Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.

Slides:



Advertisements
Similar presentations
EE578 Assignment #5 Abdul-Aziz.M Al-Yami November 8 th 2010.
Advertisements

Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Chapter 2 Fundamentals of Data and Signals
Direct Sequence Spread Spectrum. Spread Spectrum Spread power of signal over larger than necessary bandwidth in order to: 1. Reduce interference by signal.
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
Constellations Demystified Presented by Sunrise Telecom Broadband … a step ahead.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Lecture 8: Spread Spectrum
Cellular Communications
Spread Spectrum Input is fed into a channel encoder
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
William Stallings Data and Computer Communications 7th Edition
Data and Computer Communications Eighth Edition by William Stallings Chapter 9 – Spread Spectrum.
SPREAD SPECTRUM In spread spectrum (SS), we combine signals from different sources to fit into a larger bandwidth, but our goals are to prevent eavesdropping.
Spread Spectrum Steganography
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Data Communication and Networking 332 Hardware Components of Data Communication.
Spread Spectrum Techniques
Spread Spectrum. Introduction to Spread Spectrum Problems such as capacity limits, propagation effects, synchronization occur with wireless systems Spread.
STEGANOGRPAHY [APPLICATION – I]
Data Communications & Computer Networks, Second Edition1 Chapter 2 Fundamentals of Data and Signals.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
EE 445S Real-Time Digital Signal Processing Lab Fall 2013 Lab 4 Generation of PN sequences Debarati Kundu and Andrew Mark.
Physical Layer (2). Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture – Review some.
CHAPTER 6 PASS-BAND DATA TRANSMISSION
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
EE345S Real-Time Digital Signal Processing Lab Fall 2006 Lecture 16 Quadrature Amplitude Modulation (QAM) Receiver Prof. Brian L. Evans Dept. of Electrical.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
Lecture02 Spread Spectrum Communication By Engr. Muhammad Ashraf Bhutta.
Spread Spectrum Modulation Dr. Teerasit Kasetkasem.
1 Chapter 7. Spread Spectrum Wen-Shyang Hwang KUAS EE.
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
Digital Modulation Technique
Lecture 4 Spread Spectrum.
Chapter 4 part 2_a Digital Modulation Techniques.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
Combined Linear & Constant Envelope Modulation
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Nonbinary Orthogonal Modulation in Direct- Sequence Spread Spectrum Communication Systems Michael Y. Tan Home Institution: Clemson University Advisor:
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Code Division Multiple Access (CDMA) Transmission Technology
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Data and Computer Communications Ninth Edition by William Stallings Chapter 9 – Spread Spectrum Data and Computer Communications, Ninth Edition by William.
1 Spread Spectrum Technology. 2 What is Spread Spectrum(SS) Spread Spectrum (SS) technology was first introduced by military as a way of sending secure.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
TUNALIData Communication1 Spread Spectrum Chapter 9.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
William Stallings Data and Computer Communications 7th Edition
Chapter 5: Third generation systems-Wideband Digital Modulation
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Analog and Digital Modulation Techniques
Wireless Communication Project
Advanced Wireless Networks
DIRECT SEQUENCE SPREAD SPECTRUM WITH FREQUENCY HOPPING
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Spread Spectrum Chapter 7.
Modulation and OFDM.
Chapter 5: Third generation systems-Wideband Digital Modulation
Spread Spectrum Chapter 7.
William Stallings Data and Computer Communications 7th Edition
Wireless PHY (Modulation)
William Stallings Data and Computer Communications 7th Edition
Presentation transcript:

Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008

Break up Spread Spectrum Cryptography Relay Network (Orthogonal) Conclusions

NGMAST 2008 Introduction Spread Spectrum Cryptography to hide the Signal below noise level Message Encryption Doubly secured information Transmission through Relay Channel

NGMAST 2008 Spread Spectrum Spread spectrum is an RF communications system in which the baseband signal bandwidth is intentionally spread over a larger bandwidth by injecting a higher frequency signal Reason ? secure communications Makes jamming and interception harder prevent detection.

NGMAST t t t Data Signal PN Signal Data x PN T b =8T c TbTb TcTc ,-1,- 1,1,-1,1,1,-1

NGMAST 2008 Example

NGMAST 2008 The data transmitted with bit duration T b d(t)= d n  { 1,-1} PN Sequence N=T b /T c transmitted with chip duration T c The Data in channel Spread Spectrum

NGMAST 2008 Cryptography Message Secret key Cryptogram To recover the original message, the receiver computes

NGMAST 2008 SS and Cryptography To encrypt the message data or PN sequence Suppose we want to transmit the Message with SF N=T b /T c PN Sequence to synchronize bit and chip time, add S in M where is N time repetition of M

NGMAST 2008 Synchronization Problem Cryptogram Since the energy of SS is lower than ambient noise, so it is not possible to recover the message without the knowledge of S Problem ? Good cryptographic PN Sequences confronts the problem of synchronization.

NGMAST 2008 Suggestion To counter the problem of synchronization, we use a technique very like that of steganography We can spread N over a more larger bandwidth to mask the message inside ambient noise. We mask the secret SS signal with a classical dummy communication. This method is more robust than classical stegano.

NGMAST 2008 SS using BPSK Channel Let Be the non-secret message Then the transmitted signal will be let Be the hidden message Then the secret communication is

NGMAST 2008 SS using BPSK Channel Then the transmitted signal is The receiver uses non-secret communication to synchronization, recover the signal The secret message is smaller than the noise, so is not detectable if the PN sequence is not known to compute correlation

NGMAST 2008 SS and Orthogonal transmission If an error occurs on symbol M, this error induces very high noise on secret message m To avoid this problem we use a relay channel in which two signals are sent orthogonally, so now it is unlikely that that the non secret message can cause an error in the secret message. So now the transmitted signal will be Where

NGMAST 2008 Relay Network DestinationSource Relay

NGMAST 2008 Relay Network(Orthogonal)

NGMAST 2008 Relay network Capacity Achievability is proved by cut-set bound

NGMAST 2008 Conclusion SS Communications are difficult to detect. Encrypted PN sequences makes the communication more secure. The selection of good key make the communication absolutely secure Synchronization problem is addressed by Splitting the signal into phase and quadrature.

NGMAST 2008