Akanksha Dubey 39/10 Priyanka 360/10 Based on our previous report, various anti- jamming techniques are :-
Regulating Transmitted Power Frequency-hopping Spread Spectrum(FHSS) Direct Sequence Spread Spectrum(DSSS) Hybrid FHSS/DSSS Ultra Wide Band Technology Randomized Differential DSSS
NOTE - All the techniques are based on improvising SNR ratio of the channel Applications of anti-jamming schemes-
Common examples of FHSS transmissions are Wireless local area network (WLAN) cards and GSM mobile phone transmissions
DSSS can be used to increase the security of the transmission and also overcome jamming, multi-path and signal fading problems.
It is also used as a multiple access technique, e.g. Code division multiple access (CDMA), where each user utilises a different pseudo random sequence.
Common examples of DSSS transmissions are Wireless local area network (WLAN) cards and IS-95 / 3G mobile phone transmissions (CDMA). DSSS Transmitter DSSS Receiver An example of the basic RD-DSSS scheme RD-DSSS Transmission Pros and Cons Provides resistance against wireless interference for broadcast communication Requirement of shared keys is removed, gaining reliability and scalability The communication overhead is reduced Vulnerable to reactive jamming attacks The jammer can spread a fake message using the identified code sequence PERFORMANCE OVERHEADS Computational Overhead: t a = t h + t s + t p + t ip + t c
Storage Overhead: to store the code set P and all the index codes.
Communication Overhead: because a sender needs to append k index codes to the end of the message body.
non-intelligent jamming attack: the jammer disrupts wireless communication by sending random noise signals
intelligent jamming attacks: the jammer transmits jamming signals that are generated based on his knowledge of the communication systems (e.g., the signal patterns, anti-jamming strategies, and communication protocols)
Difference between various anti- jamming schemes:-
Multiple Access Operation :- Multiple access operation on the same channel is not possible in IEEE 802.11 DSSS systems whereas FHSS caters for as many as 26 collocated networks sharing the band
Interference Susceptibility :- It is possible to operate the groups of 3 possible DSSS systems much closer together than the groups of 15 FHSS systems.
Small levels of broadband interference are often well tolerated by high interference limits of DSSS system but not by FHSS systems.
Power Spectral Density :- The power spectral density will be 13.4 dBW/MHz lower for the DSSS systems than for FHSS systems Convert input bits to bipolar bits. Take 100 samples per bit for both user1 and user2 and plot base band signal Then BPSK modulate the signal. Exclusive OR gate and shift registers functions are performed Multiply the BPSK modulated signal with the PN code. Same procedure carried out for user2 bits. The signal from user1 is added to signal from user2 and white Guassian noise is added.
At receiver, first received signal is multiplied with PN then BPSK demodulated by multiplying with the carrier(coherent demod) Samples over 1 bit interval is summed. if sum > 0 => rxbit = 1 else rxbit = 0 Same procedure is repeated for user2.
Conclusion: If SNR is more than some reasonable value there are no bit errors.