CFP last date
20 May 2024
Reseach Article

Article:A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect

by Rakesh Kumar Jha, Dr. Upena D. Dalal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 8
Year of Publication: 2010
Authors: Rakesh Kumar Jha, Dr. Upena D. Dalal
10.5120/1095-1431

Rakesh Kumar Jha, Dr. Upena D. Dalal . Article:A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect. International Journal of Computer Applications. 6, 8 ( September 2010), 24-27. DOI=10.5120/1095-1431

@article{ 10.5120/1095-1431,
author = { Rakesh Kumar Jha, Dr. Upena D. Dalal },
title = { Article:A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 8 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number8/1095-1431/ },
doi = { 10.5120/1095-1431 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:53.144879+05:30
%A Rakesh Kumar Jha
%A Dr. Upena D. Dalal
%T Article:A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 8
%P 24-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents WiMAX physical layer threats jamming and scrambling. The performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system development should be focused on. In addition, from the basic theory point of view, rather surprising results where also found. The work should give a clear picture of how the studied WiMAX system performs under jamming as well as without the presence of jamming. The results show that some forms of interference degrade the performance of the system rapidly, thus the form of incoming jamming should be known and considered before deploying the system. Noise jamming, multi-carrier jamming and scrambling are discussed here. The issues related to jamming and jamming reduction techniques are also covered. Jamming and scrambling can destroy communication in the targeted area. Multi-carrier jamming is challenge in WiMAX because WiMAX is having OFDM based physical layer. Simulation approach is main concern here. OPNET MODELER is the software used for the simulation purpose.

References
  1. Jeffrey G. Andrews, Arunabha Ghosh, Rias Muhamed, Fundamentals of WiMAX Understanding Broadband Wireless Networking: Prentice-Hall.
  2. Simon Haykin, Michael Moher, Modern Wireless communication, Prentice-Hall.
  3. Syed Ahson, Mohmmad Ilyas, Syed Ahson, Mohammad Ilyas, WiMAX Standards and Security. Boca Raton: CRC Press, 2008.
  4. Taeshik Shon and Wook Choi (2007), “An Analysis of Mobile WiMAX security: Vulnerabilities and Solutions”
  5. LUO Cuilan (2009), “A Simple Encryption Scheme Based on WiMAX”, Department of Electronics Jiangxi University of Finance and Economics Nanchang, China .
  6. Boris Makarevitch, “Jamming Resistant Architecture for WiMAX Mesh Network”, communications Laboratory Helsinki University of Technology.
  7. Juan Li, Sven-Gustav Häggman (2006), “Performance of IEEE 802.16 Based System in Jamming Enviornment and Its Improvement With Link Adaption”, The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’06).
  8. Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-Hennawy (2008), “WiMAX Security”, 22nd International Conference on Advanced Information Networking and applications.
  9. White paper by Motorola (2007), “WiMAX Security for Real- World Network Service Provider Deployments”.
  10. Rakesh Kumar Jha and Dr Upena Dalal “Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN)” International Conference on Recent Trends in Information, Telecommunication and Computing, IEEE Xplore,kerela,March 2010.
  11. IEEE 802.16 Working Group. IEEE 802.16-2004 Local and metropolitan area networks - Part 16: Air interface for fixed broadband wireless access systems IEEE Standard for Local and Metropolitan Area Networks[S]: IEEE Computer Society Press.
  12. IEEE 802.16 Working Group. IEEE 802.16e-2005 IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment for Physical and Medium Access Control Layers for combined Fixed and Mobile Operation in Licensed Bands[S]: IEEE Computer Society Press.
  13. Rakesh Kumar Jha, Suresh Limkar and Dr. Upena Dalal “A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks) ” IJCA Special Issue on MANETs (2):78–83, 2010. Published by Foundation of Computer Science.
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX Physical Layer Jamming Scrambling OPNET MODELER Modulation Schemes