Abstract
Sparse code multiple access (SCMA) is a promising air interface candidate technique for next generation mobile networks. By introducing the Tent map in the Chaos theory, we propose a novel physical layer transmission scheme with codeword level interleaving at the transmitter in this letter, which is termed as interleaver-based SCMA (I-SCMA). Simulation results and analysis show that I-SCMA can provide high security performance without any loss in performance and transmission rate, thus constitutes a viable solution for the next generation wireless networks to provide secure communications.
Highlights
S CMA [1] is a code domain non-orthogonal multiple access (NOMA) scheme that is considered to be a promising 5G candidate due to its excellent ability to support massive quantities of users under heavily loaded conditions.In the possible application scenarios for Sparse code multiple access (SCMA), such as massive machine type of communication, millions of nodes must be accessed
The basic idea of interleaver based SCMA (I-SCMA) is to amplify the randomness of limited information that can be extracted from the channel state information (CSI), and leading to asymmetric knowledge between the legitimate users (LUs) and eavesdropper in interleavers since they disperse the order of codewords for each LU
By combining the higher layers cryptography, the eavesdropper would have to guess both the key and the random interleavers introduced by the CSI, which leads to a significant increase in the search space when performing cryptanalysis
Summary
S CMA [1] is a code domain non-orthogonal multiple access (NOMA) scheme that is considered to be a promising 5G candidate due to its excellent ability to support massive quantities of users under heavily loaded conditions. The basic idea of I-SCMA is to amplify the randomness of limited information that can be extracted from the channel state information (CSI), and leading to asymmetric knowledge between the legitimate users (LUs) and eavesdropper in interleavers since they disperse the order of codewords for each LU. From this perspective, the proposed scheme can be regarded as a physical layer encryption, which is a combination of conventional ciphers and physical layer security.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.