Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment

Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold.

[1]  Jitendra K. Tugnait,et al.  Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criteria , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[2]  Jovan Dj. Golic,et al.  Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers , 1995, EUROCRYPT.

[3]  Burton S. Kaliski,et al.  On the Security of the RC5 Encryption Algorithm , 1998 .

[4]  Jitendra K. Tugnait,et al.  Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion , 2001, IEEE Trans. Signal Process..

[5]  Litao Gang,et al.  Security and synchronization in watermark sequence , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[6]  Tongtong Li,et al.  Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving , 2004 .

[7]  Ismail Mansour,et al.  Security architecture for wireless sensor networks using frequency hopping and public key management , 2011, 2011 International Conference on Networking, Sensing and Control.

[8]  Xiaodong Xu Blind estimation of PN code in multipath fading direct sequence spread spectrum systems , 2008, 2008 11th IEEE International Conference on Communication Technology.

[9]  Abolfazl Falahati,et al.  Improving code division multiple access security by applying encryption methods over the spreading codes , 2007, IET Commun..

[10]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[11]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .