• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Tuesday, August 26, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Army researchers earn patent for secure communications invention

Bioengineer by Bioengineer
August 13, 2020
in Science News
Reading Time: 3 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

IMAGE

Credit: (Jason Edwards)

Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate.

Authentication is one of the core pillars of wireless communications security, along with secrecy and privacy. The value of authentication in a military setting is readily apparent and mandatory.

Receivers verify that an incoming transmission did indeed come from an ally and not a malicious adversary, therefore maintaining the integrity of communications. This invention, in particular, greatly increases an adversary’s difficulty in impersonating an ally.

The researchers, including Drs. Paul Yu and Brian Sadler from the U.S. Army Combat Capabilities Development Command’s Army Research Laboratory and Prof. Rick Blum and Dr. Jake Perazzone from Lehigh University, have invented a method to perform two tasks simultaneously: verifying the authenticity of wireless communications and communicating secret information.

Typically one or the other is done, but not both.

“In our invention, we take advantage of our wireless authentication capability to enable the covert communication of additional information,” Yu said. “There are many uses of this synergistic capability including the maintenance of strong security through the establishment of shared secrets as well as low-rate covert communications.”

The invention utilizes a shared key to create a secret code book, which is used to achieve authentication and establish an additional secure communications channel, Yu said. An adversary, not knowing the key, is unable to create the code book and thus cannot reliably impersonate legitimate parties.

“A secret key is used to generate a low-rate secret code book that is used to provide both authentication of a primary message and side-channel communication of a secure secondary message,” Sadler said. “The code word chosen from the secret code book is superimposed on the primary message waveform and is used as an identification tag so the receiver can securely and privately verify the identity of the source. The additional information is conveyed through the choice of a valid code word.”

A previous physical layer authentication patent by the CCDC ARL inventors considers the use of only one valid tag for the sole purpose of authentication. This expanded new scheme allows for a set of valid tags constructed in a way that introduces more uncertainty for an adversary and allows a small secondary message to be sent securely, Yu said. The new patent allows for greater flexibility in implementing the scheme.

Among other purposes, Yu said, the additional secure secondary message can provide a way in which the key can be updated to protect against future attacks. This would directly address the need to periodically change the secret keys shared by legitimate parties.

Authentication in general also holds great importance in the commercial wireless communications sector.

“Key agreement is even harder in commercial settings where there are less obvious backchannels for sharing additional key information, so other computational methods are utilized,” Yu said. “The secure secondary message can be used to help communicate new key information to fluidly evolve the key over time to maintain an adversary’s confusion.”

The patent, awarded Aug. 4, is based on work published in the Institute of Electrical and Electronics Engineers’ Transactions on Information Forensics and Security, and extends an earlier patent.

The invention has been verified via detailed simulations. Earlier experiments using software-defined radios have shown that such a physical layer authentication scheme can be implemented successfully, as patented previously.

This research supports the Network Army Modernization Priority by establishing a method for efficient and future-proof secure wireless communications.

“My team is focused on developing technology that is well-suited to be put into the hands of the Soldier in the not-too-distant future,” Yu said. “We are optimistic that by keeping an eye on future threats while exploring the art of the possible, we can help the future Army network be resilient and robust to the future threat environment.”

###

The team is currently looking to prototype the algorithms on software-defined radios as the next step towards transitioning the technology to the Soldier.

The laboratory’s Army Research Office partially supported the research, as well as grants from the National Science Foundation and the U.S. Department of Education (Graduate Assistance in Areas of National Need Fellowship).

Media Contact
Jenna Brady
[email protected]

Original Source

https://www.army.mil/article/238110/army_researchers_earn_patent_for_secure_communications_invention

Tags: CollaborationLicenses/PatentsResearch/DevelopmentTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

Ficus Lyrata Bark: A Remedy for Fatty Liver

August 26, 2025

Predicting Therapy Outcomes for EGFR-Mutated NSCLC Patients

August 26, 2025

Revolutionizing Nepal’s Health: Past Challenges and Innovations

August 26, 2025

Seralutinib Shows Promise for Adult Pulmonary Hypertension

August 26, 2025
Please login to join discussion

POPULAR NEWS

  • blank

    Breakthrough in Computer Hardware Advances Solves Complex Optimization Challenges

    148 shares
    Share 59 Tweet 37
  • Molecules in Focus: Capturing the Timeless Dance of Particles

    142 shares
    Share 57 Tweet 36
  • New Drug Formulation Transforms Intravenous Treatments into Rapid Injections

    115 shares
    Share 46 Tweet 29
  • Neuropsychiatric Risks Linked to COVID-19 Revealed

    81 shares
    Share 32 Tweet 20

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Ficus Lyrata Bark: A Remedy for Fatty Liver

Predicting Therapy Outcomes for EGFR-Mutated NSCLC Patients

Revolutionizing Nepal’s Health: Past Challenges and Innovations

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.