DOI QR코드

DOI QR Code

Enhanced Wireless Network Security in Military Environments

군사 환경에서의 향상된 무선 네트워크 보안

  • Kim, Jin Woo (Department of IT Convergence Engineering, Kumoh National Institute of Technology) ;
  • Shin, Soo Young (Kumoh National Institute of Technology)
  • Received : 2016.09.05
  • Accepted : 2016.11.01
  • Published : 2016.11.30

Abstract

In this paper, we propose method to enhance security performance using HT-STBC with artificial noise under Wier-Tap channel model that exist with legitimate receiver and illegal eavesdropper. Conventional STBC with artificial noise scheme has a weakness that a limited increase in the BER of the difference between the receiver and an eavesdropper, when used over QPSK modulation. To solve this problem, we suggest HT-STBC combining hadamard transform and STBC with artificial noise for reduce BER of receiver than the conventional scheme and demonstrated through simulation that also increased BER difference between the receiver and an eavesdropper. By the simulation results, when used proposed scheme, showed approximately 3dB improvement in performance compared to the conventional scheme.

본 논문은 합법적 수신자와 불법적인 도청자가 함께 존재하는 Wire-Tap 채널 모델 하에서 HT-STBC (Hadamard Transformed-Space Time Block Codes)와 인위적 잡음 (Artificial Noise)을 이용한 보안 성능 향상 방법을 제안한다. 기존의 STBC와 인위적 잡음을 이용한 방법은 QPSK 이상의 변조 방식을 사용했을 때 수신자와 도청자 사이의 BER (Bit Error Rate) 차이가 제한적으로 증가하는 문제가 있다. 이를 해결하기 위해 Hadamard 변환과 STBC를 결합한 HT-STBC와 인위적 잡음을 이용하여 수신자의 BER을 기존 방법보다 감소시키고 수신자와 도청자 사이의 BER 차이 또한 증가함을 모의실험을 통해 입증하였다. 모의실험 결과, 본 논문에서 제안한 방법을 이용하면 기존의 STBC와 인위적 잡음을 이용한 방법에 비하여 약 3dB의 성능이 향상됨을 확인하였다.

Keywords

References

  1. Y.-S. Shiu, et al., "Physical layer security in wireless networks: a tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011. https://doi.org/10.1109/MWC.2011.5751298
  2. J. Choi, J. Ha, and H. Jeon, "Physical layer security for wireless sensor networks," IEEE PIMRC, pp. 1-6, 2013.
  3. C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  4. A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  5. S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
  6. I. Son, I. Kim, J. Yang, and N. Lee, "Smart device security technology for cyber defense," J. KICS, vol. 37, no. 10, pp. 986-992, Oct. 2012.
  7. J.-K. Hong, "The analysis of crypto communication relay effect in the security framework technique of network centric warfare environment," J. Korea Academia-Ind. Cooperation Soc., vol. 8, no. 4, pp. 788-794, 2007.
  8. S. Corson and J. Macker, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, No. RFC 2501, 1998.
  9. S. Y. Shin and I. A. Wicaksono, "Improving wireless physical layer security using alamouti code and artificial noise," ICTC, pp. 1061-1064, 2013.
  10. S. M. Alamouti, "A simple transmit diversity technique for wireless communications," IEEE J. Sel. Areas in Commun., vol. 16, no. 8, pp. 1451-1458, 1998. https://doi.org/10.1109/49.730453
  11. S.-Y. Jin, J.-H. Kim, K.-H. Park, and H.-Y. Song, "Equivalence of hadamard matrices whose rows Form a vector space," J. KICS, vol. 34, no. 7, pp. 635-639, Jul. 2009.
  12. T. S. Siadari and S. Y. Shin, "Joint hadamard transform and alamouti scheme for wireless communication system," AEU-Int. J. Electron. Commun., vol. 68, no. 9, pp. 889-891, 2014.
  13. Y. Zou, et al., "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015. https://doi.org/10.1109/MNET.2015.7018202
  14. X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, 2010. https://doi.org/10.1109/TVT.2010.2059057