Abstract
Keywords
Introduction
The demands to interconnect the devices through wireless media have been increasing day-by-day tremendously. Therefore, to transmit useful information over the physical channels requires reliable mechanisms that can resist under the circumstances of vulnerabilities, as various eavesdroppers and jammers are always residing to harm the communication systems.1,2 To fight against, as a part of physical layer security, the anti-jamming techniques have validly been deployed 3 and are notably still a primary concern for today’s advanced wireless systems, such as cellular and military systems.1,2 Hence, due to the open nature and transmission over the weaker wireless channels, wireless systems have adequately been threatened with jammers and attack possibilities.1–3 The most common type of attack, as a broad category, at the physical layer, is categorized into active and passive attacks. The active attacks are mainly available in the form of jamming and interference, which principle targets are to obstruct the frequency bands by transmitting unwanted signals, and consequently, cause the transmission failures in most cases. Moreover, these attacks, therefore, have a potential effect on channel privacy and cause a more adverse impact on the quality of communication, hence weaken the required channel by establishing communication through intentional interference. On the other side, passive attacks are mainly caused by the utilization of wireless media properties and are further categorized as eavesdropping attacks and traffic inspection. Eavesdropping attacks are occurring to divulge almost the useful information resulting due to the open, unprotected nature of wireless channels. Traffic inspection is a kind of attack, mainly residing in wireless communication, which is caused by intelligently analyzing the given information continuously, and therefore affecting the normal traffic flow.3,4
Traditionally, the jamming and anti-jamming techniques have extensively been implemented specifically for the military systems, where electron attack (EA) is a part of communications electron warfare (CEW), employing the jamming techniques to intercept the target system and its communication flow. Alongside this, the prevention solutions, or electronic defense (ED) solutions, also deployed widely against electronic attacks to degrading the harmful effects on the target system.3,5 For example, consider a jamming (or active attack) scenario that encompasses a communication pair of the legitimate transmitter (Tx) and an intended receiver (Rx), and an unauthorized entity as a jammer. Each time the signals are transmitted and propagating through a wireless channel to Tx, the signal quality is reduced due to the presence of noise, interference such as unintentional interference, and the consequences of multipath fading. The jammer is mainly residing close, or located distance far in a radius, toward the Rx; the signal propagation paths of legitimate transmitter Tx to receiver Rx and jammer to receiver Rx are usually individualized to each other. However, the jammer always has a goal to degrade the channel or to generate intentional interference to the Rx; therefore, the illegitimate established link between jammer and receiver is facing the deterioration, while signaling, because of the preceding channel effects. 5
Over the years, anti-jamming solutions have also been implemented for other wireless systems as part of wireless communication, including the valuable enhancements for the strategical military applications, where the primary goals of these techniques are to achieve the low probability of detection (LPD) and the low probability of interception (LPI). 5 The LPD, as an anti-jamming solution, can be accomplished through the employment of a well-known anti-jamming technique called direct sequence spread spectrum (DSSS), which uses a larger frequency bandwidth to spread the desired original signals and targets to make the transmitted signals invisible to unknown entities that interrupt into the transmission. However, the LPI system states that the initially transmitted signals possibly have chances to be detectable during transmission but not easy to be intercepted by the unknown entities. For that, another predominated spread spectrum technique—frequency-hopping spread spectrum (FHSS)—has been employed in wireless communication systems; likewise, FHSS uses large radio frequency band and spreads the useful signals, followed by the hop sets that comprise distinct frequencies set shared between legitimate users of the communication system. Therefore, less probability of jamming, and as well, the lower expected signal-to-noise ratio (SNR), evaluates that the illegitimate user has minimal effects over the spread signals in transmission.1,5 Moreover, the useful signals that are transmitted can be hidden, from the unknown entities (such as eavesdroppers and jammers) through defined coordinated actions by employing Emissions Control (EMCON) as a part of emission control technology. EMCON solutions are vastly employed to limit the communication between legitimate nodes for a specific session; the information received continuously follows by the defined specific period, but usually, without acknowledgment of the receiver. 5 In short, in literature, various subtle jamming techniques, and corresponding anti-jamming solutions, were implemented extensively;3,6 however, the relevant terms that to fully qualify and also to evaluate the success rates of communication, while employing these techniques, are achieved through the theoretical computations that have a high aspect in measurements.6,7
As examined in previous studies,8–10 information security is still the main issue in wireless communication, the security mechanisms such as applying encryption, authentication, and security management,11–13 have some great security contributions against several vulnerabilities but are limited to applications at the physical layer.
4
Therefore, among other solutions, information-theoretic security is one of the solutions employed to evaluate the wireless channel secrecy, considering as a part of physical layer security.4,14 Thereby, Shannon’s system has been still considered as a well-known approach targeting to achieve the perfect secrecy against the unbound computational power of illegitimate users of the communication system. Shannon’s theory considered a noiseless cipher system in which the main goal was to secure the message
The spread spectrum techniques have been widely considered to enhance the wireless systems performance (i.e. throughput rate) against various jammers (e.g. narrow and wideband jammers), hopping among distinct frequencies set while communication over wireless channels. These techniques are somehow much efficient in computation than other available anti-jamming schemes;3,5 where the useful signals are modulated using frequency patterns, the spread signals are assumed to be noise-like and are therefore very difficult to demodulate by the jammers, unless they do not have the spread codes. 1 Because of the simplicity of wireless channels and having weaker channel secrecy, 3 the jammers, therefore, used their computational powers to intercept successfully in between the transmission. For example, a jammer intends to place its antenna particularly directed toward the receiver and tries to demodulate the coming signals, hence getting the baseband signals successfully. A similar case may be possible while employing encryption schemes, for example, if the jammer has unlimited power to break the encryption codes using some potential cryptanalysis schemes,7,12 consequently it can obtain the original modulated bits.4,7 However, given the definition of Shannon, 15 the perfect secrecy can be achieved in wireless transmission, if the unknown entity is not successful in deciphering the spread code, or the signals are similar to noise, or even the presence of inexhaustible computational power.7,16,17
In this study, an intelligent step is taken to examine the security of wireless communication systems and its limitations at the physical layer; later a new integrated security approach, employing an integrated cryptography and spread spectrum solution, is proposed and implemented; this study concluded that there is enough security that can be achieved at the physical layer. The selection of the proposed security solutions has been made after comparison with other available algorithms, and finally, a perfect, lightweight security-integrated solution is selected; the information-theoretical security concepts (i.e. to attain perfect secrecy) are used in this study to ensure and prove the entire security system. To achieve that, the main objectives of this study are as follow:
The FHSS system is considered in this study, the spread code (or pseudorandom PN sequence) is generated, and then encryption is deployed on; the encrypted code is defined as spreading code for frequency hopping (FH). Later, the system’s perfect secrecy is examined based on information-theoretical security concepts.
To examine the perfect–perfect secrecy of the selective encryption key, the hashing function Sha-2 is applied, and thus, perfect–perfect secrecy is anticipated. To be more precise, the study goals are achieved, as a part of proposed security development, by ensuring that the security system attained perfect secrecy even in a case of potential jammer (or attacker) residing in a transceiver system.
The rest of the article is organized as follows: Section “Literature review” conducts a detailed survey on the available security and spread spectrum solutions. Section “Spread spectrum: an FH system ” gives detail on spread spectrum systems, more specifically, focusing on FH systems. The study’s main problem statement is conducted in section “Problem statement.” Section “System model” describes the proposed system design and modeling, the cryptography module (CM) that validates the perfect secrecy and perfect–perfect secrecy of system; finally, the results are measured, and corresponding discussions are made. Section “Conclusion” concludes the overall study and gives the research directions for future developments.
Literature review
Code division multiple access (CDMA) scheme has widely been employed in wireless systems (e.g. 3G carriers), a multiple access method allowed several transmitters to communicate over a signal wireless channel simultaneously. As mentioned, CDMA technology inherently employed multiple user’s access, thereby has high chances of multi-user interferences.11,18,19 In standard CDMA systems, the code sequence is used to spread the desired signals over multiple symbols, and signals precluded through the arbitrary sampling, disordering the spread code with a pseudorandom sequence against jammers, making it not able to detect the baseband signals. However, the jammers can interrupt the transmitted signals if they are well-known about the real sequence code and the pseudorandom sequence, respectively. Hence, it is a common protection feature available, considering as a fragile method against various jammers (or attacks), in CDMA systems.
11
In addition to this, a limitation might be part of CMDA systems, that is, the long code sequence that is mainly used in occupying 42 bits mask code computed through 42 bits linear feedback shift registers (LFSRs). Consequently, the mask code could have chances to be recovered by the jammer, as the total complexity
Meng et al. 24 proposed a new anti-jamming solution for the FH system, which comprised of four main modules, such as recognition, suppression, suppression analyzing, and adaptive FH, which are required to build an integrated intelligent solution. In jamming recognition module, an algorithm was employed to make possible the recognition of jamming signals: first, the FH signals were erased on the desired jamming signals; second, the available bandwidth was analyzed, and narrowband jamming signals were discriminated from wideband jamming signals; and at the end, the required task for jamming recognition was performed well, through identifying and selecting the jamming type. In the jamming suppression module, the filtering techniques were identified not to be suitable to suppress the narrowband signals and tone jamming signals.3,24 However, FH and tone jamming signals are probably co-existence in the frequency domain; therefore, to settle down this issue through computing, the significant low jamming-to-signal ratio (JSR), essentially, the collective information confirmed that a hopping channel probably interfered with single tone jamming. Thereby, after filtering overall measurements in the frequency domain, and the channel (or kurtosis) spectrum peak is low enough; thus, the FH signals get the chance to filter out to further perform the demodulation.24,28
In section “Spread spectrum: an FH system,” a commonly used FH scheme is explained, considering a practical example of FH system, employing a two-way modulation scheme: a digital modulation scheme called multiple frequency-shift keying (MFSK), and frequency modulation scheme called FHSS, to spread the useful signals over the hopping bandwidth. Other useful components of the FH system are well described that to carry the transmission, for example, successful communication between transmitter and receiver, in the presence of anonymous narrowband jammer (that act as interference between transceiver system).
Spread spectrum: an FH system
FHSS, a part of spread spectrum technology, has commonly been used as an anti-jamming solution for wireless communication systems, encompassing a hopping sequence pattern by which the carrier frequencies are changing periodically in transmission. For example, the FHSS system employs a hopping set, let’s suppose set
where

A standard frequency hopping system.
The dehopped signals, however, might get several chances of interference and multipath padding and have no prevention against white noise, as the hopping channel allows the signals to travel outer range of frequency channel.24,31 For that, providing the potentials against narrowband interference, practically the disassociate frequency channels are required, which are either contiguous or occupying unexploited spectral region.3,32 Few useful cases through spectral notching, the spectral channels region that are susceptive to interference and fading are mainly erased from predefined frequency’s hopset. The modulation technique called MFSK has commonly been employed with an FH technique, in which all the subchannels usually get impact, hence causing the possibility of interference. Whereas, for security purposes such as to verify the hopping pattern secrecy or/and uncertainty, the FH pattern must be generated and distributed in pseudorandom sequence in an order of frequencies set. Moreover, the pseudorandom sequence is generated in a multilevel sequence and has extended the period of time, lengthily linear span, and unpredictably distributed over specified frequency channels. The long period always is significant to preclude the anonymous jammers that are trying to capture and store the pattern period, and the larger linear span is useful in the case to add restrictions that discouraging the opponent to regenerates the pattern. Code, or pattern, generates a set of control bits typically composing a symbol that collected through a finite field incorporating set properties. Furthermore, by affiliating a different frequency to each symbol collected, the FH pattern is produced to compute the more reliable, efficient, and more secure transmission; for that, control bits might subject to be encrypted through some cryptanalysis algorithms.33,34 Alongside, to be more efficient, control bits are required to be generated by employing the particular algorithm that might direct through: first, the security key, which always kept secure, the main source that provides security and further encompasses a bits set that changing irregularly according to time session; second, the time-of-day (TOD) composed of a bits set that formed through phasing the TOD counter, and its changing occurring correspond to changes of TOD clock. The possibility of changing in TOD might be in every second; however, the key only changing on daily basis; as defined, the employed algorithm is regulated through time-varying key; therefore, it could be beneficial in case the algorithm (i.e. control bits) add restrictions to avoid the key changing constantly in every particular defined time. The change in frequency occurred as a part of the code generator that controls the FH rate regulating by a system clock which operation rate notably much higher than TOD clock rate. Thereby, for both transmitter and receiver, TOD clock acquires through the means of the code clock, and this clock is formed through the synchronization system at the receiver end.29,30
In an FH system, for example, in order to compute the minimal number of pseudorandom noise (PN), chips that are needed in a frequency word encompasses a sequence of chips; so that, to formulate this given problem, the hopping bandwidth
For details, an example of an FH system is illustrated in Figure 2. The modulation scheme 8-ary FSK is employed with FH, that is, slow hopping, to perform modulation/demodulation at both sides—transmitter Tx and receiver Rx; the input information is composed in binary format with a data rate
and the time duration of a symbol

FH system using 8-ary FSK modulation.
In Figure 2, a binary data sequence is used, and the specified bits are joined together into three groups due to the 8-ary FSK modulation scheme to generate the symbols. In standard 8-ary FSK modulation system, the selective data band uses a fixed central frequency
Problem statement
In wireless systems, the massive connectivity of devices, and communication over weaker protective channels, the protection against various jammers is a major consideration. Several well-known solutions have been employed mainly at the application and data link layers; the ultimate target is to fight against the wireless system vulnerabilities and attacks, but there are limitations to implement at the physical layer.1,6,7 To be advanced, the security developments, such as channel coding schemes, spread-spectrum approaches, and the information-theoretical security, respectively, are accounting prominent developments, probably considering as the best among others, toward the physical layer security. However, none of one has evaluated a complete solution to the given security problem, excluding the information-theoretical security, toward physical layer security, which precludes the communication from stronger jammers that might have unlimited computation resources. In addition, most common methods employed at the physical layer were not very effective; it could be a case that the system was not designed with the consideration of acknowledgment paradigms. The strong channel established corresponding to a weak channel by the non-legitimate user could grab the original signals, and thus, the transmitter has no awareness at all about the interruption of the illegitimate entity in the system. For that, advanced security designs at the physical layer, the cryptanalysis solutions have also been implemented in the literature,1,35–39 but are considered as difficult implementations due to complexity of mathematical modeling for physical layer security. Although, almost all available cryptography solutions deployed for various communication systems are evaluated the best, regardless of massive complexities that are accounting during computations.4,40 Thereby, while moving toward the modern wireless systems of current age, the well-known techniques—channel coding and spreading techniques—somehow are limited to provide an inclusive security resistance. However, considering the useful properties of advanced cryptanalysis approaches examined to gain enough secrecy at the physical layer,7,11 which in short are the main objectives of this study. Therefore, we may say that the key encryption approaches are widely considered as effective approaches to analyze the perfect secrecy of the system by examining information theory concepts.7,8 However, these approaches are somehow infeasible in case the employed keys have a high probability of being stolen by an unknown system’s entity.
System model
In wireless communication systems, transmitting useful signals may have several issues; for example, transmission over an unsecured wireless channel is one of the major issues. 3 Where, the potential jammers are always residing; for example, their intentions are to place antenna in the direction toward, the target path to any legitimate entity of the transceiver system, the weaker channel and then target to get the desired useful signals by applying some jamming techniques, such as narrowband and wideband jamming solutions to demodulate the originally transmitted signals. 10 For that given problem, a solution is proposed, that is, spread-spectrum techniques which have commonly been employed against the various jammers in wireless communication systems, and these solutions are working as mitigation techniques as well, to protect the baseband signals that transmit and prevent signals that might include interception through unauthorized system’s entities. Therefore, successful communication, without the interception from potential jammers, could be possible if the spreading code is always unknown (or obfuscating) by the unauthorized entities of the system. Thus, for the system secrecy estimation in the presence of potential jammers, primarily the M-sequence code (or shortly pseudorandom code) is one of the useful component, a part of spread spectrum systems, generated by and known to only the authorized entities (Tx and Rx) of the system and considered as a adequate solution to achieve channel secrecy. The cryptanalysis methods have been widely deployed to get the original signals in baseband, for example, the encrypted signals from the transmitter probably not decipher during transmission, so the channel is said to be a perfect secured channel.9,10
In this study, a new integrated security design includes three main security paradigms: cryptography, physical layer security, and the information theory for perfect secrecy; therefore, to set forth a security development for the general systems design and modeling are required. In Figure 3, the proposed integrated security system is illustrated, including a wiretap channel for intended jammer (or eavesdropper
are used, which carry the desired/undesired information signals in the transceiver system. In detail, the channel,

System model.
Here, a standard system, that is, 8-ary FSK modulation system, detailed in section “3” of this article is extended to 16-ary FSK modulation system. The required hopping sequence, or simply the PN sequence (

PN sequence using LFSR.
A four-state using LFSR H-pattern.
LFSR: linear feedback shift registers.
The output sequence generated using LFSRs, that is, four-state registers labeled as [R1 R2 R2 R4], is defined alternatively as
For security enhancement, suppose that H-Seq is logically defined and proportional to
The given encryption/decryption function using OTP examined the perfect secrecy of the spreading code; furthermore, this study mainly focused on the weaknesses and the probability of key that the key might be stolen by the illegitimate entity of the system, while communication over weaker wireless channels. In fact, the perfect secrecy was successfully computed and verified using OTP; but in some situations, for example, the probability of the key is less secured against some powerful jammers. Therefore, the key secrecy is another challenge, which is the second main contribution of this study. For simplicity, let us supposed that the entropy of key non-confidentiality is somehow higher against jammers, and the legitimate receiver of the system is unaware of this unpredicted situation. To ensure the key secrecy, that is, perfect–perfect secrecy, which is mainly computed through the integrity function at both sides of transmission, the cryptography hashing function is the best choice. Unlike OTP, the hashing algorithm (i.e. SHA-2) always generates a fixed size output secured code, that is, 32-bit and 64-bit words, against any input length message. The strong secrecy that is computed through the OTP algorithm has been widely proved, so, for perfect–perfect secrecy, we assumed that both key and hashing secured code are similar in size, for example, like OTP. This is just an assumption that logically interrelates the defined term perfect–perfect secrecy with perfect secrecy has been examined using OTP, and alongside evaluated that spreading code integrity can be possible using hashing algorithm. 11 However, this statement is truly based on an assumption defined, so the reality is still far challenging to be achieved. In the section below, the channel entropy is simply explained and examined, and the useful basic terminologies are given in Table 2.
System terminologies.
MFSK: multiple frequency-shift keying.
Preliminaries: channel entropy
Definition 1
The system is supposed to be secured if the mutual information
And using Shannon’s theory, the entropy
where
Definition 2
The entropy of a random variable
For random variable
Definition 3
Suppose the value of
Thus, concluding that, the uncertainty
Definition 4
Generalizes the system security using Wyner’s wiretap channel, considering the noisy communication channel, assume that the receiver receives the message
Thus,
Definition 5
For a given communication system, the channel capacity
Definition 6
A message
It means that,
Definition 7
Perfect secrecy can be achieved if ciphertext provides no information about the message
It means,
Definition 8
FB, through an authenticated FB channel, is replied, a way to examine information secrecy by the setting of bits (0, 1) is
CM
The proposed CM is developed, considering the wireless physical layer security design, based on the actual FHSS modulation. For a given FHSS system, as described, the spreading code or
where
The second main challenge, a statement that information of secret key can be leaked while communicating over an open and weak wireless channel, is addressable by verifying the integrity of key that is used at the receiver site. Therefore, this study has considered a cryptography SHA-2 hashing function as a potential solution to this problem. Suppose
From the above equation, we may conclude that this study has been well contributed to prove and achieve the system secrecy, mainly communicating over the weaker open channels. Through information-theoretical concepts, the goals are to achieve and anticipate the high secrecy against powerful jammers that intercepting in transmission via wiretap channel. To be clear, this study considered the jammers3,24 as potential system’s eavesdroppers, or illegitimate entities, intercepting the signals through the wiretap channel
Furthermore, for testing the proposed CM and analyzing its performance over the wiretap channel, this study setups and considers the jammers applying through jamming techniques.
3
These jammers are considered as an alternative to potential eavesdroppers, or man-in-the-middle attacks because the main target is to examine the secrecy of spreading code,
Lemma 1
At
Lemma 2
Both the computed values
Lemma 3
For perfect secrecy, employing CM, assumed that: finite message set
Thus,
Let us suppose that, for some finite number as
Secrecy presumptions
Presumption 01
Based on the aforementioned definitions and lemmas, we may say that the proposed approach (i.e. CM) was contributed significantly to anticipate the perfect secrecy of the system, even in the case of potential jammers (active using Wiretap channel). The perfect secrecy was successfully achieved through the key encryption scheme. Note that, to examine the perfect secrecy of a random message that is transmitted in the unsecured channel, the used key length is must be large or equal to the length of the message or plain text size. However, in the case of large-sized plaintext, the size of the used key must be larger or equal to the size of the selective payload; otherwise, it is impossible to achieve the processing and perfect secrecy in some scenarios. Nevertheless, depending on the conditions and the corresponding analytical conducted before, the system design assumed to be a perfectly secure system.
Presumption 02
On the other side, the goal to ensure the secrecy of the key itself that is used to examine the perfect secrecy of the system or wireless channel secrecy, the hash was computed on the key that is deemed to be symmetric. The successful deployment, therefore, assumed to provide the secrecy of the key uncertainties might be residing in illegitimate transmission. So the system may be considered not only under perfect secrecy paradigms but also under perfect–perfect secrecy paradigms.
In the below section, results are measured and discussed to demonstrate the study significances, through simulation, which may consider a far from real-time measurements. However, real-time development is the future goal of this study.
Results and discussion
This study employed the FH technique, a technique that has been commonly used in wireless systems to protect the communication against jammers (or narrowband jammers) and deployed a CM and the information-theoretic security solution to validate the secrecy of information that transmitted is over the unsecured open physical channels. The FHSS technique inherently used PN code to spread the desired signals among the selective frequencies; in short, it is a safeguard for communication against jammers, or system eavesdroppers, as the signals are always transmitted employing distinct frequencies that defined in the hopping set and are known by transmitter and receiver. Therefore, PN code has high importance to gain security, hence this study developed a CM to ensure the PN code secrecy. The proposed solution was successfully implemented and validated the perfect secrecy by employing the key encryption method and further validated the perfect–perfect secrecy by computing the hashing code of the key. So that, the CM has been accounted as an inclusive module to validate the perfect secrecy and as well the perfect–perfect secrecy at the same time.
The given overall measurements are conducted using a CM, a number of times spreading codes were generated and transmitted between
In Figure 5, only successful experiments are randomly selected among other several experiments, the computed results show the exchanging of information (or

Computed results over normal transmission.

Information loss over normal transmission.
Furthermore, in Figure 6, the wiretap channel is established to conduct the measurements based on the collective final results of information loss, the main target is to get overall transmission gain at the receiver side and further validate the system performances in the presence of jammer(s). Hence, it is further helpful to acquire and compare the total loss of information while transmitting in the presence of anonymous jammers interception, illustrated in Figure 7. Alongside, in Figure 8, the red color marker over each measurement demonstrates the key status either successfully operated representing in the form of red marker or leakage over the wiretap channel representing through red filled symbol or marker.

Information loss over wiretap channel.

Computed results over wiretap channel.
In Figure 9, information secrecy is examined, through the employed key and key secrecy employed through hash value, to conclude the secrecy levels—perfect-secrecy and perfect–perfect secrecy of system—the red plus (+) symbol visualizes perfect secrecy at each measurement, while the green plus (+) symbol visualizes perfect–perfect secrecy. The results of Figure 9 are equally computed in the presence of a wiretap channel. Finally, Figure 10 illustrates system efficiency, the mean assessment of overall equivalent measurements for both employed scenarios—normal channel and wiretap channel. Consequently, we may say that the proposed system has a resistance against the jammers.

Secrecy assessment over wiretap channel.

System efficiency.
Conclusion
The proposed study is a significant step in computing and examining the secrecy of wireless communication systems, and the secrecy is directly linked with the physical layer. After the depth analysis and based on the potential available security issues related to the spread-spectrum techniques, the CM is proposed and implemented. The CM is an inclusive security module, comprised of encryption and hashing systems, whose development provided a well-examined
