Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers
Abstract
Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to use this scheme to transmit a sensitive data, such as in the military and commercial communication systems. In this paper, we propose a new method to increase the security of MIMO-OFDM system using the change of location of fake subcarrier. The fake subcarriers’ location is generated per packet of data using Pseudo Random sequence generator. The simulation results show that the proposed scheme does not decrease the performance of conventional MIMO-OFDM. The attacker or eavesdropper gets worse Bit Error Rate (BER) than the legal receiver compared to the conventional MIMO-OFDM system.Downloads
References
Y. Liang H., V. Poor, S. Shamai, Secure Communication over Fading Channel, IEEE Transactions of Information Theory, Vol. 54, No. 6, pp. 2470-2492, 2008.
Z. Wang, X. Ma, G. B. Giannakis, OFDM or SIngle Carrier Block Transmission?, IEEE Transactions on Communications, Vol. 52, No. 3, pp. 380-394, 2004.
G.L. Suber, J. R. Barry, S. W. Mclaughlin, and Ye Li, Broadband MIMO-OFDM Wireless Communications, Proceedings of the IEEE, Vol. 92, No. 2, pp. 271-294, 2004.
S. Grabski, K. Szczypiorski, Steganography in OFDM Symbols of Fast IEEE 802.11n Networks, IEEE In Security and Privacy Workshops (SPW), San Francisco, pp. 158-164, 2013.
C. Kratzer, J. Dittman, A. Lang, T. Kuhne, WLAN Steganography: First Practical Review, Proceedings of The 8th Workshop on Multimedia and Security, New York, pp. 17-22, 2006.
C. Kratzer, J. Dittman, R. Merkel, WLAN Steganography Revisited, In Proceedings of SPIE Electronic Imaging, San Jose, pp. 68-70, 2008.
X. Tan, K. Borle, W. Du, B. Chen, Cryptography Link Signature for Spectrum Usage Authentication in Cognitive Radio, In Proceedings of The Fourth ACM Conference of Wireless Network Security, San Jose, pp. 79-90, 2011.
M. Willhelm, I. Martinovic, J. B. Schmitt, V. Lenders, WiFire: a Firewall for the Wireless Network, In Proceeding of the ACM 2011 SIGCOMM, Toronto, pp. 456-457, 2011.
Z. Hijaz, V. Frost, Exploiting OFDM Systems for Covert Communication, In Military Communications Conference, pp. 2149-2155, 2010.
R. Ma, L. Dai, Z. Wang, Secure Communication in TDS-OFDM Using Constellation Rotation and Noise Insertion, IEEE Transactions on Consumer Electronics, Vol. 56, No. 3, pp. 1328-1332, 2010.
J. Classen, M. Schulz, M. Hollick, Practical Covert Channels for WiFi Systems, IEEE Conference on Communications and Network Security (CNS), Florence, pp. 209-217, 2015.
The Institute of Electrical and Electronic Engineers, Inc., IEEE Standard of Information Technology, IEEE Press (New York), 802.11-2012, 2012.
Copyright (c) 2016 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.