Design and analysis of physical layer security aspects in MIMO-OFDM based WiMAX network

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The protocol 802.16 of the IEEE proposed a technology of wireless broadband called WiMAX which overcomes the limitations of other wireless technologies that came prior to WiMAX. WiMAX has acquired significant attention owing to its mobility support, longer trans-mission range and higher transmission rate. In order to ensure usability and reliability, a number of security concerns are required to be addressed in WiMAX. The first part of this work is to analyze the performance of a MIMO-OFDM based WiMAX under Rayleigh fading channel using SIMULINK environment under diverse encoding algorithms and adaptive modulation schemes in terms of throughput and bit-error-rates. The second objective being its performance analysis using various standard cryptographic algorithms such as Rivest-Shamir-Adleman (RSA), Data Encryption Standard (DES) and Advanced Encryption Standard (AES), which enhances the security and efficiency of a WiMAX networks.

     

     


  • Keywords


    AES; DES; MIMO Alamouti; OFDM; RSA; STBC.

  • References


      [1] S. Bhambure, A.D. Jadhav and S.A. Shirsat, “Simulation of IEEE 802.16e physical layer”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol. 7, Issue 4, (2013), e-ISSN: 2278-2834, p- ISSN: 2278-8735, pp 23-28, available online: http://www.iosrjournals.org/iosr-jece/papers/Vol7-Issue4/E0742328.pdf.

      [2] T. S. Rappaport, Wireless Communications, Upper Saddle River, NJ: Prentice Hall, (1996), Chap. 3 & 4.

      [3] H. Schulze and C. Luders, Theory and Applications of OFDM and CDMA: Wideband Wireless Communications, John Wiley and Sons, (2005). https://doi.org/10.1002/0470017406.

      [4] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access, John Wiley and Sons, (2007). https://doi.org/10.1002/9780470319055.

      [5] V. Tarokh, N. Seshadri, and A. Calderbank, “Space-time block codes from orthogonal designs”, IEEE Trans. Information Theory, Vol. 45, (1999), pp. 1456-1467, https://doi.org/10.1109/18.771146.

      [6] S. Alamouti, “A simple transmit diversity technique for wireless communications”, IEEE Journal on Selected Areas in Communications, Vol. 16, (1998), pp. 1451-1458, https://doi.org/10.1109/49.730453.

      [7] D. Gesbert, M. Shafi, D. Shiu, P. J. Smith and A. Naguib, “From theory to practice: An overview of MIMO space-time coded wireless systems”, IEEE Journal on Selected Areas in Communications, Vol. 21, No. 3, (2003), https://doi.org/10.1109/JSAC.2003.809458.

      [8] D.W. Bliss, K.W. Forsythe and M. C. Amanda, “MIMO Wireless Communication, Lincoln Laboratory Journal, Vol.15, No.1, (2005).

      [9] R.S. Bansode and P. Borole, “Hardware implementation of an OFDM transceiver for 802.11n systems”, International Journal of Scientific and Engineering Research, Vol. 4, Issue 6, (2013).

      [10] R.K. Jha and U. D. Dalal, “A performance comparison with modulation schemes in WiMAX physical layer security aspect”, International Journal of Computer Applications (0975 – 8887), Vol. 6, No.8, (2010).

      [11] O. Verma, R. Agarwal, D. Dafouti, and S. Tyagi, “Performance analysis of data encryption algorithms”, Proceedings of the third International Conference on Electronics Computer Technology (ICECT), (2011), pp. 399-403.

      [12] H. Wang, Z. Song, X. Niu and Q. Ding, “Key Generation Research of RSA Public Cryptosystem and Matlab Implement”, Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), (2013), https://doi.org/10.1109/SNS-PCS.2013.6553849.

      [13] S.M. Seth and R. Mishra, “Comparative analysis of encryption algorithms for data communication”, International Journal of Computer Science and Technology (IJCST), Vol. 2, Issue 2, (2011), available online: http://www.ijcst.com/vol22/2/shashi.pdf.

      [14] D.L. Kumar, A.R. Reddy and S.A.K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB”, International Journal of Engineering Trends and Technology (IJETT), Vol. 33, No. 3, (2016).


 

View

Download

Article ID: 14993
 
DOI: 10.14419/ijet.v7i4.14993




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.