WO2017013628A1 - System and method for multi-user detection in a wireless communication system - Google Patents
System and method for multi-user detection in a wireless communication system Download PDFInfo
- Publication number
- WO2017013628A1 WO2017013628A1 PCT/IB2016/054382 IB2016054382W WO2017013628A1 WO 2017013628 A1 WO2017013628 A1 WO 2017013628A1 IB 2016054382 W IB2016054382 W IB 2016054382W WO 2017013628 A1 WO2017013628 A1 WO 2017013628A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data signal
- user
- data signals
- public key
- elliptic curve
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Definitions
- the present disclosure generally relates to the field of telecommunication systems. More particularly, the present disclosure relates to a system and method for multi-user detection in a wireless communication network.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- CDMA is the prominently used technology for wireless communications.
- the CDMA technology allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth.
- a special code is assigned for each transmitter for transmitting signal from one device to other.
- Exemplary embodiments of the present disclosure are directed towards a method for multiuser detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC).
- MOD multiuser detection
- CDMA code division multiple access
- ECC elliptic curve cryptography
- the method includes sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals and filtering and combining the at least one of the data signals for a key generation.
- the method of key generation using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted and encoding the transmitting data signal and transmitting the encoded data signal to the user.
- the method includes encoding data signal and decoding using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted, encoding the transmitting data signal and transmitting the encoded data signal to the user and decoding the received data signal by the user and filtered to reduce the noise and interference.
- FIG. 1 is a diagram depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
- FIG. 2 is a block diagram depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
- FIG. 3 is a flow diagram depicting a method for multiuser detection (MUD) in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
- a system and method for multi-user detection in a wireless communication network are disclosed.
- FIG. 1 is a diagram 100 depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
- the system 100 includes handheld devices 102a, 102b ... 102n of users at sending end, and the handheld devices 108a, and 108b ... 108n of users at receiving end.
- the handheld devices may include a mobile phone, tablet, and the like, without limiting the scope of the disclosure.
- the data signals 104a, 104b ... 104n are transmitted from handheld devices 102a, 102b ... 102n of users at sending end to the handheld devices 108a, 108b ... 108n of users at receiving end through a channel 105.
- the data signal may include any communication signal, without limiting the scope of the disclosure.
- the data signals 104a, 104b ... 104n transmitted are separately modulated and filtered.
- the data signals 104a, 104b ... 104n are combined after filtration to generate a key.
- the key generation process is initiated using elliptic curve cryptography, for example.
- the public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user.
- the public key is to identify the appropriate transmitted signal sent from the handheld devices 102a, 102b ... 102n of users at sending end.
- the public key is sent to the receiving user and encoding operation is performed for the transmitted signal. In the encoding operation the data signal transmitted is converted into a specific form to receive the sent signal.
- FIG. 2 is a block diagram 200 depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
- the system 200 includes handheld devices 102a, 102b ... 102n of users at sending end transmitting data signals 104a, 104b ... 104n through the same channel 105 and the data signals 104a, 104b ... 104n are modulated separately.
- the data signals 104a, 104b ... 104n are filtered and the entire signal is combined for a key generation.
- Step 1 Select a point R (x, y) on the elliptic curve.
- Step 2 Select a prime number p and integer values for a and b.
- Step 4 Select k value which is a random integer value.
- Step 6 Use Ri and R 2 as public key and k as private key.
- the public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user.
- the public key is to identify the appropriate signal sent from the transmitting unit.
- the public key is sent to the receiving user and encoding operation is performed for the transmitting signal.
- the encoding and decoding operations are done by transmitter.
- Step 1 Select h value in plain text p, which is a random integer value.
- Step 4 Take unique elements present in the R matrix and calculate the sum of the unique elements i.e. d .
- Step 5 Find the nearest square value of the sum value and take square root of the nearest square value i.e. f.
- Step 6 Create a new matrix U with size f X f using the equations given below.
- the encoded data signal is received to the user at receiving end and decoded using ECC. [025] The steps for receiving the data signal by the user are:
- s m is the signature waveform of the ⁇ ⁇ user.
- the formula to calculate signature waveform is as follows,
- N is the length of the signature sequence.
- the ECC cross-correlation matrix is defined as follows,
- the data signal is received and demodulated to get appropriate data signal transmitted from the user at sending end.
- Step 1 Calculate P using the private key g, after receiving the cipher text Cj and C i as follows:
- Step 2 Read the characters from the coordinates (Xpj , ypi ) ⁇
- the next step after decoding operation is filtering.
- noise present in the data signal are reduced to obtain the exact data signal.
- FIG. 3 is a flow diagram 300 depicting a method for MUD in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
- the method starts at step 302 by transmitting the data signals by the user at sending end.
- the method continues to next step 304 by modulating the transmitted data signals.
- the method continues to next step 306 by filtering and combining the transmitted data signals for a key generation.
- the method continues to next step 308 by generating a public key and a private key for the transmitting data signals.
- the method continues to next step 310 by assigning the public key to the user at receiving end.
- the method continues to next step 312 by demodulating the received data signal to identify the correct data signal transmitted.
- the method continues to next step 314 by encoding the transmitted data signal.
- the method continues to next step 316 by decoding the received data signal by the user at receiving end and filtered to reduce the noise and interference.
Abstract
Exemplary embodiments of the present disclosure are directed towards a method for multi-user detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC). The method comprising sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals; and filtering and combining the at least one of the data signals for a key generation.
Description
SYSTEM AND METHOD FOR MULTI-USER DETECTION IN A WIRELESS
COMMUNICATION SYSTEM
TECHNICAL FIELD
[001] The present disclosure generally relates to the field of telecommunication systems. More particularly, the present disclosure relates to a system and method for multi-user detection in a wireless communication network.
BACKGROUND
[002] Generally, most of the telecommunication devices are operated over a wireless communication network employing technologies such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA). Generally, CDMA is the prominently used technology for wireless communications. The CDMA technology allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. In this CDMA a special code is assigned for each transmitter for transmitting signal from one device to other.
[003] As a number of users in a CDMA system transmit data to the base station at the same time, it will be difficult for the CDMA system to transmit signals to number of users without interference. However interference occurs in the communication system and also there are chances of losing the signal.
[004] Although relatively specific problems have been discussed, it should be understood that the embodiments disclosed herein should not be limited to solving the specific problems identified in the background.
BRIEF SUMMARY
[005] The following presents a simplified summary of the disclosure in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure and it does not identify key/critical elements of the invention or delineate the scope of the invention. Its
sole purpose is to present some concepts disclosed herein in a simplified form as a prelude to the more detailed description that is presented later.
[006] Exemplary embodiments of the present disclosure are directed towards a method for multiuser detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC).
[007] According to an exemplary aspect, the method includes sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals and filtering and combining the at least one of the data signals for a key generation.
[008] According to an exemplary aspect, the method of key generation using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted and encoding the transmitting data signal and transmitting the encoded data signal to the user.
[009] According to an exemplary aspect, the method includes encoding data signal and decoding using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted, encoding the transmitting data signal and transmitting the encoded data signal to the user and decoding the received data signal by the user and filtered to reduce the noise and interference.
BRIEF DESCRIPTION OF DRAWINGS
[010] Other objects and advantages of the present invention will become apparent to those skilled in the art upon reading the following detailed description of the preferred embodiments, in conjunction with the accompanying drawings, wherein like reference numerals have been used to designate like elements, and wherein:
[011] FIG. 1 is a diagram depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
[012] FIG. 2 is a block diagram depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
[013] FIG. 3 is a flow diagram depicting a method for multiuser detection (MUD) in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
DETAILED DESCRIPTION
[014] It is to be understood that the present disclosure is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The present disclosure is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
[015] The use of "including", "comprising" or "having" and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. The terms "a" and "an" herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item. Further, the use of terms "first", "second", and "third", and the like, herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
[016] According to a non limiting exemplary embodiment of the present disclosure, a system and method for multi-user detection in a wireless communication network are disclosed.
[017] Referring to FIG. 1 is a diagram 100 depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
[018] The system 100 includes handheld devices 102a, 102b ... 102n of users at sending end, and the handheld devices 108a, and 108b ... 108n of users at receiving end. The handheld devices may include a mobile phone, tablet, and the like, without limiting the scope of the disclosure. The data signals 104a, 104b ... 104n are transmitted from handheld devices 102a, 102b ... 102n of users at sending end to the handheld devices 108a, 108b ... 108n of users at receiving end through a channel 105. The data signal may include any communication signal, without limiting the scope of the disclosure. The data signals 104a, 104b ... 104n transmitted are separately modulated and filtered. The data signals 104a, 104b ... 104n are combined after filtration to generate a key.
[019] The key generation process is initiated using elliptic curve cryptography, for example. The public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user. The public key is to identify the appropriate transmitted signal sent from the handheld devices 102a, 102b ... 102n of users at sending end. The public key is sent to the receiving user and encoding operation is performed for the transmitted signal. In the encoding operation the data signal transmitted is converted into a specific form to receive the sent signal.
[020] Referring to FIG. 2 is a block diagram 200 depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure. The system 200 includes handheld devices 102a, 102b ... 102n of users at sending end transmitting data signals 104a, 104b ... 104n through the same channel 105 and the data signals 104a, 104b ... 104n are modulated separately. The data signals 104a, 104b ... 104n are filtered and the entire signal is combined for a key generation.
[021] The steps for key generation using ECC:
Step 1 : Select a point R (x, y) on the elliptic curve.
Step 2: Select a prime number p and integer values for a and b.
Step 3: Select one point in the curve Ri = (x, , y )
Step 4: Select k value which is a random integer value. Step 5: Calculate Ra using the formula R2 = (xj , ) = k * Ri Step 6: Use Ri and R2 as public key and k as private key.
[022] The public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user. The public key is to identify the appropriate signal sent from the transmitting unit. The public key is sent to the receiving user and encoding operation is performed for the transmitting signal. The encoding and decoding operations are done by transmitter.
[023] The steps for the encoding operation are as follows:
Step 1 : Select h value in plain text p, which is a random integer value. Step 2: Calculate cipher text value using the equation given below, q = h * R!
Cj = ( Xpi , ypi ) + h * R2 Step 3: Generate a unique matrix from R
Step 4: Take unique elements present in the R matrix and calculate the sum of the unique elements i.e. d .
Step 5: Find the nearest square value of the sum value and take square root of the nearest square value i.e. f.
Step 6: Create a new matrix U with size f X f using the equations given below.
U(i*M+j) » R (0,0) ; if i
U(i*M+j) » R (i,j) ; if R(i,j) «U
[024] The encoded data signal is received to the user at receiving end and decoded using ECC. [025] The steps for receiving the data signal by the user are:
m
where, sm is the signature waveform of the ΜΛ user. The formula to calculate signature waveform is as follows,
30 sm (0 =∑bm -pr (t - m-Ci ) m—0 where, t is the bit period, C; is the chip interval, dm is the input bit of the M"1 user, Am is the received amplitude of the M* user, g(t) is the additive white Gaussian noise.
m
Where, N is the length of the signature sequence.
[026] The data signal is received and demodulated to get appropriate data signal transmitted from the user at sending end.
[027] The steps for decoding are as follows:
Step 1 : Calculate P using the private key g, after receiving the cipher text Cj and C i as follows:
(xpi . yp. ) = Cj - ( g *Ci )
Step 2: Read the characters from the coordinates (Xpj , ypi )■
[028] The next step after decoding operation is filtering. In the filtering process noise present in the data signal are reduced to obtain the exact data signal.
[029] Referring to FIG. 3 is a flow diagram 300 depicting a method for MUD in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure. The method starts at step 302 by transmitting the data signals by the user at sending end. The method continues to next step 304 by modulating the transmitted data signals. The method continues to next step 306 by filtering and combining the transmitted data signals for a key generation. The method continues to next step 308 by generating a public key and a private key for the transmitting data signals. The method continues to next step 310 by assigning the public key to the user at receiving end. The method continues to next step 312 by demodulating the received data signal to identify the correct data signal transmitted. The method continues to next step 314 by encoding the transmitted data signal. The method continues to next step 316 by decoding the received data signal by the user at receiving end and filtered to reduce the noise and interference.
[030] Although the present disclosure has been described in terms of certain preferred embodiments and illustrations thereof, other embodiments and modifications to preferred
embodiments may be possible that are within the principles and spirit of the invention. The above descriptions and figures are therefore to be regarded as illustrative and not restrictive.
[031] Thus the scope of the present disclosure is defined by the appended claims and includes both combinations and sub combinations of the various features described herein above as well as variations and modifications thereof, which would occur to persons skilled in the art upon reading the foregoing description.
Claims
1. A method for multi-user detection(MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC), the method comprising: sending at least one of the data signals by a plurality of users; modulating the at least one of the data signals; and filtering and combining the at least one of the data signals for a key generation.
2. The method of claim 1, whereby key generation using elliptic curve cryptography comprising: generating a public key and a private key for at least one of the data signals and assigning the public key to a user; demodulating the received data signal to identify the correct data signal transmitted; and encoding the transmitting data signal and transmitting the encoded data signal to the user.
3. The method of claim 2, whereby encoding data signal and decoding using elliptic curve cryptography comprising: generating a public key and a private key for at least one of the data signals and assigning the public key to a user; demodulating the received data signal to identify the correct data signal transmitted;
encoding the transmitting data signal and transmitting the encoded data signal to the user; and decoding the received data signal by the user and filtered to reduce the noise and interference.
4. The method of claim 2, wherein the public key is generated using elliptic curve cryptography.
5. The method of claim 2, wherein the filtering is done to reduce the noise and interference and to obtain the exact data signal.
6. The method of claim 3, wherein the encoding and decoding operations are done by transmitter.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN3776/CHE/2015 | 2015-07-22 | ||
IN3776CH2015 IN2015CH03776A (en) | 2015-07-22 | 2016-07-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017013628A1 true WO2017013628A1 (en) | 2017-01-26 |
Family
ID=54398026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2016/054382 WO2017013628A1 (en) | 2015-07-22 | 2016-07-22 | System and method for multi-user detection in a wireless communication system |
Country Status (2)
Country | Link |
---|---|
IN (1) | IN2015CH03776A (en) |
WO (1) | WO2017013628A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080173717A1 (en) * | 1998-10-02 | 2008-07-24 | Beepcard Ltd. | Card for interaction with a computer |
US20100124330A1 (en) * | 2004-03-17 | 2010-05-20 | Best Fiona S | Secure transmission over satellite phone network |
-
2016
- 2016-07-22 IN IN3776CH2015 patent/IN2015CH03776A/en unknown
- 2016-07-22 WO PCT/IB2016/054382 patent/WO2017013628A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080173717A1 (en) * | 1998-10-02 | 2008-07-24 | Beepcard Ltd. | Card for interaction with a computer |
US20100124330A1 (en) * | 2004-03-17 | 2010-05-20 | Best Fiona S | Secure transmission over satellite phone network |
Also Published As
Publication number | Publication date |
---|---|
IN2015CH03776A (en) | 2015-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | System design and performance analysis of orthogonal multi-level differential chaos shift keying modulation scheme | |
US6496104B2 (en) | System and method for communication via power lines using ultra-short pulses | |
KR102114719B1 (en) | System and method for low peak to average power ratio multiple access communications | |
US20080279287A1 (en) | Code Type Transmitting Device and Code Type Receiving Device | |
AU2016340834B2 (en) | Method and apparatus for communicating data in a digital chaos cooperative network | |
US10277438B2 (en) | Method and apparatus for communicating data in a digital chaos communication system | |
WO2016062120A1 (en) | Multi-user communication method and apparatus of code division multiple access | |
TW201018148A (en) | Dynamic scrambling techniques for reducing killer packets in a wireless network | |
US8873604B2 (en) | Method and apparatus for multiple signal aggregation and reception in digital chaos network | |
CA2995500C (en) | A differential chaos shift keying (dcsk) based on hybrid chaotic system | |
US20050021308A1 (en) | Methods and systems for transmitting digital messages | |
JP2011035921A5 (en) | ||
CN106160787A (en) | A kind of data transmission method and device | |
Dai et al. | Two-layer carrier index modulation scheme based on differential chaos shift keying | |
Nain et al. | A reliable covert channel over IEEE 802.15. 4 using steganography | |
CN106357576B (en) | Correlation delay keying chaos communication method based on hadamard matrix | |
US20040071195A1 (en) | Method and electronic device for a spread spectrum signal | |
US11539463B2 (en) | Methods and computing device for facilitating multiple access in a wireless communication network | |
EP3416319B1 (en) | Information transmission method and apparatus | |
CN101496330B (en) | Code interleaving for walsh codes | |
CN106411467B (en) | Information sending, receiving method and device based on chirp signal | |
CN109962763B (en) | Multi-user data transmission method, device and equipment | |
WO2017013628A1 (en) | System and method for multi-user detection in a wireless communication system | |
US8275020B1 (en) | Secure communication using a non-differentiable waveform | |
WO2016082735A1 (en) | Transmitter diversity transmission method, sending-end device and receiving-end device for fbmc |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16827351 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16827351 Country of ref document: EP Kind code of ref document: A1 |