Final Report Inter Mob Comm
Final Report Inter Mob Comm
On
by
Md Saif H2016124031
Mounesh H2016124024
Where R is cell radius and N is the reuse pattern (the cluster size or the
number of cells per cluster). Reusing channels fallout in different types of
interferences like co channel, adjacent channel and co site.
1) Co channel Interference:
3) Co site Interference:
These techniques are based on the way how channels are utilized.
Fixed Channel Allocation (FCA) :
Fixed channel allocation, in which channels are assigned in cells at the
beginning of system design. Total channels of cellular system are
available to every cluster. In a cluster channel destruction/division is
uniform among cells so every cell uses the same predetermined channels.
Fixed channel allocation has very simple design and work efficiently for
uniform traffic demand. However, FCA do not adapt to changing traffic
conditions and user distribution therefore FCA is not suitable for non-
uniform traffic.
In HCA, set of channels is divided into fixed and dynamic set. Fixed set
contains several nominal channels and these channels allocated like FCA &
prefer to be used in respective cell. Channels/frequency from dynamic set
are shared by users. When all nominal channels are busy then channel from
dynamic set is allocated. In this, dynamic to fixed channel ratio can be
changed as per the non-uniform traffic and geographical area.
One of the earlier aims of the channel assignment problem (CAP) is to
assign the required number of channels to each region in such a way that
interference is precluded and the frequency spectrum is used efficiently This
problem can be shown to be equivalent to a graph coloring problem.
Over the recent years, several approaches have been used to solve various
channel assignment problems, including
Simulated annealing
Neural networks and
Genetic algorithms
Among them Hybrid Channel allocation with Genetic algorithm is the most
widely used one. Ngo and Li developed an effective GA-based approach
that obtains interference-free channel assignment by minimizing
interference in a mobile network. They demonstrated that their approach
efficiently converges to conflict-free solutions in several benchmarking
problems of channel assignment.
Genetic Algorithm:
Evaluation:
Before starting with the GA, a fitness function has to be formulated first.
This fitness function is the most crucial part of the algorithm, and varies
depending upon the application GA is used in. The fitness function must be
designed such that the best chromosome corresponds to the one with the
least fitness value. In the evaluation phase, the fitness functions of all the
chromosomes present in the initial population are calculated. The fitness
function should be formulated such that the individual chromosome be its
variable input parameter.
Selection :
Once the fitness values have been calculated, the chromosomes that
correspond to the lesser fitness values can be selected. Usually, selection
probability is 0.5, i.e., half of the initial population is selected based on their
fitness values. For this purpose, the chromosomes can be arranged in their
increasing order of fitness values and the first half can be selected.
Crossover:
Termination:
DCA USING GA
Each diagonal element Cii represents the co-site constraint (CSC), which
is the minimum separation distance between any two channels at cell i.
Each non-diagonal element Cij represents the minimum separation
distance in frequency between any two frequencies assigned to cells i and
j, respectively.
Co-site constraint (CSC) is represented by Cij = 1.
Adjacent channel constraint (ACC) is represented by Cij = 2.
Cells that are free to use the same channels are represented by Cij = 0.
For example, suppose the number of cells in the network is N = 4, there are
M = 11 channels available and the demand for the channels for each of these
cells is given by D = (1,1,1,3).
The diagonal terms Cii = 5 indicate that any two channels assigned to cell i
must be at least 5 frequencies apart in order that no co-site interference
exists. Channels assigned to cells 1 and 2 must be at least C12 = 4
frequencies apart. Off diagonal terms of Cij = 1 and Cij = 2 correspond to
co-channel and adjacent channels constraints, respectively.
The solution space is represented by F as an N M binary matrix, where N
is the total number of radio cells and M is the total number of available
channels. Each element fjk in the matrix is either one or zero such that
The fitness function has to be evaluated first before performing the genetic
algorithm.
The Cost Function for the present problem given by
The next step in the genetic algorithm is to generate a new population, using
genetic algorithm operators, such as selection, crossover and mutation. The
selection process consists of selecting 2 parent chromosomes from a
population according to their fitness, i.e., individuals with better fitness
have higher chances to be selected. Each F solution array in the population
stands a chance to be selected for crossover and mutation, as a parent
chromosome.
The selection, crossover and mutation processes will be repeated until the
new population, which has the same size as the old population, is formed.
After this procedure, all new rows in the F solution matrix, or
chromosomes, will be used for a further run of the entire genetic algorithm
until an optimized solution is found.
Proposed HCA GA Algorithm Block Diagram
Key Distribution:
, ) => (
Public key is ( , ) known to everyone
Private key is (, ) => (
, ) intended receiver
Encryption:
=
^()
Decryption:
=
()
=
( )
=
Advantages and Disadvantages of RSA
Advantages:
RSA relies on the fact that it is easy to multiply two large prime numbers
together but extremely hard [time consuming] to factor them back to
result.
for ex: the product of 3391 and 23279 can be calculated easily its
78939089 but its extremely difficult to factorize the same number to get
back factors 3391 23279
Disadvantages:
1. If factorization of n [p*q] is possible then whole RSA algorithm is
compromised.
2. Encryption and Decryption takes a long time for large p and q.
Hence we have to bring some modifications which increases the security
of existing algorithm but not at the cost of time
POSSIBLE SOLUTIONS
For Enhancing the security
1. Use of fake modulus i.e. instead of sending n , Fake modulus Fn is
sent over the channel.
2. Instead of using Two prime to calculate n, we can use three prime
there by making factorization more complex.
For Enhancing the Speed
1. Offline key generation
2. Montgomery Multiplication
3. Improving Modular Exponentiation
4. Many more mathematical improvements using concepts of number
theory.
PROPOSED DESIGN
RSA algorithm can be improved in two areas as mentioned
1)Security
2)Time
Decryption:
In our modified RSA decryption is three step process
1) First cipher
is decrypted to get random number using private key
=
()
2) In second step we calculate unique integer using random number
(
. ) = such that < <
3) In third step we decrypt cipher
using
= (
.
)
Flow Chart Modified RSA Encryption
Plain text
Cipher 2 Cipher
1
Flow Chart Modified RSA Decryption
Receive
1,
2
Input number s
No
Calculate from
1 ( )
= 1
yes
Plain Text
SIMULATED RESULTS
Discussion on results
[c1]=encryption_MOD(k,e,n);
%m=input('enter the message to be encrypted');
m=input('enter the message to be encrypted\n','s');
x=length(m);
for i=1:x
[c(i)]=text2ascii_MOD(m(i));
[c2(i)]=encryption_MOD_1(k,c(i),e,n);
end
disp( sprintf( 'The value of first cipher is c1= %d\n', char(c1) ) );
disp( sprintf( 'The value cipher Corresponding to message is c2 = %s\n', c2 )
);
[k]=decryption_MOD(c1,d,n);
%disp(k);
[s]=random_MOD(k,n);
disp('the value of number S is');
disp(s);
for j=1:x Fn(j)=c2(j)*s;
[m(j)]=decryption_MOD(Fn(j),d,n);
end
disp ( sprintf( 'The encrypted message is = %s\n', char(c2) ) );
disp ( sprintf( 'The decrypted message is = %s\n', char(m)) );
Function for Calclation of phi,n,d,e,k
function[phi,n,d,e,k]=INIT(p,q)
n=p*q;
phi=(p-1)*(q-1);
e=1;
i=2;
while i>1
e=e+1;
i=gcd(phi,e);
end
d=1;
j=2;
while j>1
if rem(d*e,phi)~=1
d=d+1;
j=rem(d*e,phi);
end
end
k=5;
i=2;
while i>1
k=k+5;
i=gcd(n,k);
end
end
en=cf;
Function for text to ASCII conversion
function[c]=text2ascii(m)
x=length(m);
c=0;
for j=1:x
for i=0:122
if strcmp(m(j),char(i))
c(j)=i;
end
end
end
a=zeros(1,65535);
while d >= 2
r=rem(d,2);
if r==1
a(i)=1;
else
a(i)=0;
end i=i+1;
d=floor(d/2);
end
if d == 2
a(i) = 0;
else
a(i) = 1;
end
Function for Decryption
function[en]=decryption_MOD(c,e,n)
[e]=dtob(e);
k = 65535;
c = c; cf = 1;
cf=mod(c*cf,n);
for i=k-1:-1:1
c = mod(c*c,n);
j=k-i+1;
if e(j)==1
cf=mod(c*cf,n);
end
end
en=cf;
function[d]=random_MOD(e,n)
d=1;
j=2;
while j>1
if rem(d*e,n)~=1
d=d+1;
j=rem(d*e,n);
end
end
end
if rem(s*k,phi)~=1
d=d+1;
j=rem(s*k,phi);
end
end