17 views

Uploaded by Ijarcet Journal

- 10.1.1.110.6662
- HCS (Hierarchical Cell Structure) System for MBMS in UMTS Networks
- STBC-SM
- Capacity Evaluation of a High Altitude Platform Diversity System Equipped with Compact MIMO Antennas
- nplus.pdf
- Main Study
- Detail MIMO Wireless Communications
- 10[1].1.1.133
- Physical layer security of multiple-input– multiple-output systems with transmit beamforming in Rayleigh fading
- 2Sande 201
- VTC 09c Spring Submitted Version
- 309 MR151123 Navyashri Paper V0
- 01424535
- CourseDescription_RA4121-30A
- MIMO OFDM
- gpt1e0110
- Final Year Project Ideas
- LTE Throughput Calculation _ LTE Tutorial
- Atoll 3.2
- CompanionGuide_802.11n_091907

You are on page 1of 5

Secured communication technique for MIMO based wireless network using codebook and multiplexing methodology

1

R.RAICHEAL, 2C.ARUNACHALAPERUMAL,

The wire-tap channel, is one of the solution of information-theoretic security, was introduced in [1], the ergodic secrecy capacity is calculated for fading wiretap channels in [2]. In wireless channels, when the number of antenna increases the fading can be reduced, and transmission rates can be increased . In [3] the secrecy capacity of the Gaussian multiple-input multiple-output (MIMO) wire-tap channel are found, when the source s and the destination d have two antennas each and the attacker e has only a single antenna. Outage probability for a target secrecy rate is shown in [4], when s, d and e have CSI, and optimal power allocation minimize the outage probability are calculated. The DMT is a high SNR analysis. The diversity gain decays the rate of the probability of error, and the multiplexing gain is the rate of increase of the transmission rate in the limit of high SNR. In this paper we investigate the code generation and the cryptographic methods[5] in the multipleantenna wire-tap channel. Under CSIT, we study the effect on secrecy from a codebook based transmission beamforming with limited receiver feedback. Codebook beamforming [6], [7] has become commonly adopted in practice [8], [9] for reducing the amount of feedback overhead. The idea behind this scheme is the use of wiretap code. By using a stochastic encoder to map the secret message into many codewords according to an appropriate probability distribution, the sender can hide the secret information in the noise on wiretappers channel. We see about the secret outage probability in II.A, code book generation in III, and feedback method in IV. II. SYSTEM MODEL AND PRELIMINARIES: We consider fig1, multiple-antenna wire-tap channel, in which s, d and e have , and antennas. Both d and e have CSI about their incoming channels. For each channel, the received signal is represented as follows: Yd = HdX + Nd (1) Ye = HeX + Ne. (2) In the above equations X is an 1 vector, which is the transmitted s signal. Yd and Ye are 1 and 1 vectors, shows the received signals at d and e. Then Nd and Ne are 1, and 1 vectors that indicate the independent additive noise at d and e. Both (Nd , Ne) and (Hd, He) have independent and identically distributed (i.i.d.) complex Gaussian entries with zero

Abstract--In this paper we study about the Secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed. Index terms Diversity multiplexing tradeoff MIMO, transmission beamforming, codebook, information-theoretic security, secrecy outage probability I. INTRODUCTION: As the wireless medium the communication is being shared there is much more possibility of stealing the confidential informations. In any region of the transmitter the stealer can present and he can be more advantageous than the information producer. The confidential information such as user IDs, passwords, or credit card numbers become vulnerable if he is present near to the transmitter antenna. Then, wireless security is an essential system requirement. In existing wireless systems, protection against stealing is provided at higher layers of the Open Systems Interconnection (OSI) reference model. Therefore, key exchange and renewal may be difficult.

Manuscript received on April 2012 1 M.E(Communication systems) S.A Engineering College, Chennai 77. 2 Asst. Professor,,Dept of P.G. Studies,S.A Engineering College, Chennai -77.

50

ISSN: 2278 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012

mean and unit variance. Hd, He are of size , and . They indicate the channel gains between s and d and the s and e. Since the fading is slow, Hd and He are fixed for the whole duration of the communication. When there is no secrecy, the error probability is dominated by the outage event. The DMT,d (), establishes a relation between the target transmission rate ()(SNR) and probability of error (SNR), where is the multiplexing gain. Therefore the secrecy depends on the remaining degrees of freedom in this system is min{, }, and can increase up to this value. The maximum diversity gain is , and it decreases as the multiplexing gain increases. Under secrecy constraints, the source has to send the message , So the secrecy rate, is achieved if the secrecy constraint is satisfied; i.e. = lim (3)

channel codeword X1 . Note that is the number of dummy code words used to confuse e for each . With full CSI at s and d, () is set to , and R() = (X;Ye). The total number of code words in the s codebook is = 2(X;Yd), and the d can decode W using a. The attacker can decode only the index b and there will no information about the secret message a. Thus secrecy is achieved. For average power constraint m-SNR that the transmitter has to satisfy for each codeword transmitted. The secret multiplexing gain is defined as, lim

SNR

(6)

=lim

(4)

the above equation shows how fast the target secrecy rate scales with increasing SNR. The secret diversity gain, ds, is equal to Lim

SNR

The probability of decoding error at the d approaches zero as approaches infinity. The term lim

ds,

(7)

rate.

where Pe(SNR) denotes the probability of error under secrecy constraints. Two events are considered :Either the destination does not receive the secret message reliably, or secrecy is not achieved. Then Pe(SNR) = P (secrecy not achieved, main channel decoding error) (8) (secrecy not achieved)+ (main channel decoding error), Where (secrecy not achieved) ( lim

Destination D

D

(9)

Source S

Attacker E

1 ( e ) < () (SNR)) N

(10)

Fig1: Basic System Model =2() (SNR)+()(SNR), (secrecy not achieved) defined in (8) can be calculated as (secrecy not achieved) = (()(SNR) (X;Ye) < ()(SNR)) = ((X;Ye) > ()(SNR)). (11) Finally, as the main channel outage event dominates the main channel decoding error when the channel block length-N is long enough and good codes are used ,

The H( ) denotes the mutual sharing information between e. The papers, prove that the secrecy rate.

= [(X;Yd) (X;Ye)]+

(5)

is achievable for any input distribution (X), where + denotes max{0, }. Define = 2 , = 2 and the sets = {1, ...,} and = {1, ...,}. The source generates channel codewords X1 i.i.d. with (X). In order to send a secret message a , the source chooses uniformly from the set , forms = (, ) and maps into the

() ()

(main channel decoding error) = (main channel outage) = ((X;Yd) < ()(SNR)).

Lower bound is given as follows

(12)

51

ISSN: 2278 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012

((X;Yd) (X;Ye) < () (SNR)) (secrecy rate outage), (13) for the chosen achievable scheme with (X). If many antennas are considered power constraint will be larger. A. Definition Of Secrecy Outage Probability: To achieve secrecy, s encodes the secret message using a scalar Gaussian wiretap code and transmits in the direction of q. When the input signaling is Gaussian, then the difference of mutual information between s-to-d is Rd and between s-to-e Re is an achievable rate. This implies that when s knows the channel information to both d and e, she can design a wiretap code such that d can receive data at a rate Re Rb, whereas d receives no secret information. When no channel information is present from e, s can give information to d. Without es channel information, s will set the wiretap code to operate at an arbitrary rate R. If Rb Re R, then secrecy is achieved. If, Rb Re < R, then e can eavesdrop at a positive rate so no secrecy is there it is also known as secrecy outage. For any positive R, the secrecy outage probability characterizes an achievable secrecy rate which is also decodable by d. For a target secrecy rate R and transmission power R, secrecy outage probability can be expressed as

Key Generator

CB Generator

Code book

Character set

We denote d = 2(1/) and = 2(1/), and we set = / = /d. III. CODE BOOK GENERATION: In our system it works by the basis of a Codebook (CB), without the needing of a key to be shared. Maintaining of sessions is done to renew the code-book from time-to-time. The proposed Methodology works as follows: Generation of CB. Encryption of CB using WEP and exchange of CB. A. Generation of CB: The code-book is generated as follows: The Key Generator generates a key, based on which the Code- Book generator generates a Code-Book for the given Character- Set. The key generation process is delaying sensitive, and keys generated this way are used to protect the delay-sensitive secret messages. The working is as follows: Each group is identified or denoted by a single member (character) of that group. Now, the generated CB may look like Table-1. Let us suppose that HELLO is the message, and then it is coded as: H is coded as Z1, since H belongs to the group that is having a group code. Z and H is in 1st position from right.

Group Group code AJS J BKT T CLU C DMV V ENW E FOX O GPY P HQZ Z IR R Table 1 :Group of element generated E is coded as E1, since E belongs to the group that is having a group code E and E is in 1st position from right. L is coded as C2, since L belongs to the group that is having a group code C and L is in 2nd position from right. Likewise the total message is coded as Z1E1C2C2O2. This message is coded in such a way that a group code is followed by the position of that character in that group. B. Encryption Of CB Using WEP And Exchange Of CB: The CB has to be exchanged between the two communication parties. The WEP is used to encrypt the code book and is sent to the receiver. Since, initially CB will be only at one side, so there is a need of exchange of CB between both the parties.

Fig. 3 : Packet format for CB Fig.3.Packet that contains CB and is encapsulated using WEP encryption and sent to the other party. Then the communication begins. IV BEAM FORMING METHODOLOGY: AND FEEDBACK

52

ISSN: 2278 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012

VI. A. Effect Of Codebook Size: If the codebook size increases, then the chosen codeword q will be closer to the naive beam forming vector. For large , the value of is dominated by the term Max ,,. A.

c, c 2

(16)

For any given codebook with s, max c, c can be lower bounded as ,, max c, c max{ ( s)/( -1)s, 1 2 1/(s1)} (17) ,, where, for large value of , the bound is dominated by the second term. As , this lower bound becomes max ,,

Equal noise power received at both d and e receivers. For codebook beam forming, we use a MISO system with M = 4 transmit antennas. We apply two different codebooks for this system.. Fig. 5 presents the secrecy outage probability with different number of receive antennas at Attacker. The simulation also shows the performance of another non-security centric beamforming strategy - equal gain beamforming strategy probability with

1.2

Secracy outage probability

8, 1 Equal gain beamfor ming LB(Nave Beamfor ming) UB(N=8) 0 5 Me 10

c, c 1 2 1/ s1 1

Therefore, 1 for large and hence as , That is, for large , the secrecy outage probability cb so approaches the secrecy outage probability nb so from naive beam forming.

CODE BOOK ALGORITHM

MESSAGE

Fig .5 Comparison of secrecy outage probability between naive beamforming increasing SNR, where we kept the number of transmit antenna at User1 fixed to Me = 4. The simulation is performed for target secrecy rate of R = 0.5 b/s/Hz when Pb = Pe = 20 dB. It can be seen that at very low SNR, the secrecy outage probability is close to 1, here we cannot expect any secrecy when the channel condition is very poor. At moderate to high SNR, the secrecy outage probability increases with an increase in the number of receive antennas at e, which is expected. The simulation result presented in Fig. 6 shows the effects of increasing both the number of transmit antennas at s, and the number of receive antennas at e on the secrecy outage probability. The simulation is performed for Pe = Pb = 20 dB for a target secrecy rate R = 2 b/s/Hz. The simulation is performed for different value of Me. An interesting observation is that for a 4.2, secrecy outage probability increases with an increasing Me, while for a 4.2, secrecy outage probability actually decreases with an increasing Me. It shows that, when a is large, a change in Me also means many more transmit antennas. We have performed additional simulation for different values of SNR and target secrecy rate, and observed that the cross-off point as seen in Fig. 6 is a function of both SNR and target rate. Fig. 5 also shows the secrecy performance when the codeword corresponding to CDI is used as beam forming vector. When the attacker channel information at source is accurate (i.e. low ), However, for high value of ,

WEP ALGORITHM

FINAL CIPHER

Fig. 4 :Encoding method B. Positive Secrecy Positive secrecy is achievable when . In terms of secrecy outage probability, Prob [d ] = 1 nbso ( = 0, ) 0. Using Eq, we now have Prob [d ] = 1 nb so (0, ) = 11/ () (, ) () = 11/ () (1+) 1=0 ( /(1 + ) ) ( + 1)/ ( + 1) This means that the additional gain in secrecy probability due to naive beam forming decays exponentially with the number of received antennas employed at Attacker. In practical cases, it is not possible to estimate the number of receive antennas Attacker uses. Therefore, we focus on the case of Attacker with very large number of antennas and investigate the effect of different number of transmit antennas in this situation.

53

beam forming in the direction of destination provides similar performance results obtained.

REFERENCES:

[1] A. D. Wyner, The wire-tap channel, The Bell System Technical J., vol. 54, p. 1355, Oct. 1975. [2] P. K. Gopala, L. Lai, and H. E. Gamal, On the secrecy of capacity of fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 10, p. 4687, Oct.2008. [3] Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fading channels, IEEE Trans. Inf. Theory, vol. 54, p. 2470, June 2008. [4] S. Shafiee, N. Liu, and S. Ulukus, Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel, IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 40334039, Sep. 2009. [5] Bruce Schneier 2003, Applied Cryptography. John Wiley & Sons, Inc. [6] D. Love, R. Heath Jr., and T. Strohmer, Grassmannian beamforming for multiple-input multiple-output wireless systems, IEEE Trans. Inf. Theory, vol. 49, 2003. [7] K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, On beamforming with finite rate feedback in multiple-antenna systems, IEEE Trans. Inf. Theory, vol. 49, 2003. [8] IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, 2006. [9] T. GPP,36.211, Physical Channels and Modulation (Release 8). 3GPPvol. 12. [10] S. Leung-Yan-Cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Trans. Inf. Theory, vol. 24, 1978. [11] Brian Carter, Russell Shumway, 2002, Wireless Security End to End. Wiley Publishing, Inc. Authors profile:

Fig.6 Effect of received SNR on secrecy outage probability for different values of Pb. Here, received SNR of both Bob and Eve are assumed to be same,

R.Raicheal received B.E Electronics and communication Engineering in the year 2010. Currently doing M.E Communication systems Engineering.

VII.

CONCLUSION: In this work, we have analyzed the performance of codebook based beam forming transmission with the help of finite bit receiver feedback in a security setting. We presented the naive beam forming scheme in the direction of the intended receiver in presence of multiantenna attacker.In this paper we study the MIMO wiretap channel when there are stringent delay constraints and short-term power constraint. First, we study no CSIT case with isotropic Gaussian codebook. Our results show that the eavesdropper decreases the degrees of freedom in the direct link, min{m,n}, by the degrees of freedom in the source-eavesdropper channel, min{m,k}. Therefore, if k m, then no degrees of freedom is left. Otherwise, the secret DMT is equivalent to that of a (m k) (n k) MIMO without secrecy constraints. In this paper when there is CSIT, we assumed the source knows both the main channel CSI and the eavesdropper channel CSI to find the fundamental limits.

C.Arunachala Perumal received B.E Electronics and communication Engineering in the year 1997.Pursed M.E degree in 2004 and completed MBA Production management in 2005 MPhil in Management in 2007. Currently working as Assistant professor.

ACKNOWLEDGMENT I thank Jesus almighty for extending my opportunity to do this work and I thank everyone who supported me internally and externally for doing this work. I forward my thanks to my parents and director, chairman, principal, HOD, Guide for boosting my talents to do this work.

54

- 10.1.1.110.6662Uploaded bywanggang02
- HCS (Hierarchical Cell Structure) System for MBMS in UMTS NetworksUploaded byAndrew Ahonobadha
- STBC-SMUploaded byNavneeth Suresh S
- Capacity Evaluation of a High Altitude Platform Diversity System Equipped with Compact MIMO AntennasUploaded byIDES
- nplus.pdfUploaded byadsadadare
- Main StudyUploaded bySamsher Singh
- Detail MIMO Wireless CommunicationsUploaded byshakeel1900
- 10[1].1.1.133Uploaded byfarhanjanu
- Physical layer security of multiple-input– multiple-output systems with transmit beamforming in Rayleigh fadingUploaded byhendra
- 2Sande 201Uploaded byhendra
- VTC 09c Spring Submitted VersionUploaded byMilica Milicic
- 309 MR151123 Navyashri Paper V0Uploaded byhendra lam
- 01424535Uploaded byVictor Olmo
- CourseDescription_RA4121-30AUploaded byChintan Patel
- MIMO OFDMUploaded bymaivcong
- gpt1e0110Uploaded byTOm Cleverley
- Final Year Project IdeasUploaded byMuhammad Ashraf
- LTE Throughput Calculation _ LTE TutorialUploaded bymehran_4x
- Atoll 3.2Uploaded bymalikmdnurani
- CompanionGuide_802.11n_091907Uploaded byCaliGal
- Diversity and Mimo for Body-centric Wireless Communication Channels 2009Uploaded byGhallab Alsadeh
- Manual MimoUploaded bygoodoo27
- LTE Network Planning TechnologiesUploaded byFuzail Khan
- 1. Cases With Missing Emails From Nokia SideUploaded bymanish
- Adjacent Partitioning Based MIMO-OfDM System With Partial Transmit Sequence for PAPR ReductionUploaded byEditor IJRITCC
- Training OFDMUploaded bymanhhungbk
- Bhaskar 2015Uploaded byhendra
- Happy VPN SymbianizersUploaded byjamesoveros
- TD(12)03067 Modelling Channel Estimation Error in LTE Link Level SimulationsUploaded byKathleen Franklin
- 02 Interference Avoidance TechniquesUploaded bytrickyexpert

- 450-455Uploaded byIjarcet Journal
- 461-470Uploaded byIjarcet Journal
- 456-460Uploaded byIjarcet Journal
- 489-493Uploaded byIjarcet Journal
- 504-508Uploaded byIjarcet Journal
- 471-475Uploaded byIjarcet Journal
- 443-449Uploaded byIjarcet Journal
- 498-503Uploaded byIjarcet Journal
- 480-483Uploaded byIjarcet Journal
- 494-497Uploaded byIjarcet Journal
- 439-442Uploaded byIjarcet Journal
- 433-438Uploaded byIjarcet Journal
- 509-512Uploaded byIjarcet Journal
- 476-479Uploaded byIjarcet Journal
- 484-488Uploaded byIjarcet Journal
- 353-357Uploaded byIjarcet Journal
- 370-374Uploaded byIjarcet Journal
- 407-409Uploaded byIjarcet Journal
- 379-381Uploaded byIjarcet Journal
- 366-369Uploaded byIjarcet Journal
- 382-387Uploaded byIjarcet Journal
- 402-406Uploaded byIjarcet Journal
- 347-352Uploaded byIjarcet Journal
- 395-401Uploaded byIjarcet Journal
- 375-378Uploaded byIjarcet Journal
- 427-432Uploaded byIjarcet Journal
- 410-418Uploaded byIjarcet Journal
- 388-394Uploaded byIjarcet Journal
- MC uartUploaded byNagesh Bs
- 358-365Uploaded byIjarcet Journal

- Tracking And Security System for Women’s using GPS & GSMUploaded byAnonymous kw8Yrp0R5r
- network_planning_guide-cloudtrax.pdfUploaded byradam
- TodosUploaded bymorpheo
- ARRAY WITH I SHAPE.pdfUploaded byjenath1
- 4G TECHNOLOGYUploaded bySapna Verma
- Building Automation System by Kaung Htat NyuntUploaded byAcmv Burmese
- rfc2543Uploaded bysilvestrecn
- COE 444 042 LectureNotes Chap6Uploaded bykamal_143
- GuruUploaded bymaczya
- 180557334 HUAWEI DBS3900 Dual Mode Base Station Hardware Structure and Pinciple PptUploaded byCarlos Crisostomo
- Dell Network Deployment And Planning Certification.Student Guidee4.pdfUploaded bySteven Vides
- Seminar Report(Bubble Sensing)Uploaded bySatyajit Lele
- [FREE]Braindump2go Latest 70-337 Exam Questions 21-30Uploaded byLeon Chandler
- 02.DB_Noise - 03.ModulationUploaded byAchilles Aldave
- 100g.pdfUploaded byhas
- 5-TCSM2EUploaded byhasan2087
- Microsoft Word - May BillUploaded bypravin2projects
- WIRELESS-FINAL PBL.docxUploaded byJoy Macunial Castor
- 100093179Uploaded byarescip
- WI FI StarterUploaded bydiegogachet1618
- Hirschmann Description and Operating Instructions SPIDERUploaded byboba78
- SP RFI I03 980202 MappingUploaded bystroleg2011
- lab 1 zaliUploaded byLeong Wen Chek
- Chirp Design for Acoustical System IdentificationUploaded byAndrew Ramos
- Cisco Data Center GuideUploaded byAntony Paul Johnson
- Common BCCH-2002-05-22Uploaded byHaroon Fazal Meo
- Ec2 ADFS How ToUploaded byFrancisco Diaz
- CARRIB_2012_-_Andrew_MassiasUploaded bygvdm8574
- Avaya Ethernet Routing SwitchesUploaded byfelipe2_vilela
- Cell Phone Protection-biometricUploaded bysmiley_cathy89