Polar code security coding method in non-orthogonal multiple access system

A non-orthogonal multiple access and access system technology, which is applied in the field of physical layer security coding, can solve the problems of lack of security capacity, low security transmission rate, eavesdropping channel and main channel that do not satisfy the degeneracy relationship, etc.

Active Publication Date: 2020-05-08
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the existing secure transmission schemes based on polar codes can obtain security capacity, the existing schemes need to assume that the wiretapping channel is the degenerated channel of the main channel. The channel does not satisfy the degenerate relation
In addition, the security transmission rate in the actual scene is small, and there is a lack of scheme design on how to optimize the security capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Polar code security coding method in non-orthogonal multiple access system
  • Polar code security coding method in non-orthogonal multiple access system
  • Polar code security coding method in non-orthogonal multiple access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] The system model figure that the present invention relies on is as attached figure 1 As shown, the base station sends messages to different users through the main channel pair, each user pair includes the near-end user uc and the far-end user uf, and each user pair has an eavesdropping user who eavesdrops on the message sent by the base station through the eavesdropping channel. This embodiment considers that in a 5G system, the base station is sending data to two legitimate users through the main channel, and the eavesdropping user eavesdrops on the information of the two legitimate users, where the base station is the sending end and the user is the receiving end.

[0062] Suppose the code length is 128 bits, the information sequence length is 64 bits, the code rate is 0.5, the channel model is a fading channel model, the near-end user uc is 5 meters away from the base station, the far-end user is 12 meters away from accounting, and the eavesdropping user is 10 meters ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a polar code security coding method in a non-orthogonal multiple access system, and belongs to the technical field of physical layer security coding. A base station sends information to legal users through a non-orthogonal multiple access system, every two users form a user pair to occupy the same time-frequency resource, and meanwhile, one eavesdropping user eavesdrops the information of the user pair; according to the method, an artificial noise assistance method is utilized to deteriorate an eavesdropping channel, and power distribution among different users in thenon-orthogonal multiple access system is optimized, so that the safety capacity of the system is maximized; based on the channel difference between a main channel and an eavesdropping channel, a polarization code nesting characteristic is utilized at a sending end, a security information interval is constructed to place security information, polarization code coding is carried out, and safe transmission is realized. According to the method, the power distribution among users is optimized, so that the safe transmission capacity of the polar code is maximized; and the method is also suitable fornon-degenerated eavesdropping channels, and is more widely applied to application scenarios.

Description

technical field [0001] The invention relates to a polar code security encoding method in a non-orthogonal multiple access system, and belongs to the technical field of physical layer security encoding. Background technique [0002] In the 1970s, Wyner constructed a "tapping channel" model based on information theory, and analyzed the possibility of establishing an almost completely secure communication link without relying on exchanging keys. In Wyner's "eavesdropping channel" model, when the eavesdropping channel is a degenerated channel of the main channel, the channel capacity of the eavesdropper Eve is smaller than the channel capacity of the main channel, then there is a security greater than zero between the sender Alice and the information receiver Bob Capacity; at this time, there is a certain encoding method, so that the legitimate communicator Alice and Bob can communicate reliably, so that the amount of information obtained by the eavesdropper Eve is zero. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H03M13/29H04L1/00
CPCH03M13/29H04L1/0057
Inventor 费泽松孙策
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products