Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Tahir, Mohammad"

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
    (Gombak, Selangor : Kulliyyah of Engineering, International Islamic University Malaysia, 2011, 2011)
    Tahir, Mohammad
    ;
    Physical layer security is an emerging research area that explores the possibility of achieving perfect-secrecy for data transmission among intended network by exploiting the characteristics of the wireless channel, such as fading or noise, to provide security for wireless transmissions. Physical layer security is not meant to replace existing higher layer security schemes but calls for the enhancement of the security level by combining with existing security methods. Therefore in this context a hybrid scheme that provides security in the physical layer, by combining the traditional cryptography and physical layer characteristics is proposed in this dissertation. The aim of combining these two techniques at physical layer is to deprive the eavesdropper from receiving the correct information in first place. This aim is achieved by two step process known as encryption and pre-compensation. Here, encryption refers to rotation of data symbols in original constellation based upon the key-sequence that is generated by the AES in counter mode. Encryption transforms the original data constellation of modulated symbols into higher order constellation. After encrypting the original constellation pre-compensation is applied, pre-compensation refers to compensation of data for channel variation before transmission i.e. compensation for phase and attenuation at transmitter. These two operations hide the original signal constellation due to which eavesdropper cannot demodulate the data as demodulation require knowledge signal constellation for correct demodulation. Hence eavesdropper is forced to perform blind channel estimation first in order to find encrypted constellation followed by task of finding key-sequence to decrypt the encrypted constellation. The key-sequence can be found correctly only when the effect of precompensation cancellation results in decoded bits that are error free (because to perform cryptanalysis the data should be error free otherwise it will result in erroneous result). Performance of the scheme is analysed in MATLAB® using bit error rate (BER) as performance metric, higher the BER for eavesdropper better is the security. Results under different settings showed (perfect and imperfect pre-compensation, different training duration of pilot symbols) that the eavesdropper suffers from high BER whereas the BER of legitimate receiver (intended receiver) depends upon the accuracy of CSI used for pre-compensation at transmitter. The performance was also evaluated for image and audio transmission, which also showed similar results of eavesdropper suffering from high BER. Due to high BER the received image and audio are completely unintelligible and no useful information can be extracted. Finally the performance of hybrid scheme in existing standard IEEE 802.11a was evaluated and it was found that system performs better due the effect of encryption and precompensation in terms of BER and security i.e. legitimate receiver suffers from a lower BER whereas the eavesdropper suffers from high BER.
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Mathematical modelling of dynamic spectrum management in cognitive network
    (Kuala Lumpur :International Islamic University Malaysia, 2016, 2016)
    Tahir, Mohammad
    ;
    A survey made by a Spectrum Policy Task Force (SPTF) within Federal Communications Commission (FCC) indicates that the actual licensed spectrum is largely under-utilized. A remedy to spectrum underutilization is to allow secondary users to access underutilized licensed bands dynamically when licensed users are absent. Due to this spectrum usage is undergoing a paradigm shift from the traditional licensed allocation to the dynamic spectrum access (DSA). Cognitive radios are intelligent radio, which can implement DSA efficiently. A cognitive radio can detect vacant licensed spectrum, access it and vacate when the licensed user starts transmitting. The cognitive radios can detect the spectrum more efficiently if they cooperate with other cognitive radios in the network. This results in increased transmission opportunity and hence increases the throughput of the cognitive radio network. Therefore, in order to realize the full potential of cognitive radio, there is a need for well-designed distributed cooperative algorithms that can realise the numerous gains from the vacant licensed spectrum. This thesis uses matching theory to develop such cooperation mechanism. Matching theory is a mathematical framework used to describe the formation of mutually beneficial relationships over time. This mutually beneficial relationship encourages the cognitive radio to form groups known as coalitions. The goal of matching theory in this thesis is to form coalitions of cognitive radios so that the overall benefits termed as 'utility' is improved compared to benefit that cognitive radio receives when acting alone. This improved utility due to coalition formation results in improved spectrum detection, which in turn increases the opportunities for transmission in the vacant licensed spectrum. The detected vacant spectrum is shared among the cognitive radios in the network for achieving a higher throughput. For the purpose of coalition formation using matching theory, two algorithms are proposed. The first algorithm for coalition formation uses well-known Gale-Shapely algorithm to achieve cooperation among the cognitive radios for spectrum detection and management. This algorithm results in the formation of stable coalitions of cognitive radio. In order to form coalitions, each cognitive radio prepares a preference list of other radio in the vicinity with which the cognitive radio wants to cooperate and hence form a coalition. Each cognitive radio makes an offer to cognitive radio in its preference list for cooperation. The cognitive radio can accept or reject the offer based on the preference list. The second algorithm is based one-sided matching theory which is a variant of the Gale-Shapely algorithm. The procedure is similar to the first algorithm, however, the difference is in how the coalition formation takes place among the cognitive radios. Finally, using simulations and mathematical results, various aspects of the proposed algorithms were investigate and analysed. The proposed algorithms resulted in improved spectrum detection as well as spectrum management hence enhancing the throughput of the cognitive radio network as well as increasing the spectrum efficiency. Compared to the non-cooperative scenario the modified Gale-Shapley algorithm resulted in the reduction of false alarm probability approximately by 51% and one-sided matching resulted in a 46% reduction in AWGN channel when number of cognitive radio user in the network is set to 30. While in the fading environment the reduction was approximately by 40% and 39% respectively for modified Gale-Shapley and one-sided matching algorithm.
      3

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL