post-jdlab research
– first of all, I didn’t sign any NDA with any of the parties involved. All the data and documents were provided without any reservation or any warnings, verbal/written or any means of uderlying messages, which makes this past project with my former employer something I feel free to discuss and use to my advantage.
key elements
- RF mesh to relay wifi signals that carries encryption over a long-distance.
- Quantum board to encrypt and decrypt IMU sensor and video data.
- Network setup
- Cable and wire customization
- Control page to whitelist devices and host/air nodes
- Debugging and network
open source
This source code is licensed under the Apache License 2.0 as described in the file LICENSE.
Introduction
It introduces a quick way to build an ESP-WIFI-MESH network without a router. For another detailed network configuration method, please refer to examples/function_demo/mwifi. Before running the example, please read the documents lx-setup and ESP-WIFI-MESH.
Configure
To run this example, you need at least two development boards, one configured as a root node, and the other a non-root node. In this example, all the devices are non-root nodes by default.
- Root node: There is only one root node in an ESP-WIFI-MESH network.
MESH
networks can be differentiated by theirMESH_ID
and channels. - Non-root node: Include leaf nodes and intermediate nodes, which automatically select their parent nodes according to the network conditions.
You need to go to the submenu Example Configuration
and configure one device as a root node, and the others as non-root nodes with make menuconfig
(Make) or idf.py menuconfig
(CMake).
You can also go to the submenu Component config -> MDF Mwifi
, and configure the ESP-WIFI-MESH related parameters like max number of layers, the number of the connected devices on each layer, the broadcast interval, etc.
Configure the device type
Run
- Set the event callback function;
- Initialize wifi, and start ESP-WIFI-MESH;
- Create an event handler function:
- Non-root nodes send the data packet
Hello root!
to the root node at an interval of three seconds, and wait for its reply; - The root node replies
Hello node!
when it receives the data.
- Non-root nodes send the data packet
- Create a timer: print at the specified time the ESP-WIFI-MESH network information about layers, the signal strength and the remaining memory of the parent node.
The root node log would look like this:
The root node log
quantum
Our current way of protecting online data is to encrypt it using mathematical problems that are easy to solve if you have a digital “key” to unlock the encryption but hard to solve without it. However, hard does not mean impossible and, with enough time and computer power, today’s methods of encryption can be broken.
Quantum communication, on the other hand, creates keys using individual particles of light (photons) , which – according to the principles of quantum physics – are impossible to make an exact copy of. Any attempt to copy these keys will unavoidably cause errors that can be detected. This means a hacker, no matter how clever or powerful they are or what kind of supercomputer they possess, cannot replicate a quantum key or read the message it encrypts.
This concept has already been demonstrated in satellites and over fibre-optic cables, and used to send secure messages between different countries.
in a nutshell
When two users want to communicate, our transmitter sends them an entangled pair of photons – one particle for each user. The users’ devices then perform a series of measurements on these photons to create a shared secret quantum key. They can then encrypt their messages with this key and transfer them securely.
By using multiplexing, a common telecommunications technique of combining or splitting signals, we can effectively send these entangled photon pairs to multiple combinations of people at once.
The following wiki, pages and posts are tagged with
Title | Type | Excerpt |
---|---|---|
Using quantum encryption on rf mesh with fixed wing missions | post | Thu, May 05, 22, set up air and ground kits that will communicate in encryption over the air and in decryption between wired devices |