Professional Documents
Culture Documents
Synopsis
On
Submitted to
Of
DOCTOR OF PHILOSOPHY
In
SANSKRITI SHARMA
(MATS UNIVERSITY)
Department of Electronics and Telecommunication
Session: 2018 onwards
1
Abstract
OFDM Wireless communications is employed in latest technology and plays a vital and
important role in day to day life. The broadcasting phenomenon of radio propagation leads
wireless communications to malicious and unrecognized attacks, and leads to several critical
challenges in securing the wireless transmission. We are hereby inspired and motivated by the
insufficiency of traditional older approaches to secure wireless communications, hence the
physical layer security of the multiplexing channel is investigated to be the most important
phenomenon to reach the maximum level of accuracy in any channel medium. Few linked
techniques toward the OFDM channel security of wireless communications are proposed by us.
The first two techniques will obviously focus on the security risk assessment in ofdm wireless
networks to enable a situation-alert based protection. The later techniques will use wireless
medium features to enhance the built-in security of wireless communication systems, so as to
prevent all types of passive eavesdropping. The last technique will provide a confidential
signaling link for secure transmitter-receiver interaction in OFDM systems.
Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text
protecting it from adversaries. However, with the advent of powerful computers, there is a need for
increasing the complexity of such techniques. To increase the strength of this classical encryption
technique, the proposed modified algorithm uses the concepts of affine ciphers, transposition ciphers and
randomized substitution techniques to create a cipher text which is nearly impossible to decode.
A safest level alert scheme is proposed in this dissertation, where the number of active users in
a multipath fading environment is estimated.
We will then imply any of the cryptographic technique at the starting of transmission.With the
help of which the data to be transmitted will get encoded.Similarly at the end of the receiver the
modulated transmitted data will be retrieved by decoding the channel using the same
cryptographic medium.Hence the channel and data will remail unuttered and accurate .And the
result will be obtain in the form of higher efficiency of Ofdm channel.
Key words:
Wireless communications, encoding,decoding, OFDM, security level
alert, eavesdropping.
2
1.Introduction
The Telecommunications industry faces the problem of providing telephone services to rural areas,
where the customer base is small, but the cost of installing a fixed wired phone network is very high. One
method of reducing the high infrastructure cost of a wired system is to use a fixed wireless radio network.
The problem with this is that for rural and urban areas, large cell sizes are required to obtain sufficient
coverage. This result in problems caused by large signal path loss and long delay in multipath signal
propagation. Global System for Mobile telecommunication (GSM) technology is being applied to fixed
wireless phone system. However GSM uses TDMA, which has a high symbol rate leading to problems
with multipath causing inter-symbol interference. Several techniques are under consideration for next
generation of digital phone systems, with the aim of improving cell capacity, multipath immunity and
flexibility. These include Code Division Multiple Access (CDMA) and Coded Orthogonal Frequency
Division Multiplexing (COFDM). Both of these techniques could be applied to provide a fixed wireless
network in rural areas. OFDM has more advantages over CDMA. The OFDM was developed in the year
1960’s but because of unavailability of softwares for implementation of OFDM and the components
which work on high frequencies was not in focus. Due to the inherent broadcast nature of radio
signal propaga-
tion, wireless communications is vulnerable to masses of malicious attacks, including
eavesdropping, jamming, spoofing and so on [1]. Hence, securing wireless communication
systems has become a critical issue along with the proliferation of wireless applications [1].
A simple example of FDM is the use of different frequencies for each FM (Frequency Modulation)
radio stations. All stations transmit at the same time but do not interfere with each other because they
transmit using different carrier frequencies. Additionally they are bandwidth limited and are spaced
sufficiently far apart in frequency so that their transmitted signals do not overlap in the frequency domain.
At the receiver, each signal is individually received by using a frequency tuneable band pass filter to
3
selectively remove all the signals except for the station of interest. This filtered signal can then be
demodulated to recover the original transmitted information.
4
The transmitted signal is striked by several objects placed and located in between the transmitter and the
receiver.So,noise and other unwanted errors of surroundings get added to the original signal and the
original one is not retrieved at the receiver end .This adding up of noise to the transmitted signal is shown
in above figure.
The received radio signal from a transmitter consists of typically a direct signal, plus
reflections off objects such as building, mountings and other structures. The reflected signals arrive at a
later time then the direct signal because of the extra path length, giving rise to a different arrival times,
spreading the received energy in time. Delay spread is the time spread between the arrival of the first and
last significant multipath signals seen by the receiver. The faster the phase is varied the faster the symbol
rate and the higher the data rate and bandwidth. For OFDM transmission, each symbol corresponds to a
parallel transmission of many low bandwidth carriers. The symbol time in this case corresponds to the
period over which the amplitude and phase of the data carriers is remained fixed corresponding to one
data vector.
5
1.2.3 BASIC PRINCIPLE OF MIMO OFDM
Multiple-input multiple-output (MIMO) antennas can be combined with orthogonal frequency
division multiplexing (OFDM) to achieve diversity gain and/or to increase system spectral efficiency
through spatial multiplexing. In this report, we discuss about the working of the transceiver of OFDM
with MIMO. Implementation of high-data-rate wireless local area network (WLAN) has been a major
focus of research in recent years. Multiple-input multiple-output (MIMO) schemes and orthogonal
frequency division multiplexing (OFDM) can be combined to operate at the high-throughput mode, or
the diversity mode, or the combination of both in fading environments .
Alternatively, the relative capacity and throughput of different system configurations can be obtained by
using the channel characteristics. If analytical characterizations of the channel are available, this approach
will be more efficient than the former, as it does not require complex system-level simulations.
2.Problem Identification
2.2 Attacks-
The most common forms of passive and active attacks in wireless communications are listed as
follows:
Eavesdropping: Eavesdropping is the act that an attacker, named eavesdropper,
passively listens to a network and intercepts the ongoing traffic [2]. Due to the openness of
wireless medium, an eavesdropper is possible to access the data stream as long as it lies in the
coverage of the transmitter. In the case that communication protocols are known by the
eavesdropper, it can simply follow those protocols like normal participants and then intercept the
sensitive and private information.
Injection and Data Modification: Injection happens when an attacker adds com-
8
mands and data to the existing connection to hijack the ongoing communication, or maliciously
send commands and data to manipulate the available resource [2].
Moreover, adversaries can flood the network access point with connection messages, thereby
tricking the network access point into exceeding a maximum limit and then denying authorized
user access to the network [20]. Data modification refers to an attack in which an aggressor
adds, deletes or even changes the network communication contents [2].
The classification of these security attacks is shown in Table 2.1. Under active attacks,
communication anomalies can normally provide demonstrable evidence of malicious attacks, so
that legitimate terminals can easily detect the attackers and
then launch corresponding defending operations. In contrast, passive attacks without leaving
much evidence about their illegal behaviors are difficult to be detected. Sensitive and private
information may be intercepted by adversaries without the awareness of the communicating
pair. The threats from eavesdropping and traffic analysis would be inherent risks in wireless
networks that cannot be avoided [1]. Please note that malicious attacks typically do not stand
alone. Adversaries usually coordinate several attacks to further the damage, where passive
attacks such as eavesdropping and traffic analysis are essentially used to gather information for
other forms of attacks. Therefore, as the foundation of malicious attacking and with the counter-
detection feature, passive attacks can cause fatal damage to a wireless communication system.
It is also noteworthy that the risks and threats in wireless communications are time- and
location-varying, due to the variations of channel conditions, surrounding devices as well as
roles played by coexistent users.
Securing communication systems has been a problem of interest since the time of conception of
network based communications [17]. The concept of secure communication is linked to two
main desired objectives: effective defending against malicious attacks and reliable transmission
between legitimate users. The first objective indicates that a communication system should
protect the Confidentiality authenticity,integrity, and availability of data transmission, by
defending against various attacks [14, 21], where;
Confidentiality denotes the property that the transmitted information is prevented from
unauthorized individuals, entities or processes;
Authenticity is to provide the assurance of the identities of communicating nodes, which ensures
that a received message comes from a desired transmitter and vice versa;
9
whenever it is demanded by a legitimate entity.
With regard to the second objective, a message for an intended receiver should be
reliably received by that user. In other words, the demodulation error rate at the
legitimate receiver needs to satisfy an acceptable requirement.
In addition, since the risks and threats in wireless networks are time and location
varying, the solutions to secure wireless communication systems need to be evaluated
and updated regularly. In order to effectively and efficiently defend against the ma-
licious attacks, a wireless device should intelligently perform proper security schemes
corresponding to the real-time communication risk in an operating environment.
4. Algorithm
4.1.1 Encryption
1) Create a matrix of N x N.
2) Input the plaintext to be encrypted and a password (key) of size N.
3) From the input password (key) generate two sub keys ckey1 and ckey2 using KeyGenerator() function.
4) Call initialize() function to create two substitution tables.
5) Create ciphertext1 by replacing each character in plaintext by values assigned in the substitution table - map in step 4
6) Perform double columnar transformation using ckey2 which was generated by KeyGenerator() function.
7) Transmit the ciphertext generated in step 6.
4.1.2 Decryption
1) Create a matrix of N x N.
2) Input the ciphertext to be decrypted and a password (key) of size N.
3) From the input password (key) generate two sub keys ckey1 and ckey2 using KeyGenerator() function.
4) Call initialize() function to create substitution tables.
5) Perform reverse Columnar transformation twice using ckey2 which was generated by KeyGenerator() function.
6) Generate plaintext by replacing each character in the string obtained by step 5 by values assigned in the substitution table -
inversemap in step 4
5.Conclusion
In this proposal, the limitations and weaknesses of classical encryption algorithms like
Caesar cipher and Transposition cipher are described.Then a modified Caesar algorithm is
proposed to overcome all the weaknesses and limitations of Caesar cipher. The proposed
algorithm uses a randomized approach for substitution which is then combined with double
columnar transposition technique to increase the strength. The broadcast nature of wireless
transmission has made this technology vulnerable to passive and active attackers, mainly
eavesdroppers who are able to capture, decode and recover the transmitted signals with sufficient
power . Conventionally, communication security is viewed as an independent feature and is
10
addressed at the upper layers of the protocol stack by applying traditional cryptographic schemes
(data link layer and above) .
Security provided by this algorithm can be enhanced further by using it with one or more
different encryption algorithms or by using asymmetric key approach instead of symmetric
key.
References
13