CFP last date
20 January 2025
Reseach Article

Analysis of Security Gaps in 5G Communication using LDPC Codes and NOMA

by Vijey Thayananthan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 48
Year of Publication: 2019
Authors: Vijey Thayananthan
10.5120/ijca2019918735

Vijey Thayananthan . Analysis of Security Gaps in 5G Communication using LDPC Codes and NOMA. International Journal of Computer Applications. 182, 48 ( Apr 2019), 41-48. DOI=10.5120/ijca2019918735

@article{ 10.5120/ijca2019918735,
author = { Vijey Thayananthan },
title = { Analysis of Security Gaps in 5G Communication using LDPC Codes and NOMA },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 48 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 41-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number48/30520-2019918735/ },
doi = { 10.5120/ijca2019918735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:41.286391+05:30
%A Vijey Thayananthan
%T Analysis of Security Gaps in 5G Communication using LDPC Codes and NOMA
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 48
%P 41-48
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advance communication systems such as fifth generation (5G) and 5G+ expect to deploy the security solutions for securing the communication networks. Finding the optimum size of the security gap is a challenging problem in the large scale networks. In this paper, the parity check matrix (H) of low-density parity check (LDPC) considered for determining the security gap is analyzed with the higher rate LDPC coding schemes and different size of frames. Here, optimum LDPC decoding is considered as a method. Especially, the physical layer is investigated with H and two different high-rate codes and simulated to find the optimum size of security gaps for better security. Also, non-orthogonal multiple access (NOMA) is employed to enhance the security solution. Thus, optimum security gap is possible when suitable NOMA is employed in the physical layer of the 5G communication system. As expected in this research conclusion, simulation results show that the security gap decreases when frame size is increased.

References
  1. Sriram, Poorna Pravallika, Hwang-Cheng Wang, Hema Ganesh Jami, and Kathiravan Srinivasan. "5G Security: Concepts and Challenges." In 5G Enabled Secure Wireless Networks, pp. 1-43. Springer, Cham, 2019.
  2. Wu, Yongpeng, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, and Xiqi Gao. "A survey of physical layer security techniques for 5G wireless networks and challenges ahead." IEEE Journal on Selected Areas in Communications 36, no. 4 (2018): 679-695.
  3. Richardson, Tom, and Shrinivas Kudekar. "Design of low-density parity-check codes for a 5G new radio." IEEE Communications Magazine 56, no. 3 (2018): 28-34.
  4. Liu, Yuanwei, Zhijin Qin, Maged Elkashlan, Zhiguo Ding, Arumugam Nallanathan, and Lajos Hanzo. "Non-orthogonal multiple access for 5G and beyond." arXiv preprint arXiv:1808.00277 (2018).
  5. Chen, Shuang, Kewu Peng, Yushu Zhang, and Jian Song. "Near capacity LDPC coded MU-BICM-ID for 5G." In 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1418-1423. IEEE, 2015.
  6. Shao, Xuanbo, and Zhanji Wu. "A Novel Multiple Access Scheme with Physical Layer Security." In 2018 IEEE 18th International Conference on Communication Technology (ICCT), pp. 36-40. IEEE, 2018.
  7. Jayakody, Dushantha Nalin K., Kathiravan Srinivasan, and Vishal Sharma. "5G Enabled Secure Wireless Networks." (2019).
  8. Vaezi, Mojtaba, Zhiguo Ding, and H. Vincent Poor. "Multiple Access Techniques for 5G Wireless Networks and Beyond." (2018).
  9. E. Shannon, “Communication theory of secrecy systems,” B.S.T.J., vol. 28, pp. 656–715, Oct. 1949.
  10. R. G. Gallager, “Low-Density Parity-check Codes,” IRE Trans. Inform. Theory, vol. IT-8, pp. 21-28, Jan. 1962.
  11. O. Hamdi, M. Abdelhedi, A. Bouallegue & S. Harari, Weakness on Cryptographic schemes based on regular LDPC codes. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, 2010.
  12. S. Y. Chung, G. D. Forney, T. J. Richardson, and R. Urbanke, “On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit, “ IEEE Commun. Lett. vol. 5, pp. 58-60, Feb 2001.
  13. J. C. Mackay,“Near Shannon limit performance of low-density parity-check codes” Electron. Lett., vol. 33, pp. 457–458, Mars. 1997.
  14. J. Muramatsu, T. Uyematsu, and T. Wadayama, “Low-density parity check matrices for coding correlated sources,” IEEE Trans. Inform — Theory, 51, 3645 – 3654, 2005.
  15. D. Liveris, Z. Xiong and C. N. Georghiades, compression of binary sources with side information at the decoder using LDPC codes, IEEE Commun. Lett. vol. 6, pp. 440-442, 2002.
  16. R.Lucas, M. Fossorier, Y. Kou, and S. Lin, “Iterative decoding of one-step majority-logic decodable codes based on belief propagation, “ IEEE Trans. Comm., pp 931-937, June 2000.
  17. J. Chen and M. P. C. Fossorier, “Near optimum universal belief propagation based decoding of Low-Density Parity-Check Codes” IEEE Transactions on Communications, vol. 50, pp. 406–414, March 2002.
  18. Zhang, Yushu, Kewu Peng, Xianbin Wang, and Jian Song. "Performance Analysis and Code Optimization of IDMA with 5G New Radio LDPC Code." IEEE Communications Letters (2018).
  19. Steiner F, Böcherer G, Liva G. Bit-Metric Decoding of Non-Binary LDPC Codes with Probabilistic Amplitude Shaping. arXiv preprint arXiv:1809.04037. 2018 Sep 11.
  20. Agyapong, P.K.; Iwamura, M.; Staehle, D.; Kiess, W.; Benjebbour, A. Design Considerations for a 5G Network Architecture. IEEE Commun. Mag. 2014, 52, 65–75.
  21. Taieb, Mohamed Haj, and Jean-Yves Chouinard. "Reliable and secure communications over Gaussian wiretap channel using HARQ LDPC codes and error contamination." In 2015 IEEE Conference on Communications and Network Security (CNS), pp. 158-163. IEEE, 2015.
  22. Zhang, Gaoyuan, Hong Wen, Jiexin Pu, and Jie Tang. "Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding." IET Communications 11, no. 11 (2017): 1808-1814.
  23. Chen, Dajiang, Ning Zhang, Rongxing Lu, Xiaojie Fang, Kuan Zhang, Zhiguang Qin, and Xuemin Shen. "An LDPC code based physical layer message authentication scheme with perfect security." IEEE Journal on Selected Areas in Communications 36, no. 4 (2018): 748-761.
  24. Song, Jiho, Borja Peleato, David J. Love, Tianqiong Luo, Dennis Ogbe, and Amitava Ghosh. "Optimizing incremental redundancy for millimeter wave wireless communication using low-density parity check codes." (2017).
  25. Shah, Pradeep M., Prakash D. Vyavahare, and Anjana Jain. "Modern error correcting codes for 4G and beyond: Turbo codes and LDPC codes." In 2015 Radio and Antenna Days of the Indian Ocean (RADIO), pp. 1-2. IEEE, 2015.
  26. P. Fewer, M. F. Flanagan & A. D. Fagan, A Versatile Variable Rate LDPC Codec Architecture. IEEE Trans. on Circuits and system —I Regular paper, VOL. 54, NO. 10, 2007.
  27. Klinc, J. Ha, S. W. McLaughlin, J. Barros & B. J. Kwak, LDPC Codes for Physical Layer Security. USA and Korea: IEEE "GLOBECOM" 2009 proceedings, 2009.
  28. W. K. Harrison & S. W. McLaughlin, Physical-Layer Security: Combining Error Control Coding and Cryptography. School of ECE, Georgia Institute of Technology, Atlanta, GA.: IEEE International Conference on Communications, 2009.
  29. B. Kwak∗, N. Song†, B. Park∗, D. Klinc‡ and S. W. McLaughlin, “Physical Layer Security with Yarg Code, “ First International Conference on Emerging Network Intelligence, The IEEE Computer Society, 2009.
  30. Wang, Yingmin, Bin Ren, Shaohui Sun, Shaoli Kang, and Xinwei Yue. "Analysis of non-orthogonal multiple access for 5G." China Communications 13, no. 2 (2016): 52-66.
  31. T. Richardson, A. Shokrollahi and. R. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Trans. Inform. Theory, vol. 47, pp. 619–637, Feb. 2001.
  32. Al-Eryani, Yasser, and Ekram Hossain. "Delta-OMA (D-OMA): A New Method for Massive Multiple Access in 6G." arXiv preprint arXiv:1901.07100 (2019).
Index Terms

Computer Science
Information Sciences

Keywords

LDPC coding Parity check matrix security gap NOMA 5G communication.