SlideShare a Scribd company logo
Efficient Spread Spectrum Communication without Pre-shared Secrets


       Spread spectrum (SS) communication relies on the assumption that some secret is

shared beforehand among communicating nodes in order to establish the spreading sequence

for long-term wireless communication. Strasser et al. identified this as the circular dependency

problem (CDP). This problem is exacerbated in large networks where nodes join and leave the

network frequently, and pre-configuration of secrets through physical contact is infeasible. In

this work, we introduce an efficient and adversary-resilient secret sharing mechanism based on

two novel paradigms (intractable forward decoding, efficient backward-decoding) called Time

Reversed Message Extraction and Key Scheduling (TREKS) that enables SS communication

without pre-shared secrets. TREKS is four orders of magnitude faster than previous solutions to

the CDP. Furthermore, our approach can be used to operate long-term SS communication

without establishing any keys. The energy cost under TREKS is provably optimal with minimal

storage overhead, and computation cost at most twice that of traditional SS. We evaluate

TREKS through simulation and empirically using an experimental testbed consisting of USRP,

GNU Radio, and GPU-equipped nodes. Using TREKS under a modest hardware setup we can

sustain a 1Mbps long-term SS communication spread by a factor of 100 (i.e., 100 Megachips per

second) over a 200MHz bandwidth in real-time.




                               Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

More Related Content

What's hot (17)

PDF
W4301117121
IJERA Editor
 
DOCX
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
I3E Technologies
 
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
ieeepondy
 
DOCX
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
I3E Technologies
 
DOCX
Quantum Cryptography abstract
Kalluri Madhuri
 
PDF
One page summary of master thesis "Mathematical Analysis of Neural Networks"
Alina Leidinger
 
PPTX
CPN Thesis research Guidance
Network Simulation Tools
 
PDF
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PPTX
PhD Projects in GNS3 Network Research Help
PhD Services
 
PPTX
A probabilistic source location privacy protection scheme in wireless sensor ...
Maharshi Veeramalli
 
PPT
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
PPTX
A time efficient approach for detecting errors in big sensor data on cloud
Nexgen Technology
 
PPTX
NS2 Network Simulation Example Research Assistance
Network Simulation Tools
 
PPTX
prj exam
Shweta Dolhare
 
PDF
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
DOCX
transmission-efficient clustering method for wireless sensor networks using c...
swathi78
 
W4301117121
IJERA Editor
 
SECRECY CAPACITY OPTIMIZATION VIA COOPERATIVE RELAYING AND JAMMING FOR WANETS
I3E Technologies
 
Reliable and confidential cloud storage with efficient data forwarding functi...
ieeepondy
 
A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD
I3E Technologies
 
Quantum Cryptography abstract
Kalluri Madhuri
 
One page summary of master thesis "Mathematical Analysis of Neural Networks"
Alina Leidinger
 
CPN Thesis research Guidance
Network Simulation Tools
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PhD Projects in GNS3 Network Research Help
PhD Services
 
A probabilistic source location privacy protection scheme in wireless sensor ...
Maharshi Veeramalli
 
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
A time efficient approach for detecting errors in big sensor data on cloud
Nexgen Technology
 
NS2 Network Simulation Example Research Assistance
Network Simulation Tools
 
prj exam
Shweta Dolhare
 
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
transmission-efficient clustering method for wireless sensor networks using c...
swathi78
 

Viewers also liked (7)

PDF
Sy tech rios ai mobile command mobile command with workstations
SyTech Corporation
 
PDF
Decoding Digital Audio: Visualizing and Annotating Linear Time-Based Media 2015
Philip Desenne
 
PDF
Jamming in Wireless Sensor Networks
Distinguished Lecturer Series - Leon The Mathematician
 
PPTX
Unit 4 bandwidth utilization
Anjuman College of Engg. & Tech.
 
PDF
[DefCon 2016] I got 99 Problems, but 
Little Snitch ain’t one!
Synack
 
PPTX
Cdma by svr
venkataraveendra
 
PDF
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
Synack
 
Sy tech rios ai mobile command mobile command with workstations
SyTech Corporation
 
Decoding Digital Audio: Visualizing and Annotating Linear Time-Based Media 2015
Philip Desenne
 
Jamming in Wireless Sensor Networks
Distinguished Lecturer Series - Leon The Mathematician
 
Unit 4 bandwidth utilization
Anjuman College of Engg. & Tech.
 
[DefCon 2016] I got 99 Problems, but 
Little Snitch ain’t one!
Synack
 
Cdma by svr
venkataraveendra
 
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
Synack
 
Ad

Similar to Efficient spread spectrum communication without pre shared secrets (20)

DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
PDF
Fa36942946
IJERA Editor
 
PDF
K dag based lifetime aware data collection in wireless sensor networks
ijwmn
 
PDF
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
DOCX
Cooperative caching for efficient data access in
Shakas Technologies
 
PDF
P24120125
IJERA Editor
 
DOCX
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...
chennaijp
 
DOC
Benefit based data caching in ad hoc networks (synopsis)
Mumbai Academisc
 
PDF
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
PDF
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
Pvrtechnologies Nellore
 
PDF
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
GiselleginaGloria
 
PDF
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
IJMER
 
PDF
Computing localized power efficient data
ambitlick
 
DOCX
Fast aggregation scheduling in wireless sensor networks
LogicMindtech Nologies
 
PDF
Q04606103106
IJERA Editor
 
PDF
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
PDF
B03302007012
theijes
 
PDF
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
ijwmn
 
DOC
Java and .net IEEE 2012
Vipin Jacob
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
Fa36942946
IJERA Editor
 
K dag based lifetime aware data collection in wireless sensor networks
ijwmn
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
Cooperative caching for efficient data access in
Shakas Technologies
 
P24120125
IJERA Editor
 
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...
chennaijp
 
Benefit based data caching in ad hoc networks (synopsis)
Mumbai Academisc
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
Cost aware s ecure routing (caser) protocol design for wireless sensor networks
Pvrtechnologies Nellore
 
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc Networks
GiselleginaGloria
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
IJMER
 
Computing localized power efficient data
ambitlick
 
Fast aggregation scheduling in wireless sensor networks
LogicMindtech Nologies
 
Q04606103106
IJERA Editor
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
B03302007012
theijes
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
ijwmn
 
Java and .net IEEE 2012
Vipin Jacob
 
Ad

More from ambitlick (20)

PPTX
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
ambitlick
 
DOCX
Low cost Java 2013 IEEE projects
ambitlick
 
DOC
Ambitlick ns2 2013
ambitlick
 
DOC
Low cost Java IEEE Projects 2013
ambitlick
 
DOCX
Handling selfishness in replica allocation
ambitlick
 
DOCX
Mutual distance bounding protocols
ambitlick
 
DOCX
Moderated group authoring system for campus wide workgroups
ambitlick
 
DOCX
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
DOC
IEEE -2012-13 Projects IN NS2
ambitlick
 
PPTX
Adaptive weight factor estimation from user review 1
ambitlick
 
DOC
Integrated institutional portal
ambitlick
 
DOC
Embassy
ambitlick
 
DOC
Crm
ambitlick
 
DOCX
Mutual distance bounding protocols
ambitlick
 
DOCX
Moderated group authoring system for campus wide workgroups
ambitlick
 
DOCX
Comments on “mabs multicast authentication based on batch signature”
ambitlick
 
DOC
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
ambitlick
 
PDF
Energy efficient protocol for deterministic
ambitlick
 
PDF
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
ambitlick
 
PDF
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
ambitlick
 
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
ambitlick
 
Low cost Java 2013 IEEE projects
ambitlick
 
Ambitlick ns2 2013
ambitlick
 
Low cost Java IEEE Projects 2013
ambitlick
 
Handling selfishness in replica allocation
ambitlick
 
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
ambitlick
 
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
IEEE -2012-13 Projects IN NS2
ambitlick
 
Adaptive weight factor estimation from user review 1
ambitlick
 
Integrated institutional portal
ambitlick
 
Embassy
ambitlick
 
Crm
ambitlick
 
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
ambitlick
 
Comments on “mabs multicast authentication based on batch signature”
ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
ambitlick
 
Energy efficient protocol for deterministic
ambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
ambitlick
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
ambitlick
 

Recently uploaded (20)

PPTX
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
PPTX
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
PPTX
K-Circle-Weekly-Quiz12121212-May2025.pptx
Pankaj Rodey
 
PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
PPTX
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PDF
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
PPTX
Unlock the Power of Cursor AI: MuleSoft Integrations
Veera Pallapu
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
K-Circle-Weekly-Quiz12121212-May2025.pptx
Pankaj Rodey
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Virus sequence retrieval from NCBI database
yamunaK13
 
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
Unlock the Power of Cursor AI: MuleSoft Integrations
Veera Pallapu
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 

Efficient spread spectrum communication without pre shared secrets

  • 1. Efficient Spread Spectrum Communication without Pre-shared Secrets Spread spectrum (SS) communication relies on the assumption that some secret is shared beforehand among communicating nodes in order to establish the spreading sequence for long-term wireless communication. Strasser et al. identified this as the circular dependency problem (CDP). This problem is exacerbated in large networks where nodes join and leave the network frequently, and pre-configuration of secrets through physical contact is infeasible. In this work, we introduce an efficient and adversary-resilient secret sharing mechanism based on two novel paradigms (intractable forward decoding, efficient backward-decoding) called Time Reversed Message Extraction and Key Scheduling (TREKS) that enables SS communication without pre-shared secrets. TREKS is four orders of magnitude faster than previous solutions to the CDP. Furthermore, our approach can be used to operate long-term SS communication without establishing any keys. The energy cost under TREKS is provably optimal with minimal storage overhead, and computation cost at most twice that of traditional SS. We evaluate TREKS through simulation and empirically using an experimental testbed consisting of USRP, GNU Radio, and GPU-equipped nodes. Using TREKS under a modest hardware setup we can sustain a 1Mbps long-term SS communication spread by a factor of 100 (i.e., 100 Megachips per second) over a 200MHz bandwidth in real-time. Ambit lick Solutions Mail Id: [email protected] , [email protected]