Abstract

Based on broadcast transmission, the future Fifth-Generation networks, 5G, suffer from a critical threat, which is the eavesdropping. This issue can be fixed with the cryptographic protocols. Nevertheless, this method is complex and challenging because of the active topology of wireless networks, which does not permit effective management of security keys. Recently, Physical Layer Security (PLS) method is applied as an alternative solution to mitigate the privacy problem, where the characteristic of the physical layer schemes, namely the modulation, Massive Multi-Input Multi-Output (m-MiMo) and channel coding are exploited to ensure privacy. The fountain code is one of these methods where the legitimate receiver must recover the message before eavesdropper did. However, this feature cannot be exploited in 5G networks in the presence of an intruder using the m-MiMo. Furthermore, the design of Artificial Noise (AN) needed in m-MiMo involves a computational complexity and excessive consumption of energy that complicate the secrecy management for fountain code. In this article, we propose a new method to avoid this problem by judiciously exploiting the features of both technologies. The new approach uses the Raptor code feature, as considerably as the m-MiMo parameters aided by AN signal while reducing the transmission power of the AN. The numerical results indicate that the new approach ensures the protection of legitimate users on the channel and minimizes energy expenditure, which potentially gets to this proposed method a greener and secure transmission.

Highlights

  • The technological revolution of the Internet is thriving with the arrival of connected objects

  • To address the security problem in Massive Multi-Input Multi-Output (m-MiMo) for 5G wireless networks, a new approach is proposed in this paper

  • The proposed scheme exploits the features of the m-MiMo technique and Raptor codes to secure the main channel while minimizing the power consumption, which provides a secure green transmission

Read more

Summary

Introduction

The technological revolution of the Internet is thriving with the arrival of connected objects. These methods cannot be given to the new technologies of 5G wireless networks where the intruder uses them-MiMo, which permits it to have a high SNR to recover the signal quickly In this case, the Raptor codes can be converted into an appropriate tool for the eavesdropper that can be used to spy on the legitimate channel. To ensure security in wireless channels using Raptor code with a large number of antennas used by eavesdropper, we fully exploit the feature of the Raptor codes where Bob must intercept the K sufficient packets before Eve. In this study, we show that to fill this requirement, the power needed to design AN must be at least ς*(n) instead to that mentioned above, i.e.,.

Erasure and Rate Less Codes
Related Work
System Model
Simulation Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call