Self-Reliant HF/VHF Radio Encryption Using Multi-Radio Frequency Manipulation For Philippine Navy Secure Communication
Self-Reliant HF/VHF Radio Encryption Using Multi-Radio Frequency Manipulation For Philippine Navy Secure Communication
The constant relay of information between units and base stations is fundamental to military
operations. Military communications networks must be reliable and secure in any conditions,
especially in critical areas where vital information should be securely transmitted. The
development of self-reliant, cost-effective High Frequency/Very High-Frequency radio
encryption could provide secure, reliable, and practical information exchange within the
Philippine Navy (PN). This study aims to develop self-reliant High Frequency (HF)/Very High
Frequency (VHF) radio encryption using multi-radio frequency manipulation for PN secure
communication lines. This will benefit the entire PN by providing a secure, reliable, and cost-
effective radio communications system for voice and data. The algorithm for encryption is multi-
radio frequency manipulation. The prototype will be limited to operating under Short-Range
Devices (SRD) frequency bands and cannot be integrated with existing commercial radios.
1. Introduction
The Philippine Navy modernizes its radio communications to ensure reliability and security
in critical areas. The Navy procures military-grade radios for its forces, vessels, and Littoral
Monitoring Stations. This equipment is crucial for strategic and tactical decisions. The
development of self-reliant, cost-effective High Frequency/Very High Frequency radio
encryption could provide secure, reliable, and practical information exchange within the PN.
The study "Cryptographic Protection for Military Radio Communications" developed a
cryptographic module for information protection in radio communications. The module
allows encryption at speeds adapted to the radio's operation, suitable for narrowband and
broadband radios. [1] Similarly, the paper "Securing Radio Frequency (RF) Communication
3. Methodology
The Philippine Navy (PN) uses military-grade secure radios in some areas for secure
communication lines, especially during missions. Still, it also utilizes commercial-grade
radios, which lack encryption and have no built-in military-grade security features that make
Nanotechnology Perceptions Vol. 20 No.S2 (2024)
Self-Reliant HF/VHF Radio Encryption Using…. Rachelle Tigcal et al. 418
the system vulnerable to interception, jamming, and eavesdropping. This chapter will
describe research for designing and developing a self-reliant high frequency (HF)/ very high
frequency (VHF) radio encryption using multi-frequency manipulation for PN secure
communication within the frequency range of 3 MHz to 30 MHz as a replacement to the
commercial-grade radios. The following specific objectives guided the determination of the
requirements of the project:
a. Building of a transmitter and receiver for data transfer. To design and construct
devices to send and receive data wirelessly;
b. The use of multiple radio frequency manipulation where multiple frequencies are
used to modulate and encrypt data. To use techniques that will help enhance security and
reduce interference in data transmission;
c. Building of a modulator and demodulator for data encryption and decryption. To
design the decryption circuit required to modulate the base frequency and demodulate the
received frequency;
d. Derive a formula for multi-frequency modulation. To derive a formula for
combining multiple frequencies to achieve multi-frequency modulation; and for data
transmission;
e. Measure modulated frequency output, gain, and frequency sideband noise. To assess
the performance of the system and ensure that it is operating correctly; and
f. Tuning of multiple frequency transmission modulation and multiple frequency
demodulation. To maintain signal integrity and ensure effective communications.
4. Conceptual Framework
Figure 1 shows the conceptual framework of this study. This framework helped the
researcher put the idea in order and use it to conceptualize the project. After dedicated
reviews, this concept has strong support and structure to pursue the project’s development.
The discoveries and learnings from the study of related literature about secure
communications have contributed significantly to the final conceptual framework of this
project.
Block Diagram
The block diagram of the prototype is shown in Figure 2. The transmitter module has an op-
amp that will cut the input frequency and send it to the carrier frequency. The controllers (the
Raspberry Pi and Arduino Uno) will control the sequence of data distribution. The signal,
divided into three parts, will now be sent using three different frequencies generated from a
function generator. Continuous noise input or sending of random data is to maintain
transmission security. On the other hand, the receiver module has band pass filters to pass
frequencies within the range of HF/VHF and rejects frequencies outside that range. Op-amp
will assemble the decrypted signal, and then the demodulator will separate the signal from
the modulated carrier. The synthesizer will then combine the signal to assemble the output.
Prototype
The multi-radio frequency manipulation algorithm will utilize the jumping frequency
technique to encrypt and decrypt signals. This technique has almost the same concept as
Frequency Hopping Spread Spectrum (FHSS) transmission, only that the algorithm will be
used in a low-frequency carrier signal. This carrier signal will be integrated with the
Amplitude Shift Keying (ASK) method for the modulation.
a. Jumping Frequency Technique
This technique is used to counter eavesdropping and frequency jamming during
transmission. It will also minimize the effects of various interference or unwanted noise. To
interrupt this signal, the enemy needs to know the pattern of the jumping frequencies known
to both sender and receiver. During transmission, three frequencies will be used to transmit
the data. Thus, the data transmission will be divided into three groups. The first group of data
will be sent using the current frequency, and the next group on the other frequency, up until
the last data group. Further, jamming is complex if the frequency channel or hopping
algorithm is undisclosed. [7]
b. Amplitude Shift Keying (ASK)
Amplitude Shift Keying (ASK) aims to change or improve the voltage characteristics by
increasing the amplitude of the input binary signal concerning the carrier signal during
transmission. [8]
c. Set-up
1. Figure 3 shows the system consists of a 20x4cm LCD that displays the name and the
mode of the prototype. The mode consists of three combinations of HF and VHF. The
volume knob controls the signal input which is the audio jack and output of the system. The
power switch is to power the system and the mode button is to change the mode from one to
three. Lastly, the PTT is the push-to-talk button.
Table III shows the testing of transmission of Universal Serial Bus (USB) data in bits with
100 kb data. The USB signal is modulated and transmitted to other devices and then
demodulated on the other end.
b. The use of multiple radio frequency manipulation where multiple frequencies are
used to modulate and encrypt data;
Table IV shows the testing of transmission of the analog signal through the prototype It
shows that the sent analog signal is received on the receiving side and can be clearly
understood
Table IV: Voice Encryption Testing
Table V shows the testing of the encryption quality in terms of encryption and decryption. It
shows that the system may have noise but in a minimal situation and may be affected by
other transmission line data. Still, it can receive the data in a complete set. The use of
multiple radio frequency manipulation where multiple frequencies are used to modulate and
encrypt data.
Table V: Data Encryption Testing
c. The building of a modulator and demodulator for data encryption and decryption;
Tables VI and VII show the result of the noise injection test at the shore and ship during
radio frequency transmission for a duration of one second. The noise injected is in kilohertz.
The interpretation of the given information is that during radio frequency, the noise injection
test was conducted at both shore and sea locations.
Table VI: Noise Injection Test at Shore Transmission
Table VII shows the result of the signal modulated by the system. The signals were received
with the same data as it were transmitted. Thus, it proves that the encryption can be properly
decrypted on the other end of the system. In this table, we can also interpret that the three
carrier frequencies can be used to modulate a signal from the transmitting entity to the
receiving end.
Table VII: Noise Injection Test at Ship Transmission
At shore, after one second of noise injection, the transmitted frequency matched the received
frequency perfectly. However, at sea, there was an average difference of 0.0175 kHz
between the transmitted and received frequencies after noise injection. This difference could
be due to several factors such as environmental conditions or interference at sea. Despite
this, the encryption performance tests revealed promising results. The selected encryption
algorithms demonstrated efficient encryption/decryption speeds with manageable
complexity.
The formula for multi-frequency carrier one modulation can be expressed as:
Where:
This formula represents the carrier signal modulated by the product of cosine waves
corresponding to each modulating signal. Each modulating signal is represented by its
amplitude, frequency, and phase.
This multi-frequency modulation scheme results in a complex waveform where the carrier
signal is modulated by the combined effect of multiple modulating signals.
2. Frequency Division Multiplexing
Consider three frequency bands, each with a known finite bandwidth of 200 kHz (for data
and voice transfer) and separated by three guard bands of 20 kHz each to accommodate all
the bands, the communication channel should have a capacity of (200 x 4) + (20 x 3) = 860
kHz
e. Measure modulated frequency output, gain, and frequency sideband noise;
Table VIII shows the testing of frequency before and after modulation. The consistency of
the carrier frequency is evident since the frequency and the gain is constant.
Table VIII: Modulated Frequency, Gain, and Sideband Noise
6. Conclusion
The test result shows a capable, self-reliant, and secure HF/VHF radio encryption using
multi-radio frequency. The current configuration of the radio has a capability of low-speed
transmission that can be classified as good for search and rescue operations. The radio served
its purpose as intended based on the testing results. While there were many testing issues, the
fundamentals of the design held perfectly, and the prototype was capable of a 50-meter
effective range of simultaneous transmission using a 5V power bank supply. In conclusion,
the research presents a comprehensive framework for HF/VHF radio encryption using multi-
radio frequency manipulation, offering robust security and reliable communication for the
Philippine Navy.
7. Recommendation
Based on the test results, the first and most important improvement is an upgrade to the
amplification and frequency generator. The current design does not allow long-range
transmission due to the frequency transmission limitation of the device. It should also be able
to reach the noise-like encryption of data for maximum encryption. Future researchers must
go through extensive testing of the current system to analyze the areas of improvement, such
as efficiency, viability, and safety. Further, the PN must develop long-term sustainability
plans for the self-reliant encrypted communication system, including provisions for
technology refresh cycles, lifecycle management, and budget allocations which are
recommended to ensure the implementation of the project.
References
1. R. Białas, M. Grzonkowski, and R. Wicik, “Cryptographic protection for military radio
Nanotechnology Perceptions Vol. 20 No.S2 (2024)
427 Rachelle Tigcal et al. Self-Reliant HF/VHF Radio Encryption Using....