SlideShare a Scribd company logo
1 of 4
Download to read offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Engineering, Business and Enterprise
Applications (IJEBEA)
www.iasir.net
IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 58
ISSN (Print): 2279-0020
ISSN (Online): 2279-0039
Implementing security to OFDM symbols of 802.11n networks
1
SANTOSH, 2
VINOD B DURDI
1, 2
Department of Telecommunication Engineering,
Dayananda Sagar College of Engineering, VTU, Bangalore, India
Abstract: This paper mainly deals with the steganographic channels in high speed 802.11n networks. Here the modification
of cyclic prefix in OFDM has been discussed. This is the highest hidden transmission technique known till date. Here the
main focus is on the theoretical analysis and simulation results of the steganographic system performance.
Keywords: OFDM, network Steganography, IEEE 802.11n
I. INTRODUCTION
Since there is a great demand for fast and reliable wireless transmission there is a need to extend the
standardization limit of WLAN standards. In the existing solution the main focus is on the security and offered
throughput. The former has been solved by the IEEE 802.11i extension, significant “acceleration” was given
after a few years with the approval of the standard IEEE 802.11n. 802.11 [1] based networks protect users’
privacy with advanced cryptographic solutions. However, that user is still vulnerable to steganographic systems
that could be implemented in their wireless network. Fast 802.11n networks are, therefore, potentially a great
hidden transmissions carrier.
The main objective of this paper is to analyze the cyclic prefix information hiding techique which is
based on OFDM modulation [2] specifically for IEEE 802.11n networks. In order to implement this system
modified model of the 802.11n physical layer is used. The system requirements are MATLAB 7.10, Microsoft
Windows 7.
II. EXISTING SYSTEM
Steganography for 802.11 was proposed by Szczypiorski according to him information has been hidden
in the intentionally corrupted packets HICCUPS. Also as discussed in [3] and [4] the information has been
hidden in the intentionally corrupted packets where secret information will be in the modified fields of the frame
headers.WiPad, were information is hiding in the padding [5].
Disadvantages of existing methods:
i. The existing system is not fast as the cyclic prefix steganographic system system.
ii. Existing system is having more cost.
III. OFDM IN 802.11N
OFDM (Orthogonal Frequency-Division Multiplexing) means simultaneous transmission of
independent data streams in single radio channel. In OFDM subcarriers will be orthogonal to each other. In
FDM resources are shared according to the available bandwidth to a radio channels. In each of these channels
the data streams of each user are transmitted.
In the radio environment there is problem of multipath propagation where the receiver receives not
only the signal propagated but also the delayed copies of that signal which is the main reason for ISI (Inter
symbol Interference). In order to reduce ISI [6], in OFDM modulation, a special guard interval (GI) is inserted
between symbols as shown in Fig.1.
The IEEE 802.11 standards implement the guard interval by copying the ending part of each OFDM
symbol and adding it in front of that symbol. The total single symbol transmission time (Tsym) is then the sum
of the useful part of the symbol (Tu) and the duration of the GI as shown in Fig.1.
Fig.1 Cyclic prefix generation
In the case of OFDM modulation in IEEE 802.11 networks, the GI is assumed to be a constant value
TCP = 0.8μs. Optionally, 802.11n allows the shortening of the GI duration to TCP = 0.4μs in the case of good
propagation conditions.
Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61
IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 59
IV. DISCUSSION
The cyclic prefix technique is based on the existence of the cyclic prefix in the OFDM modulation. It
improves the quality of transmission in the standard network. The cyclic prefix has to be introduced at the right
place ie before its transmission and after the modulation. The duration of the GI remains unchanged the
described modification does not affect the correct operation of the wireless network.
The IEEE 802.11n standard distinguishes several modulation and coding schemes (MCSs) and allows
the usage of one from the four modulations (BPSK, QPSK, 16-QAM or 64-QAM). It is chosen in such a way as
to obtain the maximum possible bandwidth in a given environment at a given moment.
The cyclic prefix technique modifies the cyclic prefix at physical layer. There is a problem of choosing
antennas and the transmitters whose prefixes are to be modified. The need to finding and read these modified
symbols in the steganographic receiver [7] must be taken into account.
In order to accomplish this transmitter and receiver should have identical pseudo random number
generators (PRNGs). This type of generator allows the creation of a sequence of numbers that is similar to
random. The most important feature is that such a sequence is created in the deterministic manner that is based
on the input source. In other words, in the case of two identical generators with the same input, both output
random sequences are the same.
In order to increase the security of this system both the transmitter and the receiver should use secret
private key as the input to their generators [8]. Randomly generated numbers are from 0 to Tmax and determine
the distance between symbols. Scheduled to have modified cyclic prefixes this allows system dependency on a
secret that is known only to the hidden transmission parties.
The synchronization between the transmitter and the receiver is the time of the pseudo-random number
sequence and the beginning of the hidden transmission. For this purpose, the transmitter must notify the
steganographic receiver of setting-up the hidden channel and the message length [9] (number of fragments).
After receiving the starting information, both parties generate a random sequence of the desired length and
gradually, with an appropriate spacing between modified symbols (prefixes), send fragments of the secret
message.
V. SYSTEM PARAMETERS
In case of BPSK modulation the code rate is 1/2, for a single transmitting antenna of 20 MHz [10] channels.
Here if the GI TCP = 0,8 μs (i.e. Tsym = 4 μs) there are symbol rate = 250,000 OFDM symbols per second
transmitted. Each symbol carries 52 coded bits (NCBPS) and half of them are data bits (NDBPS). From the
above example in BPSK modulation, the useful part of the OFDM symbol (Tu = 3.2 μs) carries 52 bits.
Therefore, as in 0.8 μs of the GI it is possible to carry 13 bits, in the case of the modification of each OFDM
symbol and avoiding using error correction coding, it is possible to achieve 3.25 Mb/s capacity of the hidden
channel. The capacity can be determined from below mentioned equation[10].
CMAX = NCBPS . (TCP / Tu ) . SR (1)
Based on the modulation used the maximum capacity is [10]:
3.25 Mb/s when using BPSK modulation.
6.5 Mb/s when using QPSK modulation.
13.0 Mb/s when using 16-QAM modulation.
19.5 Mb/s when using 64-QAM modulation.
In the case of ordinary network users the steganography system user includes an additional cost which
results from the interference of the hidden system implemented in the network. In the cyclic prefix technique
user don’t lose their available bandwidth since the secret information is carried in parts of the OFDM system
which are ignored anyway.
Security is accomplished by the randomized selection of modified symbols that is based on a secret
key. Detection (without knowing the key) of the steganographic channel created in the cyclic prefix technique
requires observation and study of the cyclic prefixes in every single OFDM symbol in the network. Moreover,
such an unauthorized observer should be able to separate and compare the two extremes of the already
modulated OFDM symbol. For the casual user, who does not feel the presence of a hidden channel, this task is
impossible, especially when the secret message is additionally encrypted.
VI. SIMULATION RESULTS
From Fig.2. It shows that, while using 64-QAM, with SNR = -10 dB and Tmax = 0, gained throughput
is greater than 10Mb/s. However, in this case, the BER is too high to read the entire message properly.
Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61
IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 60
Fig. 2 BER as a function of SNR in the hidden channel for the AWGN radio channel model
From Fig.3. We can say that BER as a function of SNR for chosen MCS in the ordinary channel with
and without the steganographic system implemented will generate same result. which means the stegenographic
system hidden transmission uses part of the OFDM symbol which will not uses extra bandwidth which will not
demands extra cost.
Fig. 3 BER as a function of SNR with steganographic system implemented.
VI. CONCLUSION
The cyclic prefix steganographic system does not generate any additional cost that ordinary users
would incur. The secret private keys, introduced in the system generate random spaces between transmitted
hidden message fragments which increases security of the system.
In this system there is a need to set an additional signaling channel that would be used to agree the
value of private keys and provide information about the start of transmission.
V. References
[1] Cho Y., Kim J., Yang W., Kang C., “MIMO-OFDM Wireless Communications with MATLAB”, John Wiley & Sons Ltd., 1996.
[2] Anibal Louis Intini, “OFDM multipliexing for wireless networks”, University of California.
[3] Frikha L., Trabelsi Z., El-Hajj W., “Implementation of a Covert Channel in the 802.11 Header”, Proc. Wireless Communications
and Mobile Computing Conference (IWCMC 08), 6–8 Aug. 2003, pp. 594–599, doi: 10.1109/IWCMC.2003.103.
[4] Szczypiorski K., “A Performance Analysis of HICCUPS – a Steganographic System for WLAN”, Proc. International
Conference on Multimedia Information Networking and Security (MINES 2010), –20 Nov. 2010, vol. 1, pp. 569–572, doi:
10.1109/MINES.2010.248. 28–54, First Quarter 2009, doi: 10.1109/MCAS.2009.915504.
[5] Szczypiorski K., “HICCUPS: Hidden Communication System for Corrupted Networks”, Proc. 10th International Multi-
Conference on Advanced Computer Systems (ACS’2003), 22–24 Oct. 2010, pp. 31–40.
[6] IEEE Standard 802.11n-2008, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications –
Amendment
[7] Krätzer C., Dittman J., Lang A., Kühne T.,“WLAN Steganography: A First Practical Review”, Proc. 8th Workshop on
Multimedia and Security, 26–27 Sept. 2009, pp. 17–22,doi: 10.1145/1161366.1161371.
Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61
IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 61
[8] Paul T., Ogunfunmi T., “Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amandment”, Circuits and Systems
Magazine, IEEE, vol. 8, no. 1, pp.
[9] Title “Fundamentals of wireless communication”. David Tse. Publisher. Cambridge university press 2005.
[10] Szymon Grabski, Krzysztof Szczypiorski. “Steganography in OFDM Symbols of Fast IEEE 802.11n Networks”, IEEE 2013.
Author profile
1
Santosh, received B.E Degree in Electronics and Communication from Visvesvaraya Technological University in 2011, Currently Pursuing
M.Tech Degree in Digital Communication and Networking from Visvesvaraya Technological University in 2014, Department of
Telecommunication Engineering, Dayanand Sagar College of Engineering, Bangalore India.
2
Vinod B Durdi received BE (Electronics and Communication) from Karnataka University, Dharwad, in 2000. He obtained M.Tech (Digital
Communication) from Visvesvaraya Technological University (VTU), Belgaum, in 2003. He is presently pursuing Ph.D form Visvesvaraya
Technological University (VTU), Belgaum, India. His research interest includes video processing, wireless networks, network security and
chaos communication. He has authored and coauthored the various research papers in major national and international conference
proceeding. He is currently Associate Professor in Dayananda Sagar College of Engineering, Banglore, India.

More Related Content

What's hot

Simulation model of dc servo motor control
Simulation model of dc servo motor controlSimulation model of dc servo motor control
Simulation model of dc servo motor controlEvans Marshall
 
Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Bindia Kumari
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Dynamic optimization of overlap
Dynamic optimization of overlapDynamic optimization of overlap
Dynamic optimization of overlapcsandit
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
Resolving data collision in csma via protocols
Resolving data collision in csma via protocolsResolving data collision in csma via protocols
Resolving data collision in csma via protocolsAnurag Singh
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsPaul Andrew
 

What's hot (18)

Simulation model of dc servo motor control
Simulation model of dc servo motor controlSimulation model of dc servo motor control
Simulation model of dc servo motor control
 
Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Dynamic optimization of overlap
Dynamic optimization of overlapDynamic optimization of overlap
Dynamic optimization of overlap
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
high speed network
high speed networkhigh speed network
high speed network
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
Resolving data collision in csma via protocols
Resolving data collision in csma via protocolsResolving data collision in csma via protocols
Resolving data collision in csma via protocols
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 

Similar to Implementing OFDM Cyclic Prefix Steganography

Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...cscpconf
 
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...Performance Analysis of BER and Throughput of Different MIMO Systems using Di...
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...IRJET Journal
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
 
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET Journal
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...IJERA Editor
 
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...ijwmn
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemIJERA Editor
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
 
A041203010014
A041203010014A041203010014
A041203010014IOSR-JEN
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkeSAT Journals
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkeSAT Publishing House
 
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET Journal
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET Journal
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 

Similar to Implementing OFDM Cyclic Prefix Steganography (20)

Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...
DYNAMIC OPTIMIZATION OF OVERLAPAND- ADD LENGTH OVER MBOFDM SYSTEM BASED ON SN...
 
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...Performance Analysis of BER and Throughput of Different MIMO Systems using Di...
Performance Analysis of BER and Throughput of Different MIMO Systems using Di...
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
IRJET- Survey Paper on Performance Evaluation of 5G WiMAX (IEEE 802.16) Syste...
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
 
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
Channel Estimation Techniques in MIMO-OFDM LTE SystemsCauses and Effects of C...
 
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...
DYNAMIC OPTIMIZATION OF OVERLAP-AND-ADD LENGTH OVER MIMO MBOFDM SYSTEM BASED ...
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
50120130405012
5012013040501250120130405012
50120130405012
 
A041203010014
A041203010014A041203010014
A041203010014
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation network
 
Improving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation networkImproving quality of service using ofdm technique for 4 th generation network
Improving quality of service using ofdm technique for 4 th generation network
 
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
IRJET-Analysis of Medium Access Protocols with Channel Bonding for Cognitive ...
 
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...IRJET-Simulation of Channel-Estimation for Digital Communication System based...
IRJET-Simulation of Channel-Estimation for Digital Communication System based...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 

More from Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Implementing OFDM Cyclic Prefix Steganography

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise Applications (IJEBEA) www.iasir.net IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 58 ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 Implementing security to OFDM symbols of 802.11n networks 1 SANTOSH, 2 VINOD B DURDI 1, 2 Department of Telecommunication Engineering, Dayananda Sagar College of Engineering, VTU, Bangalore, India Abstract: This paper mainly deals with the steganographic channels in high speed 802.11n networks. Here the modification of cyclic prefix in OFDM has been discussed. This is the highest hidden transmission technique known till date. Here the main focus is on the theoretical analysis and simulation results of the steganographic system performance. Keywords: OFDM, network Steganography, IEEE 802.11n I. INTRODUCTION Since there is a great demand for fast and reliable wireless transmission there is a need to extend the standardization limit of WLAN standards. In the existing solution the main focus is on the security and offered throughput. The former has been solved by the IEEE 802.11i extension, significant “acceleration” was given after a few years with the approval of the standard IEEE 802.11n. 802.11 [1] based networks protect users’ privacy with advanced cryptographic solutions. However, that user is still vulnerable to steganographic systems that could be implemented in their wireless network. Fast 802.11n networks are, therefore, potentially a great hidden transmissions carrier. The main objective of this paper is to analyze the cyclic prefix information hiding techique which is based on OFDM modulation [2] specifically for IEEE 802.11n networks. In order to implement this system modified model of the 802.11n physical layer is used. The system requirements are MATLAB 7.10, Microsoft Windows 7. II. EXISTING SYSTEM Steganography for 802.11 was proposed by Szczypiorski according to him information has been hidden in the intentionally corrupted packets HICCUPS. Also as discussed in [3] and [4] the information has been hidden in the intentionally corrupted packets where secret information will be in the modified fields of the frame headers.WiPad, were information is hiding in the padding [5]. Disadvantages of existing methods: i. The existing system is not fast as the cyclic prefix steganographic system system. ii. Existing system is having more cost. III. OFDM IN 802.11N OFDM (Orthogonal Frequency-Division Multiplexing) means simultaneous transmission of independent data streams in single radio channel. In OFDM subcarriers will be orthogonal to each other. In FDM resources are shared according to the available bandwidth to a radio channels. In each of these channels the data streams of each user are transmitted. In the radio environment there is problem of multipath propagation where the receiver receives not only the signal propagated but also the delayed copies of that signal which is the main reason for ISI (Inter symbol Interference). In order to reduce ISI [6], in OFDM modulation, a special guard interval (GI) is inserted between symbols as shown in Fig.1. The IEEE 802.11 standards implement the guard interval by copying the ending part of each OFDM symbol and adding it in front of that symbol. The total single symbol transmission time (Tsym) is then the sum of the useful part of the symbol (Tu) and the duration of the GI as shown in Fig.1. Fig.1 Cyclic prefix generation In the case of OFDM modulation in IEEE 802.11 networks, the GI is assumed to be a constant value TCP = 0.8μs. Optionally, 802.11n allows the shortening of the GI duration to TCP = 0.4μs in the case of good propagation conditions.
  • 2. Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61 IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 59 IV. DISCUSSION The cyclic prefix technique is based on the existence of the cyclic prefix in the OFDM modulation. It improves the quality of transmission in the standard network. The cyclic prefix has to be introduced at the right place ie before its transmission and after the modulation. The duration of the GI remains unchanged the described modification does not affect the correct operation of the wireless network. The IEEE 802.11n standard distinguishes several modulation and coding schemes (MCSs) and allows the usage of one from the four modulations (BPSK, QPSK, 16-QAM or 64-QAM). It is chosen in such a way as to obtain the maximum possible bandwidth in a given environment at a given moment. The cyclic prefix technique modifies the cyclic prefix at physical layer. There is a problem of choosing antennas and the transmitters whose prefixes are to be modified. The need to finding and read these modified symbols in the steganographic receiver [7] must be taken into account. In order to accomplish this transmitter and receiver should have identical pseudo random number generators (PRNGs). This type of generator allows the creation of a sequence of numbers that is similar to random. The most important feature is that such a sequence is created in the deterministic manner that is based on the input source. In other words, in the case of two identical generators with the same input, both output random sequences are the same. In order to increase the security of this system both the transmitter and the receiver should use secret private key as the input to their generators [8]. Randomly generated numbers are from 0 to Tmax and determine the distance between symbols. Scheduled to have modified cyclic prefixes this allows system dependency on a secret that is known only to the hidden transmission parties. The synchronization between the transmitter and the receiver is the time of the pseudo-random number sequence and the beginning of the hidden transmission. For this purpose, the transmitter must notify the steganographic receiver of setting-up the hidden channel and the message length [9] (number of fragments). After receiving the starting information, both parties generate a random sequence of the desired length and gradually, with an appropriate spacing between modified symbols (prefixes), send fragments of the secret message. V. SYSTEM PARAMETERS In case of BPSK modulation the code rate is 1/2, for a single transmitting antenna of 20 MHz [10] channels. Here if the GI TCP = 0,8 μs (i.e. Tsym = 4 μs) there are symbol rate = 250,000 OFDM symbols per second transmitted. Each symbol carries 52 coded bits (NCBPS) and half of them are data bits (NDBPS). From the above example in BPSK modulation, the useful part of the OFDM symbol (Tu = 3.2 μs) carries 52 bits. Therefore, as in 0.8 μs of the GI it is possible to carry 13 bits, in the case of the modification of each OFDM symbol and avoiding using error correction coding, it is possible to achieve 3.25 Mb/s capacity of the hidden channel. The capacity can be determined from below mentioned equation[10]. CMAX = NCBPS . (TCP / Tu ) . SR (1) Based on the modulation used the maximum capacity is [10]: 3.25 Mb/s when using BPSK modulation. 6.5 Mb/s when using QPSK modulation. 13.0 Mb/s when using 16-QAM modulation. 19.5 Mb/s when using 64-QAM modulation. In the case of ordinary network users the steganography system user includes an additional cost which results from the interference of the hidden system implemented in the network. In the cyclic prefix technique user don’t lose their available bandwidth since the secret information is carried in parts of the OFDM system which are ignored anyway. Security is accomplished by the randomized selection of modified symbols that is based on a secret key. Detection (without knowing the key) of the steganographic channel created in the cyclic prefix technique requires observation and study of the cyclic prefixes in every single OFDM symbol in the network. Moreover, such an unauthorized observer should be able to separate and compare the two extremes of the already modulated OFDM symbol. For the casual user, who does not feel the presence of a hidden channel, this task is impossible, especially when the secret message is additionally encrypted. VI. SIMULATION RESULTS From Fig.2. It shows that, while using 64-QAM, with SNR = -10 dB and Tmax = 0, gained throughput is greater than 10Mb/s. However, in this case, the BER is too high to read the entire message properly.
  • 3. Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61 IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 60 Fig. 2 BER as a function of SNR in the hidden channel for the AWGN radio channel model From Fig.3. We can say that BER as a function of SNR for chosen MCS in the ordinary channel with and without the steganographic system implemented will generate same result. which means the stegenographic system hidden transmission uses part of the OFDM symbol which will not uses extra bandwidth which will not demands extra cost. Fig. 3 BER as a function of SNR with steganographic system implemented. VI. CONCLUSION The cyclic prefix steganographic system does not generate any additional cost that ordinary users would incur. The secret private keys, introduced in the system generate random spaces between transmitted hidden message fragments which increases security of the system. In this system there is a need to set an additional signaling channel that would be used to agree the value of private keys and provide information about the start of transmission. V. References [1] Cho Y., Kim J., Yang W., Kang C., “MIMO-OFDM Wireless Communications with MATLAB”, John Wiley & Sons Ltd., 1996. [2] Anibal Louis Intini, “OFDM multipliexing for wireless networks”, University of California. [3] Frikha L., Trabelsi Z., El-Hajj W., “Implementation of a Covert Channel in the 802.11 Header”, Proc. Wireless Communications and Mobile Computing Conference (IWCMC 08), 6–8 Aug. 2003, pp. 594–599, doi: 10.1109/IWCMC.2003.103. [4] Szczypiorski K., “A Performance Analysis of HICCUPS – a Steganographic System for WLAN”, Proc. International Conference on Multimedia Information Networking and Security (MINES 2010), –20 Nov. 2010, vol. 1, pp. 569–572, doi: 10.1109/MINES.2010.248. 28–54, First Quarter 2009, doi: 10.1109/MCAS.2009.915504. [5] Szczypiorski K., “HICCUPS: Hidden Communication System for Corrupted Networks”, Proc. 10th International Multi- Conference on Advanced Computer Systems (ACS’2003), 22–24 Oct. 2010, pp. 31–40. [6] IEEE Standard 802.11n-2008, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications – Amendment [7] Krätzer C., Dittman J., Lang A., Kühne T.,“WLAN Steganography: A First Practical Review”, Proc. 8th Workshop on Multimedia and Security, 26–27 Sept. 2009, pp. 17–22,doi: 10.1145/1161366.1161371.
  • 4. Santosh et al., International Journal of Engineering, Business and Enterprise Applications, 8(1), March-May., 2014, pp. 58-61 IJEBEA 14-238; © 2014, IJEBEA All Rights Reserved Page 61 [8] Paul T., Ogunfunmi T., “Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amandment”, Circuits and Systems Magazine, IEEE, vol. 8, no. 1, pp. [9] Title “Fundamentals of wireless communication”. David Tse. Publisher. Cambridge university press 2005. [10] Szymon Grabski, Krzysztof Szczypiorski. “Steganography in OFDM Symbols of Fast IEEE 802.11n Networks”, IEEE 2013. Author profile 1 Santosh, received B.E Degree in Electronics and Communication from Visvesvaraya Technological University in 2011, Currently Pursuing M.Tech Degree in Digital Communication and Networking from Visvesvaraya Technological University in 2014, Department of Telecommunication Engineering, Dayanand Sagar College of Engineering, Bangalore India. 2 Vinod B Durdi received BE (Electronics and Communication) from Karnataka University, Dharwad, in 2000. He obtained M.Tech (Digital Communication) from Visvesvaraya Technological University (VTU), Belgaum, in 2003. He is presently pursuing Ph.D form Visvesvaraya Technological University (VTU), Belgaum, India. His research interest includes video processing, wireless networks, network security and chaos communication. He has authored and coauthored the various research papers in major national and international conference proceeding. He is currently Associate Professor in Dayananda Sagar College of Engineering, Banglore, India.