PSO-Based Antenna Pattern Synthesis: A Paradigm for Secured Data Communications

PSO-Based Antenna Pattern Synthesis: A Paradigm for Secured Data Communications

Rathindra Nath Biswas, Anurup Saha, Swarup Kumar Mitra, Mrinal Kanti Naskar
Copyright: © 2019 |Pages: 28
DOI: 10.4018/978-1-5225-5852-1.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

An antenna pattern synthesis scheme based on particle swarm optimization (PSO) technique is proposed. Synthesized patterns always contain narrower beamwidth and minimum side-lobes level reducing coverage areas towards the attackers in wireless networks. On such patterns, deep nulls are also steered at various interfering directions as to provide a second layer of protection. Using selective patterns at each point-to-point link, data privacy is ensured throughout entire route from source to sink. This approach is simple enough to be commensurate with flexible design methods on a real-time platform. Thus, an FSM (finite state machine) rule-based digital system model is further developed and tested on Xilinx Virtex4 FPGA (field programmable gate array) board. Its performance under harsh radio environmental conditions is also verified with several fixed-point simulations in terms of pattern synthesis accuracy and computational overheads. These results corroborate such system integration onto wireless infrastructures for the secured data communication services.
Chapter Preview
Top

Introduction

Wireless technologies usually provide numerous potential benefits like enormous bandwidth, less space, light weight, ease of installation and maintenance etc. Obviously, these are also essential requirements for the design of state-of-the-art communication systems. However, a continuous research growth during the last decade makes it possible simply to develop low power and low cost wireless devices and circuits on both of MMIC (monolithic microwave integrated circuits) as well as VLSI (very large scale of integration) architecture. Thus, wireless systems utilizing radio frequency (RF) signals or microwaves and millimeter waves are now extensively used in various sectors of communication services (Schafer et al, 2014; Schafer, 2003). For implementation of long-haul communication systems, multi-hop networks are generally constituted with several wireless transceivers (transmitter-receiver) to relay the broadcast messages at the receiving end in a cooperative manner. During transmission and reception of RF signals, the transceivers (also termed as nodes) inevitably share a common channel in free space. Consequently, data communications among the nodes become vulnerable to the attackers mostly at the physical and other outer layers (Zhou et al, 2014; Zhou et al, 2016). At most of the cases, attackers appear in pretention of the benevolent nodes within the networks and normally get access to the control systems of few nodes using malicious codes to compromise them. They mislead the entire system operation by transferring erroneous information through the multi-hop data links (Khan et al, 2014; Mahmoud et al, 2014). Therefore, preserving privacy and security of data along its route from source to destination has turned into a prime issue in modern wireless communication systems. Several popular cryptographic methods were proposed so far and these work well for protecting data at the application and other inner layers. Nonetheless, only few approaches were adopted to defend the physical layer attacks (Wong et al, 2007; Wong et al, 2011). Besides, the task of implementing a secured data communication network with simple structure that must ensure data privacy over its radio links still puts a great challenge to the system designers. Hence, much more research attention is required to enrich both of its algorithmic and architectural attributes.

Complete Chapter List

Search this Book:
Reset