Fountain coding secure transmission method based on outage prediction and limited feedback in cellular networks
A fountain coding, cellular network technology, applied in the field of wireless communication, can solve problems such as relying on the accuracy of channel information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present invention is described in further detail below in conjunction with accompanying drawing:
[0029] In the cellular network, due to the inherent openness of the wireless channel, the signal sent between the base station and the designated user can also be received by other users or malicious eavesdroppers in the network, resulting in information leakage and unpredictable consequences for users and loss.
[0030] For this reason, the fountain coding security transmission method based on interruption prediction and limited feedback in the cellular network of the present invention includes the following steps:
[0031] The base station and the user in the cellular network are respectively regarded as the source node Alice and the destination node Bob, and the malicious user in the cellular network is regarded as the eavesdropping node Eve. The source node Alice, the destination node Bob, and the eavesdropping node Eve are all equipped with a single antenna. The s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


