-
公开(公告)号:US20200036690A1
公开(公告)日:2020-01-30
申请号:US16047375
申请日:2018-07-27
Applicant: Khalifa University of Science and Technology
Inventor: Shahzad Muzaffar , Owais Talaat Waheed , Ibrahim Elfadel
Abstract: A method for secure device-to-device communication using multilayered ciphers is provided. A selected cipher is employed to generate a pair of encryption/decryption keystreams for enabling multilayered encryption/decryption on a pulsed-index communication (PIC) packet(s). In examples discussed herein, a first layer encryption/decryption is performed by encrypting/decrypting a PIC data(s) (PD(s)) in the PIC packet(s) based on a first of the pair of encryption/decryption keystreams. In addition, a second layer encryption/decryption is performed by encrypting/decrypting selected control information (e.g., information related to encoding/decoding the PD(s)) in the PIC packet(s) based on a second of the pair of encryption/decryption keystreams. By performing multilayered encryption/decryption on the PIC packet(s), it is possible to defend against malicious attacks in single-channel device-to-device communication without compromising such key performance indicators (KPIs) as complexity, latency, power consumption, and footprint.
-
公开(公告)号:US10951596B2
公开(公告)日:2021-03-16
申请号:US16047375
申请日:2018-07-27
Applicant: Khalifa University of Science and Technology
Inventor: Shahzad Muzaffar , Owais Talaat Waheed , Ibrahim Elfadel
Abstract: A method for secure device-to-device communication using multilayered ciphers is provided. A selected cipher is employed to generate a pair of encryption/decryption keystreams for enabling multilayered encryption/decryption on a pulsed-index communication (PIC) packet(s). In examples discussed herein, a first layer encryption/decryption is performed by encrypting/decrypting a PIC data(s) (PD(s)) in the PIC packet(s) based on a first of the pair of encryption/decryption keystreams. In addition, a second layer encryption/decryption is performed by encrypting/decrypting selected control information (e.g., information related to encoding/decoding the PD(s)) in the PIC packet(s) based on a second of the pair of encryption/decryption keystreams. By performing multilayered encryption/decryption on the PIC packet(s), it is possible to defend against malicious attacks in single-channel device-to-device communication without compromising such key performance indicators (KPIs) as complexity, latency, power consumption, and footprint.
-