From: A downlink non-orthogonal multiple access scheme having physical layer security
Allocation pattern | ||
---|---|---|
Signal keys | No. of chaos processing | |
I | c00, 1 ≠ c00, 2 ≠ ⋯ ≠ c00, K | Ite1 = Ite2 = ⋯ = IteK = Ite |
II | c00, 1 = c00, 2 = ⋯ = c00, K | Iteh = Ite + 3(h − 1), (h = 1, ⋯, K) |
III | c00, 1 ≠ c00, 2 ≠ ⋯ ≠ c00, K | Iteh = Ite + 3(h − 1), (h = 1, ⋯, K) |
IV | c00, 1 = c00, 2 = ⋯ = c00, K | Ite1 = Ite2 = ⋯ = IteK = Ite |