Secure Communication Patented by US Army Researchers
Aug 15, 2020

Secure Communication Patented by US Army Researchers

Regarding wireless communications security, authentication is one of the core pillars alongside secrecy and privacy. To maintain the integrity of communications, the receivers normally should verify that an incoming transmission did come definitely from an ally and not a malicious adversary.

An invention of a practical method for wireless devices to secretly authenticate and communicating, which developed by US Army researchers, awarded recently a patent. The patented invention is a method to perform two tasks simultaneously: verifying the authenticity of wireless communications and communicating secret information. The aim of this invention is to significantly increases an adversary’s difficulty in imitating an ally.

In the patented invention, a shared key is utilized to create a secret codebook. That codebook is used to make available both authentication of a primary message and side-channel communication of a secure secondary message. In a simple word, the codebook is used to achieve authentication and establish an additional secure communications channel.

According to the patent, the code word chosen from the secret codebook is superimposed on the primary message waveform and is used as an identification tag so the receiver can securely and privately verify the identity of the source. Therefore, an adversary that not knowing the key, is unable to create the codebook and thus cannot reliably imitate legitimate parties. The additional information is conveyed through the choice of a valid codeword.

The army research Laboratory had already patented “wireless communication method and system for transmission authentication at the physical layer’ but it considered the use of only one valid tag for the solitary purpose of authentication. The new invention allows for a set of valid tags constructed in a way that introduces more uncertainty for an adversary and allows a small secondary message to be sent securely. Therefore, the new patent allows for greater flexibility in implementing the scheme.

Towards transitioning the technology to the soldier, prototyping the algorithms on software-defined radios currently is taking place.

Reply to Return
Security code

Most visited

Does China use AI technology to Identify Uyghur Muslim!
Jan 18, 2021

Does China use AI technology to Identify Uyghur Muslim!

• Huawei and other China's tech companies, have filed patents in . . recent years relating to tech that can identify Uighur individuals. Uighurs are Muslims who are controlled extensively by China government!

Unauthorized Use of Individuals Idea by Large Entities: another Familiar Story
Jan 13, 2021

Unauthorized Use of Individuals Idea by Large Entities: another Familiar Story

although the solution to some technical problems is valuable, sometimes they look very simple! Therefore protecting them from copy and free riding become more difficult as verifying the uniqueness of their idea becomes complex! How individuals or small entities could protect their ideas from others taking them and enjoying the fruits of their mental labors?

Iran's game Industry has Grown Rapidly in Pandemic
Jan 12, 2021

Iran's game Industry has Grown Rapidly in Pandemic

Iran’s game industry growing rapidly and the pandemic has led to a hike in the revenue of this business.

Tuesday with IP program and its winter training calendar
Jan 2, 2021

Tuesday with IP program and its winter training calendar

In the winter training calendar of Kanoon IP’s "Tuesday with IP program", in addition to patents, other types of Intellectual property rights are covered for the training purpose.