You are on page 1of 5

Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)

IEEE Xplore Part Number: CFP19K34-ART; ISBN: 978-1-5386-8113-8

Implementation of Spread Spectrum Modulation Schemes for Secure Communications


Anand Krisshna P Aswini B Sreehari S Nair
Department of Electronic and Department of Electronic and Department of Electronic and
Communication Engineering Communication Engineering Communication Engineering
Amrita School of Engineering, Amrita School of Engineering, Amrita School of Engineering
Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham
Amritapuri, India Amritapuri, India Amritapuri, India
anandkrisshna.p@gmail.com baswini16@gmail.com sreeharisnair26@gmail.com

P A Gopika
Gayathri Narayanan
Department of Electronic and Deparment of Electronics and
Communication Engineering Communication Engineering
Amrita School of Engineering, Amrita School of Engineering,
Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham
Amritapuri, India Amritapuri, India
gopi003.ajr@gmail.com gayathrin@am.amrita.edu

ABSTRACT- This paper presents a study of wideband “pseudo random” or “pseudo noise” (PN) codes.
spread spectrum modulation schemes with application to These randomly produced PN codes by the PN
secure communications and presents its advantages over generator are uniformly distributed and are
narrow band communications. It mainly focuses on two independent of the input data. The spread signal will
Spread Spectrum techniques - Direct Sequence Spread exhibit flat spectral density across the bandwidth
Spectrum and Frequency Hopped Spread Spectrum. rather than a single peak at the modulation frequency.
These methods sufficiently reduce the power spectral This results in the drowning of signal in noise and
density of the transmitted signal making it a very secure therefore makes the system immune to any third party
form of data transmission. Both the techniques were attackers or interference. Commercially, spread
simulated and analyzed using Matlab for the stated spectrum was used in military applications, due to its
application, where real time geographical locations was resistance to jamming. Fig 1 is a pictorial depiction of
considered and the obtained results are presented.
the power spectral density of normal modulation and
Keywords- AGWN; DSSS; FHSS; CDMA; Secure spread spectrum modulation, where the peak implies
Communication. the normal spectrum and the red curve indicates spread
spectrum.

I.INTRODUCTION
With the tremendous advancements in the field of
communications, there is an increasing demand for
secure form of data transmission. One of the major
problems with narrow-band transmission is the
undesired signal interference from the channel and
Fig 1: Spread and Normal Signals power spectral density
also interference from users of adjacent frequencies
due to the availability of small bandwidths in and
around the assigned frequency. Spread spectrum is a
technology in which the data is sent using a much Spread Spectrum communications is an area of
higher bandwidth. Spread spectrum technology is less appreciable research significance. Several research
prone to intentional and unintentional interference and works can be seen in the literature [2][4]. Performance
jamming that are encountered during the transmission analysis of the DSSS and FHSS scheme applicable to
of the digital information. These techniques exhibit AWGN channels is explored. [3] deals with the
desirable properties like reducing interference, implementation of the 2 schemes validating the aspect
minimizing crosstalk etc[1]. In Spread spectrum of security but does not emphasize on any application
transmission, the transmitted signal assumes a in particular. [6] builds on [2] to extend it to wireless
bandwidth that is much higher than the minimum scenario considering fading and interference. [7],[8]
required bandwidth to send the original information. presents an overall literature review in this field. This
By sending the signal with a much wider bandwidth, a paper is organized as mentioned. Section I gives an
third party will not be able to tap the message or introduction to the motivation of using spread
interfere because the message is now “hidden” in noise spectrum techniques and also gives a brief outline of the
and only the noise spectrum remains superficially[1]. current state of the art. Section II describes the
This type of spectrum spreading is obtained by means theory pertaining to the problem. Section III gives the
of a spreading code, and a synchronized spreading detailed simulation results for the chosen application.
code at the receiver is used for data retrieval at Section IV presents the conclusion of the work.
the receiver. These spreading codes are referred to
as
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on February 17,2024 at 04:42:57 UTC from IEEE Xplore. Restrictions apply.

978-1-5386-8113-8/19/$31.00 ©2019 IEEE 1397


Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)
IEEE Xplore Part Number: CFP19K34-ART; ISBN: 978-1-5386-8113-8

II . SPREADING TECHNIQUES which is generated by a Pseudo Noise (PN) source. For


every T seconds, the PN source produces a new k-bit
A. Direct Sequence Spread Spectrum value. The frequency of the carrier in the required time
interval is chosen such that the it is matched with the
Direct sequence spread spectrum or DSSS is one of the newly generated k-bit value corresponding to it in the
two approaches of spread spectrum modulation channel table. The major advantages of frequency
technique for digital signal transmission. It was hopping spread spectrum (FHSS) is that it can be
initially developed for military use, to resist jamming programmed to intentionally skip some portions of
attempts [1]. In DSSS modulation, initially the data spectrum. FHSS requires shorter time for acquisition
signal is multiplied by the pseudo random noise. This but very large bandwidth. FHSS is usually used for
random signal has more bit rate when compared to the WiFi (WLAN) and Bluetooth signals [8]. There are
original signal. The input signal is mixed with the also two basic classifications for FHSS namely: Slow
spreading sequence. The resultant multiplied signal FHSS (Multiple symbols are transmitted in one
will be the length of the pseudo random bit sequence. frequency hop) and Fast FHSS (Multiple hops are
Consider the frequency translation of a base-band required to transmit one symbol)
message to a higher part of the spectrum, using BPSK
modulation. The resulting signal occupies a bandwidth
which is double the frequency or more, and has a
power spectral density which is much less than the
noise occupying the same part of the spectrum. III. SYSTEM MODEL and SIMULATION
RESULTS
The carriers chosen for digital modulation, for
instance, BPSK, are typically spread over large A. Spread spectrum modulation using DSSS and
bandwidth, and so the modulated signals will also FHSS using BPSK scheme
occupy the same bandwidth. Advantages of DSSS are In this work, we exploit the property of the DSSS and
its difficultness to detect and simple implementation, FHSS scheme for defense and military applications,
it also shows the best behavior in multipath rejection, where a defense vehicle on the move will want to
but there are few drawbacks too, like the near far convey its location to the central control room as a
effect. DSSS spectrum is currently used in certain part of periodic update or location updates in cases of
application like CDMA cellphone technology, emergency. Employing spread spectrum techniques
convert communications and satellite based will ensure that no third party can access this
navigation systems. DSSS has best discrimination information being communicated to the control room.
against multiple path signals and reduces third party
interference or jamming effectively. However it has
certain disadvantages such as it requires large
acquisition time and wideband channel with small
phase distortion. Also the pseudo noise generator
should generate sequence at high rates. FHSS have
larger bandwidth and needs shorter acquisition time.
FHSS technology applies to the endpoints requiring
fast mobility. The following sub-section explains the
concept of FHSS.

Fig 2: Spread Spectrum Block


Diagram
B. Frequency Hopped Spread Spectrum

Near far effect is one of the primary problems


encountered in Direct Sequence spreading, which is In DSSS Modulation, initially the input signal is
overcome in the Frequency Hopped Spread Spectrum multiplied using randomly generated pseudo random
or FHSS. In the Frequency Hopped Spread Spectrum, noise or PN sequence which has more bit rate when
the carrier is made to hop in a random fashion from one compared to the original input signal. Pseudo random
frequency to other with respect to time [1]. The noise is a sequence of binary numbers which is
baseband signal is modulated on a carrier signal and the produced randomly. The resultant multiplied signal
frequency of this carrier, i.e. the sequence of will be the length of the pseudo random bit sequence.
channels is fully dependent on the spreading code, The output of this is then modulated using BPSK
scheme. In BPSK modulation the resultant multiplied
signal is modulated using a carrier signal. This way

978-1-5386-8113-8/19/$31.00 ©2019 IEEE 1398


Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on February 17,2024 at 04:42:57 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)
IEEE Xplore Part Number: CFP19K34-ART; ISBN: 978-1-5386-8113-8

the overall signal is spread over a much wider


bandwidth. The signal that reaches the receiver is
usually added with the noise from the receiver
channel. During the channel transmission of the
modulated signal the signal gets disturbed using the
Additive White Gaussian Noise (AWGN) which has
got a normal distribution with flat power spectral
density.

In FHSS modulation, the input signal is BPSK


modulated with a narrowband carrier signal. The
modulated signal is then transmitted by rapidly
switching the signal over many frequency channels.
The sequence of channels, which in turn determines
the frequency of our carrier is dependent on the
spreading code. i,e, the new k-bit value produced by
the PN code determines the carrier frequency for that Fig 3: Identified locations in the state of Kerala
particular time interval. The advantage of this carrier
frequency hopping is that the signal bandwidth gets
increased. The resultant FHSS signal will have
various frequency components. Fig 2 represents the
schematic diagram of spread spectrum technique
implemented here.

For analyzing the capabilities of the modulation


schemes for our application, the latitudes and
longitudes of four different locations from four places
in Kerala are taken from Google Maps. Fig 3 shows
four different locations in Kerala which will be the
secure data for transmission. Table 1 lists out the
captured data. The decimal form of this locations are
converted to its binary equivalent which serves as the
input signal. The simulations are performed using
Matlab, which is a highly effective technical
computing tool.

Fig 4 shows the DSSS modulation using BPSK


scheme whereas Fig 5 shows the results of FHSS
modulation scheme. Fig 4: DSSS modulation using BPSK a) input signal for
DSSS modulation b) Input signal with increased no: of
bits c) Pseudorandom bit sequence d) multiplied signal
output of input signal and Pseudo random bit sequence e) the
modulated signal using BPSK scheme

B. Spread spectrum demodulation using DSSS and


FHSS using BPSK scheme

The PN sequence we are using in the spread spectrum


technique is known only to the transmitter and
receiver. So the receiver can use the same PN
Table 1: Latitudes and Longitudes of four locations sequence to counteract the effect of PN sequence on
the transmitted signal to reconstruct the original
signal back. By employing longer PN sequence with

978-1-5386-8113-8/19/$31.00 ©2019 IEEE 1399


Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on February 17,2024 at 04:42:57 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)
IEEE Xplore Part Number: CFP19K34-ART; ISBN: 978-1-5386-8113-8

more bit rate we can enhance the signal to noise ratio Demodulated signal using carrier b) Despreaded signal with
on the channel known as processing gain [1]. PN
sequence c) Reconstructed
signal

Fig 7: FHSS demodulation of noise added received signal a)De-


spreaded signal with PN sequence b) Demodulated signal
Fig 5: FHSS modulation using BPSK a) input signal for using carrier c) Reconstructed signal
FHSS modulation b)input signal with BPSK modulated c)
Frequency hopped signal signal

At the FHSS receiver, the signal at the receiver is first


The received signal consist of the transmitted signal de-spread using the exact spreading signal used in the
and an additive interference. The receiver transmitter and then demodulated signal is multiplied
implementation is achieved with signal demodulation using the narrow band carrier to obtain the original
as shown in the system block diagram. This is then data. This data is then converted back to its decimal
multiplied with the pseudo random code to regenerate form to get the location. .Here Fig 6 shows the DSSS
the original input bit stream. When this is done, only demodulation of noise added received signal whereas
then does the data that was generated with the same Fig 7 shows the FHSS demodulation of noise added
spreading code become regenerated. This binary data received signal. Fig 8 shows the power spectral
is then converted to its decimal form. density of DSSS signal and Fig 9 shows the power
spectral density of FHSS signal.

Fig 6: DSSS demodulation of noise added received signal


a) Fig 8: Power spectral density(PSD) of DSSS a) PSD of
normal modulation b) PSD of DSSS signal

978-1-5386-8113-8/19/$31.00 ©2019 IEEE 1400


Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on February 17,2024 at 04:42:57 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)
IEEE Xplore Part Number: CFP19K34-ART; ISBN: 978-1-5386-8113-8

REFERENCES

[1]. R.E. Ziemer, R.L. Peterson and D.E. Borth, “Introduction


to Spread Spectrum Communications” Pearson
Publishers, 1 st edition.
[2]. M. Katta Swamy, M.Deepthi, V.Mounika,
R.N.Saranya,
‘Performance Analysis of DSSS and FHSS Techniques
over AWGN Channel’ ,International Journal of
Advancements in Technology ,Vol. 4 No. 1(March 2013)c
IJoAT
[3]. M. Hasan, J. M. Thakur, and P. Podder,Design
and
’Implementation of FHSS and DSSS for Secure
Data Transmission’, Khulna University of Engineering
and Technology (KUET), Khulna, Bangladesh
[4]. Pravin Wakhmare, Prof Rahul Nawekhare
Performance evaluation of DSSS and FHSS using
modulation techniques, International Journal of Innovative
Research in Computer and Communication Engineering.
Vol. 3,Issue 10, October 2015
[5]. A Ramesh, A Naresh, N V Seshagiri Rao, ’Technique
Fig 9: Power spectral density (PSD) of FHSS a) PSD of for Reduction of Intersymbol Interference in the Ultra-
normal modulation b) PSD of FHSS signal Wideband Systems’, International Conference on
Emerging Trends in Engineering, science and
Technology(ICETEST-2015)
[6]. X. Tian, S. Dong. Y.Han, “Performance Analysis of
Spread Spectrum Communication System in Fading
Environment and Interference”, 2010 2 nd IEEE
International Conference on Computational Intelligence
IV. CONCLUSION and Natural Computing. CINC
2010, pg 394-
This paper presents the application of spread 397
spectrum modulation schemes for secure [7]. S. Latif, “Real time System Applications in Spread
communications. The scenario considered is that of Spectrum Communication: A Literature Review”,
the communication of the position of vehicles International Journal of Signal Processing, Image
Processing and Pattern Recognition Vol.7, No.1 (2014),
carrying defense/military equipment or personnel. pp.27-32
The location of the vehicles are taken from the Maps [8]. Dr. Rajathilagam, Dr.P. Venkat Rangan, Jayaraj,
and the encoded results are transmitted and received “Techniques for Secure Communication in Emerging
using the concept of spread spectrum systems. The Wireless Ubiquitous Networks”, International
obtained results validate that it is possible to obtain the Conference on High Power Computing (HiPC),
original signal back by spreading the signal over very Bangalore 2004
wide range of frequencies. This is extremely
desirable in applications like defense and military
applications, where the defense vehicle would want to
communicate its location to the army control room,
but not want any third party to intercept its location for
the risk of getting targeted.

So here in spread spectrum, when the power spectrum


is low it is less prone to outside interference and third
party find it difficult to distinguish from noise level.
Proper filtering and removal of the Gaussian noise
from the channel we can yield better results at the
receiver using this spread spectrum technology.

978-1-5386-8113-8/19/$31.00 ©2019 IEEE 1401


Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on February 17,2024 at 04:42:57 UTC from IEEE Xplore. Restrictions apply.

You might also like