Sie sind auf Seite 1von 4

2011 Second International Conference on Emerging Applications of Information Technology

techniques. The merit of spread spectrum communication


system is its potential to eliminate interference. The
interference may be the unconscious interference by any
user, who is concurrently trying to transmit through the
channel. The interference may be conscious by an
unfavorable transmitter trying to block the transmission.
In combating to the interference (conscious interference),
it is important for communicators that jammer who is trying
to disrupt the communication does not have prior
knowledge of signal characteristics except for the overall
channel bandwidth & the modulation type. The spectrum
spreading is accomplished before transmission by using
code that is independent of the data sequence. The signal is
transmitted over low average power. The data may be
hidden in background noise by spreading its bandwidth with
the coding. Due to its low power level, the transmitted
signal is said to be covert. The data is demodulated by the
intended receiver from same code which is not known to
others. The spread spectrum systems are of two types direct
sequence spread spectrum & frequency hopped spread
spectrum.
In direct sequence spread spectrum (DSSS) the binary data
is directly multiplied with the PN sequence at transmitter
side. The direct sequence spread spectrum is like white
noise. The amplitude & thus power in direct sequence
spread spectrum signal is same as in original signal [13].
Due to the increased bandwidth of direct sequence spread
spectrum signal the power spectral density must be lower.
After dispreading the received signal with the same PN
sequence data is obtained. The properties of the direct
sequence spread spectrum are efficient modulation, broad
modulation bandwidth, continuous transmission, quick
synchronization, low power spectral density minimizes
interference.
Frequency hopping spread spectrum (FHSS) is
technique in which carrier frequencies changes randomly in
a predetermined way known only to the transmitting and
receiving devices [5]. Frequency hopping means to transmit
data in different frequency slots. The total B.W of the
output signal is equal to sum of all these frequency slots or
hops. The properties of the frequency hopping spread
spectrum are simple modulation, narrowband, discontinuous
transmission, and more network overhead.
In this paper we are taking the advantages of both spread
spectrum techniques. If the interferer is within the spreading
band, then the direct sequence spread spectrum (DSSS)

Abstract: Spread spectrum signaling technique is used for


security purpose in wireless network because it becomes
difficult to access the wireless network by unwanted users. We
are developing the algorithm to retrieve the PN sequence &
pattern of spectrum in spread spectrum system. This algorithm
will increase the wireless network security & solve the problem
of accessing the wireless network in secured way. Because,
when only sender end knows the PN sequence & pattern of
spread spectrum communication system the network security
will be enhanced.
Spread spectrum is a means of transmission in which data
sequence occupies a much more bandwidth than minimum
required bandwidth necessary to send it. The spectrum
spreading at transmitter & de-spreading at receiver is
obtained by PN sequence which is independent of data
sequence. There are two types of the spread spectrum
techniques direct sequence spread spectrum & frequency
hopped spread spectrum. Direct sequence spread spectrum is
technique in which data sequence directly modulates the
pseudo noise sequence known to only transmitter & receiver.
Frequency hopping means to transmit data in different
frequency slots.
Keywords: Direct sequence spread spectrum (DSSS), frequency
hopping spread spectrum (FHSS), hopping pattern recognition
(HPR), pseudo-noise sequence (PN sequence), local area
network (LAN), initial frequency detection (IFD), remaining
frequency detection (RFD), compute hopping pattern (CHP).

I. INTRODUCTION
Spread spectrum technique has low probability of
interception and anti jamming capability. Therefore spread
spectrum technique has been utilized widely in defense
communications. The spread spectrum communication has
been used in many Ad hoc networks, for example, cell
phone wireless LAN (local area network), GPS (global
positioning system). Ad hoc networks are dynamic
collections of self organizing mobile nodes with links that
are changing in an unpredictable way. Because the Ad hoc
network does not have any fixed infrastructure such as
stations or routers, they are highly applicable for emergency
deployments disasters search and rescue missions &
military operations.
For secure communication in a hostile environment,
requirement of the system such that transmitted data cannot
easily detected or easily recognized by unwanted listeners.
This requirement is fulfilled by the kind of signaling
techniques altogether known as spread spectrum methods or

978-0-7695-4329-1/11 $26.00 2011 IEEE


DOI 10.1109/EAIT.2011.38

391

system can tolerate and completely reject it while the


frequency hopping spread spectrum (FHSS) system can be
completely jammed on that channel. For a large out-of-band
interferer, the opposite is true. The DSSS process is
sensitive to such interferers, where the FHSS system is not.
We are developing a novel method to detect frequency
hopping pattern & retrieve the PN code. This algorithm will
increase the wireless network security & solve the problem
of accessing the wireless network in secured way. As, only
sender end knows the pattern of frequency hopping instead
of both. Therefore in this manner the network security will
be enhanced. First consider that PN code used is same in
DS-SS & FH-SS. The data signal is spread by using PN
code. Then, this signal is modulated using M-ary FSK,
which is again modulated with spread spectrum carrier
frequencies or hops randomly to generate the wideband
signal. The hopping pattern is pseudo-random across a set of
known frequencies. After the current pattern is exhausted a
new iteration occurs to allow the rest of the message to be
transmitted. Finding the sequence refers to finding the
starting frequency and the following frequencies in the
correct order. Then retrieve the PN code for decoding the
DS-SS (direct sequence spread spectrum) signal. Then
decode the DS-SS signal by using that retrieved PN code.

Fig.2. Receiver block diagram


Here, in this block diagram of transmitter first we the data
sequence b(n) is directly multiplied with the PN sequence
c(t) in product modulator or modulator. The output of the
modulator is wide spectrum signal m(N). The spectrum of
this signal is quite high compared to that of narrow band
data signal b(n).
Then, this signal m(N) is applied to the M-ary FSK
modulator. The modulator output is particular frequency
depending upon the input symbol. The output of the
modulator is applied to mixer. The other input of the mixer
is the particular frequency from frequency synthesizer. The
output of the frequency synthesizer at particular instant is
frequency slot or hop. The output of the mixer is
DS/FH/M-ary FSK signal & is transmitted over the
wideband channel.
The frequency hops given to mixer are generated by the
frequency synthesizer. The input of the frequency
synthesizer is controlled by the pseudo-noise (PN) sequence
generator. Thet successive bits of PN sequence generator
control the frequency hops generated by synthesizer. Since
the bits of the PN sequence generator change randomly, the
frequency hops generated also change randomly. Since t
bits PN sequence controls frequency hops, there will be
distinct 2 t frequency hops generated. The total bandwidth
of the output signal is very high.
The received DS/FH/ MFSK signal is applied to hopping
pattern recognition (HPR) block. This block consists of the
functional stages initial frequency detection (IFD),
remaining frequency detection (RFD), compute hopping
pattern (CHP). The goal of the detection device is to detect
the HP (hopping pattern) without any prior knowledge about
the HP used by the sender at the receiver. The HP of
wireless network will be known using this block without
any prior knowledge, about the HP used by the sender at the
receiver.
Hopping pattern (HP) may consist of two to m random
frequencies. Each frequency may exist only once. Assume
H.P is F with frequencies F0, F1, F2,.., Fx. To detect that a
frequency being transmitted clear channel assessment is
required. It requires 50 s to indicate busy. To recognize
Hopping Pattern formula is expressed as:

II. SYSTEM DESCRIPTION


In this paper we are explaining the dual encryption
transmission of spread spectrum. And then decrypt that
encrypted data without any prior knowledge of encrypting
PN sequence. First data sequence is directly encrypted by
PN sequence in direct sequence spread spectrum (DSSS).
Then this encrypted data is modulated & its modulation is
again encrypted by PN sequence in frequency hopping
spread spectrum (FHSS). As data is encrypted two times the
data is more secure from the unwanted user. To describe in
details the operations of spread spectrum detection & PN
sequence retrieval, the simplified block diagram of a
transmitter & receiver for spread spectrum multiple access
system is illustrated in Fig. 1 & Fig. 2.

Fig.1. Transmitter block diagram

392

Here dx is the dwell time of frequency Fx. Only one


frequency will be detected by detection device at a time.
This detection occurs by calling the CCA procedure. To
detect the specific frequency transmitted currently by clear
channel assessment transmission should be of complete test
period. When on transmission stops on the detected
frequency before test period then, the correct frequency may
not be available. This failure when the frequency hop is less
than 50 s can overcome in stage six. The output of the
third stage is then given to the decision device, then to the
fourth stage M-ary FSK detector. The detector detects the
particular symbol transmitted. In the FH/M-ary FSK the
individual frequency of smallest duration is called chip.
Now, at the output of the M-ary FSK detector we get the N
bit symbol in parallel. From these N bits t bit LSBs are
then transferred to the PN sequence register r(t). These are
the PN sequence for that N bit symbol. Then the N bit
symbol is converted to the serial bit stream by parallel to
serial converter. Then this N serial bits are applied to the
mixer with thet bit LSBs. The output of the mixer is the
data signal b(n). Thist bit LSBs are then used to generate
the frequency hops by frequency synthesizer. This is fed to
the mixer with the input signal & compared with the output
of HPR algorithm in decision block. The output of the both
HPR algorithm & the mixer should be same. If the
frequency hop is lesser than the 50 s than HPR algorithm
fails. Then the output of the mixer is passed to the M-ary
FSK detector.

The objective of the first stage is to detect one particular


frequency that is transmitting, regardless of its location in
the HP. The second stage is to detect the rest of the
frequencies and use a time-based marker to associate them
with the first frequency. The third stage takes the
frequencies and the time markers from the second stage and
calculates the order of the frequencies and the individual
dwell times. Fourth stage demodulates the M- ary FSK
signal & generates the N bit data at its output. Fifth stage
retrieves the PN sequence & gives the original data b(n).
Sixth stage again demodulates the input data stream &
compares with output of third stage to avoid the error if the
hop is less than 50 s .
A. Initial frequency detection algorithm (IFD)
The initial frequency detection stage (IFD) is used to
identify the first frequency in F , denoted as Fo. This method
is used to scan through all the frequencies, and if no
frequency is found scan all the frequencies again. When Fo
is found then it is passed to the second stage. This stage is
described as follows:

Let the frequency 1 is set to c.

F or 50 s scan the Fc.


After channel recognition record Fo= Fc.
Increment c and move to stage 2.Come to stage 1 if
c = 79.
B. Remaining frequencies detection (RFD)

III. SPREAD SPECTRUM PATTERN & PN SEQUENCE


RETRIEVAL

When the IFD is complete & passes Fo to the Remaining


Frequencies Detection (RFD). The RFD records when
frequencies stops transmission with respect to the end of the
Fo signal. This stage is described as follows:
Start timer from 0 & test continuously to find Fo.
Increment the timer & begin new scan Fscan1.
Record the timer related with the end of transmission
in the respective tx position, when frequency found is
not equal to Fo.
Test continuously to find it, whenever Fo is found.
Record that timer duration as the timer 1 and reset it.
If Fo is found or timer surpassed the period exit the
stage. Increment the timer & begin new scan F scan2.
Record the timer related with the end of transmission
in the respective tx position, when frequency found is
not equal to Fo.

Earlier analysis on non-coherent frequency-hopped


multiple access (FHMA) systems assume that: 1) a singlestage detector is employed by the receiver and 2) random
memory less FH patterns (users addresses) are used.
3) They also assume that a chip (hop)-synchronous mode is
maintained, i.e., all users switch their carrier frequencies
simultaneously. Here the Spread spectrum pattern & PN
sequence retrieval algorithm to detect hopping pattern &
retrieve PN sequence in wireless ad hoc network will be
developed. The algorithm consists of six stages for
recognizing the hopping pattern & retrieving PN sequence.
Each stage is linked with other stage, such that the first
stage output is taken as the input to the next stage. But the
output of last stage is compared with the output of third
stage. This method will perform in six stages:

Stage 1Initial Frequency Detection (IFD), locates


the first frequency in the network.

Stage 2 Remaining Frequencies Detection (RFD),


detects the remaining frequencies.

Stage 3 Compute Hopping Pattern (CHP),


calculates the entire hopping pattern.

Stage 4 Demodulate the M-ary FSK signal.

Stage 5 Retrieve the PN sequence & decode data.

Stage 6 Demodulate the input & compare.

C. Compute hopping pattern (CHP)


The output of the RFD fed to the CHP i.e the array of tx.
Then calculate the hopping patterns hierarchy and the dwell
times. This stage works as follows:
Classify the tx array of input.
For Fo compute dwell time.
Compute the remaining dwell times.

393

We classify the array of tx depending on the timers in CHP.

adaptive detection, and multiple interference reduction.

D. Demodulate the M-ary FSK signal

V.

In this stage the output of the third stage is fed to the


non-coherent M-ary FSK detector [12]. The output of
this detector consists of the N bit symbol or data.
E.

[1]
[2]
[3]
[4]

Retrieve the PN sequence & decode the data

In this stage the PN sequence is retrieved from N bit


symbol by transferring bit LSBs to the register r(t). This
stage is described as follows:

[5]
[7]

The t bit LSBs of N bit symbol are transferred to


register r(t) of t bit.
This t bit LSBs are PN code for that symbol.
Then the N bit parallel data are converted into the
serial data.
Hence bit LSBs are used to decode that N bit data.
F.

[8]
[9]
[10]

Demodulate the input & compare

[11]
[12]

In this stage the incoming FH/ MFSK is again


demodulated by the frequency hops generated by the
retrieved PN sequence & compare it with the output of
FHPR block. This stage is described as follows:

[13]
[14]

The t bit LSBs in r(t) are used to generate the


frequency hops as in transmitter.
These hops are used to demodulate the FH/ MFSK
signal.
The demodulated signal is compared with the output of
third stage.
If output of third stage is same as sixth stage then
retrieved PN code is correct otherwise not.
If the hop is less than the 50 s then for that instance
starting three stage fails & the output of sixth stage will
be considered.

[15]
[16]

[17]

[18]

IV. CONCLUSION

[19]

The proposed spread spectrum pattern & PN sequence


retrieval algorithm will provide more security to the
wireless AD HOC network. The algorithm has six stages:
initial frequency detection (IFD), remaining frequencies
detection (RFD), compute hopping pattern (CHP),
demodulate the M-ary FSK signal, retrieve the PN sequence
& decode data, demodulate the input & compare. Our future
work in this field will include multiple pattern detection,

[20]

[21]

394

REFERENCES

D. Wood, and J. A. Stankovic, Denial of Service in Sensor


Networks, IEEE Computer, Oct. 2002, pp. 54 62.
http://standards.ieee.org/getieee802/802.11.html.
The official Bluetooth Web site, http://www.bluetooth.com.
D. J. Goodman, P. S. Henry and V. K. Prabhu, Frequency-Hopped
Multilevel FSK for Mobile Radio, Bell System Technical Journal,
Vol. 59, No. 7, Sep. 1980, pp. 1257 1275.
P. Yegani and C. D. McGuillem, FH-MFSK Multiple Access
Communication Systems Performance in the Factory Environment,
IEEE Trans. Veh. Technol. Vol. 42, Feb. 1993, pp. 333-344.
Y. T. Su, Y. Shen and C. Hsiao, On the Detection of a Class of Fast
Frequency-Hopped Multiple Access Signals, IEEE Journal on
Selected Areas of Communications, Vol. 19, No. 11, Nov. 2001, pp.
2151 2164.
R. A. Dillard and G. M. Dillard, Likelihood- Ratio Detection of
Frequency-Hop Signals, IEEE Transactions on Aerospace and
Electronic Systems, Vol. 32, No. 2, April 1996, pp. 543 553.
T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein,
Introduction to Algorithms, 2nd ed., Cambridge, MA, The MIT Press,
2001, pp. 145-164.
M. Simon, J. Omura, R. Scholtz and B. Levitt, "Spread spectrum
communications hand book", McGraw-Hill, 2002.
D. Torrieri, "Principles of spread-spectrum communication systems",
Springer, 2005.
The Spread Spectrum Handbook, third ed., Stanford
Telecommunications, Inc., Sunnyvale.
M. B. Pursley, Introduction to Digital Communications. Upper
Saddle River, NJ: Prentice-Hall, 2005.
Sung Han Chung IEEE, and Peter J. McLane, Code Hopping - Direct
Sequence Spread Spectrum to Compensate for Intersymbol
Interference in an Ultra-Wideband System, IEEE Transactions on
communications, VOL. 56, NO. 11, November 2008.
Mike Burnster & Tri Van Le, Secure communications in ad hoc
network, Proceedings of the 2004 ieee workshop on information
assurance & security, US military Academy, Ny, June 2004.
Juinn-Homg Deng, Shu-Min Liaol, and Gau-Joe Lin, A Low
Complexity MSK-Based M-ary Cyclic Shift Keying Transceiver for
Direct Sequence Spread Spectrum System over Multipath Fading
Channels, Feb. 15-18, 20091CACT 2009, ISBN 978-89-5519-139-4.
Youngho Jo and Dapeng Wu, Blind Synchronization, Estimation of
Data Symbol, Spread Sequence, And Generator Polynomial In Direct
Sequence Spread Spectrum Systems, This work was supported in
part by a grant from Cyber Technology Research Foundation. 978-14244-26775/08/$25.00 _c 2008 IEEE.
Michael B. Pursley and Thomas C. Royster, High-Rate DirectSequence Spread Spectrum With Error-Control Coding, IEEE
Transactions On Communications, VOL. 54, NO. 9, September 2006.
Kihong Kim, Jinkeun Hong, Jongin Lim, Approach of the Secure
Communication Mechanism in Aero-wireless Environment, 2007
International Conference on Multimedia and Ubiquitous Engineering
(MUE'07).
M. I. Youssef, A. E. Emam, and M. Abd Elghany, Direct Sequence
Spread Spectrum Technique with Residue Number System,
International Journal of Electrical, Computer, and Systems
Engineering, 2009.
Michael
B.
Pursley,
Direct-Sequence
Spread-Spectrum
Communications for Multipath Channels, IEEE Transactions on
Microwave Theory and Techniques, Vol. 50, No. 3, March 2002.

Das könnte Ihnen auch gefallen