LU101567B1 - Method for a sending entity and method for a receiving entity in a network environment - Google Patents

Method for a sending entity and method for a receiving entity in a network environment Download PDF

Info

Publication number
LU101567B1
LU101567B1 LU101567A LU101567A LU101567B1 LU 101567 B1 LU101567 B1 LU 101567B1 LU 101567 A LU101567 A LU 101567A LU 101567 A LU101567 A LU 101567A LU 101567 B1 LU101567 B1 LU 101567B1
Authority
LU
Luxembourg
Prior art keywords
network environment
information
decoding
proceeding
entity
Prior art date
Application number
LU101567A
Other languages
German (de)
Inventor
Armin Dekorsy
Johannes Demel
Carsten Bockelmann
Original Assignee
Univ Bremen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Bremen filed Critical Univ Bremen
Priority to LU101567A priority Critical patent/LU101567B1/en
Priority to DE102020216122.4A priority patent/DE102020216122A1/en
Application granted granted Critical
Publication of LU101567B1 publication Critical patent/LU101567B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network

Landscapes

  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for a sending entity in a network environment, comprising the steps of - Receiving (200) payload information for a specific receiver, - Adding (300) a Message Authentication Code based on a pre-known key of the receiver to thereby form an information for being encoded, - encoding (400) the information for being encoded, - Sending (500) the encoded information towards the receiver. The invention also relates to a method for a receiving entity in a network environment, comprising the steps of - Receiving (600) encoded information, - Decoding (700) the encoded information into decoded information, - Determine (800) whether the decoded information may be authenticated based on a pre-known key of the receiver, and if the authentication is given, passing the decoded information or parts thereof on for further processing. The invention also relates to a corresponding sending entity and a corresponding receiving entity.

Description

Our ref. INC 47257 P LU | Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 | i Method for a sending entity and method for a receiving entity in a network environment | The invention relates to a method for a sending entity and a method for a receiving entity in a network | environment. | Background | it is known that with the ongoing trend to provide devices with communication capabilities data | originating from these devices is sent towards one or more recipients. ) In the customer set-up this is known as smart devices and is often quoted in context of smart-homes. ; There different devices such as energy sources or energy consumers provide data regarding to their : current status. For example a photovoltaic arrangement may provide data with respect to actual power Ë generation, whether or not a panel provides less energy than others, while a heating may provide data : with respect to a current temperature for heating or hot water purposes, actual energy consumption, . and the like, temperature sensors and wind sensors may provide actual measurement data. Sensors ı and actors arranged at different locations are providing status data and/or receive data related to . certain operations. For example, screens may be steered to a certain level. / / In industry a like scenario is known as Industry 4.0. There, the communication of machines with each | other is also known as Machine-to-Machine communication, also known as M2M. ı Within transportation, autonomous driving gains interest. Within such a set-up It is envisaged that ı vehicles may communicate with each other but may also communicate with infrastructure. | While most devices in a household are stationary, it is perceived as a drawback if a wiring has to be . provided for connecting these appliances. Also, in transportation related scenarios, including industry Ë
4.0, the devices are typically mobile. Typically, all of the above scenarios are summarized as Internet of things, abbreviated loT. A 0% fo |
Our ref.: INO 47257 P LU Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 Dn To allow for communication, the communication has to be wireless. As the name suggests loT devices ; are typically connected to a public network. However, because information in these set-ups may be sensitive, the communication shall be secure and reliable. Consequently, security needs to be deeply integrated into the design of any wireless communication system, especially on the physical layer. Such requirements lead to added overhead to the payload data. Most of the payload data sent from one entity to another within these scenarios is rather small, e.g. around 128 bit. This type of communication is also known as Machine Type Communication (MTC).
State-of-the-Art communication technologies, such as LTE or WiFi, focus on large file transfers, e.g. | video streaming, which efficiently uses large packets. As a consequence, there is a lot of | Communication overhead for short packets, e.g. control information, wasting a lot of bandwidth. | Typically, in loT scenarios within given Communication Schemes the overhead exceeds (by far) the | payload. | Furthermore, many applications, e.g. autonomous driving or 14.0, require extremely high | communication system reliability. This requirement is often referred to as five 9's or 10°. Failure to | deliver such reliability requirements for e.g. 14.0 applications, results in halted production fines. In case | of autonomous driving it may result in fatal crashes. | A communication system for loT applications must provide the required reliability or it cannot be employed for the envisaged application.
Starting from this situation it is an object of the invention to provide methods and devices allowing to reduce overhead while not compromising with reliability and security. Short description of the invention | [PMLA BF E———— ee ee Era esas
Our ref.: INO 47257 P LU Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 | -3- | The object is solved by the methods according to claims 1 and 2, respectively the entities of claim 13 | and 14. Further advantageous embodiments are subject to the dependent claims, as well as the description and the accompanying figures. | 5 Brief description of the drawings | | In the following reference will be made towards the figures.
In these Fig. 3 shows a schematic data processing scheme according to prior art, | Fig.2 shows a schematic data processing scheme according to embodiments of the invention, and Fig.3 shows a schematic flowchart of method steps in different entities according to embodiments of the invention. | Detailed Description | 15 The present disclosure describes preferred embodiments with reference to the Figures, in which like reference signs represent the same or similar elements.
Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention.
Thus, appearances of the phrases “in one embodiment,” “in an embodiment” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments.
In the description, numerous specific details are recited to provide a thorough understanding of embodiments of the invention. le, unless indicated as alternative only any feature of an embodiment may also be utilized in another embodiment. in addition, even though at some occurrences certain features will be described with reference to a single entity, such a description is for illustrative purpose only and actual implementations of the invention may also comprise one or more of these entities. l.e. usage of singular also encompasses plural entities unless indicated.
An exemplary embodiment will now be described with reference to the figure.
AR AM 1G & =
Our ref.: INO 47257 P LU Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 4 In Fig. 1 a typical processing in a state of the art communication system, such as a LTE based communication system, is shown.
There the requirements of security and reliability are embodied by different domains having an independent processing.
In the security domain, the two key targets are data confidentiality and authentication. Encryption keeps data packet contents confidential. Otherwise this information may leak production details to unauthorized third parties.
State-of-the-Art encryption may be facilitated with the Advanced Encryption Standard (AES) standard. Authentication verifies the origin of received packets in order to distinguish authorized from non- authorized data. This is often facilitated with a Message Authentication Code (MAC) in order to verify integrity of a received packet. The most prominent options for this are Keyed-hash Message Authentication Code (HMAC) and Cipher-based Message Authentication Code (CMAC). The key concept is to add a cryptographic checksum (overhead) to the payload for message authentication. In the reliability domain, the focus is on correct packet reception. Many different forward error channel coding concepts are available in this domain. The integrity of received packets may be verified via Cyclic Redundancy Check (CRC) encoding with a high level of assurance. A CRC adds a checksum (overhead) to each packet for verification. Transmissions are prone to errors, thus, Forward Error Correction (FEC) provides capabilities to correct errors at the receiver. As already indicated, packet overhead becomes a pronounced problem for short packets which are often observed in M2M communication. In a more detailed understanding, one may find that both CRC and MAC add a checksum to each packet for integrity verification. There is a minor difference, in that the MAC checksum supports additional functionality, namely authentication. This is due to the common approach that each issue shall be dealt within its own domain and provide independent results. However, the inventors noticed that in case one would deviate from the layered view of independent purposes, one may obviate processing of one checksum. Therefore, the inventors propose as shown in Fig.2 to make use of the MAC checksum only, while obviating the need of calculating a CRC. Therefore, one may reduce overhead. The invention therefore proposes a method for a sending entity in a network environment. The method comprises a step of receiving 200 payload information for a specific receiver. The transmitter adds in step 300 a Message Authentication Code based on a pre-known key of the receiver to thereby AY AL AG #3
Our ref.: INO 47257 PLU Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 -5- form an information for being encoded. Then the information is encoded in step 400 and thereafter conveyed in step 500 towards the receiver. In embodiments of the invention the coding 400 is a polar encoding or a turbo coding. it is to be noted that there might exist several implementations allowing to combine a decoding with an authentication code, namely the combination of a list decoder and a polar code. However, this is not limiting. Other codes such as turbo codes may provide similar properties. Hence, the coding may be based on this intended usage. | In order to meet high reliability requirements, one may further introduce certain codes for FEC. An example is the usage of polar codes for FEC. Polar codes are known to provide high error correction performance for short packets. For details, see e.g. E. Arikan, “Channel polarization: A method for | constructing capacity-achieving codes for symmetric binary-input memoryless channels”, IEEE Transactions on Information Theory, (2009). For the transmitter, one may combine Polar codes with MAC for overhead reduction. On the receiving side, the invention proposes a method for a receiving entity in a network environment. The method comprises a step of receiving 600 an encoded information, conveyed by the | transmitter in step 500. The encoded information is then decoded in step 700 to thereby provide | decoded information. Thereafter one may determine in step 800 whether the decoded information | may be authenticated based on a pre-known key of the receiver, and if the authentication is given, passing the decoded information or parts thereof on for further processing. In an embodiment of the receiving method, a message authentication code is used for verifying correct decoding or for feeding back information to the decoding method for enhanced decoding. It is to be noted that there might exist several implementations allowing to combine a decoding with an authentication code, namely the combination of a list decoder and a polar code. However, this is not limiting. Other codes such as turbo codes may provide similar properties. E.g. in an embodiment of the receiving method the decoding 700 is based on a candidate list such that candidates of the decoding are subject to the determination until a first candidate is authenticated or the end of the list of candidates is exhausted. On the side of the receiver, in embodiments of the invention one may then make use of a decoder like Arikan's Successive Cancellation SC decoder to produce a single information word which can be verified by a checksum with the proposed MAC checksum. More sophisticated decoders can make additional use of this checksum. ADA #5
VS
| Our ref.: INO 47257 P LU Official Ref.: NN Title Method for a sending entity and method for a receiving entity in a network environment lu101567 -6- Examples of such sophisticated decoders can be found in “List Decoding of Polar Codes”, I. Tal and A. Vardy, in IEEE Transactions on Information Theory, (2015), “Low-Complexity Soft-Output Decoding of Polar Codes”, U. U. Fayyaz and J. R. Barry, in IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 32 (2014) and “Dynamic-SCFlip Decoding of Polar Codes”, L. Chandesris, V. Savin, and D. Declercq in IEEE Global Communications Conference (GLOBECOM), 2016. Ali State-of-the-Art polar decoders use a CRC checksum in order to identify correctly received codewords. We propose to use a MAC checksum instead. This information may then be used as an early stop criterion for such a decoder or to decide for the correct codeword among many.
In any case the resulting system joins the security and reliability domain. It is more efficient in terms of overhead because the overhead caused by a CRC checksum is eliminated. | The invention may be used in any kind of network environment, in particular a wireless network | environment, Furthermore, the invention may be of particular relevance in a mobile network system / environment such as a Public Land Mobile Network, e.g. a Network of 2", 3'%, 4%, 5% or 6 generation. | In particular, the network environment may be an internet of things environment, | As shown in Figure 3, the pre-known key may be provided towards the transmitter, e.g. via a control | channel. There may also be other means to provide the pre-known key. E.g. the pre-known key may | be provided by a specialized database service within the network and/or a pre-known key may be | preset.
In particular, the (polar-) encoding may provide FEC properties in embodiments of the invention. : Furthermore, the invention proposes a Sending entity respectively a Receiving entity adapted to | perform any one of the above highlighted methods.
The invention deviates from the common approach and allows to integrate security and reliability aspects instead of treating them as separate entities. The resulting system is more efficient because overhead can be reduced while it provides like or even error correction performance than currently employed systems.
As such the invention allows for overhead reduction, which is of high importance for short M2M packet transmissions. e.g. for 128 bit packets with a typical CRC 32 bit checksum. This results in about 25 % overhead reduction. The invention allows to maintain FEC performance. Usage of polar Codes allow to reduce receiver complexity, especially in conjunction with a checksum. Ar A245 E / N”

Claims (14)

  1. Our ref.; INO 47257 P LU | Official Ref.: NN | Title Method for a sending entity and method for a receiving entity in a network environment lu101567 | 7- | Claims /
    1. Method for a sending entity in a network environment, comprising the steps of e Receiving (200) payload information far a specific receiver, | © Adding (300) a Message Authenticaticn Code based on a pre-known key of the : receiver to thereby form an informatio: for being encoded, | e encoding (400) the information for being encoded, | e Sending (500) the encoded informatio: towards the receiver. |
    2. Method for a receiving entity in a network environment, comprising the steps of e Receiving (600) encoded information, se Decoding (700) the encoded information into decoded information, e Determine (800) whether the decoded information may be authenticated based on a pre-known key of the receiver, and if the authentication is given, passing the decoded information or parts thereof on for further processing.
    3. Method according to claim 2, wherein a message authentication code is used for verifying correct decoding or for feeding back information to the decoding method for enhanced decoding.
    4. Method according to claim 2 or 3, whe: sin decoding (700) is based on a candidate list such that candidates of the decoding are subject io the determination until a first candidate is authenticated or the end of the list of candidates is exhausted. |
    5. Method according to one of the proceeding claims, wherein the coding (400.700) is a polar encoding or a turbo coding.
    8. Method according to one of the proceeding claims, wherein the network environment is a wireless network environment. AD A2 AG F5
    Our ref.: INO 47257 P LU Official Ref: NN | Title Method for a sending entity and method for a receiving entity in a network environment 1u101567 | 8- |
    7. Method according to one of the proceeding claims, wherein the network environment | is a mobile network system environment. |
    8. Method according to one of the proceeding claims, wherein the network environment | is an internet of things environment. |
    9. Method according to one of the proceeding claims, wherein the pre-known key is | provided via a control channel. |
    10. Method according to one of the proceeding claims 1 to 7, wherein the pre-known key | is preset. |
    11. Method according to one of the proceeding claims, wherein encoding provides FEC ; properties. /
    12. Method according to one of the proceeding claims, wherein decoding is based on an . Arikan’s Successive Cancellation decoder. |
    13. Sending entity adapted to perform a method according to claim 1 or claims 3-12 when | being dependent on claim 1. ;
    14. Receiving entity adapted to perform a method according to claim 2 or claims 3-12 when | being dependent on claim 2. ; BA 25 {3 |
    LU
LU101567A 2019-12-17 2019-12-17 Method for a sending entity and method for a receiving entity in a network environment LU101567B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
LU101567A LU101567B1 (en) 2019-12-17 2019-12-17 Method for a sending entity and method for a receiving entity in a network environment
DE102020216122.4A DE102020216122A1 (en) 2019-12-17 2020-12-17 PROCEDURE FOR A SENDING ENTITY AND PROCEDURE FOR A RECEIVING ENTITY IN A NETWORK ENVIRONMENT

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
LU101567A LU101567B1 (en) 2019-12-17 2019-12-17 Method for a sending entity and method for a receiving entity in a network environment

Publications (1)

Publication Number Publication Date
LU101567B1 true LU101567B1 (en) 2021-06-17

Family

ID=69375901

Family Applications (1)

Application Number Title Priority Date Filing Date
LU101567A LU101567B1 (en) 2019-12-17 2019-12-17 Method for a sending entity and method for a receiving entity in a network environment

Country Status (2)

Country Link
DE (1) DE102020216122A1 (en)
LU (1) LU101567B1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156198A1 (en) * 2000-09-22 2006-07-13 Lucent Technologies Inc. Complete user datagram protocol (CUDP) for wireless multimedia packet networks using improved packet level forward error correction (FEC) coding
US20100303096A1 (en) * 2009-06-02 2010-12-02 Assaf Kasher Apparatus and mehtods for increased mac header protection
AU2015271867A1 (en) * 2010-05-21 2016-01-21 Vaultive Ltd System and method for secure use of messaging systems
US20190260391A1 (en) * 2016-11-11 2019-08-22 Telefonaktiebolaget Lm Ericsson (Publ) Error detection in communication systems using polar coded data transmission

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156198A1 (en) * 2000-09-22 2006-07-13 Lucent Technologies Inc. Complete user datagram protocol (CUDP) for wireless multimedia packet networks using improved packet level forward error correction (FEC) coding
US20100303096A1 (en) * 2009-06-02 2010-12-02 Assaf Kasher Apparatus and mehtods for increased mac header protection
AU2015271867A1 (en) * 2010-05-21 2016-01-21 Vaultive Ltd System and method for secure use of messaging systems
US20190260391A1 (en) * 2016-11-11 2019-08-22 Telefonaktiebolaget Lm Ericsson (Publ) Error detection in communication systems using polar coded data transmission

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
E. ARIKAN: "Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels", IEEE TRANSACTIONS ON INFORMATION THEORY, 2009
I. TALA. VARDY: "List Decoding of Polar Codes", IEEE TRANSACTIONS ON INFORMATION THEORY, 2015
L. CHANDESRISV. SAVIND. DECLERCQ: "Dynamic-SCFlip Decoding of Polar Codes", IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM, 2016
U. U. FAYYAZJ. R. BARRY: "Low-Complexity Soft-Output Decoding of Polar Codes", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 32, 2014, XP011546180, DOI: 10.1109/JSAC.2014.140515

Also Published As

Publication number Publication date
DE102020216122A1 (en) 2021-06-17

Similar Documents

Publication Publication Date Title
US9332428B2 (en) Method and device for managing encrypted group rekeying in a radio network link layer encryption system
Wong et al. Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel
US10623187B2 (en) Generating cryptographic checksums
US8023513B2 (en) System and method for reducing overhead in a wireless network
EP1794920A2 (en) Reassembling of segmented packet data using reliability values
US8427961B2 (en) Information encoding on a codeword in wireless communication networks
Liu et al. Bayesian test for detecting false data injection in wireless relay networks
CN106789027B (en) Method and system for confirming consistency of secret key by using unconditional secure transmission
US20130276065A1 (en) System and methods for receiving and correcting content transmitted over multicast channels
LU101567B1 (en) Method for a sending entity and method for a receiving entity in a network environment
CN102111404B (en) Method for communication between radio and TV business and operation support system and conditional access system
CN104883359B (en) Safety of physical layer information transferring method based on relevant coding with ARQ combined codings
US11283465B2 (en) Network data prediction method, network data processing device and network data processing method
Chen et al. Network‐turbo‐coding‐based cooperation with distributed space‐time block codes
Shin et al. New stopping criteria for iterative decoding of LDPC codes in H‐ARQ systems
Tan et al. Joint network-channel code design for block fading cooperative multiple access channel
US9071964B2 (en) Method and apparatus for authenticating a digital certificate status and authorization credentials
Wang et al. A limited feedback based network coding retransmission scheme for machine‐to‐machine wireless broadcasting
Yue et al. Unequal error protection distributed network-channel coding based on LT codes for wireless sensor networks
US20170026829A1 (en) Advanced metering infrastructure network system and message broadcasting method
KR20150044692A (en) Apparatus and method for a data encryption in a near field near field communication system
Lin et al. A novel error correction and encryption algorithm combined fountain code and AES
WO2023137720A1 (en) Methods and apparatuses for network coding-based harq retransmission with scrambling
EP4376332A1 (en) Techniques for realizing semantic security in communications systems
Zivic Reliability of soft verification of message authentication codes

Legal Events

Date Code Title Description
FG Patent granted

Effective date: 20210617