Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3330180.3330189acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

Hardware Implementation of CORDIC Based Physical Layer Phase Decryption for IEEE 802.11ah

Published: 12 April 2019 Publication History

Abstract

Being a long range, low power, and low-cost technology, IEEE 802.11ah has gained much attention for developing the Internet of Things (IoT) sensor's wireless transceiver. In general, IoT sensors have a limitation on the power source and computation ability. Therefore, design a low complexity, low power and secure wireless transceiver based on 802.11ah is still challenging. In this research, we develop a low complexity hardware circuit of phase decryption for a variety of high order modulation types of the 802.11ah physical transceiver. We apply Coordinate Rotation Digital Computer (CORDIC) algorithm to calculate the amplitude, phase, sine, and cosine. The designed hardware was synthesized on FPGA and ASIC synthesis. The numerical results have shown that the hardware circuit of amplitude, phase calculation block, and cosine, sine calculation block are low and each block occupies about 10% of the entire decryption. On the contrary, the RC4 stream cipher takes approximately half of the area and power of the entire decryption.

References

[1]
J. A. Stankovic, "Reseach directions for the Internet of Thing," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 3--9, February 2014.
[2]
V. Banos-Gonzales, M.S. Afaqui, E. Lopez-Aguilera, "IEEE 802.11 ah: A technology to face the IoT challenge," Sensors, vol. 16, no. 11, p. 1960, 2016.
[3]
W. Trappe, "The challenges facing physical layer security," IEEE Communications Magazine, vol. 53, no. 6, pp. 16 - 20, 2015.
[4]
J. Zhang, A. Marshall, R. Woods, T. Q. Duong, "Design of an OFDM physical layer encryption scheme," IEEE Transactions on Vehicular Technolog, vol. 66, no. 3, pp. 2114--2127, 2017.
[5]
F. Huo, G. Gong, "XOR encryption versus phase encryption, an in-depth analysis," IEEE Transactions on Electromagnetic Compatibility, vol. 57, no. 4, pp. 903--911, 2015.
[6]
A. K. Nain, J. Bandaru, M. A. Zubair, "A secure phase-encrypted IEEE 802.15.4 transceiver design," IEEE Transactions on Computers, vol. 66, no. 8, pp. 1421 - 1427, 2017.
[7]
P. Bhoyar, S.B. Dhok, R.B. Deshmukh, "Hardware implementation of secure and lightweight Simeck32/64 cipher for IEEE 802.15.4 transceiver," AEU - International Journal of Electronics and Communications, vol. 90, pp. 147--154, June 2018.
[8]
D.L. Hoang, T.H. Tran and Y. Nakashima, ""Performance Evaluation of 802.11ah Physical Layer Phase Encryption for IoT Applications," in 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, October 2018.
[9]
T. H. Tran, S. Kanagawa, D. P. Nguyen, Y. Nakashima, "ASIC Design of MUL-RED Radix-2 Pipeline FFT Circuit for 802.11ah," in 19th IEEE Symposium on Low-power and High-speed Chips (Cool Chips XIX), Japan, April 2016.
[10]
802.11ah-2016, " Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specification amendment 2: Sub 1 GHz licence exempt operation," May 2017.
[11]
M.Kloos, "Method and apparatus for encryption of over-the-air communications in a wireless communication system". US Patent US 7693284B2, 06 04 2010.
[12]
P. K. Meher, J. Valls, T. Juang, K. Sridharan and K.Maharatna, "50 Years of CORDIC: Algorithms, Architectures, and Applications," IEEE Transactions on Circuits and Systems I, vol. 56, no. 9, pp. 1893--1907, Sept. 2009.
[13]
J. E. Volder, "The CORDIC trigonometric computing technique," IRE Transactions on Electronic Computers, Vols. EC-8, no. 3, pp. 330--334, 1959.

Cited By

View all
  • (2020)A Low Complexity Joint Encryption-Modulation Method for IoT Sensor TransceiversElectronics10.3390/electronics90406639:4(663)Online publication date: 19-Apr-2020

Index Terms

  1. Hardware Implementation of CORDIC Based Physical Layer Phase Decryption for IEEE 802.11ah

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCBN '19: Proceedings of the 7th International Conference on Communications and Broadband Networking
    April 2019
    76 pages
    ISBN:9781450362474
    DOI:10.1145/3330180
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • UPM: Universiti Putra Malaysia
    • NITech: Nagoya Institute of Technology
    • Iv. Javakhishvili Tbilisi State University, Georgia

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 April 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CORDIC hardware implementation
    2. IEEE 802.11 ah security
    3. Physical layer phase decryption

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • JSPS KAKENHI

    Conference

    ICCBN 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)A Low Complexity Joint Encryption-Modulation Method for IoT Sensor TransceiversElectronics10.3390/electronics90406639:4(663)Online publication date: 19-Apr-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media