Fan Liang, Zhang Can, Ding Chi-Biao, Wu Wei-Ren, Tu Guo-Fang. Joint Source and Channel Virtual User Safety Identification Method for Wireless Ad hoc networks[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2220-2224. doi: 10.3724/SP.J.1146.2007.00152
Citation:
Fan Liang, Zhang Can, Ding Chi-Biao, Wu Wei-Ren, Tu Guo-Fang. Joint Source and Channel Virtual User Safety Identification Method for Wireless Ad hoc networks[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2220-2224. doi: 10.3724/SP.J.1146.2007.00152
Fan Liang, Zhang Can, Ding Chi-Biao, Wu Wei-Ren, Tu Guo-Fang. Joint Source and Channel Virtual User Safety Identification Method for Wireless Ad hoc networks[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2220-2224. doi: 10.3724/SP.J.1146.2007.00152
Citation:
Fan Liang, Zhang Can, Ding Chi-Biao, Wu Wei-Ren, Tu Guo-Fang. Joint Source and Channel Virtual User Safety Identification Method for Wireless Ad hoc networks[J]. Journal of Electronics & Information Technology, 2008, 30(9): 2220-2224. doi: 10.3724/SP.J.1146.2007.00152
It is adopted the wireless channel, limited battery energy and distributed control techniques in wireless Ad hoc networks, so the existing questions are channel safety threat and more power consumption. To solve above questions, we develop a joint source and channel virtual user safety identification method for DS-CDMA wireless Ad hoc networks. The method can protect and encrypt the header by embedding a random, safe and identifiable header. A subspace-based multi-user detection and virtual user safety identification method can be used at receiver nodes, and the virtual user safety identification method only identifies the header information. Simulation results show that our proposed scheme improves miss rate and active user estimation precision, reduces the probability of retransmission, then saves running radio module power consumption, achieves virtual user safety identification and obtains advanced channel safety.
[1] Sousa E S and Silvester J A. Spreading code protocols fordistributed spread-spectrum packet radio networks. IEEETrans. on Comms., 1988, 36(3): 272-281. [2] Varanasi M K and Aazhang B. Multistage detection inasynchronous code division multiple access communications[J].IEEE Trans. on Comms.1990, 38(4):509-519 [3] Xie Z, Rushforth C K, Short R T, and Moon T K. Joint signaldetection and parameter estimation in multiusercommunications[J].IEEE Trans. on Comms.1993, 41(8):1208-1215 [4] Varanasi M K. Decision feedback multiuser detection: Asystematic approach[J].IEEE Trans. on Information Theory.1999, 45(1):219-240 [5] Xu Z and Tsatsanis M K. Blind adaptive algorithms forminimum variance CDMA receivers[J].IEEE Trans. on Comms.2001, 49(1):180-194 [6] Anderson Ross J 著. 蒋佳, 刘新喜, 等译. 信息安全工程. 机械工业出版社, 2003: 61-63. [7] Wu W and Chen K. Identification of active users insynchronous CDMA multiuser detection. IEEE J. Sel. AreasComms., 1998. 16 (9): 1723-1735. [8] Liu D, Cai Y, and Tu G. Novel packet coding scheme immuneto packet collisions for CDMA-based wireless Ad hocnetworks[J].IEE Pro.-Commun.2006, 153(1):1-4 [9] 沈凤麟, 叶中付, 钱玉美. 信号系统分析与处理. 中国科技大学出版社, 2003: 456-462.Shen F L, Ye Z F, and Qian Y M. Signal System Analysis andProcessing. University of Science and Technology of ChinaPress. 2003: 456-462. [10] Kay S M. Modern Spectral Estimation. Englewood Cliffs, NJ:Prentice-Hall, 1988, ch. 13.