Back to Search Start Over

How to Identify and Authenticate Users in Massive Unsourced Random Access

Authors :
Beatriz Soret
Israel Leyva-Mayorga
Radoslaw Kotaba
Maxime Guillaud
Anders E. Kalør
Garcia Ordonez Luis
Petar Popovski
Source :
Kotaba, R, Kalør, A E, Popovski, P, Leyva-Mayorga, I, Soret, B, Guillaud, M & Luis, G O 2021, ' How to Identify and Authenticate Users in Massive Unsourced Random Access ', I E E E Communications Letters, vol. 25, no. 12, 9564037, pp. 3795-3799 . https://doi.org/10.1109/LCOMM.2021.3118882
Publication Year :
2021
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2021.

Abstract

Identification and authentication are two essential features for traditional random access protocols. In ALOHA-based random access, the packets usually include a field with a unique user address. However, when the number of users is massive and relatively small packets are transmitted, the overhead of including such field becomes restrictive. In unsourced random access (U-RA), the packets do not include any address field for the user, which maximizes the number of useful bits that are transmitted. However, by definition an U-RA protocol does not provide user identification. This letter presents a scheme that builds upon an underlying U-RA protocol and solves the problem of user identification and authentication. In our scheme, the users generate a message authentication code (MAC) that provides these functionalities without violating the main principle of unsourced random access: the selection of codewords from a common codebook is i.i.d. among all users.

Details

ISSN :
23737891 and 10897798
Volume :
25
Database :
OpenAIRE
Journal :
IEEE Communications Letters
Accession number :
edsair.doi.dedup.....049a9d62af392913cdab67a9aa6793ec
Full Text :
https://doi.org/10.1109/lcomm.2021.3118882