IJITCS
IJITCS
IJITCS
5, October 2012
Secure text message transmission in a 4G compatible MIMO MCCDMA system with combined implementation of Vigenere Cipher and RSA cryptographic algorithm
Mousumi Haque1
1
ABSTRACT
In this paper, a comprehensive performance evaluative study has been made on a secured MIMO MCCDMA wireless communication system with implementation of Minimum Mean Square Error (MMSE) and Zero- Forcing (ZF) Linear channel equalization schemes. The 4G compatible system deploys two channel encoding schemes(1/2-rated Convolutional and CRC ) under BPSK,DPSK QPSK and QAM digital modulations. In the present simulated system, a text message transmission has been secured with concatenated implementation of Vigenere Cipher and RSA cryptographic algorithm. It is anticipated from the numerical results that with MMSE channel equalization and 1/2-rated Convolutional channel Encoding schemes, the MIMO MCCDMA system outperforms in BPSK digital modulation under AWGN and Raleigh fading channels. In CRC channel coding, the system shows comparatively worst performance in higher Signal to Noise ratio(SNR) values under DPSK, QPSK and QAM digital modulations. It has been observed from the present study that the system performance deteriorates with increase in noise power as compared to signal power.
KEYWORDS
MIMO MCCDMA, ZF, MMSE, Vigenere Cipher and RSA cryptographic algorithm, Bit Error rate(BER), AWGN and Raleigh fading channels.
1. INTRODUCTION
Orthogonal Frequency-Division Multiplexing (OFDM) has emerged as a successful airinterface multicarrier digital modulation technique advocated by many European standards, such as Digital Audio Broadcasting (DAB), Digital Video Broadcasting for Terrestrial television (DVB-T), Digital Video Broadcasting for Handheld terminals (DVB-H) , Wireless Local Area Networks (WLANs) and Broadband Radio Access Networks (BRANs). In perspective of wired environments, the OFDM transmission techniques known as Discrete Multi-Tone (DMT) are employed in theAmerican National Standards Institutes (ANSIs) Asymmetric Digital Subscriber Line (ADSL), High-bit-rate Digital Subscriber Line (HDSL) and Very-high-speed Digital Subscriber Line (VDSL) standards as well as in the European
DOI : 10.5121/ijitcs.2012.2502 9
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
Telecommunication Standard Institutes (ETSIs) VDSL applications[1]. The MC-CDMA is a hybrid transmission technique employing an amalgam of Code Division Multiple Access (CDMA) and Orthogonal Frequency Division Multiplexing (OFDM) and is expected to combine the benefits of pure CDMA and OFDM techniques. The MC-CDMA is an attractive choice for high speed wireless communication as it mitigates the problem of inter symbol interference (ISI) with exploitation of frequency diversity. It supports multiple users with high speed data communications, The CDMA technique is widely used in current Third Generation (3G) wireless communication systems( W-CDMA-Wideband Code Division Multiple Access, UMTS-Universal Mobile Telecommunications etc) presenting a wide range higher data rate supported services such as voice/video/data (IP Television, video on demand, video conferencing, tele-medicine)[2,3]. In 2012, Sarkar et.al, performed performance evaluative study ofFEC encoded MC-CDMA wireless communication system with adaptation of various signals detection and two-layer spreading schemes[4]. In the present study, secured data transmission has been ensured with implementation of cryptographic algorithm.
2. MATHEMATICAL MODEL
In my presently considered secured 2 x 2 spatially multiplexed MIMO MCCDMA wireless communication system, Vigenere Cipher and RSA cryptographic algorithms and two channel equalization schemes have been used. A brief description is given below.
10
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
to one of m possible alphabetic characters (assuming that the keyword contains m distinct characters). Such a cryptosystem is called polyalphabetic[5]. The RSA (Rivest-Shamir-Adleman) was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman .This RSA scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n 1 for n less than 1024. It makes use of an expression with exponentials .Plaintext is encrypted in blocks and each block size must be less than or equal to log2(n). In RSA, Encryption and Decryption are of the following form, for some plaintext block M and ciphertext block C: C = Me mod n M = Cd mod n = (Me)d mod n = Med mod n
(1) Both sender and receiver must know the value of n. The sender knows the value of e, and only the receiver knows the value of d. Thus, this is a public-key encryption algorithm with a public key of PU = {e, n} and a private key of PU = {d, n}. For this algorithm to be satisfactory for public-key encryption, the following requirements must be met up in consideration of two chosen prime numbers, p,q [ 6].
ed1 mod (n) and de1 mod (n) (2) where, n = pq and (n) = (p- 1)(q -1)
and additive white Gaussian noise n2L(L implies the total number of
y=Hs+n
(3)
In Zero-Forcing(ZF) linear Channel Equalization(signal detection) scheme, the reconstructed transmitted complex signal y(4) can be written as
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
(5) In Minimum mean square error (MMSE) linear signal detection(channel Equalization)scheme, the reconstructed transmitted complex signal can be written as
(6) where, is the variance of the noise. At higher SNR, the term and the asymptotic performance is the same as ZF[7]. becomes negligible
3. SYSTEM MODEL
.A simulated single -user 2 x 2 spatially multiplexed MCCDMA wireless communication system as depicted in Figure 1 utilizes two channel coding, linear channel equalization schemes and a 1024-tone OFDM. In such a communication system, the text message is encrypted two times using Vigenere Cipher and RSA cryptographic algorithm..The doubly encrypted data are converted into binary bits and channel encoded using -rated Convolutional encoding/CRC scheme and interleaved for minimization of burst errors. The interleaved bits are digitally modulated using various types of digital modulations such as Binary Phase Shift Keying (BPSK), Differential Phase Shift Keying (DPSK), Quadrature Phase Shift Keying(QPSK) and Quadrature Amplitude modulation(QAM). The number of digitally modulated symbols is increased eight times in copying section( as the processing gain of the Walsh Hadamard codes
is eight).and subsequently multiplied with Walsh Hadamardcodes.The WalshHadamard coded digitally modulated symbols are fed into Space time block encoder for processing
12
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
with implemented philosophy of Alamoutis G2 Space time block coding scheme[8,9].The output of theSpace time block encoder are sent up into two serial to parallel converter. The serial to parallelly(S/P) converted complex data symbols are fed into each of the two OFDM modulator with 1024 sub carriers which performs an IFFT on each OFDM block of length 1024 followed by a parallel to- serial conversion. A cyclic prefix(CP) of length Lcp (0.1*1024) containing a copy of the last Lcp samples of the parallel to- serial converted output of the 1024point IFFT is then prepended. The CP is essentially a guard interval which serves to eliminate interference between OFDM symbols. However, the resulting OFDM symbols of length 1024+ Lcp are lunched from the two transmitting antenna. In receiving section, all the transmitted signals are detected with linear signal detection schemes and the detected signals are subsequently sent up to the serial to parallel(S/P) converter and fed into OFDM demodulator which performs FFT operation on each OFDM block . The FFT operated OFDM blocked signal are processed with cyclic prefix removing scheme and are undergone from parallel to serial conversion and are fed into Space time block decoder. Its output is multiplied with WalshHadamard codes .The complex symbols are digitally demodulated ,decopied , deinterleaved and channel decoded to recover the transmitted text message[10,11].
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
scheme is superior by approximately 2.2 dB as compared to ZF with CRC coding scheme at a typically considered 5% BER value.In Figure 6, the transmitted and retrieved text messages at 0dB, 2dB, 4dB and 6dB have been presented under implementation of BPSK, MMSE and Convolutional channel coding schemes. The estimated BER values at 0dB, 2dB, 4dB and 6dB are 0.1348, 0.0547, 0.0059 and 0.0 respectively.
Table 1: Summary of the simulated model parameters Text message(bits) Channel Coding 1024 -rated Convolutional and CRC Channel Encoding Modulation Cryptographic algorithm Linear Channel Equalization Scheme Antenna configuration Channel Signal to noise ratio, SNR BPSK,DPSK,QPSK and QAM Vigenere Cipher and RSA Minimum Mean Square Error (MMSE) and Zero- Forcing (ZF) 22 AWGN and Rayleigh 0 to10 dB
Figure 2 : BER performance comparison of MIMO MCCDMA system with implementation of different channel coding and channel equalization schemes under QPSK digital modulation
14
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
Figure 3 : BER performance comparison of MIMO MCCDMA system with implementation of different channel coding and channel equalization schemes under QAM digital modulation
Figure 4 : BER performance comparison of MIMO MCCDMA system with implementation of different channel coding and channel equalization schemes under DPSK digital modulation
15
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
Figure 5 : BER performance comparison of MIMO MCCDMA system with implementation of different channel coding and channel equalization schemes under BPSK digital modulation
Text message transmission in a multi user MIMO MCCDMA wireless Communication system using RSA cryptographic algorithm.
Original text message
Text dessageu9ra@<g%ssio/HinkabhY&iuserMMO MCCDMKo"c1Eless Communicatiopsytem\A)p RS crypWo#u8 hictalg*rith (b) Retrieved text message at 0dB Text mesfgetrapsmissin in a multi u'er M M MCCDMA w+rless Communication system using RSA cryptographic algorithm.1?Tv (c) Retrieved text message at 2dB Text message transmission in a multi user MIMO CCDMA wireless Communication syste- using RSA cryptographic algorithm. (d) Retrieved text message at 4dB
16
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
Text message transmission in a multi user MIMO MCCDMA wireless Communication system using RSA cryptographic algorithm. (e) Retrieved text message at 6dB Figure 6 : Transmitted and Retrieved text messages. Red marks indicate noise contamination 5. CONCLUSIONS
In my present study, I have studied the performance of a FEC encoded 2 x 2 spatially multiplexed MIMO MCCDMA wireless communication system adopting various digital modulations and linear channel equalization schemes. A range of system performance results highlights the impact of a simplified digital modulation, channel equalization(signal detection) and channel coding techniques. In the context of system performance, it can be concluded that the implementation of BPSK digital modulation techniquewithMinimum Mean Square Error(MMSE)channel equalization in Convolutionally channel Encoded MIMO MCCDMA wireless communication system provides satisfactory performance in retrieving the transmitted text message in a hostile fading channel environment.
ACKNOWLEDGEMENT
The author would like to express her gratefulness to Dr. ShaikhEnayetUllah, Ex. Professor and Chairman, Department of Information and Communication Engineering, Rajshahi University, Rajshahi, Bangladesh for critical reviewing the manuscript
REFERENCES
[1]. LajosHanzo, Yosef (Jos) Akhtman , Li Wang and Ming Jiang(2011) MIMO-OFDM for LTE, Wi-Fi and WiMAX, John Wiley and Sons Ltd, United Kingdom. [2]. Pallavi, P. and Dutta, P(2010) Muti-Carrier CDMA overview with BPSK modulation in Rayleigh channel 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Vol. 4, pp.464-469. [3]. Cornelia-IonelaBadoi, NeeliPrasad ,VictorCroitoru , Ramjee Prasad (2011)5G Based on Cognitive Radio Wireless Pers Communications, Vol.57, pp.441-464. [4] SohagSarker, FarhanaEnam, Md. GolamRashed and ShaikhEnayetUllah( 2012) Performance Analysis of Two-Layer Spreading scheme based FEC encoded MCCDMA wireless communication system under implementation of various signal detection schemes, Journal of Emerging Trends in Computing and Information Sciences, vol 3, No.4, pp 554-560, Canada [5] Douglas R. Stinson(1995)Cryptography: Theory and Practice, CRC Press, CRC Press LLC, USA 17
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.5, October 2012
[6] William Stallings(2005) Cryptography and Network Security Principles and Practices, Fourth Edition, Prentice Hall Publisher [7] Alain Sibille, Claude Oestges and Alberto Zanella(2011)MIMO From Theory to Implementation, Elsevier Inc., United Kingdom [8] John . G. Proakisand MasoudSalehi( 2001) Digital Communications, Fifth Edition, McGraw Hill Company Inc., New York, USA [9] Siavash M. Alamouti( 1998) A Simple Transmit Diversity Technique For Wireless Communications, IEEE Journal on Select areas in Communications, Vol.16, No.8, pp.1451-1458 [10]. Goldsmith, Andrea (2005),Wireless Communications, First Edition, Cambridge University Press, United Kingdom [11] L. J. Cimini, Jr.(1985) Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing, IEEE Trans. Commun., Vol. COM-33, pp. 665675.
BIOGRAPHY OF AUTHOR
MousumiHaque joined as a lecturer in the Department of Information and Communication Engineering, Faculty of Engineering, University of Rajshahi, Rajshahi, Bangladesh in 2012. She received her B.Sc. (Hons) and M.Sc. degree from the Department of Applied Physics and Electronic Engineering, University of Rajshahi, Bangladesh in 2010 and 2011 respectively. During her post graduate study in the Department of Applied Physics and Electronic Engineering, She completed a research work on FEC encoded SISO MCCDMA wireless communication system. Her research interests include advanced wireless communications with special emphasis on MCCDMA, MIMO OFDM/OFDMA radio interface technologies.
18