Design and analysis of physical layer security aspects in MIMO-OFDM based WiMAX network


  • Budhaditya Bhattacharyya VIT University, India
  • Ipsita Deb VIT University, India
  • Nalini Sharma VIT University, India







The protocol 802.16 of the IEEE proposed a technology of wireless broadband called WiMAX which overcomes the limitations of other wireless technologies that came prior to WiMAX. WiMAX has acquired significant attention owing to its mobility support, longer trans-mission range and higher transmission rate. In order to ensure usability and reliability, a number of security concerns are required to be addressed in WiMAX. The first part of this work is to analyze the performance of a MIMO-OFDM based WiMAX under Rayleigh fading channel using SIMULINK environment under diverse encoding algorithms and adaptive modulation schemes in terms of throughput and bit-error-rates. The second objective being its performance analysis using various standard cryptographic algorithms such as Rivest-Shamir-Adleman (RSA), Data Encryption Standard (DES) and Advanced Encryption Standard (AES), which enhances the security and efficiency of a WiMAX networks.




[1] S. Bhambure, A.D. Jadhav and S.A. Shirsat, “Simulation of IEEE 802.16e physical layerâ€, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol. 7, Issue 4, (2013), e-ISSN: 2278-2834, p- ISSN: 2278-8735, pp 23-28, available online:

[2] T. S. Rappaport, Wireless Communications, Upper Saddle River, NJ: Prentice Hall, (1996), Chap. 3 & 4.

[3] H. Schulze and C. Luders, Theory and Applications of OFDM and CDMA: Wideband Wireless Communications, John Wiley and Sons, (2005).

[4] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access, John Wiley and Sons, (2007).

[5] V. Tarokh, N. Seshadri, and A. Calderbank, “Space-time block codes from orthogonal designsâ€, IEEE Trans. Information Theory, Vol. 45, (1999), pp. 1456-1467,

[6] S. Alamouti, “A simple transmit diversity technique for wireless communicationsâ€, IEEE Journal on Selected Areas in Communications, Vol. 16, (1998), pp. 1451-1458,

[7] D. Gesbert, M. Shaï¬, D. Shiu, P. J. Smith and A. Naguib, “From theory to practice: An overview of MIMO space-time coded wireless systemsâ€, IEEE Journal on Selected Areas in Communications, Vol. 21, No. 3, (2003),

[8] D.W. Bliss, K.W. Forsythe and M. C. Amanda, “MIMO Wireless Communicationâ€, Lincoln Laboratory Journal, Vol.15, No.1, (2005).

[9] R.S. Bansode and P. Borole, “Hardware implementation of an OFDM transceiver for 802.11n systemsâ€, International Journal of Scientific and Engineering Research, Vol. 4, Issue 6, (2013).

[10] R.K. Jha and U. D. Dalal, “A performance comparison with modulation schemes in WiMAX physical layer security aspectâ€, International Journal of Computer Applications (0975 – 8887), Vol. 6, No.8, (2010).

[11] O. Verma, R. Agarwal, D. Dafouti, and S. Tyagi, “Performance analysis of data encryption algorithmsâ€, Proceedings of the third International Conference on Electronics Computer Technology (ICECT), (2011), pp. 399-403.

[12] H. Wang, Z. Song, X. Niu and Q. Ding, “Key Generation Research of RSA Public Cryptosystem and Matlab Implementâ€, Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), (2013),

[13] S.M. Seth and R. Mishra, “Comparative analysis of encryption algorithms for data communicationâ€, International Journal of Computer Science and Technology (IJCST), Vol. 2, Issue 2, (2011), available online:

[14] D.L. Kumar, A.R. Reddy and S.A.K. Jilani, “Implementation of 128-bit AES algorithm in MATLABâ€, International Journal of Engineering Trends and Technology (IJETT), Vol. 33, No. 3, (2016).

View Full Article: