Supercharge Your Innovation With Domain-Expert AI Agents!

Non-orthogonal multiple access authentication system based on shared physical layer authentication tag

A technology of non-orthogonal multiple access and authentication tags, which is applied in the field of non-orthogonal multiple access authentication systems, can solve problems such as lack of understanding, hinder large-scale connection of NOMA system, and hinder security authentication, so as to improve concealment and robustness Effect

Active Publication Date: 2019-10-25
SHENZHEN UNIV
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing NOMA technology, security authentication is usually achieved through the traditional encryption technology in the upper layer; however, there are often three main problems in the NOMA system that hinder the implementation of security authentication
The first problem is that the security of the upper-layer encryption mechanism is established based on the assumption that the adversary has limited computing power; however, with the advancement of computing power and cryptanalysis algorithms, the assumption of computational limitations in cryptography is gradually broken
The second issue is one of efficiency, since various time-consuming tasks are unavoidable at the upper and physical layers (PHY) before the transmitter can be verified
The third issue involves compatibility issues, as wireless devices produced by different manufacturers vary, and a lack of understanding of different digital languages ​​and upper-level communication programs hinders large-scale connectivity in the NOMA system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-orthogonal multiple access authentication system based on shared physical layer authentication tag
  • Non-orthogonal multiple access authentication system based on shared physical layer authentication tag
  • Non-orthogonal multiple access authentication system based on shared physical layer authentication tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0028] It should be noted that the terms "comprising" and "having" and any variations thereof in the present disclosure, such as a process, method, system, product or device that includes or has a series of steps or units, are not necessarily limited to the clearly listed instead, may include or have other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

[0029]The present disclosure provides a non-orthogonal multiple access authentication system based on shared physical layer authentication ta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a non-orthogonal multiple access authentication system based on a shared physical layer authentication tag, and the system comprises a transmitting device which transmits a first carrier signal which comprises an authentication label and a plurality of pieces of user information, and the first carrier signal obtains a second carrier signal through a wireless fading channel;a plurality of user devices, the plurality of user devices respectively receiving a second carrier signal, obtaining channel estimation and preset target user information based on the second carrier signal so as to obtain a target authentication label, a residual signal and a test statistic. Based on channel estimation, each user device obtains a signal-to-interference-and-noise ratio and then obtains an outage probability, each user device obtains a false alarm probability, an optimal threshold value and a detection probability based on test statistics and hypothesis test conditions, and system performance is detected based on the outage probability and the detection probability.

Description

technical field [0001] The present disclosure relates to a non-orthogonal multiple access authentication system based on shared physical layer authentication tags. Background technique [0002] Non-Orthogonal Multiple Access (NOMA) technology is a key technology in the new radio (NR) access technology of the fifth generation (5G) wireless network. NOMA technology can achieve large-scale user access, meet the sharply increasing demand for heterogeneous data traffic, and provide high bandwidth efficiency and ultra-low latency services. In addition, NOMA has been included in the 5G NR standard, the 3rd Generation Partnership Project Long Term Evolution Advanced (3GPP-LTE-A) standard, and the next-generation Universal Digital Television Standard (ATSC 3.0). NOMA technology has excellent performance. Compared with traditional Orthogonal Multiple Access (OMA) schemes (such as Time Division Multiple Access (TDMA), etc.), the NOMA system supports each orthogonal resource block (suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04B17/336H04L29/06
CPCH04W12/06H04L63/0807H04L63/1441H04B17/336
Inventor 谢宁罗钢
Owner SHENZHEN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More