Unlock instant, AI-driven research and patent intelligence for your innovation.

Fountain coding secure transmission method based on outage prediction and limited feedback in cellular networks

A fountain coding, cellular network technology, applied in the field of wireless communication, can solve problems such as relying on the accuracy of channel information

Active Publication Date: 2020-10-27
XI AN JIAOTONG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of these techniques rely on the multi-antenna structure of the transceiver or the close cooperation between nodes, and heavily depend on the accuracy of the channel information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fountain coding secure transmission method based on outage prediction and limited feedback in cellular networks
  • Fountain coding secure transmission method based on outage prediction and limited feedback in cellular networks
  • Fountain coding secure transmission method based on outage prediction and limited feedback in cellular networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention is described in further detail below in conjunction with accompanying drawing:

[0029] In the cellular network, due to the inherent openness of the wireless channel, the signal sent between the base station and the designated user can also be received by other users or malicious eavesdroppers in the network, resulting in information leakage and unpredictable consequences for users and loss.

[0030] For this reason, the fountain coding security transmission method based on interruption prediction and limited feedback in the cellular network of the present invention includes the following steps:

[0031] The base station and the user in the cellular network are respectively regarded as the source node Alice and the destination node Bob, and the malicious user in the cellular network is regarded as the eavesdropping node Eve. The source node Alice, the destination node Bob, and the eavesdropping node Eve are all equipped with a single antenna. The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fountain coding secure transmission method based on interrupt prediction and limited feedback in a cellular network. The method comprises the following steps: equally dividing an original file into K source data packets with a source node Alice, and recording as (u<1>, u<2>,..., u<K>); generating a series of fountain coding data packets (v<1>, v<2>,...) according to the Ksource data packets by the source node Alice; and then generating a data packet p<k> to be transmitted from each fountain coding data packet v<k> by channel coding, and then sending the data packet p<k> to be transmitted to a destination node Bob. The method can achieve secure transmission of information, and the complexity of equipment is relatively low.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a fountain coding security transmission method based on interruption prediction and limited feedback in a cellular network. Background technique [0002] In recent years, with the widespread application of smart mobile terminal devices and the explosive growth of wireless service demands, wireless network security is also facing unprecedented challenges. First of all, the inherent openness of the wireless network makes it possible for the signal sent to the destination receiver to be received by illegal eavesdroppers, thus causing security risks; secondly, the development of supercomputers makes it possible to crack the secret key by brute force method. Therefore, In the past, the encryption technology based on the upper layer protocol stack has been difficult to ensure information security; finally, the highly heterogeneous nature of the next-generation wireless com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04B17/373H04B17/391
CPCH04L1/0057H04B17/373H04B17/391
Inventor 孙黎徐洪斌
Owner XI AN JIAOTONG UNIV