Application of hash functions to enhance security of fast frequency hopped systems

With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency...

Full description

Saved in:
Bibliographic Details
Main Author: Beak, Alvin Kang Qi
Other Authors: Li Kwok Hung
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/157597
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-157597
record_format dspace
spelling sg-ntu-dr.10356-1575972023-07-07T19:32:11Z Application of hash functions to enhance security of fast frequency hopped systems Beak, Alvin Kang Qi Li Kwok Hung School of Electrical and Electronic Engineering EKHLI@ntu.edu.sg Engineering::Electrical and electronic engineering::Wireless communication systems With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency slots where one or more of the available frequency slots is used to transmit the signal. At each frequency interval, the selection of frequency slots is generated by the pseudonoise (PN) sequence. The project aims to utilize hash functions to generate a more secure hopping pattern, using the properties of the hash function. The output of the PN sequence will be hashed and the resulting output will be used to select the frequency slots. 10% of the frequency bandwidth was jammed with partial-band noise jamming to test the performance of the hash function model. The results are compared against a control, a 4-stage linear feedback shift register (LFSR) to analyze the jamming probabilities with hash functions implemented. Although the jamming probabilities are constant at approximately 10% with hash functions implemented, it can be inferred that hash functions do not have adverse effects on the jamming probabilities. Hence, with the application of hash functions, it will be more difficult to decrypt the PN sequence due to its one-way property and to predict the future hopping pattern from previous patterns. Bachelor of Engineering (Electrical and Electronic Engineering) 2022-05-21T06:37:16Z 2022-05-21T06:37:16Z 2022 Final Year Project (FYP) Beak, A. K. Q. (2022). Application of hash functions to enhance security of fast frequency hopped systems. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/157597 https://hdl.handle.net/10356/157597 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering::Wireless communication systems
spellingShingle Engineering::Electrical and electronic engineering::Wireless communication systems
Beak, Alvin Kang Qi
Application of hash functions to enhance security of fast frequency hopped systems
description With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency slots where one or more of the available frequency slots is used to transmit the signal. At each frequency interval, the selection of frequency slots is generated by the pseudonoise (PN) sequence. The project aims to utilize hash functions to generate a more secure hopping pattern, using the properties of the hash function. The output of the PN sequence will be hashed and the resulting output will be used to select the frequency slots. 10% of the frequency bandwidth was jammed with partial-band noise jamming to test the performance of the hash function model. The results are compared against a control, a 4-stage linear feedback shift register (LFSR) to analyze the jamming probabilities with hash functions implemented. Although the jamming probabilities are constant at approximately 10% with hash functions implemented, it can be inferred that hash functions do not have adverse effects on the jamming probabilities. Hence, with the application of hash functions, it will be more difficult to decrypt the PN sequence due to its one-way property and to predict the future hopping pattern from previous patterns.
author2 Li Kwok Hung
author_facet Li Kwok Hung
Beak, Alvin Kang Qi
format Final Year Project
author Beak, Alvin Kang Qi
author_sort Beak, Alvin Kang Qi
title Application of hash functions to enhance security of fast frequency hopped systems
title_short Application of hash functions to enhance security of fast frequency hopped systems
title_full Application of hash functions to enhance security of fast frequency hopped systems
title_fullStr Application of hash functions to enhance security of fast frequency hopped systems
title_full_unstemmed Application of hash functions to enhance security of fast frequency hopped systems
title_sort application of hash functions to enhance security of fast frequency hopped systems
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/157597
_version_ 1772826357874556928