Unlock instant, AI-driven research and patent intelligence for your innovation.

Non-orthogonal multiple access authentication system and parameter optimization method based on shared authentication tags

A non-orthogonal multiple access, authentication label technology, applied in the field of non-orthogonal multiple access authentication system and parameter optimization, can solve the problems of hindering security authentication, hindering the large-scale connection of NOMA system, lack of understanding, etc., to improve system fairness , the effect of maximizing minimal fairness

Active Publication Date: 2020-11-20
SHENZHEN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing NOMA technology, security authentication is usually achieved through the traditional encryption technology in the upper layer; however, there are often three main problems in the NOMA system that hinder the implementation of security authentication
The first problem is that the security of the upper-layer encryption mechanism is established based on the assumption that the adversary has limited computing power; however, with the advancement of computing power and cryptanalysis algorithms, the assumption of computational limitations in cryptography is gradually broken
The second issue is one of efficiency, since various time-consuming tasks are unavoidable at the upper and physical layers (PHY) before the transmitter can be verified
The third issue involves compatibility issues, as wireless devices produced by different manufacturers vary, and a lack of understanding of different digital languages ​​and upper-level communication programs hinders large-scale connectivity in the NOMA system
In addition, in the existing NOMA system, there is also the problem of improving the fairness of services for each client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-orthogonal multiple access authentication system and parameter optimization method based on shared authentication tags
  • Non-orthogonal multiple access authentication system and parameter optimization method based on shared authentication tags
  • Non-orthogonal multiple access authentication system and parameter optimization method based on shared authentication tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0026] It should be noted that the terms "comprising" and "having" and any variations thereof in the present disclosure, such as a process, method, system, product or device that includes or has a series of steps or units, are not necessarily limited to the clearly listed instead, may include or have other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

[0027] The present disclosure provides a parameter optimization method of a non-orthogonal multiple access authentication system based on sha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a parameter optimization method of a non-orthogonal multiple access authentication system based on a shared authentication label, which includes: a base station transmits a first carrier signal including an authentication label and multiple user information, and the first carrier signal is obtained through a wireless fading channel The second carrier signal: Multiple UEs respectively receive and obtain channel estimation and preset target user information based on the second carrier signal to obtain test statistics. Based on channel estimation, multiple UEs obtain corresponding SINR and then obtain interruption Probability, based on test statistics and hypothesis test condition detection probability; the base station receives and optimizes the power allocation factor of the authentication tag and the power allocation factor of each user information based on the feedback signals transmitted by multiple user terminals.

Description

technical field [0001] The present disclosure relates to a non-orthogonal multiple access authentication system based on a shared authentication label and a parameter optimization method. Background technique [0002] Non-Orthogonal Multiple Access (NOMA, Non-Orthogonal Multiple Access) technology is a key technology in the new radio (NR) access technology of the fifth generation (5G) wireless network. NOMA technology can achieve large-scale user access, meet the sharply increasing demand for heterogeneous data traffic, and provide high bandwidth efficiency and ultra-low latency services. In addition, NOMA has been included in the 5G NR standard, the 3rd Generation Partnership Project Long Term Evolution Advanced (3GPP-LTE-A) standard, and the next-generation Universal Digital Television Standard (ATSC 3.0). The NOMA technology has excellent performance. Compared with the traditional Orthogonal Multiple Access (OMA) technology (such as Time Division Multiple Access (TDMA), ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B17/336H04W12/00H04W12/06H04W24/02
CPCH04B17/336H04W24/02H04W12/06H04W12/69Y02D30/70
Inventor 谢宁罗钢
Owner SHENZHEN UNIV