CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security Improvement by using Dual Coded FHSS (DC-FHSS)

by Rahat Ullah, Amjad Ali, Shahid Latif
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 7
Year of Publication: 2013
Authors: Rahat Ullah, Amjad Ali, Shahid Latif
10.5120/13256-0733

Rahat Ullah, Amjad Ali, Shahid Latif . Security Improvement by using Dual Coded FHSS (DC-FHSS). International Journal of Computer Applications. 76, 7 ( August 2013), 1-7. DOI=10.5120/13256-0733

@article{ 10.5120/13256-0733,
author = { Rahat Ullah, Amjad Ali, Shahid Latif },
title = { Security Improvement by using Dual Coded FHSS (DC-FHSS) },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 7 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number7/13256-0733/ },
doi = { 10.5120/13256-0733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:15.275708+05:30
%A Rahat Ullah
%A Amjad Ali
%A Shahid Latif
%T Security Improvement by using Dual Coded FHSS (DC-FHSS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 7
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper a technique is offered for improving the security of data transmission. In today's technical world the prime objective of wireless communication is to make the transmission not only clear, noise free and time efficient but also to make it well secure from unauthorized interceptors. Frequency hopping is a technique used for this purpose in which the random sequence is used to add with each hop of frequency which is used to change randomly at every instant. There was a draw back that if the attacker comes to know the sequence code for selecting the carrier frequencies, than the integrity of our information could be loss. To conquer this problem we have offered an algorithm in which the pseudorandom and its encrypted form both will be used. Its name is Dual Coded FHSS (DC-FHSS).

References
  1. R. A. Poisel, Modern Communications Jamming Principles and Techniques, Artech House Publishers, 2006.
  2. D. Adamy, A first course in electronic warfare. Artech House, 2001.
  3. B. Sklar, Digital communications: fundamentals and applications. Prentice-Hall, 2001.
  4. Christina P¨opper, Mario Strasser, "Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques", ieee journal on selected areas in communications, vol. 28, no. 5, june 2010
  5. R. C. Dixon, Spread spectrum Systems with Commercial Applications, 3ed, John Wiley & Sons, New York,1994.
  6. M. K. Simon, J. K. Omura, R. A. Scholtz, B. K. Levitt, Spread Spectrum Communications Handbook, McGraw-Hill, New York, 1994.
  7. H. Taub, D. L. Schilling, Principles of Communication Systems, 2ed, McGraw-Hill, New York, 1986.
  8. P. G. Flikkema, "Spread-spectrum techniques for wireless communication," IEEE Trans. Signal Proc. , vol. 14, pp. 26–36, May 1997.
  9. C. WANG and M. AMI N. "Performance analysis of instantaneous frequency-based interference excision techniques in spread spectrum communications," IEEE Trans. Signal Proc. , vol. 14, pp. 70–82, August 1998.
  10. T. Samanchuen and S. Tantaratana, "A closed-loop noncoherent pseudonoise acquisition scheme for direct-sequence spread-spectrum systems,"IEEE Conf. Circuits and Systems, Tailand, pp. 97–100, November 1998.
  11. Suwon Kang and Yong-Hwan Lee, " Rapid acquisition of PN signals for DS/SS systems using a phase estimator," IEEE Journal on Selected Areas in Communication, vol. 6, pp. 1128–1137, June 2001
  12. Huang He, Liang Yan, Zhao Chunhui, Pan Quan, "Design of A Spread Spectrum Communication System Based on DSP", Proceedings of the 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems March 20-23, 2011, Kunming, China.
  13. K. Fazel and S. Kaiser, "Multi-carrier and sprad spectrum system," John Wiley and Sons Ltd. , 2003.
  14. M. K. Simon, J. K. Omura, R. K. Scholtz, and B. K. Levitt, "Spread spectrum communications handbook," McGraw-Hill, Inc. , 1994.
  15. Fanxin Zeng, Zhenyu Zhang, "Binary sequences with Large Family Size and High Linear Complexity for Spread Spectrum Communication Systems", 2010 2nd International Conference on Signal Processing Systems (ICSPS)
  16. M. K. Simon, J. K. Omura, R. A. Scholtz, B. K. Levitt, Spread Spectrum Communications Handbook, McGraw-Hill, New York, 1994.
  17. S. Ananthi, R. Hariprakash, V. Vidya Devi, K. Padmanabhan "Spread Spectrum Communication Using Wavelets of Signal for More Security" Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006) 0-7695-2522-9/06 $20. 00 © 2006 IEEE.
  18. Andrew S. Tanenbaum, Computer Networks, pp. 294-295,Prentice Hall (India) Ltd. , Fourth Edition.
  19. Behrouz A Fourozan, "Data Communication and Networking", Fourth Edition, The McGrah-Hilll companies.
  20. Yazdi Z. Z, Nasiri-Kenari M. ,"Mutiuser performance comparisons of frequency hopping and multicarrier slow frequency hopping systems: uncoded and coded schemes ", 6th IEEE Vehicular Technology Conference, 2004.
  21. Floyd, "Digital fundamental", Chapter No. 6 Eighth Edition edition.
  22. William Stallings "Cryptography and Network Security", 4th Edition.
Index Terms

Computer Science
Information Sciences

Keywords

Spread spectrum FHSS Pseudorandom Code Encryption Decryption