SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
Secured Modem
Dr.Ir.Joko Suryana
Lab of RadioTelecommunications and Microwave
School of Electrical Engineering and Informatics
INSTITUTTEKNOLOGI BANDUNG
Outline
• Introduction
• Secured Digital Comm and Low Probability of Detection Concept
• LPD-based Communication, Navigation and Identification
• Signal Intelligence Concept
• Satellite SIGINT
• Some Experiments by ITB :
• Physical Design of Link-16 ( F-16 Data Link )
• Chaotic-based SecureVideoconference over Satelite
Introduction
Generic Digital Communication Systems
Generic Digital Communication Systems
Source Coding/Decoding
Source Coding
• Process of encoding information using
fewer bits
• Re-represents original message by
reducing redundancies
• Reduces the consumption of expensive
resources, such as disk space or
connection bandwidth
• Example –converting image from .bmp
to .jpg
Source Encoding Algorithm Examples
Channel Encoding/Decoding
• Transformation that enables the original
message to better withstand the effects of
channel impairments such as noise,
fading, etc.
• Example : BCH, Golay, Hamming,
Convolutional, Reed-Solomon etc
• Adds bits to the original message –
increases the message size
Modulation / Demodulation
Modulation Examples
Spread SpectrumTechniques
• “Spread” radio signal over a wide
frequency range
• Several magnitudes higher than
minimum requirement
• Gained popularity by the needs of
military communication
• Proved resistant against hostile
jammers
• Ratio of information bandwidth and
spreading bandwidth is identified as
spreading gain or processing gain
Offers the following applications:
• able to deal with multi-path
• multiple access due to different
spreading sequences
• low probability of interception
• privacy
• anti-jam capabilities
Spread SpectrumTechniques
• Direct Sequence Spread Spectrum (DSSS) is a
spread spectrum technique whereby the
original data signal is multiplied with a pseudo
random noise spreading code.This spreading
code has a higher chip rate (this the bitrate of
the code), which results in a wideband time
continiuous spreaded signal.
• Frequency hopping spread spectrum (FHSS) is
a method of transmitting radio signals by
shifting carriers across numerous channels
with pseudorandom sequence which is
already known to the sender and receiver.
Direct Sequence SS
Frequency Hopping SS
SSTechniques Comparisons
SS Technique Advantage Disadvantage
Direct Sequence best behavior in multi path
rejection
simple synchronization
simple implementation
difficult to detect
near far effect
coherent bandwidth
Frequency
Hopper
no need for coherent bandwidth
ess affected by the near far effect
complex hardware
error correction needed
Time Hopper high bandwidth efficiency
less complex hardware
less affected by the near far
effect
error correction needed
Secure Digital
Communication System
Why Digital Communications?
• Easy to regenerate the distorted signal
• Regenerative repeaters along the transmission path can detect a digital signal and
retransmit a new, clean (noise free) signal
• These repeaters prevent accumulation of noise along the path
• Immunity to distortion and interference
• Digital communication is rugged in the sense that it is more immune to channel noise
and distortion
• Hardware is more flexible
• Digital hardware implementation is flexible and permits the use of microprocessors,
mini-processors, digital switching andVLSI
Why Digital Communications?
• Easy to Multiplex
• Easier and more efficient to multiplex several digital signals
• Digital multiplexing techniques –Time & Code Division MultipleAccess - are easier to
implement than analog techniques such as Frequency Division Multiple Access
• Can combine different signal types – data, voice, text, etc.
• Data communication in computers is digital in nature whereas voice communication
between people is analog in nature
• The two types of communication are difficult to combine over the same medium in the
analog domain.
• Encryption and privacy techniques are easier to implement
• Better overall performance
• Digital communication is inherently more efficient than analog in realizing the
exchange of SNR for bandwidth
• Digital signals can be coded to yield extremely low rates and high fidelity as well as
privacy
Secure Communications Requirements
• Basic Security Requirements:
• Confidentiality
• Authentication
• Integrity
• Freshness
• Secure Group Management
• Availability
authenticity
confidentiality
integrity
availability
Secure Communications Systems : Military
• The success of modern military forces depends a great deal on
the effective use of sophisticated radio communication and
navigation systems. Historically, the enemy has employed
electronic countermeasures (ECM) to detect the presence of
these radio signals and either disrupt them or exploit them.
• Radio systems can be disrupted by jamming or by locating and
destroying them.
• On the other hand, exploitation involves using the transmissions for
intelligence and counter-intelligence purposes.
• Prior to the development of high quality data security and
transmission security techniques, it was possible to gather
intelligence from the received signals by demodulating and
decoding (deciphering) them.
• For simple systems it is also possible to "spoof" (or mimic) them to
provide false information (counter-intelligence).
• Radio transmissions can also be exploited, even when they employ
high quality security techniques, by simple radio direction finding
(RDF) or position monitoring.
Example of a Military Radio System
• RadioTypes
• Handheld radios
• Manpack / vehicular radios
• Soldier radios
• Frequency Range
– HF (2-30MHz): Long-range (up to 4000 km)
– VHF (30-108MHz): Short range ground tactical (up to 50 km)
– UHF (225-400MHz): Air-Air and Air-Ground (up to 300 km)
– UHF SATCOM (280-320MHz): Worldwide
– Wideband Networking (225-2000 MHz): Ranges up to 10 km
• Modes of Operation
– Voice (push-to-talk)
– Data
– IP point-to-point data
– IP sub-network data
• Information Assurance
– Programmable INFOSEC
– COMSEC
– TRANSEC
– Software Defined Radio IA
• Waveforms
– US (MIL-STDs) and NATO
(STANAGs) interoperable
waveforms
– Proprietary Harris
exportable waveforms
– Fixed frequency and anti-
jam frequency hopping
waveforms
• Key Fill
– DS-101 EKMS
– Sovereign/Coalition
• Falcon II/III Radio Platforms
– JTRS/SCA SDRs
– Exportable SCA-based SDRs
– Proprietary SDR
Secure Modem Requirements :
LPD Communications
• LPD : low probability of detection
SomeTerminologies
• There are some alternate terminologies used to describe Secure
Communications concepts that need to be discussed.
• The first is Low Probability of Detection (LPD). LPD requirements are concerned with
preventing the enemy from detecting a radio transmission. LPD applies to those
techniques which minimize power spectral density and hence detection.
• The second is Low Probability of Exploitation (LPE). LPE is concerned with preventing
the exploitation of the signal by decoding, spoofing, or position monitoring. LPE
design would deny the enemy knowledge of the system, its modulation characteristics,
its use, and its users.
• The third term is Low Probability of Intercept (LPI) which encompasses both LPD and
LPE. LPI is a generic term from which we derive the term anti-intercept.
Techniques for Securing a Communications System
• Spoofing : A technique used to gain
unauthorized access to computers,
whereby the intruder sends messages
to a computer with an IP address
indicating that the message is coming
from a trusted host.To engage in IP
spoofing, a hacker must first use a
variety of techniques to find an IP
address of a trusted host and then
modify the packet headers so that it
appears that the packets are coming
from that host.
• Falsification : the act of falsifying, or
making false; a counterfeiting; the
giving to a thing an appearance of
something which it is not
LPD Applications on CNI
CNI : Communications,
Navigation and Identification
• Communications: The ability to be able to
communicate by either voice or data link means
with cooperative forces, be it wingmen in the
same flight of aircraft, airborne command
centre or troops on the ground.
• Navigation : The science of getting ships,
aircraft, or spacecraft from place to
place; especially : the method of determining
position, course, and distance traveled
• Identification :The rules of engagement for a
given theatre of operation will necessitate
the classification and identification of a target
before permis sion to engage is given.
LPD Applications on CNI
• Communications :
• VHF/UHFTactical Radios
• SINGARS/HAVEQUICK
• Navigation :
• GPS
• TACAN
• VOR/DME
• Identification:
• IFF Mark XII
• Secondary Radar
Signal Flow of CNI Systems
Some Examples
SIGINT (Signal Intelligence) :
Secure Communication Challenger
Signal Intelligence
• SIGINT = COMINT + ELINT + MASINT
• COMINT (COMmunications INTelligence)
• Interception of communications between people or machines
• ELINT (ELectronics INTelli gence)
• Detection and analysis of non-communications electronic transmissions
• Electronic Warfare: radiation from electronic systems; jamming radiation
• MASINT (Measurement And Signatures INTelligence)
• Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric
data (metric, angle spatial angle, spatial, wavelength wavelength, time dependence modulation time
dependence, modulation, plasma and hydromagnetic)
• Example :TELINT (Telemetry Intelligence )
COMINT
• Search, DF and intercept
• Location fixing of emitters
• Signal analysis and classification
• Monitoring
• Recording
• Evaluation and comparison with
stored data
• Generation of tactical reports
Communication Signal Scenarios
• Wide Spectral Coverage ( 1.5 MHz – 18 GHz )
• ComplexWaveforms (Burst, FH, DS)
• Non-Standard Data Formats
• High Signal Density
• Low SNR Conditions
• Both NB andWB Signals (FDM &TDM)
• Encrypted Signals
• Short DwellTimes
ELINT
• ELINT involves actions taken to :
• Search
• Intercept
• Locate
• Record
• Analysis of radiated EM energy
• ELINT Receiver measure :
• Angle of Arrival (AOA)
• Pulse Width
• Pulse Repetion Frequency
• Frequency
• Time of Arrival
• Scan Rate
• Location fixing of emitter
Radar Signal Scenarios
• Wide Spectral Coverage ( 0.5 – 40 GHz )
• ComplexWaveforms
• Wide PRF Range with Jitter and Stagger – 50 Hz to 500 KHz
• Wide PulseWidth Ranges – 50 ns to 500 µs
• Variety ofAntenna Scans
• Short DwellTimes
Typical Architecture of COMINT/ELINT
Modern Implementation of COMINT/SIGINT
Modern Implementation of COMINT/SIGINT
Satellite SIGINT
Satellite SIGINT
Echelon
• ECHELON is a name used in global media and in popular culture to describe a
signals intelligence (SIGINT) collection and analysis network operated on behalf of
the five signatory states to the UK–USA Security Agreement :
• Australia
• Canada
• New Zealand
• United Kingdom
• United States.
• It has also been described as the only software system which controls the
download and dissemination of the intercept of commercial satellite trunk
communications.
Parabola Antennas Farm : Echelon
Satellite Encryption
• GEO-Mobile Radio Interface (GEO stands for Geostationary Earth Orbit), better known as GMR, is
an ETSI standard for satellite phones.The GMR standard is derived from the 3GPP-family
terrestrial digital cellular standards and supports access to GSM/UMTS core networks.
• It is used by ACeS, ICO, Inmarsat, SkyTerra,TerreStar andThuraya.There are two widely-deployed
variants of GMR, both heavily modeled after GSM :
• GMR-1: The first version of the standard and that has evolved over time into 3 different revisions:
• GMR-1:The basic circuit switched model, more or less corresponding to what plain old GSM Phase 2 is, and using
exactly the same core network infrastructure.
• GmPRS:Adding support for packet data.The equivalent of GPRS in the GSM world. Still connected to a 'Gb' style core
network.
• GMR-1 3G: Adds support for some new channel types, but the most important changes are in the core network, adding
interoperability with UMTS core network components. Contrary to the classic cell network where UMTS andGSM have
a radically different air-interface, GMR-1 3G is still very similar to GMR-1 on the Layer 1 side.
• GMR-2: Which is not an evolution of GMR-1 but rather a concurrent standard that has been developed by
another group of companies.
• GMR-1 is the technology used byThuraya. GMR-1 3G is the technology used forTerreStar and
SkyTerra. GMR-2 is used by Inmarsat iSatPhonePro. GMR was developed byTIA and ETSI.
Satellite Encryption : Satellite Phone
Don’tTrust Satellite Encryption
Experiment :
Physical Layer of Link 16 Design
JTIDS MIDS
• Secure and Jam-Resistant Communications, Navigation and Identification
System
– Tactical Digital Data andVoice
– Low Probability of Exploitation
– User Identification
– Relative Navigation
– Inherent Relay Capability
• Other Characteristics
– Frequency Hopping over 51 different carrier frequencies
– Utilizes Hybrid Direct Sequence and Frequency Hopping Spread Spectrum signals
– Data Rates: 28.8 - 119.0 Kbps (error correction); ET proposes 1 Mbps
– Omnidirectional broadcast
– High Capacity
– US DOD Primary data link
– Many US allies also utilize Link 16
– Nodeless
– Frequency: 960-1215 MHz
– Time Division Multiple Access (TDMA)
– MultipleVoice Channels
– Situational Awareness
Link 16 JTIDS/MIDS System Description
• International Cooperation
• Joint & Allied Interoperability
• Open Architecture
• State of the Art Technology
• Acquisition Reform
Link 16 JTIDS/MIDS System Description
Physical Layer : Link 16
• Link 16 implements a hybrid direct-sequence/frequency-
hopping spread spectrum (FHSS) system, which means the
transmit frequency is not held constant.
• The frequency hopping occurs over 51 frequencies (also
called bins).
• Link 16 hops at a rate of 1/13 ms (76,923 hops per second)
• Link 16 has 2 IFF notches centered at 1030 and 1090 MHz
Physical Layer : Link 16
• Main components :
• ChannelCoding :
• Reed Solomon
• Combined with Interleaver
• Modulation :
• CCSK Modulation for LPI
• MSK Modulation for cheap receiver
• Spread Spectrum :
• DSSS
• FHSS
Transceiver FH-SS
• Frequency-hopping spread spectrum
(FHSS) is a method of transmitting
radio signals by rapidly switching a
carrier among many frequency
channels, using a pseudorandom
sequence known to both transmitter
and receiver.
DSSS
• Direct Sequence Spread Spectrum (DSSS) is a
spread spectrum technique whereby the original
data signal is multiplied with a pseudo random noise
spreading code.This spreading code has a higher
chip rate (this the bitrate of the code), which results
in a wideband time continuous spreading signal.
32-Bit CCSK and RS Code Interleaving
Cyclic Code Shift Keying (CCSK) is a non-orthogonal signaling
scheme consisting of the 32 phases of a 32-chip sequence. Each
symbol represents 5 bits of data and indicates which phase of the
base sequence to transmit. For example, generating the
transmitted symbol corresponding to the data word 00010
requires a two position left cyclic shift of the base sequence.
RS Encoder Decoder
• In coding theory, Reed–Solomon (RS) codes are non-binary cyclic error-correcting codes
invented by Irving S. Reed and Gustave Solomon.They described a systematic way of building
codes that could detect and correct multiple random symbol errors. By adding t check symbols
to the data, an RS code can detect any combination of up to t erroneous symbols, or correct up
to ⌊t/2⌋ symbols.
Link-16 Experiments : Modem
Link-16 Experiments :Video Streaming
Experiment : Chaotic-based
SecureVideoconference over Satellite
Generic Chaotic Encryption
• The chaotic encryption method is proposed by
Baptista, 1998.
• It seems to be a much better encryption
algorithm than traditional algorithms were used.
• We first identify the mapping scheme for a
trajectory to encrypt the message.
• Subsequently decide the initial state and
parameters for the key.We assume the initial
condition as the current route (trajectory).
• Iterate the chaotic equation until the path reaches
the target site and then store the amount of
iterations as a code for each message symbol.
• Encrypt the next message by iterating the recent
trajectory.
• Produce the next cipher according it and so on.
Chaotic-based Encryptor Module (Tx )
Chaotic-based Decryptor Module ( Rx )
Experiment
ChaoticVideoconference HW
ThankYou

Contenu connexe

Tendances

Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radiosJAIGANESH SEKAR
 
What are Appropriate Border Surveillance Technologies? Sept. 16, 2014
What are Appropriate Border Surveillance Technologies? Sept. 16,  2014What are Appropriate Border Surveillance Technologies? Sept. 16,  2014
What are Appropriate Border Surveillance Technologies? Sept. 16, 2014Kallman Worldwide, Inc.
 
Ultra-wide band communication system: Term paper _class presentation on wirel...
Ultra-wide band communication system: Term paper _class presentation on wirel...Ultra-wide band communication system: Term paper _class presentation on wirel...
Ultra-wide band communication system: Term paper _class presentation on wirel...prajon
 
Interference cancellation in uwb systems
Interference cancellation in uwb systemsInterference cancellation in uwb systems
Interference cancellation in uwb systemsjayasheelamoses
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Jeffrey Funk
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Mustafa Khaleel
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radioAli Nasr
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesKuncoro Wastuwibowo
 
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Keith Nolan
 
Spectrum Measurements for IEEE 802.22 Wireless Regional Area Networks
Spectrum Measurements for IEEE 802.22 Wireless Regional Area NetworksSpectrum Measurements for IEEE 802.22 Wireless Regional Area Networks
Spectrum Measurements for IEEE 802.22 Wireless Regional Area NetworksIEEEP Karachi
 
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Industrial Partnerships Office
 
Medical sensing, localization, and communications usingultra wideband technol...
Medical sensing, localization, and communications usingultra wideband technol...Medical sensing, localization, and communications usingultra wideband technol...
Medical sensing, localization, and communications usingultra wideband technol...The Research Council of Norway, IKTPLUSS
 
Uwb powerpoint
Uwb powerpointUwb powerpoint
Uwb powerpointArif Ahmed
 
IEEE 802.22 WRAN Standard
IEEE 802.22 WRAN StandardIEEE 802.22 WRAN Standard
IEEE 802.22 WRAN Standardsonix022
 
Sdr the future of radio
Sdr the future of radioSdr the future of radio
Sdr the future of radioJauwadSyed
 

Tendances (20)

Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radios
 
What are Appropriate Border Surveillance Technologies? Sept. 16, 2014
What are Appropriate Border Surveillance Technologies? Sept. 16,  2014What are Appropriate Border Surveillance Technologies? Sept. 16,  2014
What are Appropriate Border Surveillance Technologies? Sept. 16, 2014
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
Ultra-wide band communication system: Term paper _class presentation on wirel...
Ultra-wide band communication system: Term paper _class presentation on wirel...Ultra-wide band communication system: Term paper _class presentation on wirel...
Ultra-wide band communication system: Term paper _class presentation on wirel...
 
Interference cancellation in uwb systems
Interference cancellation in uwb systemsInterference cancellation in uwb systems
Interference cancellation in uwb systems
 
Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible? Cognitive Radio: When might it Become Economically and Technically Feasible?
Cognitive Radio: When might it Become Economically and Technically Feasible?
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
 
Cognitive radio
Cognitive radioCognitive radio
Cognitive radio
 
UWB IRF correlator
UWB IRF correlator UWB IRF correlator
UWB IRF correlator
 
Cognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main IssuesCognitive Radio, Introduction and Main Issues
Cognitive Radio, Introduction and Main Issues
 
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...Alex Wyglinski  - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
Alex Wyglinski - IEEE VTS UKRI - Cognitive radio - a panacea for RF spectrum...
 
Spectrum Measurements for IEEE 802.22 Wireless Regional Area Networks
Spectrum Measurements for IEEE 802.22 Wireless Regional Area NetworksSpectrum Measurements for IEEE 802.22 Wireless Regional Area Networks
Spectrum Measurements for IEEE 802.22 Wireless Regional Area Networks
 
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
 
UWB and applications
UWB and applicationsUWB and applications
UWB and applications
 
Medical sensing, localization, and communications usingultra wideband technol...
Medical sensing, localization, and communications usingultra wideband technol...Medical sensing, localization, and communications usingultra wideband technol...
Medical sensing, localization, and communications usingultra wideband technol...
 
Uwb powerpoint
Uwb powerpointUwb powerpoint
Uwb powerpoint
 
Sdr seminar
Sdr seminarSdr seminar
Sdr seminar
 
IEEE 802.22 WRAN Standard
IEEE 802.22 WRAN StandardIEEE 802.22 WRAN Standard
IEEE 802.22 WRAN Standard
 
Sdr the future of radio
Sdr the future of radioSdr the future of radio
Sdr the future of radio
 
Ultra wide band technology
Ultra wide band technology Ultra wide band technology
Ultra wide band technology
 

En vedette

Phased Array Radar for Fire Control System
Phased Array Radar for Fire Control SystemPhased Array Radar for Fire Control System
Phased Array Radar for Fire Control SystemDr.Joko Suryana
 
Introduction to ELINT Analyses
Introduction to ELINT AnalysesIntroduction to ELINT Analyses
Introduction to ELINT AnalysesJoseph Hennawy
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...Mostafa Shokrian Zeini
 
Antena bts multisistem lokal
Antena bts multisistem lokalAntena bts multisistem lokal
Antena bts multisistem lokalDr.Joko Suryana
 
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...Dr.Joko Suryana
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSwolfSSL
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan Asia
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan AsiaBisnis Colocation Services dan Data Center 2014 : Indonesia dan Asia
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan AsiaDr.Joko Suryana
 
Tabel alokasi frekuensi indonesia
Tabel alokasi frekuensi indonesiaTabel alokasi frekuensi indonesia
Tabel alokasi frekuensi indonesiaMuhamad Fahrudin
 
International bw and data market
International bw and data marketInternational bw and data market
International bw and data marketDr.Joko Suryana
 
Lecture on telco managed services
Lecture on telco managed servicesLecture on telco managed services
Lecture on telco managed servicesDr.Joko Suryana
 
FTTH versus LTE : Friend or Foe
FTTH versus LTE : Friend or FoeFTTH versus LTE : Friend or Foe
FTTH versus LTE : Friend or FoeDr.Joko Suryana
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Manual de integración de Latch en Mosquito MQTT Broker
Manual de integración de Latch en Mosquito MQTT BrokerManual de integración de Latch en Mosquito MQTT Broker
Manual de integración de Latch en Mosquito MQTT BrokerTelefónica
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comMapYourTech
 

En vedette (18)

Phased Array Radar for Fire Control System
Phased Array Radar for Fire Control SystemPhased Array Radar for Fire Control System
Phased Array Radar for Fire Control System
 
Introduction to ELINT Analyses
Introduction to ELINT AnalysesIntroduction to ELINT Analyses
Introduction to ELINT Analyses
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...
 
Antena bts multisistem lokal
Antena bts multisistem lokalAntena bts multisistem lokal
Antena bts multisistem lokal
 
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...
Design and Implementation of RSLA Antenna for Mobile DBS Application in Ku-...
 
Alokasi Frekuensi Pada Selular
Alokasi Frekuensi Pada SelularAlokasi Frekuensi Pada Selular
Alokasi Frekuensi Pada Selular
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLS
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Alokasi frekuensi
Alokasi frekuensiAlokasi frekuensi
Alokasi frekuensi
 
Bisnis lte di indonesia
Bisnis lte di indonesiaBisnis lte di indonesia
Bisnis lte di indonesia
 
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan Asia
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan AsiaBisnis Colocation Services dan Data Center 2014 : Indonesia dan Asia
Bisnis Colocation Services dan Data Center 2014 : Indonesia dan Asia
 
Tabel alokasi frekuensi indonesia
Tabel alokasi frekuensi indonesiaTabel alokasi frekuensi indonesia
Tabel alokasi frekuensi indonesia
 
International bw and data market
International bw and data marketInternational bw and data market
International bw and data market
 
Lecture on telco managed services
Lecture on telco managed servicesLecture on telco managed services
Lecture on telco managed services
 
FTTH versus LTE : Friend or Foe
FTTH versus LTE : Friend or FoeFTTH versus LTE : Friend or Foe
FTTH versus LTE : Friend or Foe
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Manual de integración de Latch en Mosquito MQTT Broker
Manual de integración de Latch en Mosquito MQTT BrokerManual de integración de Latch en Mosquito MQTT Broker
Manual de integración de Latch en Mosquito MQTT Broker
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 

Similaire à Secure modem design

SatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - EditedSatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - EditedGuido Baraglia
 
AJAL ACS Chap2 rev
AJAL  ACS Chap2 revAJAL  ACS Chap2 rev
AJAL ACS Chap2 revAJAL A J
 
CDMA.pdf
CDMA.pdfCDMA.pdf
CDMA.pdfTroll9
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication networkRiazul Islam
 
advanced communication-system
advanced communication-systemadvanced communication-system
advanced communication-systemsharma ellappan
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communicationSanthoshkumar Yadav
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technologyAdams Firdaus
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...Mathavan N
 
Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training ReportNikhil Kumar
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 

Similaire à Secure modem design (20)

Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
SatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - EditedSatCom Protection in Mission Critical Oil & Gas - Edited
SatCom Protection in Mission Critical Oil & Gas - Edited
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Satellite access
Satellite accessSatellite access
Satellite access
 
AJAL ACS Chap2 rev
AJAL  ACS Chap2 revAJAL  ACS Chap2 rev
AJAL ACS Chap2 rev
 
CDMA.pptx
CDMA.pptxCDMA.pptx
CDMA.pptx
 
CDMA.pdf
CDMA.pdfCDMA.pdf
CDMA.pdf
 
Introduction wireless communication network
Introduction wireless communication networkIntroduction wireless communication network
Introduction wireless communication network
 
advanced communication-system
advanced communication-systemadvanced communication-system
advanced communication-system
 
Free space optical communication
Free space optical communicationFree space optical communication
Free space optical communication
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
PPT-DC.pptx
PPT-DC.pptxPPT-DC.pptx
PPT-DC.pptx
 
matdid473708.pdf
matdid473708.pdfmatdid473708.pdf
matdid473708.pdf
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
 
Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 

Plus de Dr.Joko Suryana

Market size and growth of network services 2012 aspac
Market size and growth of network services 2012 aspacMarket size and growth of network services 2012 aspac
Market size and growth of network services 2012 aspacDr.Joko Suryana
 
Pengantar bisnis wholesale telekomunikasi
Pengantar bisnis wholesale telekomunikasiPengantar bisnis wholesale telekomunikasi
Pengantar bisnis wholesale telekomunikasiDr.Joko Suryana
 
Doing low arpu high usage business 2007
Doing low arpu high usage business 2007Doing low arpu high usage business 2007
Doing low arpu high usage business 2007Dr.Joko Suryana
 
Design of human body scanner based on uwb
Design of human body scanner based on uwbDesign of human body scanner based on uwb
Design of human body scanner based on uwbDr.Joko Suryana
 
Pengantar bisnis mvno 2007
Pengantar bisnis mvno 2007Pengantar bisnis mvno 2007
Pengantar bisnis mvno 2007Dr.Joko Suryana
 
Iccs 2012 presentation joko suryana and audhia
Iccs 2012 presentation joko suryana and audhiaIccs 2012 presentation joko suryana and audhia
Iccs 2012 presentation joko suryana and audhiaDr.Joko Suryana
 
Final tssa design and realization of passive phase shifters
Final tssa design and realization of passive phase shiftersFinal tssa design and realization of passive phase shifters
Final tssa design and realization of passive phase shiftersDr.Joko Suryana
 
Broadband paradox and mobile cloud
Broadband paradox and mobile cloudBroadband paradox and mobile cloud
Broadband paradox and mobile cloudDr.Joko Suryana
 

Plus de Dr.Joko Suryana (12)

Market size and growth of network services 2012 aspac
Market size and growth of network services 2012 aspacMarket size and growth of network services 2012 aspac
Market size and growth of network services 2012 aspac
 
Pengantar bisnis wholesale telekomunikasi
Pengantar bisnis wholesale telekomunikasiPengantar bisnis wholesale telekomunikasi
Pengantar bisnis wholesale telekomunikasi
 
Bts hotel joko suryana
Bts hotel joko suryanaBts hotel joko suryana
Bts hotel joko suryana
 
Doing low arpu high usage business 2007
Doing low arpu high usage business 2007Doing low arpu high usage business 2007
Doing low arpu high usage business 2007
 
Design of human body scanner based on uwb
Design of human body scanner based on uwbDesign of human body scanner based on uwb
Design of human body scanner based on uwb
 
Pengantar bisnis mvno 2007
Pengantar bisnis mvno 2007Pengantar bisnis mvno 2007
Pengantar bisnis mvno 2007
 
Cdn prospects 2011
Cdn prospects 2011Cdn prospects 2011
Cdn prospects 2011
 
Mobile data offloading
Mobile data offloadingMobile data offloading
Mobile data offloading
 
Iccs 2012 presentation joko suryana and audhia
Iccs 2012 presentation joko suryana and audhiaIccs 2012 presentation joko suryana and audhia
Iccs 2012 presentation joko suryana and audhia
 
Final tssa design and realization of passive phase shifters
Final tssa design and realization of passive phase shiftersFinal tssa design and realization of passive phase shifters
Final tssa design and realization of passive phase shifters
 
Lte technical overview
Lte technical overviewLte technical overview
Lte technical overview
 
Broadband paradox and mobile cloud
Broadband paradox and mobile cloudBroadband paradox and mobile cloud
Broadband paradox and mobile cloud
 

Dernier

Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentBharaniDharan195623
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Dernier (20)

Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Secure modem design

  • 1. Secured Modem Dr.Ir.Joko Suryana Lab of RadioTelecommunications and Microwave School of Electrical Engineering and Informatics INSTITUTTEKNOLOGI BANDUNG
  • 2. Outline • Introduction • Secured Digital Comm and Low Probability of Detection Concept • LPD-based Communication, Navigation and Identification • Signal Intelligence Concept • Satellite SIGINT • Some Experiments by ITB : • Physical Design of Link-16 ( F-16 Data Link ) • Chaotic-based SecureVideoconference over Satelite
  • 6. Source Coding/Decoding Source Coding • Process of encoding information using fewer bits • Re-represents original message by reducing redundancies • Reduces the consumption of expensive resources, such as disk space or connection bandwidth • Example –converting image from .bmp to .jpg
  • 8. Channel Encoding/Decoding • Transformation that enables the original message to better withstand the effects of channel impairments such as noise, fading, etc. • Example : BCH, Golay, Hamming, Convolutional, Reed-Solomon etc • Adds bits to the original message – increases the message size
  • 11.
  • 12.
  • 13. Spread SpectrumTechniques • “Spread” radio signal over a wide frequency range • Several magnitudes higher than minimum requirement • Gained popularity by the needs of military communication • Proved resistant against hostile jammers • Ratio of information bandwidth and spreading bandwidth is identified as spreading gain or processing gain Offers the following applications: • able to deal with multi-path • multiple access due to different spreading sequences • low probability of interception • privacy • anti-jam capabilities
  • 14. Spread SpectrumTechniques • Direct Sequence Spread Spectrum (DSSS) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code.This spreading code has a higher chip rate (this the bitrate of the code), which results in a wideband time continiuous spreaded signal. • Frequency hopping spread spectrum (FHSS) is a method of transmitting radio signals by shifting carriers across numerous channels with pseudorandom sequence which is already known to the sender and receiver.
  • 17. SSTechniques Comparisons SS Technique Advantage Disadvantage Direct Sequence best behavior in multi path rejection simple synchronization simple implementation difficult to detect near far effect coherent bandwidth Frequency Hopper no need for coherent bandwidth ess affected by the near far effect complex hardware error correction needed Time Hopper high bandwidth efficiency less complex hardware less affected by the near far effect error correction needed
  • 19. Why Digital Communications? • Easy to regenerate the distorted signal • Regenerative repeaters along the transmission path can detect a digital signal and retransmit a new, clean (noise free) signal • These repeaters prevent accumulation of noise along the path • Immunity to distortion and interference • Digital communication is rugged in the sense that it is more immune to channel noise and distortion • Hardware is more flexible • Digital hardware implementation is flexible and permits the use of microprocessors, mini-processors, digital switching andVLSI
  • 20. Why Digital Communications? • Easy to Multiplex • Easier and more efficient to multiplex several digital signals • Digital multiplexing techniques –Time & Code Division MultipleAccess - are easier to implement than analog techniques such as Frequency Division Multiple Access • Can combine different signal types – data, voice, text, etc. • Data communication in computers is digital in nature whereas voice communication between people is analog in nature • The two types of communication are difficult to combine over the same medium in the analog domain. • Encryption and privacy techniques are easier to implement • Better overall performance • Digital communication is inherently more efficient than analog in realizing the exchange of SNR for bandwidth • Digital signals can be coded to yield extremely low rates and high fidelity as well as privacy
  • 21. Secure Communications Requirements • Basic Security Requirements: • Confidentiality • Authentication • Integrity • Freshness • Secure Group Management • Availability authenticity confidentiality integrity availability
  • 22. Secure Communications Systems : Military • The success of modern military forces depends a great deal on the effective use of sophisticated radio communication and navigation systems. Historically, the enemy has employed electronic countermeasures (ECM) to detect the presence of these radio signals and either disrupt them or exploit them. • Radio systems can be disrupted by jamming or by locating and destroying them. • On the other hand, exploitation involves using the transmissions for intelligence and counter-intelligence purposes. • Prior to the development of high quality data security and transmission security techniques, it was possible to gather intelligence from the received signals by demodulating and decoding (deciphering) them. • For simple systems it is also possible to "spoof" (or mimic) them to provide false information (counter-intelligence). • Radio transmissions can also be exploited, even when they employ high quality security techniques, by simple radio direction finding (RDF) or position monitoring.
  • 23. Example of a Military Radio System • RadioTypes • Handheld radios • Manpack / vehicular radios • Soldier radios • Frequency Range – HF (2-30MHz): Long-range (up to 4000 km) – VHF (30-108MHz): Short range ground tactical (up to 50 km) – UHF (225-400MHz): Air-Air and Air-Ground (up to 300 km) – UHF SATCOM (280-320MHz): Worldwide – Wideband Networking (225-2000 MHz): Ranges up to 10 km • Modes of Operation – Voice (push-to-talk) – Data – IP point-to-point data – IP sub-network data • Information Assurance – Programmable INFOSEC – COMSEC – TRANSEC – Software Defined Radio IA • Waveforms – US (MIL-STDs) and NATO (STANAGs) interoperable waveforms – Proprietary Harris exportable waveforms – Fixed frequency and anti- jam frequency hopping waveforms • Key Fill – DS-101 EKMS – Sovereign/Coalition • Falcon II/III Radio Platforms – JTRS/SCA SDRs – Exportable SCA-based SDRs – Proprietary SDR
  • 24. Secure Modem Requirements : LPD Communications • LPD : low probability of detection
  • 25. SomeTerminologies • There are some alternate terminologies used to describe Secure Communications concepts that need to be discussed. • The first is Low Probability of Detection (LPD). LPD requirements are concerned with preventing the enemy from detecting a radio transmission. LPD applies to those techniques which minimize power spectral density and hence detection. • The second is Low Probability of Exploitation (LPE). LPE is concerned with preventing the exploitation of the signal by decoding, spoofing, or position monitoring. LPE design would deny the enemy knowledge of the system, its modulation characteristics, its use, and its users. • The third term is Low Probability of Intercept (LPI) which encompasses both LPD and LPE. LPI is a generic term from which we derive the term anti-intercept.
  • 26. Techniques for Securing a Communications System • Spoofing : A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host. • Falsification : the act of falsifying, or making false; a counterfeiting; the giving to a thing an appearance of something which it is not
  • 28. CNI : Communications, Navigation and Identification • Communications: The ability to be able to communicate by either voice or data link means with cooperative forces, be it wingmen in the same flight of aircraft, airborne command centre or troops on the ground. • Navigation : The science of getting ships, aircraft, or spacecraft from place to place; especially : the method of determining position, course, and distance traveled • Identification :The rules of engagement for a given theatre of operation will necessitate the classification and identification of a target before permis sion to engage is given.
  • 29. LPD Applications on CNI • Communications : • VHF/UHFTactical Radios • SINGARS/HAVEQUICK • Navigation : • GPS • TACAN • VOR/DME • Identification: • IFF Mark XII • Secondary Radar
  • 30. Signal Flow of CNI Systems
  • 32. SIGINT (Signal Intelligence) : Secure Communication Challenger
  • 33. Signal Intelligence • SIGINT = COMINT + ELINT + MASINT • COMINT (COMmunications INTelligence) • Interception of communications between people or machines • ELINT (ELectronics INTelli gence) • Detection and analysis of non-communications electronic transmissions • Electronic Warfare: radiation from electronic systems; jamming radiation • MASINT (Measurement And Signatures INTelligence) • Scientific and technical intelligence obtained by quantitative and qualitative analysis of data (metric data (metric, angle spatial angle, spatial, wavelength wavelength, time dependence modulation time dependence, modulation, plasma and hydromagnetic) • Example :TELINT (Telemetry Intelligence )
  • 34. COMINT • Search, DF and intercept • Location fixing of emitters • Signal analysis and classification • Monitoring • Recording • Evaluation and comparison with stored data • Generation of tactical reports
  • 35. Communication Signal Scenarios • Wide Spectral Coverage ( 1.5 MHz – 18 GHz ) • ComplexWaveforms (Burst, FH, DS) • Non-Standard Data Formats • High Signal Density • Low SNR Conditions • Both NB andWB Signals (FDM &TDM) • Encrypted Signals • Short DwellTimes
  • 36. ELINT • ELINT involves actions taken to : • Search • Intercept • Locate • Record • Analysis of radiated EM energy • ELINT Receiver measure : • Angle of Arrival (AOA) • Pulse Width • Pulse Repetion Frequency • Frequency • Time of Arrival • Scan Rate • Location fixing of emitter
  • 37. Radar Signal Scenarios • Wide Spectral Coverage ( 0.5 – 40 GHz ) • ComplexWaveforms • Wide PRF Range with Jitter and Stagger – 50 Hz to 500 KHz • Wide PulseWidth Ranges – 50 ns to 500 µs • Variety ofAntenna Scans • Short DwellTimes
  • 38. Typical Architecture of COMINT/ELINT
  • 39. Modern Implementation of COMINT/SIGINT
  • 40. Modern Implementation of COMINT/SIGINT
  • 43. Echelon • ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UK–USA Security Agreement : • Australia • Canada • New Zealand • United Kingdom • United States. • It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.
  • 45. Satellite Encryption • GEO-Mobile Radio Interface (GEO stands for Geostationary Earth Orbit), better known as GMR, is an ETSI standard for satellite phones.The GMR standard is derived from the 3GPP-family terrestrial digital cellular standards and supports access to GSM/UMTS core networks. • It is used by ACeS, ICO, Inmarsat, SkyTerra,TerreStar andThuraya.There are two widely-deployed variants of GMR, both heavily modeled after GSM : • GMR-1: The first version of the standard and that has evolved over time into 3 different revisions: • GMR-1:The basic circuit switched model, more or less corresponding to what plain old GSM Phase 2 is, and using exactly the same core network infrastructure. • GmPRS:Adding support for packet data.The equivalent of GPRS in the GSM world. Still connected to a 'Gb' style core network. • GMR-1 3G: Adds support for some new channel types, but the most important changes are in the core network, adding interoperability with UMTS core network components. Contrary to the classic cell network where UMTS andGSM have a radically different air-interface, GMR-1 3G is still very similar to GMR-1 on the Layer 1 side. • GMR-2: Which is not an evolution of GMR-1 but rather a concurrent standard that has been developed by another group of companies. • GMR-1 is the technology used byThuraya. GMR-1 3G is the technology used forTerreStar and SkyTerra. GMR-2 is used by Inmarsat iSatPhonePro. GMR was developed byTIA and ETSI.
  • 46. Satellite Encryption : Satellite Phone
  • 48. Experiment : Physical Layer of Link 16 Design
  • 49. JTIDS MIDS • Secure and Jam-Resistant Communications, Navigation and Identification System – Tactical Digital Data andVoice – Low Probability of Exploitation – User Identification – Relative Navigation – Inherent Relay Capability • Other Characteristics – Frequency Hopping over 51 different carrier frequencies – Utilizes Hybrid Direct Sequence and Frequency Hopping Spread Spectrum signals – Data Rates: 28.8 - 119.0 Kbps (error correction); ET proposes 1 Mbps – Omnidirectional broadcast – High Capacity – US DOD Primary data link – Many US allies also utilize Link 16 – Nodeless – Frequency: 960-1215 MHz – Time Division Multiple Access (TDMA) – MultipleVoice Channels – Situational Awareness Link 16 JTIDS/MIDS System Description • International Cooperation • Joint & Allied Interoperability • Open Architecture • State of the Art Technology • Acquisition Reform
  • 50. Link 16 JTIDS/MIDS System Description
  • 51. Physical Layer : Link 16 • Link 16 implements a hybrid direct-sequence/frequency- hopping spread spectrum (FHSS) system, which means the transmit frequency is not held constant. • The frequency hopping occurs over 51 frequencies (also called bins). • Link 16 hops at a rate of 1/13 ms (76,923 hops per second) • Link 16 has 2 IFF notches centered at 1030 and 1090 MHz
  • 52. Physical Layer : Link 16 • Main components : • ChannelCoding : • Reed Solomon • Combined with Interleaver • Modulation : • CCSK Modulation for LPI • MSK Modulation for cheap receiver • Spread Spectrum : • DSSS • FHSS
  • 53. Transceiver FH-SS • Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver.
  • 54. DSSS • Direct Sequence Spread Spectrum (DSSS) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code.This spreading code has a higher chip rate (this the bitrate of the code), which results in a wideband time continuous spreading signal.
  • 55. 32-Bit CCSK and RS Code Interleaving Cyclic Code Shift Keying (CCSK) is a non-orthogonal signaling scheme consisting of the 32 phases of a 32-chip sequence. Each symbol represents 5 bits of data and indicates which phase of the base sequence to transmit. For example, generating the transmitted symbol corresponding to the data word 00010 requires a two position left cyclic shift of the base sequence.
  • 56. RS Encoder Decoder • In coding theory, Reed–Solomon (RS) codes are non-binary cyclic error-correcting codes invented by Irving S. Reed and Gustave Solomon.They described a systematic way of building codes that could detect and correct multiple random symbol errors. By adding t check symbols to the data, an RS code can detect any combination of up to t erroneous symbols, or correct up to ⌊t/2⌋ symbols.
  • 60. Generic Chaotic Encryption • The chaotic encryption method is proposed by Baptista, 1998. • It seems to be a much better encryption algorithm than traditional algorithms were used. • We first identify the mapping scheme for a trajectory to encrypt the message. • Subsequently decide the initial state and parameters for the key.We assume the initial condition as the current route (trajectory). • Iterate the chaotic equation until the path reaches the target site and then store the amount of iterations as a code for each message symbol. • Encrypt the next message by iterating the recent trajectory. • Produce the next cipher according it and so on.