Evaluation of HF ALE Linking Protection

Similar documents
Preamble Performance for

Asymptotic Throughput of the FED-STD-1052 Data Link Protocol

ROM/UDF CPU I/O I/O I/O RAM

RECOMMENDATION ITU-R F ARRANGEMENT OF VOICE-FREQUENCY, FREQUENCY-SHIFT TELEGRAPH CHANNELS OVER HF RADIO CIRCUITS. (Question ITU-R 145/9)

CDMA Principle and Measurement

P. 241 Figure 8.1 Multiplexing

SourceSync. Exploiting Sender Diversity

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Wideband HF Radio. Third-Generation and. Communications. John Nieto. William N. Furman Mark Jorgenson ARTECH. Eric E. Johnson Eric Koski HOUSE

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Chapter 2 Overview - 1 -

DEPARTMENT OF DEFENSE INTERFACE STANDARD INTEROPERABILITY AND PERFORMANCE STANDARDS FOR MEDIUM AND HIGH FFREQUENCY RADIO EQUIPMENT

RECOMMENDATION ITU-R F (Question ITU-R 158/9) b) that it is desirable to specify the requirements of HF packet radio systems,

Overview of Digital Mobile Communications

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology

STANAG 4529 CONFORMANCE TEST PROCEDURES

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

ON SYMBOL TIMING RECOVERY IN ALL-DIGITAL RECEIVERS

Wideband HF Channel Simulator Considerations

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

- Setup and Operation

Chapter 2 Overview - 1 -

REPORT ITU-R M Adaptability of real zero single sideband technology to HF data communications

DEVELOPMENT OF A DIGITAL TERRESTRIAL FRONT END

6. FUNDAMENTALS OF CHANNEL CODER

Digi-Wave Technology Williams Sound Digi-Wave White Paper

Data and Computer Communications

Design and Implementation of a STANAG 5066 Data Rate Change Algorithm for High Data Rate Autobaud Waveforms

Time Iteration Protocol for TOD Clock Synchronization. Eric E. Johnson. January 23, 1992

Design concepts for a Wideband HF ALE capability

Algorithm to Improve the Performance of OFDM based WLAN Systems

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

Local Asynchronous Communication. By S.Senthilmurugan Asst.Professor/ICE SRM University. Chennai.

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Adoption of this document as basis for broadband wireless access PHY

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Spread Spectrum Techniques

Frequency-Hopped Spread-Spectrum

Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

VARA HF Modem Specification Revision Oct30, 2017 Jose Alberto Nieto Ros, EA5HVK

B.E SEMESTER: 4 INFORMATION TECHNOLOGY

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

The use of diversity for voice-frequency telegraphy on HF radio circuits

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Lab/Project Error Control Coding using LDPC Codes and HARQ

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Chapter 3. Communication and Data Communications Table of Contents

RECOMMENDATION ITU-R M *, **

Simulation of MIL-STD C Automated HF Networking

Digital Communications Theory. Phil Horkin/AF7GY Satellite Communications Consultant

MIMO RFIC Test Architectures

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Electrical signal types

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

COHERENT DEMODULATION OF CONTINUOUS PHASE BINARY FSK SIGNALS

HF MODEM DESIGN FOR EXTREMELY HIGH SIMULTANEOUS DOPPLER AND DELAY SPREADS

UNIT-1. Basic signal processing operations in digital communication

Performance Analysis of n Wireless LAN Physical Layer

Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems

D1.26B VDES Training Sequence Performance Characteristics (v.1.2)

PERFORMANCE COMPARISON OF SOQPSK DETECTORS: COHERENT VS. NONCOHERENT

OFDM the 3 rd generation of narrowband Power Line Communications

RECOMMENDATION ITU-R F Characteristics of advanced digital high frequency (HF) radiocommunication systems

Chapter-1: Introduction

Communications I (ELCN 306)

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

Update on GPS L1C Signal Modernization. Tom Stansell Aerospace Consultant GPS Wing

Wireless Networks (PHY): Design for Diversity

PROPOSAL FOR PHY SIGNALING PRESENTED BY AVI KLIGER, BROADCOM

V. Digital Implementation of Satellite Carrier Acquisition and Tracking

IT S A COMPLEX WORLD RADAR DEINTERLEAVING. Philip Wilson. Slipstream Engineering Design Ltd.

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing

WIDEBAND ALE - THE NEXT GENERATION OF HF

Comparative Study of OFDM & MC-CDMA in WiMAX System

GSM and Similar Architectures Lesson 08 GSM Traffic and Control Data Channels

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

WiMOD LR Base Plus Firmware

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

System Identification and CDMA Communication

Fundamentals of Digital Communication

Antenna Measurements using Modulated Signals

By Nour Alhariqi. nalhareqi

Diversity Performance Gains Achieved by a WBHF Waveform in Simulated WBHF Channels

TSA 6000 System Features Summary

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1

ECT-215 Homework #1 Solution Set Chapter 14 Problems 1-29

Namaste Link Analysis

Using Modern Design Tools To Evaluate Complex Communication Systems: A Case Study on QAM, FSK and OFDM Transceiver Design

Test and Maintenance of P25 Phase II Subscriber Units

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Digital Television Lecture 5

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Digital Communication - Pulse Shaping

Receiver Designs for the Radio Channel

3. ADD-ON MODULES Due to hardware limitations, such as antenna design, the base node is limited to a 433 MHz band. Two

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

GROUND ROUTING PROTOCOL FOR USE WITH AUTOMATIC LINK ESTABLISHMENT (ALE) CAPABLE HF RADIOS

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

Transcription:

Evaluation of HF Linking Protection Dr. Eric E. ohnson, Roy S. Moore New Mexico State University Abstract The resurgence of interest in high frequency (HF) radio may be largely attributed to the success of automation in making HF usable by operators with minimal HF training. Unfortunately, Automatic Link Establishment () technology opens automated HF networks to possible hostile manipulation. To counter this vulnerability, a scheme called Linking Protection (LP) has been developed and standardized that scrambles transmissions so that only legitimate users can interact with protected radios. In this paper, we summarize the LP scheme, and present an evaluation of the impact of LP on linking performance. The evaluation includes both simulation results and measurements of early implementations. Introduction MIL-STD-88-4A and FED-STD-045 specify an Automatic Link Establishment () protocol for use in HF radio systems that often must link over sky-wave channels. To cope with the poor channel characteristics often encountered with such channels, the standard specifies fairly robust mechanisms at both the physical layer (modem) and the data link layer, in OSI terms. The modem employs 8-ary FSK with 8 msec tones; thus 3-bit symbols are sent at a rate of 25 per second, giving a raw data rate of 375 bps. A conceptual model of the MIL-STD-88-4A data link layer protocols is shown in Figure. Linking is accomplished by exchanging 24-bit words. Several means are employed to cope with the characteristics of HF sky-wave channels: a (24, 2, 3) Golay code is used for Forward Error Correction (FEC), with each (2-bit) half of the 24-bit word encoded separately, producing two 24-bit results. These two 24-bit Golay words are then interleaved bit by bit, and a stuff bit is appended, to produce a -bit word to be transmitted. Finally, each -bit word is sent three times, which allows the receiver to correct some errors using 2 of 3 majority voting. The time to send this redundant word is termed Trw. At the receiver, received bits from the modem are (conceptually) shifted into a 99-bit shift register. Majority voting among the outputs of this shift register yields a 48-bit "majority word" (stuff bits are discarded), which is de-interleaved to produce two 24- bit Golay words. These are delivered to the Golay decoder, which attempts to recover a 24-bit word. TRANSMIT Figure : Protocol ENCRYPT GOLAY ENCODE INTERLEAVE REDUNDANCY (Network Layer) Protection FEC (Physical Layer) Protocol DECRYPT GOLAY DECODE DEINTERLEAVE MAORITY VOTE Conceptual Model of Data Link Layer The format of an word consists of a 3-bit preamble, which indicates the correct interpretation of the remaining bits of the word, followed by 2 data bits which are often used to hold three 7-bit ASCII characters part of a station address, for example. The characters of an address are constrained to be chosen from a 38-character ASCII subset. ecause no bits in the word are spent on synchronization, acquiring word synchronization in this system employs a series of tests on the prospective word after each received symbol (tri-bit) is shifted in. First, the number of unanimous votes in the majority voter must exceed a threshold. Next, the Golay decoder must successfully decode both halves of the 48-bit majority word. Finally, the resulting 24-bit word must be acceptable to the protocol module (including having an acceptable preamble, and characters from the correct ASCII subset). Once word synchronization has been achieved, it is automatically tracked for the remainder of the transmission using the same tests. In operation, automatic link establishment is accomplished as follows:. The calling station transmits a call that contains the initial portion of the called station(s) address(es) for sufficient time to capture scanning receivers; the time for this "scanning call" is denoted Tsc. 2. Scanning receivers pause on channels containing signaling. If a receiver successfully achieves word sync as described above, the words are RECEIVE This section is derived from [].

examined to determine whether the call is intended for that receiver. 3. If a station finds the beginning of its own address in a call, it will stay on channel and read the full address(es) contained in the "leading call" that immediately follows the scanning call (this period of the call is denoted Tlc). If its full address is found, the receiving station reads the rest of the call, including the caller's address, and completes a 3-way handshake to establish a link. If any of the conditions specified above is not met, a receiver will immediately return to scan. Once a link is established, the receivers alert the operators, indicating the station ID of the distant station. At this point, operators may converse in voice mode, exchange data, or even re-program each others' automated controllers. Clearly, if an adversary could establish links with such stations, he could severely disrupt operations. 2 Linking Protection 2. Overview of the LP Procedure Linking protection (LP) seeks to exclude interference and deception from the function. The method chosen to shield the receiving module from such distractions is time-varying encryption of words. The sender encrypts words using a secret key and a "seed" containing time of day and the frequency in use on a link. The receiver decrypts received words using its key, and seeds covering a narrow range of times of day (based upon the protection interval or PI). Unless the received word was encrypted using the same key and a time of day in that range, it will appear to be noise to the receiver and will be accepted as a legitimate call with a probability less than 0-7. In addition to the time of day and frequency in use, the seed used in the encryption algorithm also contains a "word number" that is used to sequentially number all words in a transmission starting with Tlc. (During Tsc, the word number simply alternates between 0 and.) The state diagrams shown in Figures 2 and 3 succinctly summarize the operation of the sending and receiving LP modules, respectively, except that the procedure used to acquire word and time-of-day synchronization at the receiver is not shown. In the figures, the states are labeled using the current PI number (denoted N) and the current word number used in the seed to the encryption algorithm. The phrase "" denotes a PI transition. Further information about this protocol may be found in []. Tsc N 2 Tsc Tlc, etc. Other than scanning call N 3 N 4 N 5 Figure 2: Transmitting State Diagram (2 second PI) Word sync during Tsc Tsc (and 2 words of Tlc) Tlc, etc. N 2 Word sync (other than scanning call) N 3 N 4 Figure 3: Receiving State Diagram (2 second PI) N 5 The correct PI and word number to be used at the transmitting station are always determined unambiguously by the state diagram in Figure 2. However, there are several sources of ambiguity at the receiver that can cause linking attempts to fail when they result in the receiving LP module failing to follow the seed sequence used at the transmitting station:. Uncertainty of the time-of-day at the transmitter 2. Unknown word number during word sync acquisition 3. Unknown locations of PI transitions during Tsc in the received word stream. 4. Unknown location of the transition from Tsc to Tlc. The first two uncertainties require decryption of received words under a range of PI/word number combinations during word sync acquisition. In all cases, the usual word sync tests must be used to resolve ambiguity, due to the lack of synchronization codes in the word stream. Techniques that may be used to resolve these ambiguities are discussed in the following sections.

2.2 Resolution of Ambiguity Word Sync. During unprotected (non-lp) word sync acquisition, the receiver's FEC module examines the received stream of tones for bit patterns that exceed the unanimous vote threshold and produce correctable Golay words. When a candidate word is produced by the FEC module, it is checked by the protocol module for acceptable preamble and ASCII subset and, if these checks pass, for compliance with the protocol. When all tests concur that the received word is acceptable, word sync is assumed, and the FEC module settles into checking and returning one word every Trw thereafter until otherwise notified by the protocol module. From Figure, the place of the LP function in this chain of events is clear: it is interposed between the FEC and the protocol. Thus, when the FEC module returns a candidate word, the LP must decrypt it using seeds containing all valid PI/word number combinations, and deliver the results to the protocol module where the final series of tests is applied. In most cases, at most one seed will produce a word that is acceptable to the module, and time-of-day synchronization between the transmitter and the receiver will be achieved simultaneously with word sync. However, on rare occasions a candidate word from FEC will produce acceptable words under two or more seeds, resulting in an ambiguity that must be resolved before the LP function can properly decrypt subsequent words. The word number sequencing in the LP protocol was designed specifically to assist in the resolution of this ambiguity. For individual and net calls with single-word addresses (a common case), the next word received following word sync acquisition must be identical to the first word when decrypted under word numbers alternating between 0 and, possibly with a PI change, whether word sync is achieved during Tsc or Tlc. In this case the word sync function can resolve seed ambiguity by simply waiting for the next word and decrypting it under the appropriate combinations to determine which PI/word number combination was the correct one for the first (word sync) word. This next word is then retained to be returned when requested by the receiving protocol software. Transitions During Tsc. Note that in Figure 3, three arrows emerge from the N/ state during Tsc, corresponding to simple alternation to word number 0; transition to the next PI and word 0; and a transition to N/2, indicating that Tlc began two words ago. These transitions are identified by evaluating incoming words under all possibilities, and selecting the most probable case when more than one case passes the tests. 3 Performance Evaluation In this section, results obtained from a detailed simulator are compared to results of non-protected simulations, and to measurements of early implementations of linking protection. The metric used in these comparisons is the probability of successful link establishment as a function of channel conditions. The conditions include a range of signalto-noise ratio for three standard channels: a pure Gaussian noise channel (no fading or multipath), a good channel (0. Hz fading bandwidth with ms multipath delay) and a poor channel ( Hz fading bandwidth with 2 ms multipath delay). 3. The Simulator The simulator used to evaluate Linking Protection performance is written in C, and structured along the lines of the protocols simulated, as shown in Figure 4. Each simulator shown was validated against measured results. The HF channel simulator implements the well-known Watterson model [2]; the remaining simulators implement the protocols specified in the standards, with a few minor limitations in the protocols simulated (i.e., only single-word addresses and individual or net calls are simulated; this results in simpler protocol processing in the simulator than in fielded controllers). Data Link Layer Physical Layer Network Protocol Simulator Protocol Simulator LP Simulator FEC Simulator Modem Simulator HF Channel Simulator Figure 4: Simulator Stack 3.2 Protected vs Non-Protected Simulations The first group of graphs compares the predicted linking probabilities for three cases: with no linking protection (sometimes called AL-0 LP) AL- LP (60 second protection interval) AL-2 LP (2 second protection interval) Other experimental conditions were as follows: individual calls with no embedded messages

unanimous vote threshold in FEC module set to 0 2 ch/s scanning rate (500 ms dwell time) channel fading gains recomputed at 8 ms intervals From these results, it is apparent that linking protection, as implemented in these simulations, produces a small but measurable degradation in linking probability. In nearly error-free channels, the linking probability achieved when using LP (especially AL-2) falls short of 00%, due to increased sensitivity to a false word sync problem (described below) that is also present in the non-protected implementation. When the word sync algorithm is continuously reading symbols from the modem, there is a nonnegligible probability that both Golay decodes will succeed at an erroneous word phase; in Detect-6 / Correct- mode, this probability is approximately 3% for each candidate word checked. r When the Golay check accepts a mis-aligned word, the preamble and ASCII subset checks will usually reject the word: of all 24-bit words, fewer than % contain three ASCII-38 characters and one of the three preambles accepted by the word sync algorithm in the simulator. However, if Golay determines that a misaligned word is "correctable" and the resulting word passes the preamble and ASCII checks, the word sync algorithm will accept the erroneous word phase and the linking attempt will almost certainly fail. Good (AL0) Good AL T0 0. Good AL2 T0 0-3 0 3 6 9 2 5 8 2 24 27 30 3 KHz SNR (d) Figure 6: Effect of LP on Good Channel Poor (AL0) Poor AL T0 0. Poor AL2 T0 0-3 0 3 6 9 2 5 8 2 24 27 30 3 KHz SNR (d) Figure 7: Effect of LP on Poor Channel Gauss. (AL0) Gauss AL T0 0. Gauss AL2 T0 0-9 -6-3 0 3 6 9 2 5 8 2 24 3 KHz SNR (d) Figure 5: Effect of LP on Gaussian Channel If we denote the probability of Golay success on random inputs as p G and the probability that a random word passes the preamble and ASCII checks as ppac, then we can estimate the probability of a word sync error in non-protected mode, p wse, as follows (assuming a uniform relative word phase distribution, and that the FEC process is invoked for each arriving symbol ): p wse = P no false Golay before correct word phase p pac = 48 i = 0 P i symbols before correct word phase P no false Golay in first i symbols p pac

= 48 i=0 p G i p pac = p G p G p pac 0.005 Thus, in the long run, we would expect that a non-protected station would experience a linking failure on ideal channels about once in 200 attempts due to false word sync, unless the word sync algorithm is improved over that described above. Use of a higher unanimous vote threshold should reduce pwse at the possible expense of reduced linking probability over marginal channels. (Another possibility is soft word sync detection.) When LP is added to the receiver, several words are presented to the preamble and ASCII checks for each candidate word that passes the FEC- checks, because each such candidate word is decrypted under several PI/word number combinations (either 6 or 8). Pwse is therefore increased by this factor, resulting in a drop in linking probability of a few percent. In the simulations shown in Figures 5 through 7, reached a plateau of 96 to 97%. When diagnostic simulations were made at 30 d SNR, the failures in every case were due to false word sync acquisition. Subsequent simulations have shown that adjustment of the unanimous vote threshold to 25 provides 99 to 00% linking performance in high SNR channels, with minimal performance degradation at low SNR. 3.3 Simulation versus Measured Results Implementations of linking protection have been successfully tested recently by NTIA. Figure 8 compares measurements made at the SNR values for which performance standards are specified in FED-STD-045, compared to the results of the simulations described before (with the unanimous vote threshold set to 25). The measurements are qualitatively similar to the simulation results, with somewhat lower performance in general. This is not unexpected, because the simulator supports only a subset of the protocols supported by the tested equipment. In particular, because the simulator does not support group calls or multi-word addresses, the number of possible protocol branches that it must examine during word sync acquisition and during Tsc is reduced to exactly one: every word must be identical to the last one until Tlc is reached. Furthermore, there is only one format of Tlc that must be accommodated by the simulator. Examination of the simulator output suggests that the elimination of these possibilities for going astray in following the protocol may be at least partially responsible for the better results produced by the simulator. r 0. Poor (AL2) 0-9 -6-3 0 3 6 9 2 5 8 2 24 3 KHz SNR (d) Gaus Meas AL2 Poor Meas AL2 Gauss. (AL2) Figure 8: Simulation Vs Measurement (AL 2) 4 Conclusion Simulation of the recently-standardized HF linking protection technology has shown that LP can provide its protection from imitative calls with minimal degradation in linking performance. A unanimous vote threshold near 25 provides a good balance of performance over a broad range of channel conditions. References. ohnson, E.E. Linking Protection Implementation Guide. Technical Report NMSU-ECE-9-004A, New Mexico State University, March 992. 2. Watterson C., et al. "Experimental Confirmation of an HF Channel Model" IEEE Transactions on Communication Technology (COM-8) 6: 792-803, 970.