Advanced Search
Volume 43 Issue 2
Feb.  2021
Turn off MathJax
Article Contents
Kenan ZHANG, Guofang TU, Can ZHANG, Deyuan CHEN. Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2021, 43(2): 380-387. doi: 10.11999/JEIT190644
Citation: Kenan ZHANG, Guofang TU, Can ZHANG, Deyuan CHEN. Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2021, 43(2): 380-387. doi: 10.11999/JEIT190644

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Networks

doi: 10.11999/JEIT190644
Funds:  The National Natural Science Foundation of China (61571416, 61271282), The Award Foundation of Chinese Academy of Sciences (Y82901EA1)
  • Received Date: 2019-08-27
  • Rev Recd Date: 2020-03-02
  • Available Online: 2020-12-09
  • Publish Date: 2021-02-23
  • Ad hoc network is a kind of self-organized network without center. The reliability of virtual user identification and channel security are reduced when SNR is low due to user energy limitation. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by xoring the orthogonal address code of transmitter with the pseudo random address code of receiver and encrypted with channel security code as key to acquire orthogonal random secure sequence so as to improve channel security. In order to realize spread spectrum as well as improve transmission efficiency, transmitted data is divided into 6-bit symbols, each symbol is mapped with an orthogonal random secure sequence. Receivers adopt subspace-based method to process received data and establish a judgment model to identify virtual users. Simulation results indicate that the proposed method obtains 1.6 dB

    \begin{document}${{E_b}}/{{N}}_0$\end{document}

    gains compared with existing methods when miss alarm rate of virtual user identification is 10–3.

  • loading
  • WU W C and CHEN K C. Identification of active users in synchronous CDMA multiuser detection[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(9): 1723–1735. doi: 10.1109/49.737641
    LIN D D and LIM T J. Subspace-based active user identification for a collision-free slotted ad hoc network[J]. IEEE Transactions on Communications, 2004, 52(4): 612–621. doi: 10.1109/TCOMM.2004.826415
    PAD P, SOLTANOLKOTABI M, HADIKHANLOU S, et al. Errorless codes for over-loaded CDMA with active user detection[C]. 2009 IEEE International Conference on Communications, Dresden, Germany, 2009: 1–6. doi: 10.1109/ICC.2009.5199003.
    ANGELOSANTE D, BIGLIERI E, and LOPS M. Multiuser detection in a dynamic environment—part II: Joint user identification and parameter estimation[J]. IEEE Transactions on Information Theory, 2009, 55(5): 2365–2374. doi: 10.1109/TIT.2009.2016008
    ANGELOSANTE D, BIGLIERI E, and LOPS M. Low-complexity receivers for multiuser detection with an unknown number of active users[J]. Signal Processing, 2010, 90(5): 1486–1495. doi: 10.1016/j.sigpro.2009.10.019
    VÁZQUEZ M A and MÍGUEZ J. User activity tracking in DS-CDMA systems[J]. IEEE Transactions on Vehicular Technology, 2013, 62(7): 3188–3203. doi: 10.1109/TVT.2013.2251024
    ZHANG Yijin, SHUM K W, WONG W S, et al. Binary sequences for multiple access collision channel: Identification and synchronization[J]. IEEE Transactions on Communications, 2014, 62(2): 667–675. doi: 10.1109/TCOMM.2013.121313.130331
    田珊, 张灿. 无线ad hoc网络中基于跨层设计的有效用户识别方法[J]. 中国科学院研究生院学报, 2009, 26(5): 681–687.

    TIAN Shan and ZHANG Can. Virtual user identification based on cross-layer design in wireless ad hoc networks[J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2009, 26(5): 681–687.
    ROZOVSKY R and KUMAR P R. Seedex: A MAC protocol for ad hoc networks[C]. The 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, USA, 2001: 67–75. doi: 10.1145/501426.501427.
    JEONG B K, SHIM B, and LEE K B. MAP-based active user and data detection for massive machine-type communications[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9): 8481–8494. doi: 10.1109/TVT.2018.2849621
    AHN J, SHIM B, and LEE K B. EP-based joint active user detection and channel estimation for massive machine-type communications[J]. IEEE Transactions on Communications, 2019, 67(7): 5178–5189. doi: 10.1109/TCOMM.2019.2907853
    KIM W, LIM G, AHN Y, et al. Active user detection of machine-type communications via dimension spreading neural network[C]. 2019 IEEE International Conference on Communications, Shanghai, China, 2019: 1–6. doi: 10.1109/ICC.2019.8761407.
    葛文萍, 张雪婉, 吴雄, 等. 基于部分码字消息传递的SCMA多用户检测算法[J]. 电子与信息学报, 2018, 40(10): 2309–2315. doi: 10.11999/JEIT171073

    GE Wenping, ZHANG Xuewan, WU Xiong, et al. Message passing multiuser detection algorithm for SCMA based on partial codewords searching[J]. Journal of Electronics &Information Technology, 2018, 40(10): 2309–2315. doi: 10.11999/JEIT171073
    杨维, 赵懿伟, 侯健琦. 一种改进基于门限的稀疏码多址接入低复杂度多用户检测算法[J]. 电子与信息学报, 2018, 40(5): 1044–1049. doi: 10.11999/JEIT170647

    YANG Wei, ZHAO Yiwei, and HOU Jianqi. An improved threshold-based low complexity multiuser detection scheme for sparse code multiple access system[J]. Journal of Electronics &Information Technology, 2018, 40(5): 1044–1049. doi: 10.11999/JEIT170647
    Rand Corporation. A Million Random Digits with 100, 000 Normal Deviates[M]. New York, USA: Free Press, 1955: 5–404.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(6)

    Article Metrics

    Article views (676) PDF downloads(54) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return