

How to Protect Radio Signals Over Short Distances? 93
anth_007 asks: "I'm a software developer seeking to delve into the hardware world. I am trying to create a prototype for a new product that would broadcast signals over a very short range (100s of meters). The important part is that only authorized users (ie. no hackers) would be able to broadcast signals. Well, a more accurate description would be that anyone could broadcast (it's just a radio transmitter after all), but receivers would be able to differentiate between authorized signals and those which are not. I've been looking to find information on Satellite Radio (XM, Sirius, etc) and how they protect their signals, but I haven't had much success. I realize that I'm talking about two different problems here (I want to stop unauthorized people from broadcasting, satellite radio is trying to stop unauthorized people from receiving), but I need to start somewhere. Any ideas? How do the big boys protect their signals? Is there any readily available technology out there that would allow me to accomplish this?"
Idea (Score:3, Funny)
Re:Idea (Score:3, Funny)
Re:Idea (Score:2)
Authenticating and "protecting" the signal are two separate problems. If you use the aether to carry your signal, only the former is soluble (unless you can invoke the gove
Re:Idea (Score:2)
rather than using a sine wave - it uses square waves at predetermined intervals - which intervals are known only to the secure pair.
aik
Re:Idea (Score:2)
- Coax cable in a "Bus" topology.
- BNC connectors and T-shaped spliters for each device.
- 50 Ohm rezistive terminators at the end of the Bus
- And use the latest transmission devices using the industry proven 10Base2 transcievers which can send or receive data at up to 10 Mbit/sec ! They use a 20Mhz carrier so you don't get interference with wifi. The range is up to 200 meters.
You can even run IP over this advanced data transmission setup.
Re:Idea (Score:2)
Signatures (Score:1, Informative)
Re:Signatures (Score:2)
As there is no "scramble proof" radio technology, the best you can do is authenticate the sender and reciever. You can't prevent anyone from sending or recieving the radio signal. Although you can prove the authenticity of teh sender, and the authorization of the reciever. The best way is to use 802.11x to secure your radio transmissions. All the hard work is alr
Tinfoil (Score:5, Funny)
seems obvious (Score:1)
Re:seems obvious (Score:2)
Use lots of redundancy and spread the signal over the available spectrum. Some form of frequency hopping perhaps. Oh, and lots of redundancy, plus some error checking.
To authenticate:
Use existing technology - public/private keypairs, pgp/gpg etc
Buy an FCC license (Score:3, Informative)
If you are using some unlicensed spectrum like the 2.4GHz band, you have no recourse. Any unlicenced radio communication is required to not interfere with other people's use of the spectrum, and accept any interference without recourse.
Re:Buy an FCC license (Score:3, Informative)
Correct in theory, though in practice not so much.
You can complain to the FCC, but they're unlikely to send somebody to investigate unless it's an extreme and repeated violation.
More likely is that you'll need to find the offender yourself, then give the FBI your evidence, and maybe they'll send them a nasty letter that they mu
Re:Buy an FCC license (Score:2)
Yeah, and instead of using a secure encryption scheme, you can just depend on the DMCA to bust people who crack your code, right?
Get real.
jamming (Score:2)
Re:jamming (Score:2)
And you have a better idea? (Score:2)
128-bit encryption (Score:1)
Transmitting signals into the air leave it open to anyone within line of site of the transmitter to receive the energy and do what ever they want to with it....
There are antennas with very narrow beamwidths, but new DSP radio receivers can really pull signals out of the mud
Spread spectrum (Score:5, Informative)
With the right despreading key, you get signals.
Otherwise, you get noise.
...laura
Re:Spread spectrum (Score:1)
Encryption/signing at the data level is also good.
Re:Spread spectrum (Score:2, Funny)
Re:Spread spectrum (Score:1, Funny)
Your geek license is hereby revoked for one or more of the following reasons:
* Failure to recognize an All Your Base [planettribes.com] reference
* Wasting mod points on a reply to an offtopic post, rather than the original offtopic post
* Not having a sense of humor
Slashdot account deletion will take place in approximately 24 hours. Thank you, and have a nice day.
Spread spectrum-Exploration. (Score:2, Informative)
Some "exploratories" on signal processing.
There's some other good stuff there as well.
Re:Spread spectrum (Score:2)
Don't try to authenticate the radio waves. (Score:4, Informative)
It's far easier to secure the higher layers (in the OSI sense) -- the data you're sending over the radio waves.
Authenticating this is pretty trivial, from a crypto standpoint. The simplest approach is to encrypt your data with a shared key; more robust approaches might include signing unencrypted data with a private/public keypair, etc. This would also introduce some noise resistance, since you could tell if the data's been corrupted by checking the signature. (Though for non-malicious interference, you're probably better off using a redundancy check of some sort.)
Good luck!
Re:Don't try to authenticate the radio waves. (Score:1)
There are plenty of existing solutions for this (SSL, ssh, etc). You've probably already used them.
Also, there is no such thing as a short-range radio signal.
Re:Don't try to authenticate the radio waves. (Score:3, Informative)
Not really true.
It's far easier to secure the higher layers (in the OSI sense) -- the data you're sending over the radio waves.
Except that does nothing to protect you from DOS attacks.
This guy was asking for a system where no one else could transmit but authorized users. Obviously you can't actually prevent someone from building a transmitter, but you can design your modulat
Re:Don't try to authenticate the radio waves. (Score:2)
digital radio provides the option of infinite channels consisting of a shared time base, and any psuedo random sequence of signal delays.
with two or three antennas - it would be possible to cancel a rouge source based on spatial diversity
aik
Satellite DIGITAL radio (Score:1)
Since Sirius et.al are digital broadcasts, they can encrypt their signals to whatever encoding they'ed care to use. No?
Rely on a repeater? (Score:2)
Re:Rely on a repeater? (Score:2)
Re:Rely on a repeater? (Score:2)
Well, the point was that the central computer (repeater) would 'own' that frequency/channel. The devices wouldn't accept commands from anybody else. (I did not express this clearly.)
I'm not holding onto it as a good idea, rather just suggesting something I remember from back in my ham radio days.
well technically speaking... (Score:4, Informative)
the only way to actually attempt to control who transmits on what bandwidth would probably require some sort of licensing from the FCC. that way you have some sort of legal recourse if someone does decide to walk on your airwaves.
there are lots of techies out there who know how to build transmitters and recievers that can send and recieve at any frequency they want, so trying to put a technical barrier to the actual airwaves won't get you anywhere, as you mentioned.
an elegant solution would consist of some sort of stream verification, so that you can verify the sender of a signal via fingerprint, encryption, hidden messages, etc. Something that you control and that is difficult to reverse engineer would allow you to differentiate your signals from someone else's.
I think XM and Sirius encrypt their streams, or at least apply some sort of proprietary DRM to their streams to keep idle listeners from tuning in. They also use a fully digital stream, so encryption is pretty easy. And if I remember, they use an odd frequency that must be licensed from the FCC to use. The combination of those things seems to work great for them, a quick search on satellite radio hacking revealed almost nothing useful.
Re:well technically speaking... (Score:1)
OK. With that sarcastic answer out of the way, the parent is completely correct. You CANNOT keep other people from transmitting on your frequency. But what you CAN do it know if the received signal is from the desired source by using cryptography (assuming that your information is digital). Of course, jamming is still a
Re:well technically speaking... (Score:2)
like spread spec, but each "burst" is a simple state change at a pseudorandom point in time.
currently disallowed by the fcc except for spookops
aik
Re:well technically speaking... (Score:1)
The key is not to make radio waves not transmittable, but to make it easy to reject any radio waves other than the ones you don't want.
Add in unauthorized transmission detection (Score:2)
You're looking at the problem from the wrong side (Score:4, Interesting)
1. Send block of data
2. compute fingerprint ("hash") of the transmitted data
3. encrypt that fingerprint with the transmitter's private key
4. transmit that
on the receiving end, you do this:
1. receive data
2. receive encrypted hash
3. compute hash of received data
4. decrypt received hash using sender's public key and compare to actual hash of data
This process is called signing, and is used in many many places. The use you've most likely encountered is to verify the identity of online stores. (the store's encryption certificate is signed by the trusted certificate authority that issued it. Your browser has all the authorities' public keys built into it, and uses it to check the signature against the certificate contents.)
Re:You're looking at the problem from the wrong si (Score:1)
I suppose it depends on what con
Re:You're looking at the problem from the wrong si (Score:2)
Sure there is.
Take military GPS for example.
Try and explain to me how you're going to spoof a military GPS signal......
What this guy needs to do is research something called Electronic Counter-Countermeasures (ECCM). This is a common military problem.
For example:
Joe's shooting a radar-guided missile at Steve. If Steve can send back enough fake radar pulses to throw off the missile's tracking, Joe will never be able to shoot him dow
Re:You're looking at the problem from the wrong si (Score:2)
Radio? Nonsense, go optical (Score:3, Funny)
A telescope is effectively a very high gain "antenna."
If I understand... (Score:2)
So the broadcast must be tagged in such a way as to allow this identification to be made (since potential transmitters cannot be controlled -- as you observed).
Encrypt the broadcast, or transmit a hash (or equivalent). Be sure to consider "replay attacks". An old message can be recorded and played back to the receiver at a later time.
And that's really all that you can do. Be sure to choose a cipher or h
Re:If I understand... (Score:2)
I suspect he also wants to counter hostile jamming. Redundancy and spread spectrum will help towards that goal.
Antiradiation missile? (Score:1)
Beyond this, the "big boys" recognize that it is most difficult to prevent the dedicated and motivated from transmitting before the fact. They deal with the problem in two ways:
The first is jam-resistant modulation schemes - so the miscreant
anth_007 asks? (Score:1, Insightful)
Can't you just ask Q?
Public key cryptography solves this. Only transmitters get the private key, they sign the communications with it, and anybody with the public key can verify that the private key signed it.
Despreading - yeah that's the ticket (Score:4, Informative)
Further, the transmission by it's very nature is somewhat covert. Now - if you're the NSA, perhaps you can figure out, but it's likely to be able to put together a system that is for all intents and purposes "private" using this type of transmission.
Now -FCC licenses, and spectruma are your REAL problem. The technical problems have solutions.
Public Key Encryption (Score:2)
This makes the same compromises Phil Zimmer
oops... brain fart (Score:2)
--Mike--
WCDMA (Score:2, Informative)
Buy a license (Score:2)
Two things to do (Score:1)
Encrypt your traffic. This prevents people from sending you crap that you might mistake for good stuff, and it prevents others from reading your transmission.
Shoulders of Giants (Score:1)
It's All In The Digital (Score:1)
A bit off topic (Score:2)
Basically, it's a software-controlled receiver/transmitter, which makes it easy to pull signals out of the air, store and analyze them, and generate your own signals for broadcast.
I saw a nifty demonstration of it once. So I've already told you about everything I know.
As to your actual question, I agree with the general consensus: It's a crypto problem, not a ha
Re:A bit off topic (Score:2)
Partly. Spread sprectrum is at least in part a hardware problem (in that it requires certain hardware).
Re:A bit off topic (Score:2)
Re:A bit off topic (Score:2)
Quite right. I interpreted the original Ask Slashdot question, where the asker said "I want to stop unauthorized people from broadcasting" as meaning he wants to prevent jamming, since you can't really stop people from transmitting a radio signal.
For what part of the world? (Score:2)
That said - let me examine your statements from the context of a project to operate within the US.
First, there is the question of what frequency you want to be operating in. If you are wanting 100's of meters, and yet you are planning on operating in
hop frequency (Score:3, Insightful)
Then you need to build a transmitter and a reciever that will be able to change frequencies very very fast (hundreds or thousands of times per second), keep in sync with one another, and send packetized digital data between them.
If you are really paraniod, you encrypt the signals going to the transmitter, allow the transmitter to encrypt them again, the reverse the process at the receiver side.
If you are really, really paranoid, you iterate that cascading pattern over several layers of the network, multiplex the signal to the radio, and broadcast a solid stream of encrypted information, filling it the gaps between "real" information with garbage so that there isn't any variation in the RF between when you are saying something and when you aren't.
If you are more paraniod than that, you unplug everything, use very low tech methods executed by fanatically loyal zealots who would rather die horribly painful deaths than bring shame on their families, betray the cause, or endanger their eternal soul.
If you want to stop the paranoid, really paraniod, and really really paraniod folks from communicating, you build your own frequency hopping device, add a modulation hopping function, connect it to a really big tesla coil mounted on an electronically isolated & shielded truck, and broadcast megawatts of RF into the atmosphere while driving around in arbitrary paths.
If you want to stop the zealots, pull a Keiser Soze on them and kill them and everyone they've ever known, their dog, their neighbor, the guy who sold them coffee this morning, etc. Iterate until there aren't any more zealots.
Smart Antenna (Score:2)
Transmit a broadband signal to all recievers. Have the receiver narrow it's coverage to your area and send an authentication request. Then you are "in" if you pass, and if not the receiver decreases signal reception and transmission to your geographic area, and could even pass that information to other
Uh, FCC. (Score:2)
You are worried about others transmitting on your bandwidth? Well don't worry there is a federal agency just for this. It's called the FCC. I'm sure that your company is paying a very large amount to license the spectrum that you want to prevent others from transmitting on. Well, just identify others that are transmitting on your licensed spectrum and the FCC will go out and if they don't stop transmitting on your licensed spectrum space they will be fined $10,000
Need more info (Score:2)
Still, there are situations where these would be unworkable: severe cost restrictions might rule out encryption, or a moving transmitter might rule out a highly directional antenna on the reciever. What is needed is more information: what are your limita
Depends ... (Score:2, Informative)
I assume it's a digital signal you are sending, but if it's analog audio you can do some cool things by adding something that sounds like white noise to the transmitter, then subtracting it on the receiver. A "sync" signal will need to be sent to get them together (or transmit the "white noise" on another frequency if 2 tranmitters is feasable). If the transmitter isn't adding the "white noise", but you subtract it, then the audio wil
Uhhhh. (Score:2)
You trust your credit cards, personal information, and bank account to it, so why wouldn't it be good enough here?
Need more information (Score:1)
obligatory (Score:1)
DSS (Score:2)
check here for a brief overview:
http://electronics.howstuffworks.com/question326.
UWB (Score:2)
supposed to sound like static
only readable/interpertable if you know exactly what you are looking for.
Zigbee (Score:2)
You might look at... (Score:2)
Get an Amateur Radio License (Score:2)
You should be able to get a no-code license in a few months through a local club. The Amateur Radio Relay League [arrl.org] is a good place to start.
Re:Get an Amateur Radio License (Score:1)
spread spectrum + steg (Score:2)
Before everybody here keeps posting the same thing (Score:2)
Everyone's "obvious answer" is encryption of some sort, but no one realizes that no matter what you do, someone can come in and broadcast out noise on your frequency to pretty much kill your broadcast in all regards. And THAT is what you need to really protect against. The encryption only makes sure someone isn't receiving when they shouldn't be.
To get it into your hard wired minds... you can encrypt anything and send it over a cable, but if someone hooks up a vacuum cleaner'
Re:Before everybody here keeps posting the same th (Score:2)
Do it like the spies do it (Score:2)
Triangulation (Score:1)
Active denial: Microwave the intruder's rig.
The Right Way: Use crypto, of course.
Power (Score:1)
Well you already got a couple of answers. (Score:2)
2. A public key style encryption.
3. Highly directional signal if possible.
You could combine them as well to make it as secure as possible. Have fun.
Make it directional? (Score:2)
Encryption will help, but it's still defeatable with brute force.
How you might start framing the problem (Score:1)
Sirius and XM Satellite radio are probably not the best place to start, since they use proprietary waveforms, and they are designed to avoid dropouts as you drive around in your car. They do this by combining two satellite signals and hundreds of local ter
More info... (Score:1)
First, I am not really transmitting much info. A simple "signal is on" is ok... perhaps a bitmap, but that's it. I'm not transmitting audio/video/data at all. In terms of the broadcast stations, they must be mobile.
There can be no line of site.
I don't care who picks up the signal or what they do with it... the data is unimportant.
I just want to make sure no one can b
Digital (or Analog) PLs (Score:2)
Basically a signal broadcast at the same time as the communication signal that opens the squelch up on the receievers. This is what most Police/Fire/Safety Departments use on their radios. You may also try using a (Digitally) Trunked System.
How PL Systems Work [geocities.com]
What is Trunking? [mwc.co.uk]