{"title":"交错多址:新一代竞争对手的安全性分析","authors":"A. Basharat, I. Khokhar, S. Murtaza","doi":"10.1109/ICWMC.2008.57","DOIUrl":null,"url":null,"abstract":"Interleave Division Multiple Access (IDMA) is one of the competitors for next generation wireless systems. IDMA not only inherits all the advantages of CDMA but also has the capability to overcome its deficiencies. In this paper, security analysis of IDMA system has been carried out through NIST tests and it has been found that it is highly secure on its own, not requiring any additional security device. In other words, IDMA exhibits security features of an efficient crypto system.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security Analysis of Interleave-Division Multiple Access: Next Generation Competitor\",\"authors\":\"A. Basharat, I. Khokhar, S. Murtaza\",\"doi\":\"10.1109/ICWMC.2008.57\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Interleave Division Multiple Access (IDMA) is one of the competitors for next generation wireless systems. IDMA not only inherits all the advantages of CDMA but also has the capability to overcome its deficiencies. In this paper, security analysis of IDMA system has been carried out through NIST tests and it has been found that it is highly secure on its own, not requiring any additional security device. In other words, IDMA exhibits security features of an efficient crypto system.\",\"PeriodicalId\":308667,\"journal\":{\"name\":\"2008 The Fourth International Conference on Wireless and Mobile Communications\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The Fourth International Conference on Wireless and Mobile Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWMC.2008.57\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Wireless and Mobile Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWMC.2008.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Analysis of Interleave-Division Multiple Access: Next Generation Competitor
Interleave Division Multiple Access (IDMA) is one of the competitors for next generation wireless systems. IDMA not only inherits all the advantages of CDMA but also has the capability to overcome its deficiencies. In this paper, security analysis of IDMA system has been carried out through NIST tests and it has been found that it is highly secure on its own, not requiring any additional security device. In other words, IDMA exhibits security features of an efficient crypto system.