A Review and Analysis of Existing Approaches for Imperceptibility Based Proactive Security Measures for Wireless Networks
Main Article Content
Abstract
A lot of security systems rely on devising mechanisms which rely on detecting security threats or possible attacks. Such security mechanisms are typically terms as intrusion detection systems (IDS). When such as system is deployed at the network layer, it is termed as a network intrusion detection system (NIDS). While ID or NIDS is typically a rule based reactive security mechanism, with emergence of AI and Quantum computing, reliance on conventional IDS or encryption mechanisms lead to high possibility of successful security attacks. Hence, research is focussing on proactive approaches which can render imperceptibility to data transmission in a network. In the proposed work, a crest factor reduction mechanism based on the selective mapping (SLM) approach which renders the property of chaos to the system. The SLM technique multiples the plain text with complex vectors whose pattern is known only to the sending and receiving end, and produces relatively high security, through implementation of chaos. The analysis of the crest factor needs to be evaluated in terms of the complementary cumulative distribution function (CCDF) of the crest factor. It is shown that the proposed approach attains lower PAPR compared to existing approaches in the domain.
Article Details
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.