terminal with a larger number (n) of antenna elements, and in particular, exhibits the significant effect when m is 1.
In Embodiments 1 to 28, confidential information corresponding to the propagation environment is acquired by the configuration of hardware. However, the present invention is not limited to such a case, and confidential information corresponding to the propagation environment may be acquired by processing in software using a program or the like. In this case, it may be possible to use a program or the like acquired in any method such as a program or the like stored in a storage medium such as CD-ROM and a program or the like transmitted through a network.
As described above, according to the present invention, since it is possible to extract data corresponding to the propagation state, it is possible to ensure high security without a significant change in communication system.
This application is based on the Japanese Patent Applications No.2002-054064 filed on Feb. 28, 2002, No.2002-132068 filed on May 7, 2002, and No.2003-48364 filed on Feb. 25, 2003, entire contents of which are expressly incorporated by reference herein.
The present invention is for use in a technique used in a digital communication, and in particular, is suitable for use in a technique related to security.
Murakami, Yutaka, Orihashi, Masayuki, Matsuoka, Akihiko, Abe, Katsuaki
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
3633105, | |||
3671967, | |||
4514753, | Nov 03 1982 | Colorado Video, Incorporated | Spectrum conservation in encoded color TV signals |
5027123, | Jun 26 1989 | MC MASTER UNIVERSITY | Adaptive interference canceller |
5532706, | Dec 05 1994 | Hughes Electronics Corporation | Antenna array of radiators with plural orthogonal ports |
5604806, | Jan 20 1995 | Ericsson Inc | Apparatus and method for secure radio communication |
5675648, | Dec 24 1992 | British Telecommunications public limited company | System and method for key distribution using quantum cryptography |
5995533, | Jan 20 1995 | Ericsson Inc. | Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics |
6144339, | Jul 31 1998 | NEC Corporation | Array antenna |
6405020, | Sep 24 1997 | MUNITECH IP S A R L | Method and base station system for voice transmission via a radio interface in a digital radio communication system |
6492958, | Aug 25 2000 | NEC Corporation | Adaptive antenna reception apparatus |
6590532, | Jun 23 1999 | Japan as represented by President of Hokkaido University; Sanyo Electric Co., Ltd. | Radio device |
7349545, | Mar 24 2000 | SAMSUNG ELECTRONICS CO , LTD | Key agreement method in secure communication system using multiple access method |
7929592, | Apr 02 1999 | NTT DoCoMo, Inc | Channel estimation device and method, demodulation device and method, and fading frequency decision device and method |
20020012380, | |||
20020018483, | |||
20080318606, | |||
20120127889, | |||
20130148757, | |||
20130156122, | |||
CN1179249, | |||
CN1330816, | |||
JP2000286751, | |||
JP200046939, | |||
JP2001244911, | |||
JP2001308761, | |||
JP2001326630, | |||
JP2003069516, | |||
JP2003258771, | |||
JP4220033, | |||
JP541607, | |||
JP595352, | |||
JP6020660, | |||
JP63121334, | |||
JP637010, | |||
WO9622643, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 07 2019 | Panasonic Intellectual Property Corporation of America | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Mar 07 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Oct 11 2025 | 4 years fee payment window open |
Apr 11 2026 | 6 months grace period start (w surcharge) |
Oct 11 2026 | patent expiry (for year 4) |
Oct 11 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 11 2029 | 8 years fee payment window open |
Apr 11 2030 | 6 months grace period start (w surcharge) |
Oct 11 2030 | patent expiry (for year 8) |
Oct 11 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 11 2033 | 12 years fee payment window open |
Apr 11 2034 | 6 months grace period start (w surcharge) |
Oct 11 2034 | patent expiry (for year 12) |
Oct 11 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |