WO2017013628A1 - System and method for multi-user detection in a wireless communication system - Google Patents

System and method for multi-user detection in a wireless communication system Download PDF

Info

Publication number
WO2017013628A1
WO2017013628A1 PCT/IB2016/054382 IB2016054382W WO2017013628A1 WO 2017013628 A1 WO2017013628 A1 WO 2017013628A1 IB 2016054382 W IB2016054382 W IB 2016054382W WO 2017013628 A1 WO2017013628 A1 WO 2017013628A1
Authority
WO
WIPO (PCT)
Prior art keywords
data signal
user
data signals
public key
elliptic curve
Prior art date
Application number
PCT/IB2016/054382
Other languages
French (fr)
Inventor
Ranga Rao MATURI
Prabhakara Rao B
Original Assignee
Maturi Ranga Rao
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maturi Ranga Rao filed Critical Maturi Ranga Rao
Publication of WO2017013628A1 publication Critical patent/WO2017013628A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Definitions

  • the present disclosure generally relates to the field of telecommunication systems. More particularly, the present disclosure relates to a system and method for multi-user detection in a wireless communication network.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • CDMA is the prominently used technology for wireless communications.
  • the CDMA technology allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth.
  • a special code is assigned for each transmitter for transmitting signal from one device to other.
  • Exemplary embodiments of the present disclosure are directed towards a method for multiuser detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC).
  • MOD multiuser detection
  • CDMA code division multiple access
  • ECC elliptic curve cryptography
  • the method includes sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals and filtering and combining the at least one of the data signals for a key generation.
  • the method of key generation using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted and encoding the transmitting data signal and transmitting the encoded data signal to the user.
  • the method includes encoding data signal and decoding using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted, encoding the transmitting data signal and transmitting the encoded data signal to the user and decoding the received data signal by the user and filtered to reduce the noise and interference.
  • FIG. 1 is a diagram depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
  • FIG. 2 is a block diagram depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
  • FIG. 3 is a flow diagram depicting a method for multiuser detection (MUD) in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
  • a system and method for multi-user detection in a wireless communication network are disclosed.
  • FIG. 1 is a diagram 100 depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure.
  • the system 100 includes handheld devices 102a, 102b ... 102n of users at sending end, and the handheld devices 108a, and 108b ... 108n of users at receiving end.
  • the handheld devices may include a mobile phone, tablet, and the like, without limiting the scope of the disclosure.
  • the data signals 104a, 104b ... 104n are transmitted from handheld devices 102a, 102b ... 102n of users at sending end to the handheld devices 108a, 108b ... 108n of users at receiving end through a channel 105.
  • the data signal may include any communication signal, without limiting the scope of the disclosure.
  • the data signals 104a, 104b ... 104n transmitted are separately modulated and filtered.
  • the data signals 104a, 104b ... 104n are combined after filtration to generate a key.
  • the key generation process is initiated using elliptic curve cryptography, for example.
  • the public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user.
  • the public key is to identify the appropriate transmitted signal sent from the handheld devices 102a, 102b ... 102n of users at sending end.
  • the public key is sent to the receiving user and encoding operation is performed for the transmitted signal. In the encoding operation the data signal transmitted is converted into a specific form to receive the sent signal.
  • FIG. 2 is a block diagram 200 depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
  • the system 200 includes handheld devices 102a, 102b ... 102n of users at sending end transmitting data signals 104a, 104b ... 104n through the same channel 105 and the data signals 104a, 104b ... 104n are modulated separately.
  • the data signals 104a, 104b ... 104n are filtered and the entire signal is combined for a key generation.
  • Step 1 Select a point R (x, y) on the elliptic curve.
  • Step 2 Select a prime number p and integer values for a and b.
  • Step 4 Select k value which is a random integer value.
  • Step 6 Use Ri and R 2 as public key and k as private key.
  • the public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user.
  • the public key is to identify the appropriate signal sent from the transmitting unit.
  • the public key is sent to the receiving user and encoding operation is performed for the transmitting signal.
  • the encoding and decoding operations are done by transmitter.
  • Step 1 Select h value in plain text p, which is a random integer value.
  • Step 4 Take unique elements present in the R matrix and calculate the sum of the unique elements i.e. d .
  • Step 5 Find the nearest square value of the sum value and take square root of the nearest square value i.e. f.
  • Step 6 Create a new matrix U with size f X f using the equations given below.
  • the encoded data signal is received to the user at receiving end and decoded using ECC. [025] The steps for receiving the data signal by the user are:
  • s m is the signature waveform of the ⁇ ⁇ user.
  • the formula to calculate signature waveform is as follows,
  • N is the length of the signature sequence.
  • the ECC cross-correlation matrix is defined as follows,
  • the data signal is received and demodulated to get appropriate data signal transmitted from the user at sending end.
  • Step 1 Calculate P using the private key g, after receiving the cipher text Cj and C i as follows:
  • Step 2 Read the characters from the coordinates (Xpj , ypi ) ⁇
  • the next step after decoding operation is filtering.
  • noise present in the data signal are reduced to obtain the exact data signal.
  • FIG. 3 is a flow diagram 300 depicting a method for MUD in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
  • the method starts at step 302 by transmitting the data signals by the user at sending end.
  • the method continues to next step 304 by modulating the transmitted data signals.
  • the method continues to next step 306 by filtering and combining the transmitted data signals for a key generation.
  • the method continues to next step 308 by generating a public key and a private key for the transmitting data signals.
  • the method continues to next step 310 by assigning the public key to the user at receiving end.
  • the method continues to next step 312 by demodulating the received data signal to identify the correct data signal transmitted.
  • the method continues to next step 314 by encoding the transmitted data signal.
  • the method continues to next step 316 by decoding the received data signal by the user at receiving end and filtered to reduce the noise and interference.

Abstract

Exemplary embodiments of the present disclosure are directed towards a method for multi-user detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC). The method comprising sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals; and filtering and combining the at least one of the data signals for a key generation.

Description

SYSTEM AND METHOD FOR MULTI-USER DETECTION IN A WIRELESS
COMMUNICATION SYSTEM
TECHNICAL FIELD
[001] The present disclosure generally relates to the field of telecommunication systems. More particularly, the present disclosure relates to a system and method for multi-user detection in a wireless communication network.
BACKGROUND
[002] Generally, most of the telecommunication devices are operated over a wireless communication network employing technologies such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA). Generally, CDMA is the prominently used technology for wireless communications. The CDMA technology allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. In this CDMA a special code is assigned for each transmitter for transmitting signal from one device to other.
[003] As a number of users in a CDMA system transmit data to the base station at the same time, it will be difficult for the CDMA system to transmit signals to number of users without interference. However interference occurs in the communication system and also there are chances of losing the signal.
[004] Although relatively specific problems have been discussed, it should be understood that the embodiments disclosed herein should not be limited to solving the specific problems identified in the background.
BRIEF SUMMARY
[005] The following presents a simplified summary of the disclosure in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure and it does not identify key/critical elements of the invention or delineate the scope of the invention. Its sole purpose is to present some concepts disclosed herein in a simplified form as a prelude to the more detailed description that is presented later.
[006] Exemplary embodiments of the present disclosure are directed towards a method for multiuser detection (MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC).
[007] According to an exemplary aspect, the method includes sending at least one of the data signals by a plurality of users, modulating the at least one of the data signals and filtering and combining the at least one of the data signals for a key generation.
[008] According to an exemplary aspect, the method of key generation using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted and encoding the transmitting data signal and transmitting the encoded data signal to the user.
[009] According to an exemplary aspect, the method includes encoding data signal and decoding using elliptic curve cryptography includes generating a public key and a private key for at least one of the data signals and assigning the public key to a user, demodulating the received data signal to identify the correct data signal transmitted, encoding the transmitting data signal and transmitting the encoded data signal to the user and decoding the received data signal by the user and filtered to reduce the noise and interference.
BRIEF DESCRIPTION OF DRAWINGS
[010] Other objects and advantages of the present invention will become apparent to those skilled in the art upon reading the following detailed description of the preferred embodiments, in conjunction with the accompanying drawings, wherein like reference numerals have been used to designate like elements, and wherein:
[011] FIG. 1 is a diagram depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure. [012] FIG. 2 is a block diagram depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure.
[013] FIG. 3 is a flow diagram depicting a method for multiuser detection (MUD) in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure.
DETAILED DESCRIPTION
[014] It is to be understood that the present disclosure is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The present disclosure is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
[015] The use of "including", "comprising" or "having" and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. The terms "a" and "an" herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item. Further, the use of terms "first", "second", and "third", and the like, herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
[016] According to a non limiting exemplary embodiment of the present disclosure, a system and method for multi-user detection in a wireless communication network are disclosed.
[017] Referring to FIG. 1 is a diagram 100 depicting a system for multi user detection (MUD) for code division multiple access (CDMA), according to an exemplary embodiment of the present disclosure. [018] The system 100 includes handheld devices 102a, 102b ... 102n of users at sending end, and the handheld devices 108a, and 108b ... 108n of users at receiving end. The handheld devices may include a mobile phone, tablet, and the like, without limiting the scope of the disclosure. The data signals 104a, 104b ... 104n are transmitted from handheld devices 102a, 102b ... 102n of users at sending end to the handheld devices 108a, 108b ... 108n of users at receiving end through a channel 105. The data signal may include any communication signal, without limiting the scope of the disclosure. The data signals 104a, 104b ... 104n transmitted are separately modulated and filtered. The data signals 104a, 104b ... 104n are combined after filtration to generate a key.
[019] The key generation process is initiated using elliptic curve cryptography, for example. The public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user. The public key is to identify the appropriate transmitted signal sent from the handheld devices 102a, 102b ... 102n of users at sending end. The public key is sent to the receiving user and encoding operation is performed for the transmitted signal. In the encoding operation the data signal transmitted is converted into a specific form to receive the sent signal.
[020] Referring to FIG. 2 is a block diagram 200 depicting a system for multiuser detection (MUD) based code division multiple access (CDMA) using elliptic curve cryptography (ECC), according to an exemplary embodiment of the present disclosure. The system 200 includes handheld devices 102a, 102b ... 102n of users at sending end transmitting data signals 104a, 104b ... 104n through the same channel 105 and the data signals 104a, 104b ... 104n are modulated separately. The data signals 104a, 104b ... 104n are filtered and the entire signal is combined for a key generation.
[021] The steps for key generation using ECC:
Step 1 : Select a point R (x, y) on the elliptic curve.
Step 2: Select a prime number p and integer values for a and b.
Step 3: Select one point in the curve Ri = (x, , y ) Step 4: Select k value which is a random integer value. Step 5: Calculate Ra using the formula R2 = (xj , ) = k * Ri Step 6: Use Ri and R2 as public key and k as private key.
[022] The public and private keys are generated for each data signals 104a, 104b ... 104n transmitted and the public key is given to the receiving user. The public key is to identify the appropriate signal sent from the transmitting unit. The public key is sent to the receiving user and encoding operation is performed for the transmitting signal. The encoding and decoding operations are done by transmitter.
[023] The steps for the encoding operation are as follows:
Step 1 : Select h value in plain text p, which is a random integer value. Step 2: Calculate cipher text value using the equation given below, q = h * R!
Cj = ( Xpi , ypi ) + h * R2 Step 3: Generate a unique matrix from R
Step 4: Take unique elements present in the R matrix and calculate the sum of the unique elements i.e. d .
Step 5: Find the nearest square value of the sum value and take square root of the nearest square value i.e. f.
Step 6: Create a new matrix U with size f X f using the equations given below.
U(i*M+j) » R (0,0) ; if i U(i*M+j) » R (i,j) ; if R(i,j) «U
[024] The encoded data signal is received to the user at receiving end and decoded using ECC. [025] The steps for receiving the data signal by the user are:
m
where, sm is the signature waveform of the ΜΛ user. The formula to calculate signature waveform is as follows,
30 sm (0 =∑bm -pr (t - m-Ci ) m—0 where, t is the bit period, C; is the chip interval, dm is the input bit of the M"1 user, Am is the received amplitude of the M* user, g(t) is the additive white Gaussian noise.
The ECC the signature sequences is
Figure imgf000007_0001
m
Where, N is the length of the signature sequence.
The ECC cross-correlation matrix is defined as follows,
Figure imgf000008_0001
[026] The data signal is received and demodulated to get appropriate data signal transmitted from the user at sending end.
[027] The steps for decoding are as follows:
Step 1 : Calculate P using the private key g, after receiving the cipher text Cj and C i as follows:
(xpi . yp. ) = Cj - ( g *Ci )
Step 2: Read the characters from the coordinates (Xpj , ypi )■
[028] The next step after decoding operation is filtering. In the filtering process noise present in the data signal are reduced to obtain the exact data signal.
[029] Referring to FIG. 3 is a flow diagram 300 depicting a method for MUD in CDMA using elliptic curve cryptography, according to an exemplary embodiment of the present disclosure. The method starts at step 302 by transmitting the data signals by the user at sending end. The method continues to next step 304 by modulating the transmitted data signals. The method continues to next step 306 by filtering and combining the transmitted data signals for a key generation. The method continues to next step 308 by generating a public key and a private key for the transmitting data signals. The method continues to next step 310 by assigning the public key to the user at receiving end. The method continues to next step 312 by demodulating the received data signal to identify the correct data signal transmitted. The method continues to next step 314 by encoding the transmitted data signal. The method continues to next step 316 by decoding the received data signal by the user at receiving end and filtered to reduce the noise and interference.
[030] Although the present disclosure has been described in terms of certain preferred embodiments and illustrations thereof, other embodiments and modifications to preferred embodiments may be possible that are within the principles and spirit of the invention. The above descriptions and figures are therefore to be regarded as illustrative and not restrictive.
[031] Thus the scope of the present disclosure is defined by the appended claims and includes both combinations and sub combinations of the various features described herein above as well as variations and modifications thereof, which would occur to persons skilled in the art upon reading the foregoing description.

Claims

CLAIMS What is claimed is:
1. A method for multi-user detection(MUD) for code division multiple access (CDMA) system using elliptic curve cryptography (ECC), the method comprising: sending at least one of the data signals by a plurality of users; modulating the at least one of the data signals; and filtering and combining the at least one of the data signals for a key generation.
2. The method of claim 1, whereby key generation using elliptic curve cryptography comprising: generating a public key and a private key for at least one of the data signals and assigning the public key to a user; demodulating the received data signal to identify the correct data signal transmitted; and encoding the transmitting data signal and transmitting the encoded data signal to the user.
3. The method of claim 2, whereby encoding data signal and decoding using elliptic curve cryptography comprising: generating a public key and a private key for at least one of the data signals and assigning the public key to a user; demodulating the received data signal to identify the correct data signal transmitted; encoding the transmitting data signal and transmitting the encoded data signal to the user; and decoding the received data signal by the user and filtered to reduce the noise and interference.
4. The method of claim 2, wherein the public key is generated using elliptic curve cryptography.
5. The method of claim 2, wherein the filtering is done to reduce the noise and interference and to obtain the exact data signal.
6. The method of claim 3, wherein the encoding and decoding operations are done by transmitter.
PCT/IB2016/054382 2015-07-22 2016-07-22 System and method for multi-user detection in a wireless communication system WO2017013628A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN3776/CHE/2015 2015-07-22
IN3776CH2015 IN2015CH03776A (en) 2015-07-22 2016-07-22

Publications (1)

Publication Number Publication Date
WO2017013628A1 true WO2017013628A1 (en) 2017-01-26

Family

ID=54398026

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2016/054382 WO2017013628A1 (en) 2015-07-22 2016-07-22 System and method for multi-user detection in a wireless communication system

Country Status (2)

Country Link
IN (1) IN2015CH03776A (en)
WO (1) WO2017013628A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080173717A1 (en) * 1998-10-02 2008-07-24 Beepcard Ltd. Card for interaction with a computer
US20100124330A1 (en) * 2004-03-17 2010-05-20 Best Fiona S Secure transmission over satellite phone network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080173717A1 (en) * 1998-10-02 2008-07-24 Beepcard Ltd. Card for interaction with a computer
US20100124330A1 (en) * 2004-03-17 2010-05-20 Best Fiona S Secure transmission over satellite phone network

Also Published As

Publication number Publication date
IN2015CH03776A (en) 2015-07-31

Similar Documents

Publication Publication Date Title
Yang et al. System design and performance analysis of orthogonal multi-level differential chaos shift keying modulation scheme
US6496104B2 (en) System and method for communication via power lines using ultra-short pulses
KR102114719B1 (en) System and method for low peak to average power ratio multiple access communications
US20080279287A1 (en) Code Type Transmitting Device and Code Type Receiving Device
AU2016340834B2 (en) Method and apparatus for communicating data in a digital chaos cooperative network
US10277438B2 (en) Method and apparatus for communicating data in a digital chaos communication system
WO2016062120A1 (en) Multi-user communication method and apparatus of code division multiple access
TW201018148A (en) Dynamic scrambling techniques for reducing killer packets in a wireless network
US8873604B2 (en) Method and apparatus for multiple signal aggregation and reception in digital chaos network
CA2995500C (en) A differential chaos shift keying (dcsk) based on hybrid chaotic system
US20050021308A1 (en) Methods and systems for transmitting digital messages
JP2011035921A5 (en)
CN106160787A (en) A kind of data transmission method and device
Dai et al. Two-layer carrier index modulation scheme based on differential chaos shift keying
Nain et al. A reliable covert channel over IEEE 802.15. 4 using steganography
CN106357576B (en) Correlation delay keying chaos communication method based on hadamard matrix
US20040071195A1 (en) Method and electronic device for a spread spectrum signal
US11539463B2 (en) Methods and computing device for facilitating multiple access in a wireless communication network
EP3416319B1 (en) Information transmission method and apparatus
CN101496330B (en) Code interleaving for walsh codes
CN106411467B (en) Information sending, receiving method and device based on chirp signal
CN109962763B (en) Multi-user data transmission method, device and equipment
WO2017013628A1 (en) System and method for multi-user detection in a wireless communication system
US8275020B1 (en) Secure communication using a non-differentiable waveform
WO2016082735A1 (en) Transmitter diversity transmission method, sending-end device and receiving-end device for fbmc

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16827351

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16827351

Country of ref document: EP

Kind code of ref document: A1