DOI QR코드

DOI QR Code

Develop an Effective Security Model to Protect Wireless Network

  • 투고 : 2021.03.05
  • 발행 : 2021.03.30

초록

Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

키워드

참고문헌

  1. Padala, A. N. S. R., &Kommana, K. (2018),Performance of physical layer security with different service integrity parameters.
  2. Li, X., Wang, H., Dai, H. N., Wang, Y., & Zhao, Q. (2016), An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things, Mobile Information Systems, 2016.
  3. Wu, Y., Khisti, A., Xiao, C., Caire, G., Wong, K. K., &Gao, X. (2018), A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. arXiv preprint arXiv:1801.05227.
  4. Zou, Y., Zhu, J., Wang, X., &Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765. https://doi.org/10.1109/JPROC.2016.2558521
  5. Devi, L., &Suganthi, A. (2014). Denial of service attacks in wireless networks: The case of jammers. Int. J. Comput. Sci. Mobile Comput., 3(1), 548-558.
  6. Tupakula, U., &Varadharajan, V. (2013), Security techniques for counteracting attacks in mobile healthcare services. Procedia Computer Science, 21, 374-381. https://doi.org/10.1016/j.procs.2013.09.049
  7. OOzanKoyluoglu, Can EmreKoksal, and Hesham El Gamal. On secrecy capacity scaling in wireless networks, IEEE Trans. Inf. Theory, 58(5):3000-3015, 2012. https://doi.org/10.1109/TIT.2012.2184692
  8. HyoungsukJeon, Namshik Kim, Jinho Choi, Hyuckjae Lee, and JeongseokHa. Bounds on secrecy capacity over correlated ergodic fading channels at high snr. IEEE Trans. Inf. Theory, 57(4):1975-1983, Apr. 2011. https://doi.org/10.1109/TIT.2011.2112190
  9. Weng Chon Ao and Kwang-Cheng Chen. Broadcast transmission capacity ofheterogeneous wireless ad hoc networks with secrecy outage constraints. In IEEEGlobal Telecommunications Conference (GLOBECOM), pages 1-5, 2011.
  10. Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015), Improving physical-layer security in wireless communications using diversity techniques , IEEE Network, 29(1), 42-48. https://doi.org/10.1109/MNET.2015.7018202