Application of hash functions to enhance security of fast frequency hopped systems
With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/157597 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-157597 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1575972023-07-07T19:32:11Z Application of hash functions to enhance security of fast frequency hopped systems Beak, Alvin Kang Qi Li Kwok Hung School of Electrical and Electronic Engineering EKHLI@ntu.edu.sg Engineering::Electrical and electronic engineering::Wireless communication systems With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency slots where one or more of the available frequency slots is used to transmit the signal. At each frequency interval, the selection of frequency slots is generated by the pseudonoise (PN) sequence. The project aims to utilize hash functions to generate a more secure hopping pattern, using the properties of the hash function. The output of the PN sequence will be hashed and the resulting output will be used to select the frequency slots. 10% of the frequency bandwidth was jammed with partial-band noise jamming to test the performance of the hash function model. The results are compared against a control, a 4-stage linear feedback shift register (LFSR) to analyze the jamming probabilities with hash functions implemented. Although the jamming probabilities are constant at approximately 10% with hash functions implemented, it can be inferred that hash functions do not have adverse effects on the jamming probabilities. Hence, with the application of hash functions, it will be more difficult to decrypt the PN sequence due to its one-way property and to predict the future hopping pattern from previous patterns. Bachelor of Engineering (Electrical and Electronic Engineering) 2022-05-21T06:37:16Z 2022-05-21T06:37:16Z 2022 Final Year Project (FYP) Beak, A. K. Q. (2022). Application of hash functions to enhance security of fast frequency hopped systems. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/157597 https://hdl.handle.net/10356/157597 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Wireless communication systems |
spellingShingle |
Engineering::Electrical and electronic engineering::Wireless communication systems Beak, Alvin Kang Qi Application of hash functions to enhance security of fast frequency hopped systems |
description |
With the widespread adoption of the Internet and digitalization during the Digital Era, security of wireless communications and data transmission integrity is of utmost importance. In frequency-hopped spread spectrum, the accessible channel bandwidth is divided into multiple nonoverlapping frequency slots where one or more of the available frequency slots is used to transmit the signal. At each frequency interval, the selection of frequency slots is generated by the pseudonoise (PN) sequence. The project aims to utilize hash functions to generate a more secure hopping pattern, using the properties of the hash function. The output of the PN sequence will be hashed and the resulting output will be used to select the frequency slots. 10% of the frequency bandwidth was jammed with partial-band noise jamming to test the performance of the hash function model. The results are compared against a control, a 4-stage linear feedback shift register (LFSR) to analyze the jamming probabilities with hash functions implemented. Although the jamming probabilities are constant at approximately 10% with hash functions implemented, it can be inferred that hash functions do not have adverse effects on the jamming probabilities.
Hence, with the application of hash functions, it will be more difficult to decrypt the PN sequence due to its one-way property and to predict the future hopping pattern from previous patterns. |
author2 |
Li Kwok Hung |
author_facet |
Li Kwok Hung Beak, Alvin Kang Qi |
format |
Final Year Project |
author |
Beak, Alvin Kang Qi |
author_sort |
Beak, Alvin Kang Qi |
title |
Application of hash functions to enhance security of fast frequency hopped systems |
title_short |
Application of hash functions to enhance security of fast frequency hopped systems |
title_full |
Application of hash functions to enhance security of fast frequency hopped systems |
title_fullStr |
Application of hash functions to enhance security of fast frequency hopped systems |
title_full_unstemmed |
Application of hash functions to enhance security of fast frequency hopped systems |
title_sort |
application of hash functions to enhance security of fast frequency hopped systems |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/157597 |
_version_ |
1772826357874556928 |