Securing Information by Using Encryption of Pseudorandom Code Rahat Ullah 1, Shahid Latif 2 Department of Computer & IT, Sarhad University of Science and.

Slides:



Advertisements
Similar presentations
Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
Advertisements

IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Lecture 8: Spread Spectrum
King Fahd University of Petroleum &Minerals Electrical Engineering Department EE-400 presentation CDMA systems Done By: Ibrahim Al-Dosari Mohammad.
Spread Spectrum Input is fed into a channel encoder
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Chapter 9 – Spread Spectrum.
SPREAD SPECTRUM In spread spectrum (SS), we combine signals from different sources to fit into a larger bandwidth, but our goals are to prevent eavesdropping.
Spread Spectrum Steganography
1 CMPT 371 Data Communications and Networking Spread Spectrum.
© 2002 Pearson Education, Inc. Commercial use, distribution, or sale prohibited. Wireless Communications Principles and Practice 2/e T.S. Rapppaport Chapter.
Wireless & Mobile Networking: Multiple Division Techniques
Spread Spectrum Techniques
TYPES OF SS TECHNIQUES THE FUTURE LIES WITHIN. INTRODUCTION There are four basic types classified according to the point of insertion of PN code –D–Direct.
DCSP-4: Modem Jianfeng Feng Department of Computer Science Warwick Univ., UK
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
INTRODUCTION. TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM IN MATLAB TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM.
IEEE Wireless LAN Standard
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
Lecture02 Spread Spectrum Communication By Engr. Muhammad Ashraf Bhutta.
Spread-Spectrum Techniques
1 Chapter 7. Spread Spectrum Wen-Shyang Hwang KUAS EE.
6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
WCDMA Introduction Code Division Multiple Access
ELECTRONIC COMMUNICATIONS A SYSTEMS APPROACH CHAPTER Copyright © 2014 by Pearson Education, Inc. All Rights Reserved Electronic Communications: A Systems.
Spread Spectrum Chapter 7. Spread Spectrum Form of communication Can be used to transmit analog or digital data using an ANALOG signal Idea: spread the.
Lecture 4 Spread Spectrum.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Code Division Multiple Access (CDMA) Transmission Technology
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Data and Computer Communications Ninth Edition by William Stallings Chapter 9 – Spread Spectrum Data and Computer Communications, Ninth Edition by William.
1 Spread Spectrum Technology. 2 What is Spread Spectrum(SS) Spread Spectrum (SS) technology was first introduced by military as a way of sending secure.
Code Division Multiple Access (CDMA) Transmission Technology
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
教育部網路通訊人才培育先導型計畫 Wireless Communication Technologies 1 Summary Direct-sequence MPSK and Frequency-hop MFSK represent two principle categories of spread-spectrum.
TUNALIData Communication1 Spread Spectrum Chapter 9.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 2 Introduction to spread-spectrum communications Part II.
William Stallings Data and Computer Communications 7th Edition
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Chapter 5: Third generation systems-Wideband Digital Modulation
Bandwidth Utilization
Subject Name: Digital Communication Subject Code: 10EC61
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
Wireless & Mobile Networking: Multiple Division Techniques
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Spread Spectrum Chapter 7.
Spread Spectrum L.Tahani Aljehani.
Spread Spectrum Multiplexing combines signals from several sources to achieve bandwidth efficiency: The available bandwidth of a link is divided between.
Chapter 5: Third generation systems-Wideband Digital Modulation
Spread Spectrum A signal that occupies a bandwidth of B, is spread out to occupy a bandwidth of Bss All signals are spread to occupy the same bandwidth.
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
CSE 4215/5431: Mobile Communications Winter 2011
Wireless Networks Fall 2007
Spread Spectrum Chapter 7.
William Stallings Data and Computer Communications 7th Edition
William Stallings Data and Computer Communications 7th Edition
Spread Spectrum Analog or digital data Analog signal
Presentation transcript:

Securing Information by Using Encryption of Pseudorandom Code Rahat Ullah 1, Shahid Latif 2 Department of Computer & IT, Sarhad University of Science and IT Peshawar Pakistan 1, 2 1, 2 Abstract. The main task of frequency hopping spread spectrum is to secure the information from the detectors. In FHSS a pseudorandom code is multiplied with each of the information packet, which makes a hop. These codes randomly changes for securing the communication and also these codes are used in FHSS for indicating the carrier frequency at the receiver side. As in today’s world the prime goal of wireless communication is security of information, although FHSS provide security but it has a threat from the unknown interceptor, if the hijacker come to know that sequence of pseudorandom than for surely the security will be collapsed. To save that data from leaking out, we have generated a new idea. If we use pseudorandom random code with one hop of the frequency and use the encoded form of pseudorandom code for the next hop, than the security level will be increase. Keywords: Spread Spectrum, Frequency hopping spread spectrum, Encryption techniques, Security of communication. 1 Introduction to Spread Spectrum Spread spectrum which is know a day’s using for commercial usage and was initially used for military applications, provides a secure transmission from jamming because wireless communication/transmission has a threat to be jammed [1]-[3]. In spread spectrum communication the spreading sequence plays a vital role which spread the information in SS-signal which increases the security level of the signal [4]. The spread spectrum technique provides an anti- jamming communication by spreading the signals having wideband frequency [5] as shown in fig.1, while at the receiver side the information can be easily dig up from the SS-signal. Spread spectrum has many techniques [6][7], which are used for many applications i.e. security/ robustness of broadcasting the link, security of communication, fast speed rate, anti-interference ability[8-11]. 1.1 Frequency Hopping Spread Spectrum (FHSS) The carrier’s frequency is arbitrarily changes in FHSS, the signals jumps at different carrier frequencies randomly according to the pseudorandom code, which specifies the carriers frequency at the receiver side because at the transmitter side each of the hop of frequency have this code for identity of carriers frequency [12]. In FHSS the pseudorandom code is used for the identification of the carrier frequency. 132

Fig.1 Spreading of a signal using pseudo-noise code Suppose we have a total bandwidth of 400 MHz from 900 MHz to 1300 MHz, and at this instant of time we use three bits of spreading code having the given sequence 000, 001, 010, 011, 100, 101, 110, 111. So we can divide the given bandwidth into eight different frequencies, 950Mhz, 1000Mhz, 1050Mhz, 1100Mhz, 1150Mhz, 1200Mhz, 1250Mhz, & 1300Mhz. Table.1 show that how the pseudorandom code will identify the carrier’s frequency. 2 Proposed Work The security matters in the field of wireless communications and in frequency hopping spread spectrum, the pseudorandom code is using for the identification of carriers frequency of each hop, but if someone get some information or suppose it succeeds in breaking out that sequence of random codes than the integrity of information will be lose. To overcome this draw back we have proposed/designed a technique in which the original pseudorandom code and its encrypted code will be use consecutively, so that if some break the sequence code than after breaking that security, they will still be unable to leak out the secure information. It depends on the designer that what encryption technique they use for encryption. Only the receiver will be 133

able to get the original information, because it will know about the encryption technique used for encryption of random sequence and also the original pseudorandom code. Table.2 will show the main concept of the paper that how both the original and the encrypted pseudorandom code will be use in the FHSS technique. Table.2 showing the main idea of the paper The left two columns shows the use of original code for packet one and the right columns shows the use of encrypted code References 1.R. A. Poisel, Modern Communications Jamming Principles and Techniques, Artech House Publishers, D. Adamy, A first course in electronic warfare. Artech House, B. Sklar, Digital communications: fundamentals and applications. Prentice-Hall, Fanxin Zeng, Zhenyu Zhang, “Binary sequences with Large Family Size and High Linear Complexity for Spread Spectrum Communication Systems”, nd International Conference on Signal Processing Systems (ICSPS). 5.Christina P¨opper, Mario Strasser, “Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques”, ieee journal on selected areas in communications, vol. 28, no. 5, june K. Fazel and S. Kaiser, “Multi-carrier and sprad spectrum system,” John Wiley and Sons Ltd., M. K. Simon, J. K. Omura, R. K. Scholtz, and B. K. Levitt, “Spread spectrum communications handbook,” McGraw-Hill, Inc., P. G. Flikkema, “Spread-spectrum techniques for wireless communication,” IEEE Trans. Signal Proc., vol. 14, pp. 26–36, May C. WANG and M. AMI N. “Performance analysis of instantaneous frequency-based interference excision techniques in spread spectrum communications,” IEEE Trans. Signal Proc., vol. 14, pp. 70–82, August T. Samanchuen and S. Tantaratana, “A closed-loop noncoherent pseudonoise acquisition scheme for direct-sequence spread-spectrum systems,”IEEE Conf. Circuits and Systems, Tailand, pp.97–100, November Suwon Kang and Yong-Hwan Lee, “Rapid acquisition of PN signals for DS/SS systems using a phase estimator,” IEEE Journal on Selected Areas in Communication, vol. 6, pp.1128–1137, June Behrouz A Fourozan, “Data Communication and Networking”, Fourth Edition, The McGrah-Hilll companies. 134