Methods for Securing Wireless Communications at the Physical Layer

Technology #ua16-054

Questions about this technology? Ask a Technology Manager

Download Printable PDF

Categories
Researchers
Hanif Rahbari
PhD Student, ECE
Onur Koyluoglu
Assistant Professor, Electrical & Computer Engineering
Rashad Eletreby
Graduate Assistant, ECE
Peyman Siyari
Graduate Assistant, ECE
Berk Akgun
Graduate Student, ECE
Marwan Krunz
Professor, Electrical & Computer Engineering
Managed By
Robert Sleeper
Licensing Manager (520) 626-4604

Title: Methods for Securing Wireless Communications at the Physical Layer

 

Invention: A method that enables users to obfuscate their transmission patterns by intelligently producing friendly jamming at the transmitter end, a technique that prevents low level eavesdropping.

 

Background: In a world dominated by ever-developing technology, the demand for reliable digital security measures is increasingly prevalent. When securing communications at the software level, like most current security schemes, it became apparent that prevention of eavesdropping may show a stronger performance at the hardware level. Using a multiple input and multiple output scheme in addition to game theoretic considerations, this method was developed as an easier way to secure wireless communications.

 

Applications:

  • Military
  • Personal (internet, devices, vehicles, home, etc.)
  • Electronic health records
  • Mobile devices and hotspots
  • Aeronautical/astronomical instruments (i.e. satellites)
  • Buildings/locations

 

Advantages:

  • Versatility in hardware implementation
  • Easily integrated into current technologies
  • Prevents low level eavesdropping
  • Includes locations of all legitimate receivers

 

Licensing Manager:

Robert Sleeper

RobertS@tla.arizona.edu

(520) 626-4604