Abstract

With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communication, are information security and information jamming. Carefully considering the given challenges, this study uses a new advanced anti-jamming approach, a modulation technique based on the frequency-hopping spread spectrum, which has notably high resistance accounted against various potential jammers. The objective of this study is two-fold. First, the physical channel properties are considered, and the random bits are transmitted, employing a cryptographic secured hoping-spread pattern, having a set of carrier frequencies, known at both sides of the transmission. Second, the hashing code is computed only for the key, and transmitted along the original hopset, but with distinct frequencies set. The deployed practical anti-jamming approach, therefore, computed a high efficiency to examine the information secrecy well and primarily the connection availability even in the presence of the jammers. Moreover, this study considered and modeled a communication system and evaluated the proposed system’s performance, applying the theories of Shannon’s entropy and Wyner’s entropy (i.e. Wyner’s wiretap channel), to anticipate the system’s perfect secrecy, even in the worst case when jammer has unlimited computational capabilities.

Highlights

  • The demands to interconnect the devices through wireless media have been increasing day-by-day tremendously

  • The given encryption/decryption function using one-time padding (OTP) examined the perfect secrecy of the spreading code; this study mainly focused on the weaknesses and the probability of key that the key might be stolen by the illegitimate entity of the system, while communication over weaker wireless channels

  • This study employed the frequency hopping (FH) technique, a technique that has been commonly used in wireless systems to protect the communication against jammers and deployed a cryptography module (CM) and the information-theoretic security solution to validate the secrecy of information that transmitted is over the unsecured open physical channels

Read more

Summary

Introduction

The demands to interconnect the devices through wireless media have been increasing day-by-day tremendously. The active attacks are mainly available in the form of jamming and interference, which principle targets are to obstruct the frequency bands by transmitting unwanted signals, and cause the transmission failures in most cases. These attacks, have a potential effect on channel privacy and cause a more adverse impact on the quality of communication, weaken the required channel by establishing communication through intentional interference. Passive attacks are mainly caused by the utilization of wireless media properties and are further categorized as eavesdropping attacks and traffic inspection. Traffic inspection is a kind of attack, mainly residing in wireless communication, which is caused by intelligently analyzing the given information continuously, and affecting the normal traffic flow.[3,4]

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.