Browse > Article
http://dx.doi.org/10.7840/kics.2016.41.11.1341

Enhanced Wireless Network Security in Military Environments  

Kim, Jin Woo (Department of IT Convergence Engineering, Kumoh National Institute of Technology)
Shin, Soo Young (Kumoh National Institute of Technology)
Abstract
In this paper, we propose method to enhance security performance using HT-STBC with artificial noise under Wier-Tap channel model that exist with legitimate receiver and illegal eavesdropper. Conventional STBC with artificial noise scheme has a weakness that a limited increase in the BER of the difference between the receiver and an eavesdropper, when used over QPSK modulation. To solve this problem, we suggest HT-STBC combining hadamard transform and STBC with artificial noise for reduce BER of receiver than the conventional scheme and demonstrated through simulation that also increased BER difference between the receiver and an eavesdropper. By the simulation results, when used proposed scheme, showed approximately 3dB improvement in performance compared to the conventional scheme.
Keywords
Physical layer; STBC; Hadamard transform; Artificial noise; MIMO;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 S. Y. Shin and I. A. Wicaksono, "Improving wireless physical layer security using alamouti code and artificial noise," ICTC, pp. 1061-1064, 2013.
2 S. M. Alamouti, "A simple transmit diversity technique for wireless communications," IEEE J. Sel. Areas in Commun., vol. 16, no. 8, pp. 1451-1458, 1998.   DOI
3 S.-Y. Jin, J.-H. Kim, K.-H. Park, and H.-Y. Song, "Equivalence of hadamard matrices whose rows Form a vector space," J. KICS, vol. 34, no. 7, pp. 635-639, Jul. 2009.
4 T. S. Siadari and S. Y. Shin, "Joint hadamard transform and alamouti scheme for wireless communication system," AEU-Int. J. Electron. Commun., vol. 68, no. 9, pp. 889-891, 2014.
5 Y. Zou, et al., "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015.   DOI
6 X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, 2010.   DOI
7 Y.-S. Shiu, et al., "Physical layer security in wireless networks: a tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.   DOI
8 J. Choi, J. Ha, and H. Jeon, "Physical layer security for wireless sensor networks," IEEE PIMRC, pp. 1-6, 2013.
9 C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949.   DOI
10 A. D. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.   DOI
11 S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.   DOI
12 I. Son, I. Kim, J. Yang, and N. Lee, "Smart device security technology for cyber defense," J. KICS, vol. 37, no. 10, pp. 986-992, Oct. 2012.
13 S. Corson and J. Macker, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, No. RFC 2501, 1998.
14 J.-K. Hong, "The analysis of crypto communication relay effect in the security framework technique of network centric warfare environment," J. Korea Academia-Ind. Cooperation Soc., vol. 8, no. 4, pp. 788-794, 2007.