An efficient emerging network and secured hopping scheme employed over the unsecured public channels

With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communication, are information security and information jamming. Carefully considering the given challenges, this study uses a new advanced anti-jamming approach, a modulation technique based on the frequency-hopping spread spectrum, which has notably high resistance accounted against various potential jammers. The objective of this study is two-fold. First, the physical channel properties are considered, and the random bits are transmitted, employing a cryptographic secured hoping-spread pattern, having a set of carrier frequencies, known at both sides of the transmission. Second, the hashing code is computed only for the key, and transmitted along the original hopset, but with distinct frequencies set. The deployed practical anti-jamming approach, therefore, computed a high efficiency to examine the information secrecy well and primarily the connection availability even in the presence of the jammers. Moreover, this study considered and modeled a communication system and evaluated the proposed system’s performance, applying the theories of Shannon’s entropy and Wyner’s entropy (i.e. Wyner’s wiretap channel), to anticipate the system’s perfect secrecy, even in the worst case when jammer has unlimited computational capabilities.


Introduction
The demands to interconnect the devices through wireless media have been increasing day-by-day tremendously. Therefore, to transmit useful information over the physical channels requires reliable mechanisms that can resist under the circumstances of vulnerabilities, as various eavesdroppers and jammers are always residing to harm the communication systems. 1,2 To fight against, as a part of physical layer security, the antijamming techniques have validly been deployed 3 and are notably still a primary concern for today's advanced wireless systems, such as cellular and military systems. 1,2 Hence, due to the open nature and transmission over the weaker wireless channels, wireless systems have adequately been threatened with jammers and attack possibilities. [1][2][3] The most common type of attack, as a broad category, at the physical layer, is categorized into active and passive attacks. The active attacks are mainly available in the form of jamming and interference, which principle targets are to obstruct the frequency bands by transmitting unwanted signals, and consequently, cause the transmission failures in most cases. Moreover, these attacks, therefore, have a potential effect on channel privacy and cause a more adverse impact on the quality of communication, hence weaken the required channel by establishing communication through intentional interference. On the other side, passive attacks are mainly caused by the utilization of wireless media properties and are further categorized as eavesdropping attacks and traffic inspection. Eavesdropping attacks are occurring to divulge almost the useful information resulting due to the open, unprotected nature of wireless channels. Traffic inspection is a kind of attack, mainly residing in wireless communication, which is caused by intelligently analyzing the given information continuously, and therefore affecting the normal traffic flow. 3,4 Traditionally, the jamming and anti-jamming techniques have extensively been implemented specifically for the military systems, where electron attack (EA) is a part of communications electron warfare (CEW), employing the jamming techniques to intercept the target system and its communication flow. Alongside this, the prevention solutions, or electronic defense (ED) solutions, also deployed widely against electronic attacks to degrading the harmful effects on the target system. 3,5 For example, consider a jamming (or active attack) scenario that encompasses a communication pair of the legitimate transmitter (Tx) and an intended receiver (Rx), and an unauthorized entity as a jammer. Each time the signals are transmitted and propagating through a wireless channel to Tx, the signal quality is reduced due to the presence of noise, interference such as unintentional interference, and the consequences of multipath fading. The jammer is mainly residing close, or located distance far in a radius, toward the Rx; the signal propagation paths of legitimate transmitter Tx to receiver Rx and jammer to receiver Rx are usually individualized to each other. However, the jammer always has a goal to degrade the channel or to generate intentional interference to the Rx; therefore, the illegitimate established link between jammer and receiver is facing the deterioration, while signaling, because of the preceding channel effects. 5 Over the years, anti-jamming solutions have also been implemented for other wireless systems as part of wireless communication, including the valuable enhancements for the strategical military applications, where the primary goals of these techniques are to achieve the low probability of detection (LPD) and the low probability of interception (LPI). 5 The LPD, as an anti-jamming solution, can be accomplished through the employment of a well-known anti-jamming technique called direct sequence spread spectrum (DSSS), which uses a larger frequency bandwidth to spread the desired original signals and targets to make the transmitted signals invisible to unknown entities that interrupt into the transmission. However, the LPI system states that the initially transmitted signals possibly have chances to be detectable during transmission but not easy to be intercepted by the unknown entities. For that, another predominated spread spectrum technique-frequency-hopping spread spectrum (FHSS)-has been employed in wireless communication systems; likewise, FHSS uses large radio frequency band and spreads the useful signals, followed by the hop sets that comprise distinct frequencies set shared between legitimate users of the communication system. Therefore, less probability of jamming, and as well, the lower expected signal-to-noise ratio (SNR), evaluates that the illegitimate user has minimal effects over the spread signals in transmission. 1,5 Moreover, the useful signals that are transmitted can be hidden, from the unknown entities (such as eavesdroppers and jammers) through defined coordinated actions by employing Emissions Control (EMCON) as a part of emission control technology. EMCON solutions are vastly employed to limit the communication between legitimate nodes for a specific session; the information received continuously follows by the defined specific period, but usually, without acknowledgment of the receiver. 5 In short, in literature, various subtle jamming techniques, and corresponding anti-jamming solutions, were implemented extensively; 3,6 however, the relevant terms that to fully qualify and also to evaluate the success rates of communication, while employing these techniques, are achieved through the theoretical computations that have a high aspect in measurements. 6,7 As examined in previous studies, 8-10 information security is still the main issue in wireless communication, the security mechanisms such as applying encryption, authentication, and security management, [11][12][13] have some great security contributions against several vulnerabilities but are limited to applications at the physical layer. 4 Therefore, among other solutions, information-theoretic security is one of the solutions employed to evaluate the wireless channel secrecy, considering as a part of physical layer security. 4,14 Thereby, Shannon's system has been still considered as a wellknown approach targeting to achieve the perfect secrecy against the unbound computational power of illegitimate users of the communication system. Shannon's theory considered a noiseless cipher system in which the main goal was to secure the message M that was intended to be sent from a transmitter Tx to a legitimate receiver Rx. The encryption was computed on message M employing the secret key K s shared between the Tx and Rx and further, the shared key K s was assumed not to be known by the illegitimate entity of the communication system. In short, message M is encoded into a secure code, the intended message M secrecy was observed successfully, before transmitting to the receiver Rx; upon received, Rx used a similar secret key K s to decode the secure code X in order to get the message M. 7,15 This approach is supposed to be secured in case the unknown entity has not succeeded in overhearing the information; therefore, the probability of intercepting the integrated information between the original message M and the secure code X s was absolutely derived as zero, I(M; X s ) = 0. Employing Shannon's entropy H, the mutual information is defined as I(M; X s ) = H(M) À H(M=X s ), where the uncertainty of M is defined with entropy H(M). So that, H(M) =À P P(m) log P(m), where P is defined to compute the probability of M by considering the value of m, and further H(M=K s ) is the conditional entropy reported by the remaining uncertainty accounted in M after the secure code X s is discovered. Therefore, considering I(M; X s ) = 0, the observed uncertainty H(M) and uncertainty H(M=X s ) of message M are statistically independent and are equal. Here is the condition; the perfect secrecy can be achieved in case the observed secure code X s disclosed nothing about original message M. In a situation where the eavesdropper has unlimited computation power; thus, the confidential information could have chances to be interfered by; here, the perfect secrecy can be attained by employing Shannon' theory 7 as H(K s ) ø H(M).
The spread spectrum techniques have been widely considered to enhance the wireless systems performance (i.e. throughput rate) against various jammers (e.g. narrow and wideband jammers), hopping among distinct frequencies set while communication over wireless channels. These techniques are somehow much efficient in computation than other available anti-jamming schemes; 3,5 where the useful signals are modulated using frequency patterns, the spread signals are assumed to be noise-like and are therefore very difficult to demodulate by the jammers, unless they do not have the spread codes. 1 Because of the simplicity of wireless channels and having weaker channel secrecy, 3 the jammers, therefore, used their computational powers to intercept successfully in between the transmission. For example, a jammer intends to place its antenna particularly directed toward the receiver and tries to demodulate the coming signals, hence getting the baseband signals successfully. A similar case may be possible while employing encryption schemes, for example, if the jammer has unlimited power to break the encryption codes using some potential cryptanalysis schemes, 7,12 consequently it can obtain the original modulated bits. 4,7 However, given the definition of Shannon, 15 the perfect secrecy can be achieved in wireless transmission, if the unknown entity is not successful in deciphering the spread code, or the signals are similar to noise, or even the presence of inexhaustible computational power. 7,16,17 In this study, an intelligent step is taken to examine the security of wireless communication systems and its limitations at the physical layer; later a new integrated security approach, employing an integrated cryptography and spread spectrum solution, is proposed and implemented; this study concluded that there is enough security that can be achieved at the physical layer. The selection of the proposed security solutions has been made after comparison with other available algorithms, and finally, a perfect, lightweight security-integrated solution is selected; the information-theoretical security concepts (i.e. to attain perfect secrecy) are used in this study to ensure and prove the entire security system. To achieve that, the main objectives of this study are as follow: 1. The FHSS system is considered in this study, the spread code (or pseudorandom PN sequence) is generated, and then encryption is deployed on; the encrypted code is defined as spreading code for frequency hopping (FH). Later, the system's perfect secrecy is examined based on information-theoretical security concepts. 2. To examine the perfect-perfect secrecy of the selective encryption key, the hashing function Sha-2 is applied, and thus, perfect-perfect secrecy is anticipated. To be more precise, the study goals are achieved, as a part of proposed security development, by ensuring that the security system attained perfect secrecy even in a case of potential jammer (or attacker) residing in a transceiver system.
The rest of the article is organized as follows: Section ''Literature review'' conducts a detailed survey on the available security and spread spectrum solutions. Section ''Spread spectrum: an FH system '' gives detail on spread spectrum systems, more specifically, focusing on FH systems. The study's main problem statement is conducted in section ''Problem statement.'' Section ''System model'' describes the proposed system design and modeling, the cryptography module (CM) that validates the perfect secrecy and perfect-perfect secrecy of system; finally, the results are measured, and corresponding discussions are made. Section ''Conclusion'' concludes the overall study and gives the research directions for future developments.

Literature review
Code division multiple access (CDMA) scheme has widely been employed in wireless systems (e.g. 3G carriers), a multiple access method allowed several transmitters to communicate over a signal wireless channel simultaneously. As mentioned, CDMA technology inherently employed multiple user's access, thereby has high chances of multi-user interferences. 11,18,19 In standard CDMA systems, the code sequence is used to spread the desired signals over multiple symbols, and signals precluded through the arbitrary sampling, disordering the spread code with a pseudorandom sequence against jammers, making it not able to detect the baseband signals. However, the jammers can interrupt the transmitted signals if they are well-known about the real sequence code and the pseudorandom sequence, respectively. Hence, it is a common protection feature available, considering as a fragile method against various jammers (or attacks), in CDMA systems. 11 In addition to this, a limitation might be part of CMDA systems, that is, the long code sequence that is mainly used in occupying 42 bits mask code computed through 42 bits linear feedback shift registers (LFSRs). Consequently, the mask code could have chances to be recovered by the jammer, as the total complexity C of recovery is just C(2 42 ), to detect and as well interrupt the useful signals. 11,18 Moreover, an enhancement was made, prevention against multi-users interference and weaker security challenges, employing of secured DSSS approach for CMDA system; M-sequences were generated and spread securely to enhance the performance of the system, therefore highly protective against interference and attacks at the physical layer. 11,20 For that, during communication, the spread code was transmitted over unsecured or weaker security channels-included an encryption key-therefore, the encrypted code was assumed as spread code and de-spread by a receiver that knows a similar key to get the original message. Likewise, another spread spectrum technique, called FHSS, has a better resistance against narrowband jammers and is much efficient in precluding against interferences but less efficient if the jammer successfully interrupted in, and used a similar technique to demodulate the spread signals. For example, a jammer, considering as a manin-the-middle attack, which resides between the transmitter and receiver, is targeting to access the channel: the spread signals, the spreading method, and the PN sequence pattern. 11 If that is possible, he or she targets to get a modulation scheme that employed to a pattern and later synchronizing himself as an authorized entity of the transceiver system. As a result, the jammer pretends himself as an authorized entity of system by successfully intercepting the receiving signals, for example, through masking as a real transmitter; therefore, he or she finally makes the legitimate receiver useless to get the real signals. [20][21][22][23] To get the better system's performance, or to make the wireless channel more protective, spread spectrum technology is highly demanded as a hybrid solution that utilizes the DSSS and FHSS together with advanced signal processing system. [24][25][26] Therefore, the hybrid solution notably can better resist interference in the presence of jammers, multiuser radio frequency interference (RFI), and wireless fading channels. 11,27 Meng et al. 24 proposed a new anti-jamming solution for the FH system, which comprised of four main modules, such as recognition, suppression, suppression analyzing, and adaptive FH, which are required to build an integrated intelligent solution. In jamming recognition module, an algorithm was employed to make possible the recognition of jamming signals: first, the FH signals were erased on the desired jamming signals; second, the available bandwidth was analyzed, and narrowband jamming signals were discriminated from wideband jamming signals; and at the end, the required task for jamming recognition was performed well, through identifying and selecting the jamming type. In the jamming suppression module, the filtering techniques were identified not to be suitable to suppress the narrowband signals and tone jamming signals. 3,24 However, FH and tone jamming signals are probably co-existence in the frequency domain; therefore, to settle down this issue through computing, the significant low jamming-tosignal ratio (JSR), essentially, the collective information confirmed that a hopping channel probably interfered with single tone jamming. Thereby, after filtering overall measurements in the frequency domain, and the channel (or kurtosis) spectrum peak is low enough; thus, the FH signals get the chance to filter out to further perform the demodulation. 24,28 In section ''Spread spectrum: an FH system,'' a commonly used FH scheme is explained, considering a practical example of FH system, employing a two-way modulation scheme: a digital modulation scheme called multiple frequency-shift keying (MFSK), and frequency modulation scheme called FHSS, to spread the useful signals over the hopping bandwidth. Other useful components of the FH system are well described that to carry the transmission, for example, successful communication between transmitter and receiver, in the presence of anonymous narrowband jammer (that act as interference between transceiver system).
Spread spectrum: an FH system FHSS, a part of spread spectrum technology, has commonly been used as an anti-jamming solution for wireless communication systems, encompassing a hopping sequence pattern by which the carrier frequencies are changing periodically in transmission. For example, the FHSS system employs a hopping set, let's suppose set N, that is, . . , f iÀ1 , f i g, which defines an order set i to changing the carrier frequencies; however, FH is employed to define a number of symbols transmitting over one or more channels. Given carrier frequencies, during transmission, are hopping over available frequency bandwidth comprising a number of frequency channels called hopping band, mainly the employed hopping bandwidth is much larger than carrier frequency bandwidth or transmitted signals bandwidth. Thus, hopping set corresponding to the spread code defines the carriers to hop over predetermined frequency channels and comprised a large bandwidth; the carrier frequencies are periodically switching hop-tohop in a time interval called hop interval, with a specified duration called hop duration T h . In an FHSS system, the frequency synthesizer is used to convert available standard frequency to distinct frequencies; therefore, it is employed to synthesize the all-useful frequencies that are comprised into a hopset. A standard formulation f hj = xf 1 + y j f R , j = 1, 2, 3, . . . , N , is a basic form of hopset containing a number of frequencies, where x and y j are representing the rational numbers, respectively. f 1 defines the frequency of a hopset for spectral channel band, and the reference frequency is shown as f R . The reference signal is a resulting source, or a tone signal, over the reference frequency generated from frequency operation, such as fed by the oscillator, to verify stability and accuracy of the resulting frequency from a synthesizer, similar to the reference signal. 29,30 The frequency synthesizer is used to generate the FH pattern, each time the code generator resulting in bits, shown in Figure 1. So that, the FH signal is formed by scrambled together the original modulated signal, for example, angle modulation ;(t), and synthesizer pattern (resulted); thus, at the receiver end, for example, a sample ith hop signal is formulated in equation (1) as where S, f j , and ; i respectively are the average power, carrier frequency, phase angle of this ith hop signal. The frequency pattern from the transmitter is then synchronized with the receiver pattern generated through the synthesizer, which might offset with constant intermediate frequency; finally, after the mixing process, the dehopping is successfully performed. Later, the output of the mixer is then further passed to the bandpass filter in order to remove the extra frequency elements and the outage power of frequency channel and hence yielded the demodulated output. 29 The dehopped signals, however, might get several chances of interference and multipath padding and have no prevention against white noise, as the hopping channel allows the signals to travel outer range of frequency channel. 24,31 For that, providing the potentials against narrowband interference, practically the disassociate frequency channels are required, which are either contiguous or occupying unexploited spectral region. 3,32 Few useful cases through spectral notching, the spectral channels region that are susceptive to interference and fading are mainly erased from predefined frequency's hopset. The modulation technique called MFSK has commonly been employed with an FH technique, in which all the subchannels usually get impact, hence causing the possibility of interference. Whereas, for security purposes such as to verify the hopping pattern secrecy or/and uncertainty, the FH pattern must be generated and distributed in pseudorandom sequence in an order of frequencies set. Moreover, the pseudorandom sequence is generated in a multilevel sequence and has extended the period of time, lengthily linear span, and unpredictably distributed over specified frequency channels. The long period always is significant to preclude the anonymous jammers that are trying to capture and store the pattern period, and the larger linear span is useful in the case to add restrictions that discouraging the opponent to regenerates the pattern. Code, or pattern, generates a set of control bits typically composing a symbol that collected through a finite field incorporating set properties. Furthermore, Figure 1. A standard frequency hopping system. by affiliating a different frequency to each symbol collected, the FH pattern is produced to compute the more reliable, efficient, and more secure transmission; for that, control bits might subject to be encrypted through some cryptanalysis algorithms. 33,34 Alongside, to be more efficient, control bits are required to be generated by employing the particular algorithm that might direct through: first, the security key, which always kept secure, the main source that provides security and further encompasses a bits set that changing irregularly according to time session; second, the timeof-day (TOD) composed of a bits set that formed through phasing the TOD counter, and its changing occurring correspond to changes of TOD clock. The possibility of changing in TOD might be in every second; however, the key only changing on daily basis; as defined, the employed algorithm is regulated through time-varying key; therefore, it could be beneficial in case the algorithm (i.e. control bits) add restrictions to avoid the key changing constantly in every particular defined time. The change in frequency occurred as a part of the code generator that controls the FH rate regulating by a system clock which operation rate notably much higher than TOD clock rate. Thereby, for both transmitter and receiver, TOD clock acquires through the means of the code clock, and this clock is formed through the synchronization system at the receiver end. 29,30 In an FH system, for example, in order to compute the minimal number of pseudorandom noise (PN), chips that are needed in a frequency word encompasses a sequence of chips; so that, to formulate this given problem, the hopping bandwidth H BW and frequency For details, an example of an FH system is illustrated in Figure 2. The modulation scheme 8-ary FSK is employed with FH, that is, slow hopping, to perform modulation/demodulation at both sides-transmitter Tx and receiver Rx; the input information is composed in binary format with a data rate R D of 150 bits/s. Hence, the symbol rate R S is given as follows R S = R D 8 À ary FSK = 150 bits=s (log 2 8) = 50 symbols=s and the time duration of a symbol T S is computed as T S = 1=50 = 20 ms: Thereby, each time-frequency hopped is occurred, as per symbol, and is synchronized with symbol execution time that specified. Figure 2 illustrates the timing flows of FH employing of 8-ary FSK modulation scheme with its essential components. In Figure 2, a binary data sequence is used, and the specified bits are joined together into three groups due to the 8-ary FSK modulation scheme to generate the symbols. In standard 8-ary FSK modulation system, the selective data band uses a fixed central frequency f o and at the same time, the central frequency f o is usually not the same for data band while using FH/MFSK system, as illustrated in Figure 2. So, this is only a difference accounted between them. Furthermore, informing the new symbol, the frequency f o hops, and shifts its entire data band, to the new position in the defined boundary of frequency hop bandwidth. In Figure 2, the solid line represents the symbol tone and the dotted line represents the central frequency f o position, for a given first symbol 011 having a 25 Hz tone placed above f o . Continuously, in the same order, during the second and third (or final) defined intervals f o moves to new spectral locations shown by dotted lines, for the given symbols: second symbol 110 and final symbol 001 yield frequency of 125 Hz (-) and 125 Hz (+), respectively, and are positioned below and above than f o . Thereby, it is notified that the central frequency f o changing its position according to specified data sequence and conversely, the symbol tones remain consistent at their respective positions. 29

Problem statement
In wireless systems, the massive connectivity of devices, and communication over weaker protective channels, the protection against various jammers is a major consideration. Several well-known solutions have been employed mainly at the application and data link layers; the ultimate target is to fight against the wireless system vulnerabilities and attacks, but there are limitations to implement at the physical layer. 1,6,7 To be advanced, the security developments, such as channel coding schemes, spread-spectrum approaches, and the information-theoretical security, respectively, are accounting prominent developments, probably considering as the best among others, toward the physical layer security. However, none of one has evaluated a complete solution to the given security problem, excluding the information-theoretical security, toward physical layer security, which precludes the communication from stronger jammers that might have unlimited computation resources. In addition, most common methods employed at the physical layer were not very effective; it could be a case that the system was not designed with the consideration of acknowledgment paradigms. The strong channel established corresponding to a weak channel by the non-legitimate user could grab the original signals, and thus, the transmitter has no awareness at all about the interruption of the illegitimate entity in the system. For that, advanced security designs at the physical layer, the cryptanalysis solutions have also been implemented in the literature, 1,35-39 but are considered as difficult implementations due to complexity of mathematical modeling for physical layer security. Although, almost all available cryptography solutions deployed for various communication systems are evaluated the best, regardless of massive complexities that are accounting during computations. 4,40 Thereby, while moving toward the modern wireless systems of current age, the well-known techniqueschannel coding and spreading techniques-somehow are limited to provide an inclusive security resistance. However, considering the useful properties of advanced cryptanalysis approaches examined to gain enough secrecy at the physical layer, 7,11 which in short are the main objectives of this study. Therefore, we may say that the key encryption approaches are widely considered as effective approaches to analyze the perfect secrecy of the system by examining information theory concepts. 7,8 However, these approaches are somehow infeasible in case the employed keys have a high probability of being stolen by an unknown system's entity.

System model
In wireless communication systems, transmitting useful signals may have several issues; for example, transmission over an unsecured wireless channel is one of the major issues. 3 Where, the potential jammers are always residing; for example, their intentions are to place antenna in the direction toward, the target path to any legitimate entity of the transceiver system, the weaker channel and then target to get the desired useful signals by applying some jamming techniques, such as narrowband and wideband jamming solutions to demodulate the originally transmitted signals. 10 For that given problem, a solution is proposed, that is, spreadspectrum techniques which have commonly been employed against the various jammers in wireless communication systems, and these solutions are working as mitigation techniques as well, to protect the baseband signals that transmit and prevent signals that might include interception through unauthorized system's entities. Therefore, successful communication, without the interception from potential jammers, could be possible if the spreading code is always unknown (or obfuscating) by the unauthorized entities of the system. Thus, for the system secrecy estimation in the presence of potential jammers, primarily the M-sequence code (or shortly pseudorandom code) is one of the useful component, a part of spread spectrum systems, generated by and known to only the authorized entities (Tx and Rx) of the system and considered as a adequate solution to achieve channel secrecy. The cryptanalysis methods have been widely deployed to get the original signals in baseband, for example, the encrypted signals from the transmitter probably not decipher during transmission, so the channel is said to be a perfect secured channel. 9,10 In this study, a new integrated security design includes three main security paradigms: cryptography, physical layer security, and the information theory for perfect secrecy; therefore, to set forth a security development for the general systems design and modeling are required. In Figure 3, the proposed integrated security system is illustrated, including a wiretap channel for intended jammer (or eavesdropper J Eve ) active assumed to be at the physical layer in transceiver system, a legitimate transmitter T Alice and a legitimate receiver R Bob are also active to communicate with each other. For communication, a traditional wireless system is considered using standard FHSS for precluding the communication against jammers and MFSK modulation. 6,27,28 However, this study has no focus to well detail the FHSS and MFSK modulations because the goal is not to do something with modulation schemes, the objective is to employ these modulations schemes to get the proposed system' s objectives. Thus, in short, the main study target is to add a new CM, which is design encompassing the encryption, hashing, and comparator module, a new design module that may be considered as a part of the FH system. For that, three physical channels, such as

3)
Ch WT : Eve ! Bob ð Þ are used, which carry the desired/undesired information signals in the transceiver system. In detail, the channel, Ch main , is legitimated main channel between the transmitter T Alice and receiver R Bob ; the second channel called feedback (FB) channel, Ch FB , is an authenticated channel between the receiver R Bob and transmitter T Alice , which is established each time (distinct from other channels) as a channel for synchronization and confirmation and FB purposes about the signals that are transmitted by T Alice and then received by R Bob . Thereby, R Bob and T Alice are well synchronized with each other-and will give the confirmation if the confirmation bit is set-upon delivery of each signal. The third channel is an illegitimate channel, or wiretap channel, between J Eve and R Bob . Thus, there is no FB channel, :Ch FB : (Eve ! Alice), between J Eve and T Alice and vice versa. Therefore, it is considering as a way that makes J Eve identification clear in legitimated transceiver system, if the confirmation bit was enabled and, there will be no confirmation at all. Here, a standard system, that is, 8-ary FSK modulation system, detailed in section ''3'' of this article is extended to 16-ary FSK modulation system. The required hopping sequence, or simply the PN sequence (PN_Seq), which is supposed to be known by both legitimated entities (i.e. transmitter and receiver) of the system, is generated using LFSRs. 29 In Figure 4, a four-state LFSRs are employed to generate the 15 possible output values; however, r-state PN sequence, or maximum sequence, can be generated using m = 2 r À 1, where the maximum number of states directly depending on the value of r (as an input value). For the output sequence, Figure 4 illustrates a four-state register used to store and shifting the binary numbers using exclusive-OR function or modulo-2 adder, an FB pathway, and clock pulses that used to control the shift register overall processing. It is noted that, in Table 1, the PN sequence is truly a random sequence, as it has been conducted and verified by three main properties of randomness: Balance, Run, and Correction.
The output sequence generated using LFSRs, that is, four-state registers labeled as [R1 R2 R2 R4], is defined alternatively as PN Seq = ½(St) 0 , (St) 0 , (St) 0 , . . . , (St) 1 , (St) 1 , wherein sequence (St) 0 and (St) 1 are representing the sequence in order of 0's and 1's, respectively. For FH system, hopping bandwidth H BW and frequency step size Df is 400 and 25 kHz, respectively, and the corresponding bits-pattern is given using LFSRs. Furthermore, FH sequence (H-Seq), H À Seq = ½f 8 , f 4 , f 2 , f 9 , . . . , f 3 , f 1 , a period in which original signals are modulated with carrier frequencies one after another, is generated followed through bitspattern and the step (time) in order of 0-15. So, in order to preclude the transceiver system from external jammers or/and attackers, that is, eavesdropping and a man-in-the-middle attack, for that, the spreading code or PN_Seq is said to be transmitted securely using encryption (a mechanism), which is a significant way to enhance the security of an FH system.
For security enhancement, suppose that H-Seq is logically defined and proportional to PN_Seq, an output sequence finally generated from 4°LFSRs. Thus, the PN_Seq encompassing a binary sequence (of 0's and 1's) is encrypted with a key that is randomly generated, and its length is at least larger or equivalent to the length of the message, for example, PN_Seq in our case. Here, we only use the truly random secret key, generated using a non-proprietary key generator (software), and the size of the key is exactly similar to the size of PN_Seq. As it was stated by Debbah et al. 7 [Shannon entropy], the perfect secrecy can be achieved if and only if the probability (or entropy) of the secret key is larger than the entropy of secret message. In this work,  therefore, to achieve the perfect secrecy of a given system, mainly to secure the spread code, one-time padding (OTP) algorithm has been employed. 40 Let us assume that the spreading code or PN_Seq is just a message that contains 15 bits in binary format, PN_Seq = [0 0 0 1 0 0 1 1 0 1 0 1 1 1 1] depicted in Table 1, and the key is formated equally in binary, SC = [1 1 1 0 1 0 0 1 0 1 0 1 1 0 1]; thus the encryption/decryption function is computed using OTP as: The given encryption/decryption function using OTP examined the perfect secrecy of the spreading code; furthermore, this study mainly focused on the weaknesses and the probability of key that the key might be stolen by the illegitimate entity of the system, while communication over weaker wireless channels. In fact, the perfect secrecy was successfully computed and verified using OTP; but in some situations, for example, the probability of the key is less secured against some powerful jammers. Therefore, the key secrecy is another challenge, which is the second main contribution of this study. For simplicity, let us supposed that the entropy of key non-confidentiality is somehow higher against jammers, and the legitimate receiver of the system is unaware of this unpredicted situation. To ensure the key secrecy, that is, perfect-perfect secrecy, which is mainly computed through the integrity function at both sides of transmission, the cryptography hashing function is the best choice. Unlike OTP, the hashing algorithm (i.e. SHA-2) always generates a fixed size output secured code, that is, 32-bit and 64-bit words, against any input length message. The strong secrecy that is computed through the OTP algorithm has been widely proved, so, for perfect-perfect secrecy, we assumed that both key and hashing secured code are similar in size, for example, like OTP. This is just an assumption that logically interrelates the defined term perfect-perfect secrecy with perfect secrecy has been examined using OTP, and alongside evaluated that spreading code integrity can be possible using hashing algorithm. 11 However, this statement is truly based on an assumption defined, so the reality is still far challenging to be achieved. In the section below, the channel entropy is simply explained and examined, and the useful basic terminologies are given in Table 2.
Preliminaries: channel entropy Definition 1. The system is supposed to be secured if the mutual information I between M T and X T in the presence of a jammer J Eve is defined a value that approaches absolute zero And using Shannon's theory, the entropy H of mutual information I is defined as where M T are original data signals and the encoded message X T transmitted from T Alice and then, received by the legitimate receiver R Bob and as well by J Eve over wiretap channel Ch WT .
Thus, concluding that, the uncertainty H(M T ) of the transmitted message M T is equal to the measured conditional uncertainty Definition 4. Generalizes the system security using Wyner's wiretap channel, considering the noisy communication channel, assume that the receiver receives the message M R in the presence of Eve using wiretap channel, after decoding; that is M T is the message being sent, after encoded into X M T n having a length and correspondingly X T is encoded message, M T ) X T , through the computing of Y M R n a receiver received after passing over the noisy channel. Furthermore, Eve also get some value (unknown Probability, P) computed of Z M R n passing over the noisy channel, where she is connected legitimately. Means that the secret code having length ''n'' possibly utilizes the channel ''n'' times, and for other, the legitimate receiver can get the channel output at Y M R n and the eavesdropper at Z M R n . Such that Thus, Inf (M T ; X T ) according to the Wyner's wiretap channel model, for secrecy condition, both the encoding/decoding outputs are contented and, with a minimal rate of error (probability).
Definition 5. For a given communication system, the channel capacity CC, according to an encoded message X T , and the output Y R , is defined as A message M T assumed to be secure if encrypted with a secret key K ss forms X T , and then the perfect secrecy is defined as It means that, X T leaks no information about the message M T . Definition 7. Perfect secrecy can be achieved if ciphertext provides no information about the message M T and secret key K ss , and H(K ss ) ø H(M T ), thus we also define a perfect-perfect secrecy for K ss using hashing It means, X H leaks no information about key K ss , and X H provides perfect-perfect secrecy for K ss .
Definition 8. FB, through an authenticated FB channel, is replied, a way to examine information secrecy by the setting of bits (0, 1) is f MFSK (M T ) = X MFSK Modulation applied on message M T 5.
Cry(E) = f E ½K ss (PN Seq) = X PN Cryptography encryption function, encryption E is performed on PN_Seq using the secret session key K ss 6.
f FB (X MFSK ) = X FH Frequency hopping (modulation) applied and got value X FH transmitted to the main channel 7.
Cry(H) = f H (K ss ) = X H Cryptography hashing function, hashing is performed on key T Alice (K ss ) using the SHA-2 algorithm 8.

CM
The proposed CM is developed, considering the wireless physical layer security design, based on the actual FHSS modulation. For a given FHSS system, as described, the spreading code or PN_Seq was generated using linear-feedback shift registers (LFSRs); thus to implement and to examine the spreading code secrecy, the PN-Seq has to be encoded using the secret session key K ss , that is where PN_Seq is generated as a maximum sequence, m = 2 r À 1. Meaning that, the encoded form of PN Seq, as E(M), is treated as spreading code of FH system. The K ss is generated with a session that is random in reality and shared securely between T Alice and T Bob , through a defined channel Ch main , prior to FH modulation. Thereby, to perform FH, the spreading code, that is, E(M), has to be synchronized between T Alice and T Bob , prior to the transmission; thus, in case of the synchronization failure issues, T Bob will only receive X FH signals similar to the noise-like signals. However, only possible to get the spreading code is through decoding function D(X T ), that is, D(X T ) = Y R = K ss ½E(M) = K ss fPN Seqg. As the key, T Alice (K ss ) = T Bob (K ss ) is statistically generated and distributed in the absences of the certificate authority (CA) and the key distribution center (KDC) to perform encryption/decryption function. For each transmission, the key is processed with a session that is always in random to avoid jammer J Eve . For example, if the secret key has a session of 28 s, and at the receiver, the spreading code or E(M) is unsuccessfully decoded using the same key. Then, a new key will be requested, with a new session, to decode the E(M). The second main challenge, a statement that information of secret key can be leaked while communicating over an open and weak wireless channel, is addressable by verifying the integrity of key that is used at the receiver site. Therefore, this study has considered a cryptography SHA-2 hashing function as a potential solution to this problem. Suppose H is a hashing algorithm, and f H is a hashing function applied on key, the hashing value of the key is then computed as T Alice : Cry(H) = f H (K ss ). This operation is done before passing of spread code toward the frequency synthesizer, which is used to convert the conventional frequencies to distinct required frequencies, shown in Figure 3, at both ends of the transceiver system. Thus, the transceiver system has been fully configured and setup with CM; the computed hash code Cry(H) is sent toward the legitimate receiver R Bob , along with spread code as E(M), readable by legitimate receiver R Bob prior to passing through the hash comparator function. As a consequence, the jamming J Eve will not able to change (or alter) the reception of the data signals that transmitted from T Alice , for that, she has to compute the hashing code similar to the intended receiver, which is almost impossible; then, she is able to make alternation into the data signals that surly also impossible for her. At the receiver side, to get the spreading code that is transmitted from T Alice , R Bob computes first the hash value of spread code, Cry(H) = f H (K ss ), before converting to the desired hopset frequencies through the synthesizer. At the same time, the unknown receiver J Eve has a probability to interrupt in-between the communication via wiretap channel, to get the original transmitted spread code along with hash value, after spending much effort with high-level system computations. However, it depends on the computation probability of whether she should be able to get something valuable or not. In short, in the presence of unlimited resources, targeting via wiretap channel J Eve , are somehow useful to get the information, but not reliable because the information that computed will not be much sufficient to attack or continuously attack over the legitimated channel between T Alice and R Bob . As the transceiver system is fully setup with high secrecy paradigms in mind at the physical layer only, using a CM and a secured acknowledgment channel in between T Alice and R Bob , so the J Eve finally do not have a highlevel probability to interrupting the transmission. Therefore, in the case of a legitimate receiver, R Bob , successfully able to computed the hashing value Cry(H), using a hashing function f H , that is, R Bob : Cry(H) = f H (K ss ); means that, the K ss integrity has been verified, and same key employed to decode the spread code, such that From the above equation, we may conclude that this study has been well contributed to prove and achieve the system secrecy, mainly communicating over the weaker open channels. Through informationtheoretical concepts, the goals are to achieve and anticipate the high secrecy against powerful jammers that intercepting in transmission via wiretap channel. To be clear, this study considered the jammers 3,24 as potential system's eavesdroppers, or illegitimate entities, intercepting the signals through the wiretap channel Ch WT . The following mathematical computations, or lemmas, solely demonstrate the study contributions slightly close to reality; however, overall study work is conducted using simulation. conducted before, the system design assumed to be a perfectly secure system.
Presumption 02. On the other side, the goal to ensure the secrecy of the key itself that is used to examine the perfect secrecy of the system or wireless channel secrecy, the hash was computed on the key that is deemed to be symmetric. The successful deployment, therefore, assumed to provide the secrecy of the key uncertainties might be residing in illegitimate transmission. So the system may be considered not only under perfect secrecy paradigms but also under perfect-perfect secrecy paradigms.
In the below section, results are measured and discussed to demonstrate the study significances, through simulation, which may consider a far from real-time measurements. However, real-time development is the future goal of this study.

Results and discussion
This study employed the FH technique, a technique that has been commonly used in wireless systems to protect the communication against jammers (or narrowband jammers) and deployed a CM and the information-theoretic security solution to validate the secrecy of information that transmitted is over the unsecured open physical channels. The FHSS technique inherently used PN code to spread the desired signals among the selective frequencies; in short, it is a safeguard for communication against jammers, or system eavesdroppers, as the signals are always transmitted employing distinct frequencies that defined in the hopping set and are known by transmitter and receiver. Therefore, PN code has high importance to gain security, hence this study developed a CM to ensure the PN code secrecy. The proposed solution was successfully implemented and validated the perfect secrecy by employing the key encryption method and further validated the perfect-perfect secrecy by computing the hashing code of the key. So that, the CM has been accounted as an inclusive module to validate the perfect secrecy and as well the perfect-perfect secrecy at the same time.
The given overall measurements are conducted using a CM, a number of times spreading codes were generated and transmitted between T Alice and T Bob , and J Eve using wiretap channel Ch WT : Meaning that, the system performances have been measured based on successful experiments those distributed according to the defined scenarios and compared to finally examine the effectiveness of the proposed CM, through careful comparison with the existing FH system having security limitations directly connected with its spreading code. So that, the entropy H of spreading code was measured using given lemmas, and the demonstrated the PN_Seq secrecy that individually computed while running over the normal communication (without wiretap channel) and in the presence of a jammer J Eve (with a wiretap channel). At the end, overall conducted results are compared to compute the system precision and to demonstrate the analytical contributions of this study.
In Figure 5, only successful experiments are randomly selected among other several experiments, the computed results show the exchanging of information (or PN_Seq) between the transmitter and receiver. Suppose that the information transmitted from the transmitter was enclosed in a packet contained a random bits order and was always distinct in size for each successful measurement. So, the blue line shows a number of packets (i.e. a PN_Seq order), and the parallel orange line along shows the throughput or transmission gain at the receiver site. As examined, there are few differences while comparing both performances that might be because of some unknown wireless medium impairments. However, overall transmission gain over each transmission does not look very different from the original once each time. The exact information loss, that is, bits loss, are illustrated in Figure 6.
Furthermore, in Figure 6, the wiretap channel is established to conduct the measurements based on the collective final results of information loss, the main target is to get overall transmission gain at the receiver side and further validate the system performances in the presence of jammer(s). Hence, it is further helpful to acquire and compare the total loss of information while transmitting in the presence of anonymous jammers interception, illustrated in Figure 7. Alongside, in Figure 8, the red color marker over each measurement demonstrates the key status either successfully operated representing in the form of red marker or leakage over the wiretap channel representing through red filled symbol or marker.
In Figure 9, information secrecy is examined, through the employed key and key secrecy employed through hash value, to conclude the secrecy levelsperfect-secrecy and perfect-perfect secrecy of systemthe red plus (+) symbol visualizes perfect secrecy at each measurement, while the green plus (+) symbol visualizes perfect-perfect secrecy. The results of Figure 9 are equally computed in the presence of a wiretap channel. Finally, Figure 10 illustrates system efficiency, the mean assessment of overall equivalent measurements for both employed scenarios-normal channel and wiretap channel. Consequently, we may say that the proposed system has a resistance against the jammers.

Conclusion
The proposed study is a significant step in computing and examining the secrecy of wireless communication systems, and the secrecy is directly linked with the physical layer. After the depth analysis and based on the potential available security issues related to the spread-spectrum techniques, the CM is proposed and  implemented. The CM is an inclusive security module, comprised of encryption and hashing systems, whose development provided a well-examined PN_Seq secrecy as a part of the FH system. Moreover, the proposed system is successfully applied and validated with information-theoretical security approaches, and consequently, the perfect secrecy and perfect-perfect secrecy are well anticipated. This study provides further future research directions to enhance the security at the physical layer, to fight against the vulnerabilities and jamming attacks, and to deploy in other applications or systems that using various random codes to transmit the desired information. This study will be very useful to integrate with the existing conventional designs of the wireless systems, such as Bluetooth, Wi-Fi, CDMA systems, and so on, to ensure secrecy at a high level.

Declaration conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.