EC312 Lesson 21: Spread Spectrum

advertisement
EC312 Lesson 21: Spread Spectrum: Electronic Protection Techniques
(3/20/14)
Objectives:
(a) Understand the purpose of spread spectrum, the challenges it overcomes, and the advantages it provides for
EW and commercial applications of digital communication..
(b) Describe the difference between Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread
Spectrum (DSSS) in terms of data and frequencies.
(c) Analyze the engineering factors associated with an FHSS signal (e.g., dwell time, bandwidth, data rate,
etc.).
(d) Analyze the engineering factors associated with a DSSS signal (e.g., processing gain, chipping rate, data
rate, etc.).
All of our previous discussions of modulation, both analog and digital, we have always been concerned about
the conservation of bandwidth and how much more bandwidth we need to get more data and more speed. The
goal has been to achieve maximum data transmission using minimum bandwidth. (We are reminded of our
lesson in digital modulation, where we encoded our multiple phase shifts and amplitudes to represent more bits
per symbol, 256-QAM, to keep the same bandwidth while increasing our information.)
In this lesson we will concentrate on a new technique of modulation, wideband modulation, and the goal is to
increase the bandwidth of the transmitted signal. So why would we want to do that?
One of the main reasons to spread our spectrum, or modulate over many frequencies for one transmission is to
avoid a jamming attack.
Your main worry may be protecting your RC car from interfering signals, but the
rest of the world is also interested in keeping their information secure and keeping
their infrastructures intact!
Wideband modulation
The most common forms of wideband modulation are:

Spread spectrum(SS)
o Frequency-hopping spread spectrum(FHSS)
o Direct sequence spread spectrum (DSSS) or code-division multiple access (CDMA)
Spread spectrum has its roots in the military’s need for communication systems that are secure and immune to
jamming. Consider how the spectrum is typically divided among multiple users. Below is our FM Band:
Frequency
(MHz)
1
This system of frequency division allows multiple stations (transmitters) to share a portion of the RF spectrum
(88–108 MHz) without interference from each other. The main advantage is simplicity. But what are the
implications of fixed frequencies for military applications?
High-power, fixed-frequency transmitters make easy targets… targets that are easy to jam and easy to destroy.
In our last lesson on EW, we used many of the principles from our wireless lessons to show that the enemy has
the capability to find our transmitter and affect its transmission.
Recapping, we remember that initially:
1) The adversary may need only a simple dipole antenna whose radiation pattern is an omni – directional,
donut shaped, pattern to try to pick up any of our transmissions.
2) He could extend the length (/2) of the dipole to try to pick up different frequencies in its range to hone
in on a specific carrier frequency that looks interesting.
3) Once received, he can use its signal strength (dBm) to give an idea of its area of location (like our
Bad_Egg Access Point) and then,
4) He can use 3 different positions to triangulate and really locate the transmitter.
5) At this point he could use a better focused antenna like the Yagi to get better reception of the signal and
6) Then, he can work to try to figure out the specific modulation and encryption that was used so that he
can demodulate and then decode the transmission to get the data and now that channel would be
insecure.
7) Also, once he figures out the distance to the receiver target using TDOA and his distance from the
target, he can figure out the strength of the jamming signal he needs to provide to interfere with any
operation the transmitter and target are controlling
8) All of this depends on him locating the transmission of a fixed carrier frequency.
So, to the rescue! Along comes:
Frequency hopping – just like it sounds, our data will hop from one carrier to the next.
This dilemma of fixed frequency location was recognized prior to WWII. In 1942, a scheme was proposed for
a remote control torpedo guidance system that would employ frequency hopping. By changing the transmitter
frequencies in a “random” pattern, the torpedo control signal could not be jammed.
In a frequency hopping spread spectrum system, the carrier frequency is switched in a pseudorandom fashion.
The transmitter and receiver know the pattern and are synchronized. So each user of the frequency band that is
being used shares the band, but has his own pseudorandom sequence for transmitter and receiver.
time t1 t2 t3 t4 t5 t6 t7 t8 t9 …………….t14
User 1: {f2, f1, f2, f7, f5, f3, f6, f3, 0, f4, f1, f7, f1, f5} Hz
User 2: {f6, 0, f7, f4, f7, f1, f4, f7, f2, f4, f2, f5, f3, f6} Hz
User 3: {f4, f3, f2, f3, f2, f5, 0, f7, f3, f6, f1, f3, f5, f1} Hz
.
.
User 6: {f6, f7, f4, f3, f1, f7, f6, 0, f2, f4, f1, f5, f6, f3} Hz
.
.
User 10:{f1, f1, f2, f3, f3, f4, f4,0, f5, f6, f6, f6, f7, f7} Hz
2
Dwell time
f1
f2
f3
f4
f5
f6
f7
Notice for this particular example of a frequency hopping system that time is on the vertical axis above. After
each increment of time, a single user changes (hops) between different frequencies to send his data. So his
message is spread out over many random frequencies within a band.
Example
If the frequency band of the FHSS system above, 222.5-257.5MHz ,was divided into 7 sub-bands which 10
users share. Which user’s pattern is shown above?
FCC authorized use of spread spectrum in specific bands at 1W for civilian applications: 902- 928MHz,
2.4-2.438GHz, and 5.725 - 5.85GHz. Many commercial communication systems use SS techniques on these
frequencies, ie wireless networks, cell phones, etc.
Frequency hopping transmitter ( Figure next page)
The binary data binary data to be transmitted is first applied to a conventional
two-tone
FSK modulator.
In this FHSS system, a frequency synthesizer produces a sine wave (the carrier) at a random frequency
determined by a pseudorandom code generator. These two signals are mixed together, filtered and then
transmitted.
3
Typically the rate of frequency change determined by the pseudorandom (PSN) code generator is much higher
than the serial binary data rate. The illustration above shows that the frequency synthesizer changes 4 times for
each data bit. The time period spent on each frequency is called the dwell time (typically < 10 ms).
The resulting signal, whose frequency rapidly jumps around, effectively scatters pieces of the signal all over the
band. Someone else monitoring the spectrum looking would not recognize a transmission is being made. In
other words, instead of seeing two strong frequencies in use (and thus presuming someone is using BFSK),
someone monitoring the spectrum would see a blur of very faint frequencies in use, and presume it is just noise.
Example
If the bit rate of the FHSS system above is 1kbps, and the dwell time is 0.1ms on the frequency range of
222.5MHz- 257.5MHz range, how many frequency shifts occur during the transmission of each bit?
Frequency hopping receiver The received signal is mixed using a local oscillator driven by the same
pseudorandom sequence.
The output produces the original FSK signal from which the binary data can be extracted.
Timing is extremely critical in frequency hopping systems in order to provide for synchronization.
Military spread spectrum examples
HAVEQUICK
4

HAVEQUICK is a frequency-hopping system used in virtually all aircraft radios to provide antijamming. Every radio is synchronized by a timing signal (usually GPS) and steps through a predetermined set of frequencies which is loaded into the radio daily.

SINCGARS is a VHF-FM frequency-hopping system used by the Army, Navy and USMC. SINCGARS
operates on any or all of the 2,320 frequencies between 30 and 87.975 MHz in 25 kHz increments.
SINCGARS
Direct Sequence Spread Spectrum
Another method of realizing spread spectrum is called direct sequence spread spectrum (DSSS). In DSSS,
the serial binary data is XORed (bitwise logic function) with a pseudo-random binary code which has a bit rate
faster than the binary data rate, and the result is used to phase-modulate a carrier. The bit rate of the
pseudorandom code is called the chipping rate.
Sudden phase changes to a carrier signal (like those occurring in simple BPSK,0o and 180o phase shifts,) cause
the bandwidth of the resulting modulated signal to increase. Beyond that, if we increase the rate of the phase
changes of the carrier the bandwidth also increases. If we can get the phase change rate up high enough (thanks
to a high chipping rate), the resulting modulated signal will look more like noise than an actual signal. It would
look like noise just from the rapid phase changes. However, it becomes even more noise-like due to the fact
that the phase changes are generated in a pseudorandom fashion.
Figure 4. A high-level description of a DSSS system.
5
1
data
1
0
1
time of one data bit
carrier modulated by the data
Pseudo Random
Sequence
“chip”
data  PRS
XOR 
carrier modulated by the data  PRS
Instead of using the original data to phase
modulate a carrier, we would now use the
output of the XOR process. This will change
the phase of the carrier much more frequently
than the original data would, so the signal
power would be spread over a wider
bandwidth.
power
UNMODULATED
CARRIER
SLOW SPEED PSK
HIGH SPEED PSK
frequency
Figure 5. An illustration of the spread spectrum and noise properties of DSSS.
In DSSS, a signal that would normally occupy a few kHz of bandwidth (say like your regular FM broadcast) is
spread out 10 to 10,000 times its normal bandwidth. The energy that would normally be concentrated in that
narrow bandwidth is still there in DSSS, but has been spread out, too. In fact the energy is so spread out, that
it’s often indistinguishable from the normal atmospheric background noise as shown in Fig. 6 below. It’s so
diluted that it appears as noise in a conventional receiver where rapid frequency changes cause noise like effects
and spreading of a signal’s bandwidth.
Figure 6. The energy of a DSSS signal is spread over such a large bandwidth that the energy is
indistinguishable from naturally occurring background noise.
As was the case with frequency-hopping spread spectrum, a DSSS receiver must know the pseudorandom
sequence of the transmitter and have a synchronizing circuit to get in step with this pseudorandom digital signal.
6
The receiver using an identically programmed PN sequence can then “see” incoming matched signal clearly
from the noise. Even cooler, multiple DSSS broadcasts can overlap each other spectrum-wise. Other signals
using different PN sequences appear as noise to the receiver and is ignored.
DSSS is also called Code Division Multiple Access (CDMA). CDMA is used in satellites and digital cell
phones.
List some reasons CDMA is attractive for cell phones and satellites.
The measure of the spreading is called the processing gain, G, which is the ratio of the DSSS bandwidth, BW,
divided by the data rate, fb.
G
BW
fb
The higher the processing gain, the greater the DSSS signal’s ability to fight interference.
Example
A 13kbps binary signal is spread over a bandwidth of 1.25 MHz using BPSK. What is the processing gain of
the resulting DSSS signal? Express the answer as a ratio and in decibels.
Benefits of Spread Spectrum and how they relate to Cyber
Spread spectrum is being used in more and more applications in data communications.
 Security – need a wide BW receiver and precise knowledge and timing of the pseudorandom sequence,
and this relates to the confidentiality and authenication of our data
 Resistance to jamming and interference – jamming signals are usually restricted to one frequency
 Band sharing – many signals can use the same frequency band; and many spread spectrum signals
raise the overall background noise level, but don’t prevent reliable communication. This relates to the
availability of our data
 Resistance to fading – fading is a frequency-selective phenomenon; a spread spectrum signal doesn’t
reside at only one frequency
 Precise timing – signals jump so quickly that even the most determined snooper will only “see” a
fraction of a bit’s worth of data
This lesson finishes the section of material in the wireless section of Cyber2 that is covered by Exam II. You
have learned the vulnerabilities that are specific to this section and you hopefully understand that to defend and
attack against threats in cyber communications; you were provided with the conventional and theoretical
development to get a baseband signal (voice, video, and data) from a transmitter to a receiver through the
channel of free space.
The lessons have brought you from learning the electromagnetic spectrum, and the time signals and their
frequencies and wavelengths to the modulation techniques for these analog and digital signals (AM,ASK, FM,
FSK, PM, PSK). The bandwidths of the different techniques and the antennas and filters were very important to
defining the limitations of the communication systems ( 1/2 power, -3dB, helped define the upper to lower
cutoffs). The gain and attenuation involved in the transmission of the signal and the propagation idiosyncrasies
of the different modulation frequencies guided us to be wary of the noise associated every step of the way.
7
In the previous lesson you’ve had a discussion and demonstration of the wireless aspect of military
communications and the ideas of how electronic warfare has become ever present in today’s age. The take away
for you especially in this lesson on jamming mitigation is that you find that a principle that you had been
preserving, bandwidth, as it was finite and regulated became your best friend to ignore and spread out when
trying to defend, and the ugly noise that is everywhere and causes frustration when trying to get your signal,
became your friend, as you could hide behind it. So always think outside the box, EW is not fought fairly, so
playing with strategy and tactics to use constraints differently can be your best invention.
Asst. Prof. Currie Wooten, CDR Hewitt Hymas
Help us improve these notes! Send comments, corrections and clarifications to cwooten@usna.edu
8
Download