You are on page 1of 14

By :-

Ankita Sharma 83/10


Akanksha Dubey 39/10
Priyanka 360/10
Based on our previous report, various anti-
jamming techniques are :-

Regulating Transmitted Power
Frequency-hopping Spread Spectrum(FHSS)
Direct Sequence Spread Spectrum(DSSS)
Hybrid FHSS/DSSS
Ultra Wide Band Technology
Randomized Differential DSSS

NOTE - All the techniques are based on
improvising SNR ratio of the channel
Applications of anti-jamming schemes-

Common examples of FHSS transmissions are Wireless local area
network (WLAN) cards and GSM mobile phone transmissions

DSSS can be used to increase the security of the transmission and
also overcome jamming, multi-path and signal fading problems.

It is also used as a multiple access technique, e.g. Code division
multiple access (CDMA), where each user utilises a different pseudo
random sequence.

Common examples of DSSS transmissions are Wireless local area
network (WLAN) cards and IS-95 / 3G mobile phone transmissions
(CDMA).
DSSS Transmitter
DSSS Receiver
An example of the basic RD-DSSS scheme
RD-DSSS Transmission
Pros and Cons
Provides resistance against wireless interference for
broadcast communication
Requirement of shared keys is removed, gaining
reliability and scalability
The communication overhead is reduced
Vulnerable to reactive jamming attacks
The jammer can spread a fake message using the
identified code sequence
PERFORMANCE OVERHEADS
Computational Overhead:
t
a
= t
h
+ t
s
+ t
p
+ t
ip
+ t
c

Storage Overhead: to store the code set P and all the
index codes.

Communication Overhead: because a sender needs
to append k index codes to the end of the message
body.

non-intelligent jamming attack: the jammer
disrupts wireless communication by sending
random noise signals

intelligent jamming attacks: the jammer
transmits jamming signals that are generated
based on his knowledge of the communication
systems (e.g., the signal patterns, anti-jamming
strategies, and communication protocols)

Difference between various anti-
jamming schemes:-

Multiple Access Operation :- Multiple access operation on the same
channel is not possible in IEEE 802.11 DSSS systems whereas FHSS caters
for as many as 26 collocated networks sharing the band

Interference Susceptibility :- It is possible to operate the groups of 3
possible DSSS systems much closer together than the groups of 15 FHSS
systems.

Small levels of broadband interference are often well tolerated by high
interference limits of DSSS system but not by FHSS systems.

Power Spectral Density :- The power spectral density will be 13.4
dBW/MHz lower for the DSSS systems than for FHSS systems
Convert input bits to bipolar bits.
Take 100 samples per bit for both user1 and user2
and plot base band signal
Then BPSK modulate the signal.
Exclusive OR gate and shift registers functions are
performed
Multiply the BPSK modulated signal with the PN
code.
Same procedure carried out for user2 bits.
The signal from user1 is added to signal from user2
and white Guassian noise is added.


At receiver, first received signal is
multiplied with PN then BPSK
demodulated by multiplying with the
carrier(coherent demod)
Samples over 1 bit interval is summed.
if
sum > 0 => rxbit = 1
else
rxbit = 0
Same procedure is repeated for user2.

Conclusion: If SNR is more than some reasonable
value there are no bit errors.

THANK YOU

You might also like