Performance of Orthogonal Frequency Division Multiplexing Based Advanced Encryption Standard

Duc-Tai Truong, Q. Nguyen, T. Dinh
{"title":"Performance of Orthogonal Frequency Division Multiplexing Based Advanced Encryption Standard","authors":"Duc-Tai Truong, Q. Nguyen, T. Dinh","doi":"10.25073/2588-1086/VNUCSCE.240","DOIUrl":null,"url":null,"abstract":"Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses  the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to compare with the criteria for 4G. \nKeywords: \nOrthogonal Frequency Division Multiplexing (OFDM), Advanced Encryption Standard (AES), Quadrature Amplitude Modulation (QAM), Authentication Key, Cellular Network, Encryption, Physical Layer, 4G, LTE. \nReferences \n[1] M.A. Jessen, “Wireless communication security: Physical-Layer techniques exploiting radio and propagation characteristics”, Wireless Information Technology and Systems (ICWITS), IEEE International Conference, 2012.[2] M. Kim, M. Lee, S. Kim, D. Won, “Weakness and Improvements of a One-time Password Authentication Scheme”, International Journal of Future Generation Communication and Networking, 2009. \n[3] Alabaichi, Ashwaq, Salih, Adnan, “Enhance security of advance encryption standard algorithm based on key-dependent S-box”, 2015, pp. 44-53. \n[4] S. Xiao, W. Gong, D. Towsley, “Secure Wireless Communication with Dynamic secrets”, IEEE INFOCOM, 2010.[5] N.U. Rehman, L. Zhang, M.Z. Hammad, “ICI cancellation in OFDM system by frequency offset reduction”, Journal of Information Engineering and Applications, 2014. \n[6] Nikita Agrawal, Neelesh Gupta, “Security of OFDM through Steganography”, International Journal of Computer Applications 121(20) (2015) 41-43. \n[7] A. Al-Dweik, M. Mirahmadi, A. Sharmi, Z. Ding, R. Hamila, “Joint Secured and Robust technique for OFDM systems”, Western University, Canada, IEEE ICC 2013. \n[8] G.R. Tsouri, D. Wulich, “Securing OFDM over Wireless Time-varying channel using subcarrier overloading with Joint signal constellations”, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communication and Networking, 2009. \n[9] D. Rajaveerappa, A. Almarimi, A., “RSA/Shift secured IFFT/FFT based OFDM wireless system,” Fifth International Conference on Information Assurance and Security, 2009. \n[10] M. Hilmey, S. Elhalafwy, M. Zein Eldin, “Efficient transmission of chaotic and AES encrypted images with OFDM over an AWGN channel”, 2009 International Conference on Computer Engineering & Systems, Cairo, 2009, pp. 353-358. \n[11] B.V. Naik, N.L.K. Sai, C.M. Kumar, “Efficient transmission of encrypted images with OFDM system”, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, 2017, pp. 2383-2388. \n[12] S.M.S. Eldin, “Optimized OFDM Transmission of Encrypted Image Over Fading Channel”, An International Journal on Sensing and Imaging 15(1) (2014), pp. 1-14. \n[13] C. Akbar, H. Mahmood, Q. Minhas, I. Mustafa, “Secure AES OFDM with channel reciprocity exploitation through relative calibration”, 2016 International Conference on Open Source Systems & Technologies (ICOSST), Lahore, 2016, pp. 54-61. \n[14] Y. Liang, J. Ren, T. Li, “Secure OFDM System Design and Capacity Analysis Under Disguised Jamming”, in IEEE Transactions on Information Forensics and Security 15 (2020) 738-752. \n[15] Westlund, B. Harold, “NIST reports measurable success of Advanced Encryption Standard”,Journal of Research of the National Institute of Standards and Technology, 2002. \n[16] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Performance Comparison of the AES Submissions, Proceedings of the Second AES Candidate Conference, 1999. \n[17] S. He, A. Tang, H. Zhang, “A high-performance Implementation of OFDM-MIMO base-band in wireless video system”, Information Technology Journal 13 (2014), pp. 1678-1685.","PeriodicalId":416488,"journal":{"name":"VNU Journal of Science: Computer Science and Communication Engineering","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"VNU Journal of Science: Computer Science and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25073/2588-1086/VNUCSCE.240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Currently, there are a lot of secure communication schemes have been proposed to hide secret contents. In this work, one of the methods deploying encryption to cipher data is represented. The primary object of this project is applying Advanced Encryption Standard (AES) in communications based Orthogonal Frequency Division Multiplexing (OFDM). This article discusses  the security of the method encrypting directly QAM symbols instead of input bit-stream. This leads to improving the security of transmitting data by utilization of authentication key between the mobile and base station. The archived results demonstrate that the performance of the AES-OFDM system is completely acceptable to compare with the criteria for 4G. Keywords: Orthogonal Frequency Division Multiplexing (OFDM), Advanced Encryption Standard (AES), Quadrature Amplitude Modulation (QAM), Authentication Key, Cellular Network, Encryption, Physical Layer, 4G, LTE. References [1] M.A. Jessen, “Wireless communication security: Physical-Layer techniques exploiting radio and propagation characteristics”, Wireless Information Technology and Systems (ICWITS), IEEE International Conference, 2012.[2] M. Kim, M. Lee, S. Kim, D. Won, “Weakness and Improvements of a One-time Password Authentication Scheme”, International Journal of Future Generation Communication and Networking, 2009. [3] Alabaichi, Ashwaq, Salih, Adnan, “Enhance security of advance encryption standard algorithm based on key-dependent S-box”, 2015, pp. 44-53. [4] S. Xiao, W. Gong, D. Towsley, “Secure Wireless Communication with Dynamic secrets”, IEEE INFOCOM, 2010.[5] N.U. Rehman, L. Zhang, M.Z. Hammad, “ICI cancellation in OFDM system by frequency offset reduction”, Journal of Information Engineering and Applications, 2014. [6] Nikita Agrawal, Neelesh Gupta, “Security of OFDM through Steganography”, International Journal of Computer Applications 121(20) (2015) 41-43. [7] A. Al-Dweik, M. Mirahmadi, A. Sharmi, Z. Ding, R. Hamila, “Joint Secured and Robust technique for OFDM systems”, Western University, Canada, IEEE ICC 2013. [8] G.R. Tsouri, D. Wulich, “Securing OFDM over Wireless Time-varying channel using subcarrier overloading with Joint signal constellations”, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communication and Networking, 2009. [9] D. Rajaveerappa, A. Almarimi, A., “RSA/Shift secured IFFT/FFT based OFDM wireless system,” Fifth International Conference on Information Assurance and Security, 2009. [10] M. Hilmey, S. Elhalafwy, M. Zein Eldin, “Efficient transmission of chaotic and AES encrypted images with OFDM over an AWGN channel”, 2009 International Conference on Computer Engineering & Systems, Cairo, 2009, pp. 353-358. [11] B.V. Naik, N.L.K. Sai, C.M. Kumar, “Efficient transmission of encrypted images with OFDM system”, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, 2017, pp. 2383-2388. [12] S.M.S. Eldin, “Optimized OFDM Transmission of Encrypted Image Over Fading Channel”, An International Journal on Sensing and Imaging 15(1) (2014), pp. 1-14. [13] C. Akbar, H. Mahmood, Q. Minhas, I. Mustafa, “Secure AES OFDM with channel reciprocity exploitation through relative calibration”, 2016 International Conference on Open Source Systems & Technologies (ICOSST), Lahore, 2016, pp. 54-61. [14] Y. Liang, J. Ren, T. Li, “Secure OFDM System Design and Capacity Analysis Under Disguised Jamming”, in IEEE Transactions on Information Forensics and Security 15 (2020) 738-752. [15] Westlund, B. Harold, “NIST reports measurable success of Advanced Encryption Standard”,Journal of Research of the National Institute of Standards and Technology, 2002. [16] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Performance Comparison of the AES Submissions, Proceedings of the Second AES Candidate Conference, 1999. [17] S. He, A. Tang, H. Zhang, “A high-performance Implementation of OFDM-MIMO base-band in wireless video system”, Information Technology Journal 13 (2014), pp. 1678-1685.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于正交频分复用的高级加密标准的性能研究
目前,已经提出了许多隐藏秘密内容的安全通信方案。在这项工作中,介绍了一种部署加密来加密数据的方法。该项目的主要目标是在基于正交频分复用(OFDM)的通信中应用高级加密标准(AES)。本文讨论了直接加密QAM符号代替输入比特流的方法的安全性。利用手机与基站之间的认证密钥,提高了数据传输的安全性。存档结果表明,与4G标准相比,AES-OFDM系统的性能完全可以接受。关键词:正交频分复用(OFDM),高级加密标准(AES),正交调幅(QAM),认证密钥,蜂窝网络,加密,物理层,4G, LTE[1]陈晓明,“无线通信安全:基于无线传输特性的物理层技术”,无线通信技术与系统,2012.[2]李明辉,李明辉,李明辉,“一次性密码认证方案的缺陷与改进”,通信技术学报,2009。[3]张晓明,张晓明,“基于密钥依赖S-box的加密标准算法”,计算机科学与技术,2015,pp. 44-53。[4]肖绍林,龚文伟,王志强,“基于动态秘密的无线通信安全”,通信技术,2010.[5]张磊,张明忠,“基于频率偏移的OFDM系统ICI消除”,信息工程与应用,2014。[6]聂立新,陈志强,“基于隐写的OFDM安全算法”,计算机应用学报,34(6)(2015):41-43。[7]张晓明,张晓明,张晓明,“基于多信道的OFDM系统”,西安交通大学学报(工学版),2013。[8]王志强,“无线时变信道下的OFDM安全”,通信学报,2009。[9]王晓明,王晓明,“基于FFT/FFT的OFDM无线通信系统”,信息安全与通信技术,2009。[10]王晓明,王晓明,“一种基于OFDM的图像传输算法”,计算机工程与系统学报,2009,pp. 353-358。[11]张建军,张建军,张建军,“基于OFDM系统的图像加密传输”,计算机工程学报,2017,pp. 883 - 888。[12]王志强,“基于OFDM的图像传输算法研究”,计算机工程学报(ei), 2014, pp. 1-14。[13]陈晓明,陈晓明,陈晓明,“基于相对校准的安全AES OFDM技术”,国际开源系统与技术会议,2016,pp. 54-61。[14]梁勇,任建军,李涛,“基于伪装干扰的OFDM系统设计与容量分析”,信息安全与安全学报,15(2020):738-752。[15]王志强,“基于网络的加密技术研究”,《计算机科学》,2002。[16]陈建军,陈建军,陈建军,陈建军,陈建军,陈建军,陈建军,陈建军,陈建军,陈建军。[17]何松,唐安,张宏,“无线视频系统中OFDM-MIMO基带的高性能实现”,信息技术学报,2014,pp. 1678-1685。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Aspect-Category based Sentiment Analysis with Unified Sequence-To-Sequence Transfer Transformers A Bandwidth-Efficient High-Performance RTL-Microarchitecture of 2D-Convolution for Deep Neural Networks Noisy-label propagation for Video Anomaly Detection with Graph Transformer Network FRSL: A Domain Specific Language to Specify Functional Requirements A Contract-Based Specification Method for Model Transformations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1