SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 11, Issue 02 (February 2015), PP.74-78
74
Contemporary Spread Spectrum Techniques: A Comparative Study
Ashish G. Nandre 1
, Yogesh R. Risodkar 2
1
MET’s IOE, BKC, Nashik..
2
Sandip Institute of Engineering & Management, Nashik
Abstract:- Anti-jamming is an important problem in broadcast communication. In this paper , we provide an
overview of recent contributions pertaining to the anti-jamming techniques. Specifically, the paper focuses on
comparative study of anti-jamming techniques‟ performance against jammers. Due to secret key sharing
between sender and receiver in classical Spread spectrum techniques, Anti-jamming Broadcast problem arises.
To have jamming resistant communication, Uncoordinated SS, Randomized differential-DSSS, Quorum
Rendezvous Channel Hopping are proposed and implemented in the respective domain of communication. From
the discussion provided in this paper, it is concluded that the brief review of anti-jamming techniques can help
the researchers to understand the functionality and practical applications of the techniques based on DSSS and
FHSS.
Keywords:- DSSS, FHSS, QRCH, UDSSS, UFH-DSSS, Jammers.
I. INTRODUCTION
Traditional communication systems require less power for transmission and bandwidth usage is
efficient. But, these systems are not immune to jamming. Hence at the cost of more bandwidth and higher power
usage for transmission, the Spread Spectrum Techniques provides excellent immunity to all sorts of jamming.
Besides this, SS Techniques possess following advantages:
Ability to selectively address
Bandwidth sharing
Security from eavesdropping
Difficulty in detection
Resistance to fading
But these techniques undergoes anti-jamming broadcast problem due to pre sharing of secret keys between
sender and receivers. To have remedy on this problem the Anti-jamming techniques are proposed in this paper
which gives the best performance against the specific jammers.
MOTIVATION:
Spread spectrum techniques use data independent, random sequences to spread a narrow band
information signal over wideband of frequencies. It is hard or infeasible for an attacker to jam the entire
frequency band; the receiver can correlate the received signal with replicate of the random sequence to retrieve
the original information signal. Important instances of spread spectrum techniques are Frequency Hopping (FH)
and Direct Sequence Spread Spectrum (DSSS).In traditional Frequency Hopping (FH) and Direct Sequence
Spread Spectrum (DSSS) based communication, the sender and the receiver share a secret prior to their
communication which enables the receiver to generate the random sequence and to detect and decode the
sender‟s spread signal. This reliance on a pre-shared secret generally precludes unanticipated transmission
between unpaired devices as well as communication from a sender (or a base station) to an unknown set of
receivers. This problem is known as the anti jamming broadcast problem. This leads to an anti-jamming/key
establishment dependency cycle.[1]
II. LITERATURE REVIEW
In adversarial conditions, following types of jammers can jam the communication: Random, Sweep
and Static jammers can jam the channel permanently without sensing the ongoing transmission messages. These
jammers can be distinguished by regularity of their jamming signals. Reactive jammers sense the ongoing
transmission and with acknowledgement of message transfer they start jamming. Repeater jammers are a
subclass of reactive jammers that intercept the signal (especially DSSS) , low noise amplify, filter and
retransmit it on the channel( knowledge of used spreading codes is not necessary). Combination of the above
types is the Hybrid jammers which jam the channel during the search of message transmissions.[1]
To address the Anti-jamming broadcast problem and immunity against interferences; some researchers
have provided the solutions like Uncoordinated Spread Spectrum (USS) [1], Randomized Differential DSSS
Contemporary Spread Spectrum Techniques: A Comparative Study
75
(RD-DSSS) [2]. The solutions like Quorum Rendezvous Channel Hopping (QRCH) and Dual Code-DSSS (DC-
DSSS) help to find pattern for hopping sequence and better encryption of spreading codes in FHSS and DSSS
respectively.
USS Techniques:
UDSSS, UFHSS, UFH-DSSS are instances of USS techniques and based on SS techniques in that they
spread the information signal over a frequency band that is much larger than the band required for transmission
of information signal. In USS, the sender uses the public set C:={c1,c2,….,cn} of communication channels within
the available frequency band instead of a pre-agreed spreading sequence. This set C is known to all receivers. In
UFH and UDSSS, the communication channels are frequency channels and spreading code sequences
respectively. The sender secretly chooses the transmission channel among C and receivers try to predict the
sender‟s selected channel to receive the message during the acceptance of delay in the reception of repeatedly
transmitted messages (Figure 1). The repeated transmission of messages enables receivers to get synchronized
and receive the messages successfully even in jamming conditions.
Fig.1: The basic principle of USS Techniques [1].
Uncoordinated DSSS (UDSSS):
In UDSSS techniques user utilizes fresh spreading code randomly. Therefore it is hard to predict the
code for jammers. The code sequences are used to spread the entire message, hence, no need of fragmentation
and reassembly at sender and receivers is not required. On the contrary more time is required to receive the data
because the channel gets recorded and UDSSS efficiency depends on balanced spreading codes with good auto
cross correlation properties.
Fig.2: UDSSS: The sender A spreads and transmit the message using randomly selected spreading codes ; the
receiver records the channel and subsequently try to identify the used spreading sequence to decode the message
[1].
Uncoordinated FHSS (UFHSS):
In UFHSS the jammer‟s chances to jam the right channel decreases if more numbers of channels are
used. But due to fragmentation of messages the reassembly is not that much easy at receiver. The fragmentation
allows jammers to insert his own messages to jam the channel.
Contemporary Spread Spectrum Techniques: A Comparative Study
76
Fig.3: UFHSS: The sender A and each receiver Bi choose the channels on which they send and listen randomly
from the set C of available frequency channels respectively. Messages are too long to fit on the one frequency
hop and are thus fragmented, message encoded and packet encoded by sender; after reception, the messages are
reassembled and verified at the receiver [1].
In uncoordinated FH-DSSS the spreading code and the carrier frequency is selected randomly from the
predefined set for message transmission. First the spreading process takes place on signal and then it is fed to
frequency hopper which chooses random frequency channel. At the receiver exactly reverse procedure takes
place. The advantage of UFH-DSSS is that it provides low probability of intercept and frequency diversity over
a large spectrum. Requirement of advanced technique to receive the originally transmitted signal makes UFH-
DSSS stronger against reactive jamming attacks.
Randomized Differential DSSS:
In RD- DSSS the sender and the receiver share spreading code set in which there should be low
correlation between two codes selected randomly. A sender encodes each bit of data using the correlation of two
unpredictable spreading codes. Bit „0‟ is transmitted with two different spreading codes having low correlation
with each other and bit „1‟ is spread using two identical spreading codes with high correlation. The correlation
between two codes for each bit (High correlation => Bit „1‟; Low correlation => Bit „0‟ at the time of de-
spreading at the receiver. For reducing the communication overhead each code sequence is associated with a
special coding code called a Index code. It is advisable that the correlation between two index codes is low. The
index code set and spreading code set should have no overlap for distinguishing index code and a regular
spreading code.
Fig. 4: RD-DSSS Basic Scheme [2].
In RD-DSSS since the correlation properties of spreading code are utilized, the intellectual jamming
attacks can be removed. But, due to storage of spreading as well as index code the communication overheads of
RD-DSSS are high [2].QRCH is the technique which is utilized to select the hopping sequence in PCH (Pseudo
Contemporary Spread Spectrum Techniques: A Comparative Study
77
random channel/ frequency hopping) system. The hopping sequences are constructed using Quorum system
which guaranties the nodes to meet within bounded amount of time in WSN [5]. In Dual code DSSS the
spreading code is encrypted and decrypted at sender and receiver end respectively which gives security against
hijacking of the spreading codes [6].
III. PERFORMANCE ANALYSIS OF ANTI-JAMMING TECHNIQUE
Table I Comparison of Anti-jamming Techniques
Anti-jamming
Techniques
USS Techniques RD-DSSS
Message
Integrity
USS Techniques require measures that
check the integrity of the messages.
Specifically, UDSSS (UFH) requires the
messages (packets) are identifiable and the
bit modification can be detected. UFH
further requires that fragments which
belong to the same message can be
efficiently identified.
RD-DSSS requires the check for message
integrity against the presence of reactive
jammers.
Authenticity
Confidentiality
Message authentication or confidentiality
are not general part of USS techniques but
can be achieved on the application layer
which runs on the top of the USS schemes
e.g. by making use of public key
cryptography, timestamps and message
buffering.
Message authenticity depends upon to what
extent the public information is captured by
the jammers.
Efficiency Although the message latency under
jamming is longer for USS techniques than
the coordinated counterparts, the same
message latency as SS communication can
be achieved in absence of jamming.
RD-DSSS efficiency affected by the
computations of correlations to identify the
index codes, storage overheads due to
spreading code storage and communication
overhead due to appending the index code
along with message body.
Applications Anti-jamming Navigation Broadcast, Anti-
jamming Emergency alerts, Bootstrapping
SS Communication.
It‟s a theoretical simulation based technique
inspired by UDSSS and can be used
efficiently against reactive jamming attack.
IV. CONCLUSION
In this paper, the comparative study of three main Anti-jamming Techniques, viz, UDSSS, UFHSS and
RD-DSSS are compared. These techniques are basically dependent on coordinated SS in case of spreading the
message but differ in the method of choosing the communication channels. The techniques exhibit different
properties against different jammers, i.e., RD-DSSS deals effectively against reactive jamming attacks. . DC-
DSSS[6] is the extension to traditional SS with additional encoding of the barker code. The other techniques like
ZPK-DSSS [7] tells the concept like intractable forward decoding and efficient backward decoding along with
key scheduling method. Baird et al. in [8] represented BBC algorithm for achieving the same level of jamming
resistance as traditional spread spectrum, at under half the bit rate with no shared keys. These are the
contemporary Anti-jamming Techniques.
REFERENCES
[1]. Popper C., Mario strasser, Srdjan Capkun. “Anti-jamming Broadcast Communication using
Uncoordinated Spread Spectrum Techniques” in IEEE Journal on selected areas in Communication,
Vol. 28 No.5, pages 703-715, June 2010. Doi: 10.1109/JSAC.2010.100608.
[2]. Yao Liu, Peng Ning, Huaiyu Dai, An Liu. “Randomized Differential DSSS: Jamming Resistant
Wireless Broadcast Communication” in Proceedings of IEEE international Conference on Computer
Communication (INFOCOM), 2010.
[3]. Popper C., Mario strasser, Srdjan Capkun.”Jamming-resistant Broadcast Communication without
Shared Keys” in ETH-Zurich INFK-Tech.Report 609, March 2009.
[4]. Mario Strasser. “Novel Techniques for Thwarting Communication Jamming in Wireless Networks”, A
dissertation submitted toETH ZURICH for the degree of Doctor of Sciences,2009.
[5]. Eun Kyu Lee, Soon Y. Oh and Mario Gerla. “Randomized Channel Hopping Scheme For Anti-
jamming Communication”, in the poster session of ACM MobiCom, 2010.
Contemporary Spread Spectrum Techniques: A Comparative Study
78
[6]. Rahat Ullah and Shahid Latif.” Improving the security level in Direct Sequence Spread Spectrum using
Dual Code DSSS (DC-DSSS) “ in International Journal of Security and its Applications, Vol 6 No
2,pages 133-136,April 2012.
[7]. Tao Jin,Guevera Noubir.” Pre-shared Secret Key Establishment in Presence of jammers” in
MobiHoc09, Orleans, Louisiana, USA, May 2009.
[8]. Baird III L., Bahn W., Collins M., Carlisle M. " Keyless Jam Resistance" in the proceedings of the
Workshop on Information Assurance, United states Military Academy, West point, New York, USA,
20-22 June 2007.

More Related Content

What's hot

Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networksProf. Dr. Noman Islam
 
Design & imlementation of tarf
Design & imlementation of tarfDesign & imlementation of tarf
Design & imlementation of tarfmadhav558
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksIJERA Editor
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioralIJNSA Journal
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196IJMER
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall forijistjournal
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manetINFOGAIN PUBLICATION
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 

What's hot (19)

Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Design & imlementation of tarf
Design & imlementation of tarfDesign & imlementation of tarf
Design & imlementation of tarf
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor NetworksA Review on Congestion control Mechanisms in Wireless Sensor Networks
A Review on Congestion control Mechanisms in Wireless Sensor Networks
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Entropy based detection andbehavioral
Entropy based detection andbehavioralEntropy based detection andbehavioral
Entropy based detection andbehavioral
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Enhanced green firewall for
Enhanced green firewall forEnhanced green firewall for
Enhanced green firewall for
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
disruption of black hole attacks in manet
disruption of black hole attacks in manetdisruption of black hole attacks in manet
disruption of black hole attacks in manet
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
A43030104
A43030104A43030104
A43030104
 

Viewers also liked

Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...IJERD Editor
 
A location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-cityA location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-cityIJERD Editor
 
Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...IJERD Editor
 
A Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDAA Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDAIJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
 
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...IJERD Editor
 

Viewers also liked (10)

Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
Parallel Reaction Kinetic Modelling Of Biogas To Biomethanol With Zno/Sio2 Na...
 
A location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-cityA location comparison of three health care centers in Sfax-city
A location comparison of three health care centers in Sfax-city
 
Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...Determination and comparison rate of expression markers of osteoblast derived...
Determination and comparison rate of expression markers of osteoblast derived...
 
A Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDAA Review on Image Compression in Parallel using CUDA
A Review on Image Compression in Parallel using CUDA
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
The Implementation Of Concept Main Map In Basic Calculation Of Engineering Su...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
Enhancement of Power Quality Using the Combination of Thyristor-Controlled Re...
 

Similar to Contemporary Spread Spectrum Techniques: A Comparative Study

Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...ijtsrd
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...IJTET Journal
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
Time delayed broadcasting for defeating
Time delayed broadcasting for defeatingTime delayed broadcasting for defeating
Time delayed broadcasting for defeatingjpstudcorner
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Accessguest734441
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
Cellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless networkCellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless networkFaheema Monica
 
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...IJAEMSJORNAL
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...IOSRJECE
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 

Similar to Contemporary Spread Spectrum Techniques: A Comparative Study (20)

UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
A.pptx
A.pptxA.pptx
A.pptx
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...Successful interference cancellation with Blind Equalization method for MC-CD...
Successful interference cancellation with Blind Equalization method for MC-CD...
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
Time delayed broadcasting for defeating
Time delayed broadcasting for defeatingTime delayed broadcasting for defeating
Time delayed broadcasting for defeating
 
Spread Spectrum Multiple Access
 Spread Spectrum Multiple Access Spread Spectrum Multiple Access
Spread Spectrum Multiple Access
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Cellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless networkCellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless network
 
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Contemporary Spread Spectrum Techniques: A Comparative Study

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 02 (February 2015), PP.74-78 74 Contemporary Spread Spectrum Techniques: A Comparative Study Ashish G. Nandre 1 , Yogesh R. Risodkar 2 1 MET’s IOE, BKC, Nashik.. 2 Sandip Institute of Engineering & Management, Nashik Abstract:- Anti-jamming is an important problem in broadcast communication. In this paper , we provide an overview of recent contributions pertaining to the anti-jamming techniques. Specifically, the paper focuses on comparative study of anti-jamming techniques‟ performance against jammers. Due to secret key sharing between sender and receiver in classical Spread spectrum techniques, Anti-jamming Broadcast problem arises. To have jamming resistant communication, Uncoordinated SS, Randomized differential-DSSS, Quorum Rendezvous Channel Hopping are proposed and implemented in the respective domain of communication. From the discussion provided in this paper, it is concluded that the brief review of anti-jamming techniques can help the researchers to understand the functionality and practical applications of the techniques based on DSSS and FHSS. Keywords:- DSSS, FHSS, QRCH, UDSSS, UFH-DSSS, Jammers. I. INTRODUCTION Traditional communication systems require less power for transmission and bandwidth usage is efficient. But, these systems are not immune to jamming. Hence at the cost of more bandwidth and higher power usage for transmission, the Spread Spectrum Techniques provides excellent immunity to all sorts of jamming. Besides this, SS Techniques possess following advantages: Ability to selectively address Bandwidth sharing Security from eavesdropping Difficulty in detection Resistance to fading But these techniques undergoes anti-jamming broadcast problem due to pre sharing of secret keys between sender and receivers. To have remedy on this problem the Anti-jamming techniques are proposed in this paper which gives the best performance against the specific jammers. MOTIVATION: Spread spectrum techniques use data independent, random sequences to spread a narrow band information signal over wideband of frequencies. It is hard or infeasible for an attacker to jam the entire frequency band; the receiver can correlate the received signal with replicate of the random sequence to retrieve the original information signal. Important instances of spread spectrum techniques are Frequency Hopping (FH) and Direct Sequence Spread Spectrum (DSSS).In traditional Frequency Hopping (FH) and Direct Sequence Spread Spectrum (DSSS) based communication, the sender and the receiver share a secret prior to their communication which enables the receiver to generate the random sequence and to detect and decode the sender‟s spread signal. This reliance on a pre-shared secret generally precludes unanticipated transmission between unpaired devices as well as communication from a sender (or a base station) to an unknown set of receivers. This problem is known as the anti jamming broadcast problem. This leads to an anti-jamming/key establishment dependency cycle.[1] II. LITERATURE REVIEW In adversarial conditions, following types of jammers can jam the communication: Random, Sweep and Static jammers can jam the channel permanently without sensing the ongoing transmission messages. These jammers can be distinguished by regularity of their jamming signals. Reactive jammers sense the ongoing transmission and with acknowledgement of message transfer they start jamming. Repeater jammers are a subclass of reactive jammers that intercept the signal (especially DSSS) , low noise amplify, filter and retransmit it on the channel( knowledge of used spreading codes is not necessary). Combination of the above types is the Hybrid jammers which jam the channel during the search of message transmissions.[1] To address the Anti-jamming broadcast problem and immunity against interferences; some researchers have provided the solutions like Uncoordinated Spread Spectrum (USS) [1], Randomized Differential DSSS
  • 2. Contemporary Spread Spectrum Techniques: A Comparative Study 75 (RD-DSSS) [2]. The solutions like Quorum Rendezvous Channel Hopping (QRCH) and Dual Code-DSSS (DC- DSSS) help to find pattern for hopping sequence and better encryption of spreading codes in FHSS and DSSS respectively. USS Techniques: UDSSS, UFHSS, UFH-DSSS are instances of USS techniques and based on SS techniques in that they spread the information signal over a frequency band that is much larger than the band required for transmission of information signal. In USS, the sender uses the public set C:={c1,c2,….,cn} of communication channels within the available frequency band instead of a pre-agreed spreading sequence. This set C is known to all receivers. In UFH and UDSSS, the communication channels are frequency channels and spreading code sequences respectively. The sender secretly chooses the transmission channel among C and receivers try to predict the sender‟s selected channel to receive the message during the acceptance of delay in the reception of repeatedly transmitted messages (Figure 1). The repeated transmission of messages enables receivers to get synchronized and receive the messages successfully even in jamming conditions. Fig.1: The basic principle of USS Techniques [1]. Uncoordinated DSSS (UDSSS): In UDSSS techniques user utilizes fresh spreading code randomly. Therefore it is hard to predict the code for jammers. The code sequences are used to spread the entire message, hence, no need of fragmentation and reassembly at sender and receivers is not required. On the contrary more time is required to receive the data because the channel gets recorded and UDSSS efficiency depends on balanced spreading codes with good auto cross correlation properties. Fig.2: UDSSS: The sender A spreads and transmit the message using randomly selected spreading codes ; the receiver records the channel and subsequently try to identify the used spreading sequence to decode the message [1]. Uncoordinated FHSS (UFHSS): In UFHSS the jammer‟s chances to jam the right channel decreases if more numbers of channels are used. But due to fragmentation of messages the reassembly is not that much easy at receiver. The fragmentation allows jammers to insert his own messages to jam the channel.
  • 3. Contemporary Spread Spectrum Techniques: A Comparative Study 76 Fig.3: UFHSS: The sender A and each receiver Bi choose the channels on which they send and listen randomly from the set C of available frequency channels respectively. Messages are too long to fit on the one frequency hop and are thus fragmented, message encoded and packet encoded by sender; after reception, the messages are reassembled and verified at the receiver [1]. In uncoordinated FH-DSSS the spreading code and the carrier frequency is selected randomly from the predefined set for message transmission. First the spreading process takes place on signal and then it is fed to frequency hopper which chooses random frequency channel. At the receiver exactly reverse procedure takes place. The advantage of UFH-DSSS is that it provides low probability of intercept and frequency diversity over a large spectrum. Requirement of advanced technique to receive the originally transmitted signal makes UFH- DSSS stronger against reactive jamming attacks. Randomized Differential DSSS: In RD- DSSS the sender and the receiver share spreading code set in which there should be low correlation between two codes selected randomly. A sender encodes each bit of data using the correlation of two unpredictable spreading codes. Bit „0‟ is transmitted with two different spreading codes having low correlation with each other and bit „1‟ is spread using two identical spreading codes with high correlation. The correlation between two codes for each bit (High correlation => Bit „1‟; Low correlation => Bit „0‟ at the time of de- spreading at the receiver. For reducing the communication overhead each code sequence is associated with a special coding code called a Index code. It is advisable that the correlation between two index codes is low. The index code set and spreading code set should have no overlap for distinguishing index code and a regular spreading code. Fig. 4: RD-DSSS Basic Scheme [2]. In RD-DSSS since the correlation properties of spreading code are utilized, the intellectual jamming attacks can be removed. But, due to storage of spreading as well as index code the communication overheads of RD-DSSS are high [2].QRCH is the technique which is utilized to select the hopping sequence in PCH (Pseudo
  • 4. Contemporary Spread Spectrum Techniques: A Comparative Study 77 random channel/ frequency hopping) system. The hopping sequences are constructed using Quorum system which guaranties the nodes to meet within bounded amount of time in WSN [5]. In Dual code DSSS the spreading code is encrypted and decrypted at sender and receiver end respectively which gives security against hijacking of the spreading codes [6]. III. PERFORMANCE ANALYSIS OF ANTI-JAMMING TECHNIQUE Table I Comparison of Anti-jamming Techniques Anti-jamming Techniques USS Techniques RD-DSSS Message Integrity USS Techniques require measures that check the integrity of the messages. Specifically, UDSSS (UFH) requires the messages (packets) are identifiable and the bit modification can be detected. UFH further requires that fragments which belong to the same message can be efficiently identified. RD-DSSS requires the check for message integrity against the presence of reactive jammers. Authenticity Confidentiality Message authentication or confidentiality are not general part of USS techniques but can be achieved on the application layer which runs on the top of the USS schemes e.g. by making use of public key cryptography, timestamps and message buffering. Message authenticity depends upon to what extent the public information is captured by the jammers. Efficiency Although the message latency under jamming is longer for USS techniques than the coordinated counterparts, the same message latency as SS communication can be achieved in absence of jamming. RD-DSSS efficiency affected by the computations of correlations to identify the index codes, storage overheads due to spreading code storage and communication overhead due to appending the index code along with message body. Applications Anti-jamming Navigation Broadcast, Anti- jamming Emergency alerts, Bootstrapping SS Communication. It‟s a theoretical simulation based technique inspired by UDSSS and can be used efficiently against reactive jamming attack. IV. CONCLUSION In this paper, the comparative study of three main Anti-jamming Techniques, viz, UDSSS, UFHSS and RD-DSSS are compared. These techniques are basically dependent on coordinated SS in case of spreading the message but differ in the method of choosing the communication channels. The techniques exhibit different properties against different jammers, i.e., RD-DSSS deals effectively against reactive jamming attacks. . DC- DSSS[6] is the extension to traditional SS with additional encoding of the barker code. The other techniques like ZPK-DSSS [7] tells the concept like intractable forward decoding and efficient backward decoding along with key scheduling method. Baird et al. in [8] represented BBC algorithm for achieving the same level of jamming resistance as traditional spread spectrum, at under half the bit rate with no shared keys. These are the contemporary Anti-jamming Techniques. REFERENCES [1]. Popper C., Mario strasser, Srdjan Capkun. “Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques” in IEEE Journal on selected areas in Communication, Vol. 28 No.5, pages 703-715, June 2010. Doi: 10.1109/JSAC.2010.100608. [2]. Yao Liu, Peng Ning, Huaiyu Dai, An Liu. “Randomized Differential DSSS: Jamming Resistant Wireless Broadcast Communication” in Proceedings of IEEE international Conference on Computer Communication (INFOCOM), 2010. [3]. Popper C., Mario strasser, Srdjan Capkun.”Jamming-resistant Broadcast Communication without Shared Keys” in ETH-Zurich INFK-Tech.Report 609, March 2009. [4]. Mario Strasser. “Novel Techniques for Thwarting Communication Jamming in Wireless Networks”, A dissertation submitted toETH ZURICH for the degree of Doctor of Sciences,2009. [5]. Eun Kyu Lee, Soon Y. Oh and Mario Gerla. “Randomized Channel Hopping Scheme For Anti- jamming Communication”, in the poster session of ACM MobiCom, 2010.
  • 5. Contemporary Spread Spectrum Techniques: A Comparative Study 78 [6]. Rahat Ullah and Shahid Latif.” Improving the security level in Direct Sequence Spread Spectrum using Dual Code DSSS (DC-DSSS) “ in International Journal of Security and its Applications, Vol 6 No 2,pages 133-136,April 2012. [7]. Tao Jin,Guevera Noubir.” Pre-shared Secret Key Establishment in Presence of jammers” in MobiHoc09, Orleans, Louisiana, USA, May 2009. [8]. Baird III L., Bahn W., Collins M., Carlisle M. " Keyless Jam Resistance" in the proceedings of the Workshop on Information Assurance, United states Military Academy, West point, New York, USA, 20-22 June 2007.