Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Polar Code Secure Encoding Method in Non-orthogonal Multiple Access System

A non-orthogonal multiple access and access system technology, applied in the field of physical layer security coding, can solve the problems of lack of security capacity, small security transmission rate, eavesdropping channel and main channel do not satisfy the degeneration relationship, etc., and achieve polar code security Maximum transmission capacity, optimized power allocation, and wide application scenarios

Active Publication Date: 2021-06-22
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the existing secure transmission schemes based on polar codes can obtain security capacity, the existing schemes need to assume that the wiretapping channel is the degenerated channel of the main channel. The channel does not satisfy the degenerate relation
In addition, the security transmission rate in the actual scene is small, and there is a lack of scheme design on how to optimize the security capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Polar Code Secure Encoding Method in Non-orthogonal Multiple Access System
  • A Polar Code Secure Encoding Method in Non-orthogonal Multiple Access System
  • A Polar Code Secure Encoding Method in Non-orthogonal Multiple Access System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] The system model figure that the present invention relies on is as attached figure 1 As shown, the base station sends messages to different users through the main channel pair, each user pair includes the near-end user uc and the far-end user uf, and each user pair has an eavesdropping user who eavesdrops on the message sent by the base station through the eavesdropping channel. This embodiment considers that in a 5G system, the base station is sending data to two legitimate users through the main channel, and the eavesdropping user eavesdrops on the information of the two legitimate users, where the base station is the sending end and the user is the receiving end.

[0062] Suppose the code length is 128 bits, the information sequence length is 64 bits, the code rate is 0.5, the channel model is a fading channel model, the near-end user uc is 5 meters away from the base station, the far-end user is 12 meters away from accounting, and the eavesdropping user is 10 meters ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a polar code security encoding method in a non-orthogonal multiple access system, and belongs to the technical field of physical layer security encoding. The base station sends information to legal users through the non-orthogonal multiple access system. Every two users form a user pair to occupy the same time-frequency resources, and there is an eavesdropping user who eavesdrops on the information of the user pair; using the artificial noise auxiliary method, the deterioration Eavesdropping on the channel, while optimizing the power allocation between different users in the non-orthogonal multiple access system, so as to maximize the security capacity of the system; based on the channel difference between the main channel and the eavesdropping channel, the polar code is used at the sending end The nesting feature constructs a security information section to place security information and encode it with polar codes to achieve secure transmission. The method optimizes the power allocation among users to maximize the secure transmission capacity of the polar code; it is also applicable to non-degenerate eavesdropping channels, and the application scenarios are more widely applicable.

Description

technical field [0001] The invention relates to a polar code security encoding method in a non-orthogonal multiple access system, and belongs to the technical field of physical layer security encoding. Background technique [0002] In the 1970s, Wyner constructed a "tapping channel" model based on information theory, and analyzed the possibility of establishing an almost completely secure communication link without relying on exchanging keys. In Wyner's "eavesdropping channel" model, when the eavesdropping channel is a degenerated channel of the main channel, the channel capacity of the eavesdropper Eve is smaller than the channel capacity of the main channel, then there is a security greater than zero between the sender Alice and the information receiver Bob Capacity; at this time, there is a certain encoding method, so that the legitimate communicator Alice and Bob can communicate reliably, so that the amount of information obtained by the eavesdropper Eve is zero. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H03M13/29H04L1/00
CPCH03M13/29H04L1/0057
Inventor 费泽松孙策
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products