Application of hash functions to enhance security of fast frequency hopped systems
With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/157597 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency slots where one or more of the available frequency slots is used to transmit the signal. At each frequency interval, the selection of frequency slots is generated by the pseudonoise (PN) sequence. The project aims to utilize hash functions to generate a more secure hopping pattern, using the properties of the hash function. The output of the PN sequence will be hashed and the resulting output will be used to select the frequency slots. 10% of the frequency bandwidth was jammed with partial-band noise jamming to test the performance of the hash function model. The results are compared against a control, a 4-stage linear feedback shift register (LFSR) to analyze the jamming probabilities with hash functions implemented. Although the jamming probabilities are constant at approximately 10% with hash functions implemented, it can be inferred that hash functions do not have adverse effects on the jamming probabilities.
Hence, with the application of hash functions, it will be more difficult to decrypt the PN sequence due to its one-way property and to predict the future hopping pattern from previous patterns. |
---|