How to Identify and Authenticate Users in Massive Unsourced Random Access

04/21/2021
by   Radosław Kotaba, et al.
0

Identification and authentication are two basic functionalities of traditional random access protocols. In ALOHA-based random access, the packets usually include a field with a unique user address. However, when the number of users is massive and relatively small packets are transmitted, the overhead of including such field becomes restrictive. In unsourced random access (U-RA), the packets do not include any address field for the user, which maximizes the number of useful bits that are transmitted. However, by definition an U-RA protocol does not provide user identification. This paper presents a scheme that builds upon an underlying U-RA protocol and solves the problem of user identification and authentication. In our scheme, the users generate a message authentication code (MAC) that provides these functionalities without violating the main principle of unsourced random access: the selection of codewords from a common codebook is i.i.d. among all users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/11/2022

Common Message Acknowledgments: Massive ARQ Protocols for Wireless Access

Massive random access plays a central role in supporting the Internet of...
research
06/14/2021

A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access Authentication

Anonymous access authentication schemes provide users with massive appli...
research
03/30/2023

Active User Identification in Fast Fading Massive Random Access Channels

Reliable and prompt identification of active users is critical for enabl...
research
06/30/2020

Identifying Packet Loss and Reordering Packets in Keyed UDP Transmissions

The User Datagram Protocol (UDP) and other similar protocols send the ap...
research
05/26/2021

Random Access Based on Maximum Average Distance Code for Massive MTC in Cellular IoT Networks

Code-expanded Random Access (CeRA) is a promising technique for supporti...
research
01/08/2018

Behavioural Analytics: Beyond Risk-based MFA

This paper investigates how to effectively stop an attacker from using c...
research
01/11/2018

A Monetary Mechanism for Stabilizing Cooperative Data Exchange with Selfish Users

This paper considers the problem of stabilizing cooperative data exchang...

Please sign up or login with your details

Forgot password? Click here to reset