Performance Analysis of WiMAX under Single and Multi-Carrier Jamming

Similar documents
WiMAX System Simulation and Performance Analysis under the Influence of Jamming

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Guide to Wireless Communications, Third Edition Cengage Learning Objectives

Analysis Of Wimax Connectivity In Rural And Urban Area Using Propagation Model

Performance Enhancement of WiMAX System using Adaptive Equalizer

Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni WiMAX

OBJECTIVES. Understand the basic of Wi-MAX standards Know the features, applications and advantages of WiMAX

EC 551 Telecommunication System Engineering Mohamed Khedr

ECS455: Chapter 4 Multiple Access

Nand Dhandhukia, Dr. Kiran Parmar 3 NODE MODELS AND SIMULATION SCENARIOS

Introduction to WiMAX Dr. Piraporn Limpaphayom

Solutions. Innovation in Microwave Communications. Backhauling WiMAX on Wide Channel TDD

WiMAX/ Wireless WAN Case Study: WiMAX/ W.wan.6. IEEE 802 suite. IEEE802 suite. IEEE 802 suite WiMAX/802.16

Modelling and Performances Analysis of WiMAX/IEEE Wireless MAN OFDM Physical Downlink

Overview of IEEE Broadband Wireless Access Standards. Timo Smura Contents. Network topologies, frequency bands

Wireless WAN Case Study: WiMAX/ W.wan.6

Academic Course Description

Performance Evaluation of IEEE e (Mobile WiMAX) in OFDM Physical Layer

Academic Course Description. CO2110 OFDM/OFDMA COMMUNICATIONS Third Semester, (Odd semester)

Wireless Broadband Networks

RECOMMENDATION ITU-R F Radio interface standards for broadband wireless access systems in the fixed service operating below 66 GHz

Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks

COMPARISON BETWEEN LTE AND WIMAX

Multiple Access Schemes

TDD and FDD Wireless Access Systems

A R DIGITECH International Journal Of Engineering, Education And Technology (ARDIJEET) X, VOLUME 2 ISSUE 1, 01/01/2014

PERFORMANCE ANALYSIS OF DOWNLINK MIMO IN 2X2 MOBILE WIMAX SYSTEM

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

WiMAX and Non-Standard Solutions

Capacity Enhancement in Wireless Networks using Directional Antennas

Department of Computer Science Institute for System Architecture, Chair for Computer Networks

Downlink Scheduling in Long Term Evolution

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

Optimizing WiMAX: Mitigating Co-Channel Interference for Maximum Spectral Efficiency

Overview of Mobile WiMAX Technology

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve

RADIO LINK ASPECT OF GSM

CDMA & WCDMA (UMTS) AIR INTERFACE. ECE 2526-WIRELESS & CELLULAR COMMUNICATION SYSTEMS Monday, June 25, 2018

Technical Aspects of LTE Part I: OFDM

Effective Bandwidth Utilization in WiMAX Network

Chapter 14. Cellular Wireless Networks

IEEE Project m as an IMT-Advanced Technology

Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage

2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved.

MULTIPLE-INPUT MULTIPLE-OUTPUT (MIMO) The key to successful deployment in a dynamically varying non-line-of-sight environment

Mobile Communication Systems. Part 7- Multiplexing

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Multiplexing Module W.tra.2

Key words: OFDM, FDM, BPSK, QPSK.

Data and Computer Communications. Tenth Edition by William Stallings

Performance Analysis of WiMAX Physical Layer Model using Various Techniques

Boosting Microwave Capacity Using Line-of-Sight MIMO

Planning of LTE Radio Networks in WinProp

Improving the Data Rate of OFDM System in Rayleigh Fading Channel Using Spatial Multiplexing with Different Modulation Techniques

TESTING OF FIXED BROADBAND WIRELESS SYSTEMS AT 5.8 GHZ

UNIK4230: Mobile Communications. Abul Kaosher

Performance Evaluation of 3G CDMA Networks with Antenna Arrays

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

CHAPTER : 1 INTRODUCTION. 1.1 Basic. 1.2 System Modeling and Simulation

Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow.

CDMA - QUESTIONS & ANSWERS

Chapter 6 Applications. Office Hours: BKD Tuesday 14:00-16:00 Thursday 9:30-11:30

Dynamic Frequency Hopping in Cellular Fixed Relay Networks

Wireless TDMA Mesh Networks

Bluetooth BlueTooth - Allows users to make wireless connections between various communication devices such as mobile phones, desktop and notebook comp

Design of a new IT Infrastructure for the Region of Nordjylland. Access Network

Access Methods and Spectral Efficiency

RADWIN JET PtMP Beamforming solution delivers fiber-like connectivity for residential and enterprise. 750 Mb

DESIGN AND IMPLEMENTATION OF WCDMA RAKE RECEIVER USED IN 3G WIRELESS COMMUNICATION

Cellular systems 02/10/06

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

Wireless Physical Layer Concepts: Part III

Seeking Partnership for Pilot Test-beds for Assessing Broadband Deployment in UHF-TV White Space of India

A MULTICARRIER CDMA ARCHITECTURE BASED ON ORTHOGONAL COMPLEMENTARY CODES FOR NEW GENERATION OF WIDEBAND WIRELESS COMMUNICATIONS

WiMAX: , e, WiBRO Introduction to WiMAX Measurements

Deployment Examples and Guidelines for GPS Synchronization

Wireless Medium Access Control and CDMA-based Communication Lesson 14 CDMA2000

Page 1. Problems with 1G Systems. Wireless Wide Area Networks (WWANs) EEC173B/ECS152C, Spring Cellular Wireless Network

RADWIN JET POINT-TO-MULTIPOINT BEAMFORMING SOLUTION DELIVERS FIBER-LIKE CONNECTIVITY FOR RESIDENTIAL AND ENTERPRISE

Keywords WiMAX, BER, Multipath Rician Fading, Multipath Rayleigh Fading, BPSK, QPSK, 16 QAM, 64 QAM.

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Dimensioning Cellular WiMAX Part II: Multihop Networks

4x4 Time-Domain MIMO encoder with OFDM Scheme in WIMAX Context

University of Bristol - Explore Bristol Research. Peer reviewed version

ROUTING AND SCHEDULING USING COLUMN GENERATION IN IEEE J WIRELESS RELAY NETWORKS

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Full Spectrum: Mission Critical Private Wireless Networks

MULTI-HOP RADIO ACCESS CELLULAR CONCEPT FOR FOURTH-GENERATION MOBILE COMMUNICATION SYSTEMS

REPORT ITU-R M Characteristics of broadband wireless access systems operating in the land mobile service for use in sharing studies

SC - Single carrier systems One carrier carries data stream

RADWIN JET PtMP Beamforming solution for fiber-like connectivity

RADWIN 5000 JET REDEFINING POINT-TO-MULTIPOINT WIRELESS CONNECTIVITY IN SUB-6GHZ BANDS

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

EE 577: Wireless and Personal Communications

GTBIT ECE Department Wireless Communication

RADWIN JET PtMP Beamforming solution delivers fiber-like connectivity for residential and enterprise. 750 Mbps. PtMP solution with PtP performance

Chapter 1 Introduction

IEEE P Broadband Wireless Access Working Group

Planning Your Wireless Transportation Infrastructure. Presented By: Jeremy Hiebert

LiFi Vs WiFi Vs WiMAX

Transcription:

144 Performance Analysis of WiMAX under Single and Multi-Carrier Jamming Gurkamal Singh and Maninder Singh *Punjabi university, DEPT. of Computer science, Patiala, India Summary WiMAX is at the peak of communication technology as it is gaining a great position in the next generation of wireless networks. With the development of various wireless networks rapidly, they have turn into necessary infrastructure in our networking atmosphere. The main challenge for WiMAX is the problems associated with various jamming attacks that make them unavailable. Jamming attack is easy to be launched with very little efforts while its damage is severe since it effects the communication of all the nodes in the jamming range. This paper examines the threats at physical layer of the WiMAX and the performance analysis of WiMAX under physical layer is discussed. Issues related to single carrier jamming and multi carrier jamming has been covered. Various antenna patterns like Omni directional antenna isotropic antenna and sector antenna has been discussed with their effect on the WiMAX system has been discussed. Key words WiMAX, Jamming, Network Security, Wireless Communication, Single Carrier Jamming, Multi-Carrier Jamming 1. A WiMAX tower or Base Station 2. A WiMAX receiver A WiMAX tower station as shown in figure 1 can connect directly to the Internet using a high bandwidth, wired connection and it can also connect to another WiMAX tower using a LOS microwave link which is also called backhaul. 1. Introduction Wi-MAX which stands for Worldwide Interoperability for Microwave Access is a telecommunications technology that provides wireless transmission of data using a variety of broadcast modes, from point-to-point links to portable Internet access technology providing up to 75 Mb/s symmetric broadband speeds without the need for cables like DSL. The technology is based on the IEEE 802.16 standard also called Broadband Wireless Access. The unique idea of WiMAX is to offer users in rural areas with high speed communications as an alternative to comparatively costly wired connections. WiMAX standard includes utilization of adaptive modulation and coding, which makes it possible to provide users with high connection speeds close to the BS (Base Station) and lower speeds when the radio channel is not as good. It is also designed to enable LANs to communicate with each other through a WMAN.The WiMAX technology is capable of providing a platform to deliver the applications for the convergence of data, voice, and video services [4]. WiMAX works in the same way as Wi-Fi but at higher speeds over greater distances and with increased numbers of users. Mainly WiMAX consists of two parts [8]: Figure 1: WiMAX Network This paper is divided into total of seven sections. Section II describes physical layer threats under which duplex scheme has been discussed. In Section III related work has been examined. Section IV consists of Simulation setup. Section V gives simulation results of our proposed Opnet model. Section VI concludes with the conclusion 2. Physical Layer Attacks There are two basic types of attacks that can affect the physical layer of WiMAX. One is jamming and the other is packet scrambling. The first is comparatively simple, and it sometimes results in interference rather than an attack. Jamming is a disruption of the frequency such as strong noise. It can either be intentional or accidental. Increasing the power of the signal can be achieved easily by means of using a more powerful transmitter or a high gain transmission antenna and a high gain receiving antenna. At various points most WiMAX service providers will face some type of interference or jamming problem. Jamming consists of a stronger signal than the WiMAX network Manuscript received July 5, 2013 Manuscript revised July 20, 2013

145 crushing network data feeds either in discontinuous bursts or with constant carrier waves. 2.1 Duplexing scheme in WiMAX: TDD or FDD Duplexing is a two way wireless transmission that refers to the way downlink and uplink data is arranged in the system. The downlink carries information from a Base Station (BS) to Subscriber Stations (SSs). Downlink is also known as forward link. The uplink carries information from a Subscriber Station to a Base Station. It is also known as reverse link. Duplexing techniques are of two types: FDD and TDD. for transmitting downlink and uplink sub-frames at two distinct time slots Moreover, using TDD downlink to uplink (DL/UL) ratio can be adjusted dynamically. TDD can flexibly handle both symmetric and asymmetric broadband traffic. Figure 2.3 shows that Downlink and uplink sub-frames are transmitted at different time slots in one channel. Figure 4: Time Division Duplex (TDD) Figure 2: Downlink and uplink traffic in a 2-way communication. FDD (Frequency Division Duplex) requires two different channels for transmitting downlink sub-frame and uplink sub-frame at the identical time slot. Bi-directional voice service is suitable for FDD since it occupies a symmetric downlink and uplink channel pair. WiMAX supports fullduplex FDD and half-duplex FDD. The difference is in full-duplex FDD a user device can broadcast and receive simultaneously, while in half-duplex FDD a user device can only broadcast or receive at any given instant. Figure 3: Frequency Division Duplex (FDD) - full duplex mode FDD is ineffective for handling asymmetric data services since data traffic occupy a small part of a channel bandwidth at any given time. TDD (Time Division Duplex) is another duplexing scheme that requires only one channel Most WiMAX implementations either on licensed or license-exempt bands will most likely use TDD. One advantage of using is that TDD uses half of FDD spectrum thus saving the bandwidth, other can be TDD system is less composite and thus cheaper, and WiMAX traffic will be conquered by asymmetric data.fixed WiMAX profiles support both TDD and FDD, while Mobile WiMAX profiles only comprise TDD. In the next section of the paper, physical layer features and framing of TDD is discussed. 3. Related Work Syed Ahson [10] analyzed that there are two principal threats to the WiMAX PHY are jamming and scrambling. Resilience to jamming can be augmented by increasing the power of signals or increasing the bandwidth of signals via spreading techniques such as: Frequency hopping Direct sequence spread spectrum The practical options include a more powerful WiMAX transmitter, a high gain WiMAX transmission antenna, or a high gain WiMAX receiving antenna. It is easy to detect jamming in WiMAX communications as it can be heard by the receiving equipment. Law enforcement can also be involved to stop jammers. In this paper, the performance of an IEEE802.16-2004 based system in jamming environment is evaluated by computer simulations. Two categories of jamming, multi carrier pilot jamming and partial-band jamming, are investigated. The results reveal that, the system exposed to multi carrier pilot jamming suffers greater throughput loss than the system exposed to partial-band jamming, when the same total jamming power is applied.

146 A survey was made by Mahmoud Nasreldin [7] on carrierto-interference-noise ratio (CINR) based link adaptation algorithm is also proposed to enhance the system resistance to jamming. According to the simulations, the system performance is improved by applying the algorithm. This paper presents a jamming resistant architecture for military applications of WiMAX (802.16) mesh network. The main idea is to use multiple base stations (BS), access points to the fixed core network. This will facilitate network survivability both in case of BS destruction and in case of jamming. When the nodes are affected by jamming they can reroute to another base station if possible. According to Juan Li [5] the multiple base station architecture requires distributed scheduling as there is no single point of control that can execute centralized scheduling. A distributed scheduling algorithm, performing well in both jammed and non-jammed environment, is a key issue in implementation of the architecture. Several scheduling algorithms are considered in the paper: a static algorithm using the number of traffic flows in the node, dynamic load-dependent algorithms using two and threehop neighbor information. Finally, an algorithm based on finite field initial slot assignment is proposed. This algorithm uses two-hop information and is also loaddependent. Performance of different algorithms is evaluated with and without jamming. The finite field algorithm shows the best performance in both cases. LUO Cuilan [6] has provided us two goals to achieve the efficient security of WiMAX, one is to provide privacy across the wireless network and the other is to provide access control to the network. Privacy is accomplished by encrypting connections between the subscriber station and the base station. The base station protects against unauthorized access by enforcing encryption of service flows across the network. Rakesh Kumar Jha [8] has described the performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system development should be focused on. There are several techniques to reduce the jamming. BEAMFORMING, It is the technique to improve the directionality of the antenna. This technique is useful in the base station which uses sector pattern instead of the Omni directional antenna. Let s consider three sector of base station antenna. If jamming antenna is in sector one then the other two sectors are less affected by the jammer. Jamming resistant architecture, this jamming resistant architecture is also used to reduce the jamming effects. In this architecture more than one base station is used in one cell. All subscriber stations are connected in mesh topology including base stations which is serving in particular cell. Multi-tone pilot jamming affects the system more severely than partial-band jamming under the same Jamming power. In multi-tone pilot jamming, the number of jammed pilots decides the jamming severity and jamming 8 (full) pilots degrades the system to the most. In partial band jamming, system performance is degraded by either increased power of sub jammer or increased number of sub jammer, depending on the level of jamming power. 4. Simulation Methodology In this paper, we use the OPNET Modeler 14.5 Simulator tool for simulation. We have built a jammer with transmitter and receiver while in the multicarrier jamming we have mobile nodes and wimax config with http application configuration and http_prof profile configuration and a mobile jammer is used. 4.1 Node Model of Jammer Jammer is achieved by changing the modulation to jam mod. Figure 5: Node Model of Jammer Design of jammer is given in this paper using Opnet modeler but it is not feasible to include each step by step procedure. The plan has been discussed in the paper for the design of jammer. 4.2 Simulation Model for Single Jamming Figure 6: Simulation Model of Single Carrier Jamming

147 C Simulation Model for Multicarrier Jamming 5. Result Figure 7: Simulation Model for Multicarrier Jamming Bit error rate difference in single carrier jamming with isotropic and sector antenna Figure 9: Throughput vs Simulation time The graph of throughput in case of isotropic antenna is.60 then after 1 minute it almost drops to zero because of maximum error rate. Throughput in case of directional antenna is high than that of isotropic antenna. As a result this shows us that the performance with the use of directional antenna increases. When the bit error rate is high it almost drops and afterwards it again increases. Figure 8: BER vs. Simulation time The graph for the isotropic antenna pattern shows that the bit error rate at the receiver node steadily increased as the distance between the jammer and receiver nodes decreases. The isotropic receiver antenna receives jammer interference during the entire simulation. The graph for the directional shows that bit error rate at the receiver node is non-zero at the start as the distance between the jammer node and receiver node decreases. After approximately 6 minutes, the bit error rate increases and the number of packets received first drops then increases again when the jammer leaves the antenna's sector and the bit error rate drops back to 0. Figure 10: Throughput of 512 sub carrier Figure 11: Throughput of 1024 sub carrier

148 With the increase in sub carrier in multi carrier jamming there is increase in throughput which results in increase in performance. Thus the 1024 sub carrier is less affected to jamming then that of the 512 sub carrier. Figure 12: Comparison of SNR (blue-no jammer deploy) and (red- jammer deployed) From the Figure 12 we came to know that when the jammer is deployed, the noise or interference increases which results in low SNR. Thus when the jammer is used the SNR becomes half of the original. 6. Conclusion As the attractiveness of WiMAX increases, so will the threats to it. Jamming attack is one of the dangerous attacks which deliberately uses radio noise or signals in an attempt to disrupt communications. Jamming is the attack that has resulted in the decrease the performance of the WiMAX network. In this paper, the result shows that with isotropic antenna the effect of jamming is more rather than using sector antenna. Another result reveals us that higher the sub carrier higher is the throughput. When the jammer is installed noise increases, its SNR (signal to noise ratio) decreases thus it is affected by jamming. [4] Jeffrey G. Andrews, Arunabha Ghosh, Rias Muhamed, Fundamentals of WiMAX Understanding Broadband Wireless Networking, pp.1-63, 271-292, 2007. [5] Juan Li, Sven-Gustav Häggman, Performance of IEEE 802.16 Based System in Jamming Enviornment and Its Improvement With Link Adaption, The 17th Annual IEEE International Symposium on (PIMRC 06), pp.74-87, 2006 [6] LUO Cuilan, A Simple Encryption Scheme Based on WiMAX, Department of Electronics Jiangxi University of Finance and Economics Nanchang, China, pp. 21-36, 2009 [7] Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, WiMAX Security, 22nd International Conference on Advanced Information Networking and Applications, 2008 [8] Rakesh Kumar Jha, Dr. Upena D. Dalal "A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect" Department of Electronics and Communication Engineering, SVNIT Surat, INDIA, International Journal of Computer Applications (0975 8887) Volume 6 No.8, September 2010 [9] Simon Haykin, Michael Moher, Modern Wireless Communications, Prentice-Hall, U.S.A, pp.540-560, 2005. [10] Syed Ahson, Mohmmad Ilyas, Syed Ahson, Mohammad Ilyas, WiMAX Standards and Security, Boca Raton: CRC Press, pp. 200-250, 2008. [11] White paper by Motorola, WiMAX Security for Real-World Network Service Provider deployments, 2007. [12] www.networkworld.com/columnists/2006/121106-wirelesssecurity.html Gurkamal Singh is currently pursuing her M.Tech. in Internet and Communication Technology from Punjabi University. He is doing his thesis work in the area of WiMAX Networks. He has completed her B.Tech from Guru Nanak Dev Engineering College, Ludhiana in 2010. His research interests are Wimax and Wireless Lan s. References [1] Boris Makarevitch, Jamming Resistant Architecture for WiMAX Mesh Network communications Laboratory Helsinki University of Technology, 2007 [2] Frank Hsieh, Fan Wang, Amitava Ghosh, Link Performance of WiMAX PUSC, Networks Advanced Technologies, Home & Networks Mobility, Motorola Inc, pp. 271-278, 2008 [3] Gilberto Flores Lucio, Marcos Paredes-Farrera, Emmanuel Jammeh, Martin Fleury, OPNET Modeler and Ns-2: Comparing the Accuracy Of Network Simulators for Packet- Level Analysis using a Network Test bed,pp. 164-173, 2009.