Keyword Search Result

[Keyword] jamming(23hit)

1-20hit(23hit)

  • A Distortionless Anti-Jamming Method Based on STAP for GNSS Receiver

    Fankun ZENG  Xin QIU  Jinhai LI  Haiyang LIU  Xiaoran CHEN  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2022/04/26
      Vol:
    E105-B No:11
      Page(s):
    1467-1476

    Global Navigation Satellite System (GNSS) receivers often realize anti-jamming capabilities by combining array antennas with space-time adaptive processing (STAP). Unfortunately, in suppressing the interference, basic STAP degrades the GNSS signal. For one thing, additional carrier phase errors and code phase errors to the GNSS signal are introduced; for another, the shape of the cross-correlation function (CCF) will be distorted by STAP, introducing tracking errors when the receiver is in tracking mode. Both of them will eventually cause additional Pseudo-Range (PR) bias, and these problems prevent STAP from being directly applied to high-precision satellite navigation receivers. The paper proposes a novel anti-jamming method based on STAP that solves the above problems. First, the proposed method constructs a symmetric STAP by constraining the STAP coefficients. Subsequently, with the information of the steering vector, a compensation FIR filter is cascaded after the symmetric STAP. This approach ensures that the proposed method introduces only a fixed offset to the code phase and carrier phase, and the order of the STAP completely determines the offset, which can be compensated during PR measurements. Meanwhile, the proposed method maintains the symmetry of the CCF, and the receiver can accurately track the carrier phase and code phase in tracking mode. The effectiveness of the proposed method is validated through simulations, which suggest that, in the worst case, our method does not increase carrier and code phase errors and tracking error at the expense of only a 2.86dB drop in interference suppression performance.

  • A Wideband Real-Time Deception Jamming Method for Countering ISAR Based on Parallel Convolution

    Ning TAI  Huan LIN  Chao WEI  Yongwei LU  Chao WANG  Kaibo CUI  

     
    PAPER-Sensing

      Pubricized:
    2019/11/06
      Vol:
    E103-B No:5
      Page(s):
    609-617

    Since ISAR is widely applied in many occasions and provides high resolution images of the target, ISAR countermeasures are attracting more and more attention. Most of the present methods of deception jamming are not suitable for engineering realization due to the heavy computation load or the large calculation delay. Deception jamming against ISAR requires large computation resource and real-time performance algorithms. Many studies on false target jamming assume that the jammer is able to receive the target echo or transmit the jamming signal to the real target, which is sometimes not possible. How to impose the target property onto the intercepted radar signal is critical to a deception jammer. This paper proposes a jamming algorithm based on parallel convolution and one-bit quantization. The algorithm is able to produce a single false target on ISAR image by the jammer itself. The requirement for computation resource is within the capabilities of current digital signal processors such as FPGA or DSP. The method processes the samples of radar signal in parallel and generates the jamming signal at the rate of ADC data, solving the problem that the real-time performance is not satisfied when the input data rate for convolution is far higher than the clock frequency of FPGA. In order to reduce the computation load of convolution, one-bit quantization is utilized. The complex multiplication is implemented by logical resources, which significantly reduces the consumption of FPGA multipliers. The parallel convolution jamming signal, whose date rate exceeds the FPGA clock rate, is introduced and analyzed in detail. In theory, the bandwidth of jamming signal can be half of the sampling frequency of high speed ADC, making the proposed jamming algorithm able to counter ultra-wideband ISAR signals. The performance and validity of the proposed method are verified by simulations. This jamming method is real-time and capable of producing a false target of large size at the low cost of FPGA device.

  • Unconventional Jamming Scheme for Multiple Quadrature Amplitude Modulations Open Access

    Shaoshuai ZHUANSUN  Jun-an YANG  Cong TANG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2019/04/05
      Vol:
    E102-B No:10
      Page(s):
    2036-2044

    It is generally believed that jamming signals similar to communication signals tend to demonstrate better jamming effects. We believe that the above conclusion only works in certain situations. To select the correct jamming scheme for a multi-level quadrature amplitude modulation (MQAM) signal in a complex environment, an optimal jamming method based on orthogonal decomposition (OD) is proposed. The method solves the jamming problem from the perspective of the in-phase dimension and quadrature dimension and exhibits a better jamming effect than normal methods. The method can construct various unconventional jamming schemes to cope with a complex environment and verify the existing jamming schemes. The Experimental results demonstrate that when the jammer ideally knows the received power at the receiver, the proposed method will always have the optimal jamming effects, and the constructed unconventional jamming scheme has an excellent jamming effect compared with normal schemes in the case of a constellation distortion.

  • Secrecy Throughput Analysis for Time-Switching SWIPT Networks with Full-Duplex Jamming

    Xuanxuan TANG  Wendong YANG  Yueming CAI  Weiwei YANG  Yuyang ZHANG  Xiaoli SUN  Yufeng QIAN  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E101-A No:7
      Page(s):
    1136-1140

    This paper studies the secrecy throughput performance of the three-node wireless-powered networks and proposes two secure transmission schemes, namely the half-duplex maximal ratio combining (HD&MRC) scheme and the full-duplex jamming scheme based on time switching simultaneous wireless information and power transfer (FDJ&TS-SWIPT). The closed-form expressions of the secrecy throughput are derived, and intuitive comparison of the two schemes is provided. It is illustrated that the HD&MRC scheme only applies to the low and medium signal-to-noise ratio (SNR) regime. On the contrary, the suitable SNR regime of the FDJ&TS-SWIPT is much wider. It is depicted that FDJ&TS-SWIPT combing with current passive self-interference cancellation (SIC) algorithm outperforms HD&MRC significantly, especially when a medium or high transmit SNR is provided. Numerical simulations are conducted for verifying the validity of the analysis.

  • Proactive Eavesdropping through a Third-Party Jammer

    Ding XU  Qun LI  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:5
      Page(s):
    878-882

    This letter considers a legitimate proactive eavesdropping scenario, where a half-duplex legitimate monitor hires a third-party jammer for jamming the suspicious communication to improve the eavesdropping performance. The interaction between the third-party jammer and the monitor is modeled as a Stackelberg game, where the jammer moves first and sets the price for jamming the suspicious communication, and then the legitimate monitor moves subsequently and determines the requested transmit power of the jamming signals. We derive the optimal jamming price and the optimal jamming transmit power. It is shown that the proposed price-based proactive eavesdropping scheme is effective in improving the successful eavesdropping probability compared to the case without jamming. It is also shown that the proposed scheme outperforms the existing full-duplex scheme when the residual self-interference cannot be neglected.

  • Joint Attack-Defense Strategy Based on Game Theory for Cognitive Devices in Covert Communication Networks

    Van-Hiep VU  Insoo KOO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E101-A No:2
      Page(s):
    544-548

    This research addresses improvements in the efficiency of spectrum utilization by defending against jamming attacks and corrupting the communications of the adversary network by executing its own jamming strategy. The proposed scheme, based on game theory, selects the best operational strategy (i.e., communications and jamming strategies) to maximize the successful communications and jamming rates of the network. Moreover, an estimation algorithm is investigated to predict the behavior of the adversary network in order to improve the efficiency of the proposed game theory-based scheme.

  • Energy-Efficient Resource Allocation Strategy for Low Probability of Intercept and Anti-Jamming Systems

    Yu Min HWANG  Jun Hee JUNG  Kwang Yul KIM  Yong Sin KIM  Jae Seang LEE  Yoan SHIN  Jin Young KIM  

     
    LETTER-Digital Signal Processing

      Vol:
    E100-A No:11
      Page(s):
    2498-2502

    The aim of this letter is to guarantee the ability of low probability of intercept (LPI) and anti-jamming (AJ) by maximizing the energy efficiency (EE) to improve wireless communication survivability and sustain wireless communication in jamming environments. We studied a scenario based on one transceiver pair with a partial-band noise jammer in a Rician fading channel and proposed an EE optimization algorithm to solve the optimization problem. With the proposed EE optimization algorithm, the LPI and AJ can be simultaneously guaranteed while satisfying the constraint of the maximum signal-to-jamming-and-noise ratio and combinatorial subchannel allocation condition, respectively. The results of the simulation indicate that the proposed algorithm is more energy-efficient than those of the baseline schemes and guarantees the LPI and AJ performance in a jamming environment.

  • Novel Anti-Jamming Algorithm for GNSS Receivers Using Wavelet-Packet-Transform-Based Adaptive Predictors

    Ying-Ren CHIEN  Po-Yu CHEN  Shih-Hau FANG  

     
    PAPER-Digital Signal Processing

      Vol:
    E100-A No:2
      Page(s):
    602-610

    Powerful jammers are able to disable consumer-grade global navigation satellite system (GNSS) receivers under normal operating conditions. Conventional anti-jamming techniques based on the time-domain are unable to effectively suppress wide-band interference, such as chirp-like jammer. This paper proposes a novel anti-jamming architecture, combining wavelet packet signal analysis with adaptive filtering theory to mitigate chirp interference. Exploiting the excellent time-frequency resolution of wavelet technologies makes it possible to generate a reference chirp signal, which is basically a “de-noised” jamming signal. The reference jamming signal then is fed into an adaptive predictor to function as a refined jamming signal such that it predicts a replica of the jammer from the received signal. The refined chirp signal is then subtracted from the received signal to realize the aim of anti-jamming. Simulation results demonstrate the effectiveness of the proposed method in combating chirp interference in Galileo receivers. We achieved jamming-to-signal power ratio (JSR) of 50dB with an acquisition probability exceeding 90%, which is superior to many anti-jamming techniques based on the time-domain, such as conventional adaptive notch filters. The proposed method was also implemented in an software-defined GPS receiver for further validation.

  • A Broadened and Deepened Anti-Jamming Technology for High-Dynamic GNSS Array Receivers

    Li-wen CHEN  Jian-sheng ZHENG  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:9
      Page(s):
    2055-2061

    Outside wireless signals often obstruct GNSS receivers from acquiring satellite signals. Traditional anti-jamming algorithms are used to suppress interference using a convex optimization method based on minimizing output power. These algorithms can reduce interference. However, these models suppress satellite signals as well as jamming interference. Under the high-dynamic condition, the output signal-to-interference-and-noise ratio (SINR) deteriorates seriously and the success rate in acquiring satellite signals falls accordingly. This paper introduces a novel, broadened model with a no-main-lobe-and-multi-virtual-null-constraints (NMLCB) method based on maximizing output power and constraining interference sources. With the new method, GNSS receivers can receive satellite signals more easily than using the power inversion (PI) and power minimization with derivative constraints null (NB) methods under the high-dynamic condition.

  • A Zero Bias Frequency-Domain Interference Suppressor for GNSS Receivers

    Guangteng FAN  Xiaomei TANG  Junwei NIE  Yangbo HUANG  Guangfu SUN  

     
    PAPER-Navigation, Guidance and Control Systems

      Pubricized:
    2016/04/04
      Vol:
    E99-B No:9
      Page(s):
    2081-2086

    Global navigation satellite system (GNSS) receivers equipped with the frequency domain interference suppression (FDIS) filter can operate in environments with harsh interference. The FDIS will not cause tracking error bias for an ideal analog receiver channel as its magnitude response and phase response are constant. However, the analog receiver channel distortion is induced by RF cables, amplifiers, and mixers. The distortion of the channel caused asymmetry correlation function. The correlation function is further deformed by the FDIS filter. More seriously, since the FDIS filter is adaptive, the bias will vary with the jamming pattern, especially when the frequency of interference is varying. For precision navigation applications, this bias must be mitigated. Fortunately, to prevent power loss, the analog receiver channel filter is a real function or the imaginary part is negligible. Therefore, the magnitude response and the phase response are even functions. Based on these channel features, a new FDIS filter based on mirror frequency amplitude compensation (MFAC) method is proposed in this paper. The amplitude of the symmetry position of the notch frequency is doubled in the MFAC method in order to mitigate the tracking bias. Simulation results show that the MFAC-based FDIS method is capable of reducing the bias error to less than 0.1ns, which is significant smaller than that achieved by the traditional FDIS method.

  • Secure Communication of the Multi-Antenna Channel Using Cooperative Relaying and Jamming

    Haiyan XU  Qian TIAN  Jianhui WU  Fulong JIANG  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E96-B No:4
      Page(s):
    948-955

    In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.

  • A Deception Mechanism against Compromised Station Attacks in IEEE 802.11 Channel-Hopping Systems

    Jaemin JEUNG  Seungmyeong JEONG  JaeSung LIM  

     
    LETTER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E95-B No:10
      Page(s):
    3362-3364

    We propose a deception mechanism to combat a compromised station in IEEE 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.

  • Wireless Secure Communications via Cooperative Relaying and Jamming

    Ling TANG  Hao CHEN  Jianhui WU  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E95-B No:9
      Page(s):
    2774-2784

    We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.

  • Jamming Attack in Wireless Sensor Network: From Time to Space

    Yanqiang SUN  Xiaodong WANG  Xingming ZHOU  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E95-B No:6
      Page(s):
    2113-2116

    Classical jamming attack models in the time domain have been proposed, such as constant jammer, random jammer, and reactive jammer. In this letter, we consider a new problem: given k jammers, how does the attacker minimize the pair-wise connectivity among the nodes in a Wireless Sensor Network (WSN)? We call this problem k-Jammer Deployment Problem (k-JDP). To the best of our knowledge, this is the first attempt at considering the position-critical jamming attack against wireless sensor network. We mainly make three contributions. First, we prove that the decision version of k-JDP is NP-complete even in the ideal situation where the attacker has full knowledge of the topology information of sensor network. Second, we propose a mathematical formulation based on Integer Programming (IP) model which yields an optimal solution. Third, we present a heuristic algorithm HAJDP, and compare it with the IP model. Numerical results show that our heuristic algorithm is computationally efficient.

  • Jamming-Aware Routing in Ad Hoc Networks

    Jae-Joon LEE  Jihye LEE  Jaesung LIM  

     
    LETTER-Network

      Vol:
    E95-B No:1
      Page(s):
    293-295

    When a jamming attack occurs, existing ad hoc routing protocols can experience significant throughput degradation and unnecessary control overhead due to the inclusion of unreliable links into routing paths. In this work, we identify which factors hinder establishment of reliable routing paths by the existing routing protocols in the face of jamming attacks. Our solution is Jamming-Aware Routing (JAR) based on OLSR protocol, which provides explicit route recovery procedures to counteract jamming attack. By establishing a reliable routing path, the proposed scheme achieves significant throughput gains as well as control overhead reduction.

  • Anomaly Detection in Electronic Shelf Label Systems

    Yulia PONOMARCHUK  Dae-Wha SEO  

     
    LETTER-Network

      Vol:
    E94-B No:1
      Page(s):
    315-318

    This paper proposes a lightweight, fast and efficient method for the detection of jamming attacks, interference, and other anomalies in electronic shelf label (ESL) systems and wireless sensor networks (WSNs) with periodic data transmission. The proposed method is based on the thresholding technique, which is applied to selected parameters of traffic and allows discrimination of random failures from anomalies and intrusions. It does not require the installation of additional hardware and does not create extra communication costs; its computational requirements are negligible, since it is based on statistical methods. Herein recommendations are provided for choosing a thresholds type. Extensive simulations, made by Castalia simulator for WSNs, show that the proposed method has superior accuracy compared to existing algorithms.

  • Interference Cancellation and Multipath Mitigation Algorithm for GPS Using Subspace Projection Algorithms

    Jeong Hwan SHIN  Jun HEO  Seokho YOON  Sun Young KIM  

     
    LETTER-Communication Theory and Signals

      Vol:
    E91-A No:3
      Page(s):
    905-908

    This paper presents an interference cancellation and multipath mitigation algorithm for use in Global Positioning System (GPS) with an array antenna. It is shown that interference signals and multipath signals are effectively suppressed using a serial subspace projection method without any knowledge of the incoming directional information. After the subspace projections, a beamformer is used to maximize the SNR of the received signal. The enhancement in the performance is presented in terms of the cross correlation value and beam patterns.

  • Analysis of GPS Receiver Anti-Jamming Characteristics

    Zdravko M. PONOS  Miroslav L. DUKIC  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E83-B No:10
      Page(s):
    2411-2418

    One of the basic GPS features is its inherent anti-jamming (AJ) characteristics based on great processing gain as a result of using direct sequence spread spectrum (DS-SS) technique. For calculated jamming threshold for GPS receivers operating with L1 C/A, L1 P(Y) and L2 P(Y) signals, jamming range has been analyzed with respect to the characteristic jamming signals and under various effective radiated power of jamming signals. The tests of C/A GPS receiver jamming resistance on different jamming strategies, during the tracking and acquisition phase have been performed. The influence of jamming strategy on jamming efficiency has been proved. At the same time AJ characteristics of GPS receiver have been checked.

  • Probability of Error for a Hybrid DS/SFH Spread-Spectrum System over a Nakagami Fading Channel in the Presence of Multiple Tone Jamming

    WooSub BYUN  SeongJoon BAEK  Koeng-Mo SUNG  

     
    LETTER-Radio Communication

      Vol:
    E82-B No:10
      Page(s):
    1699-1701

    In this letter, the bit error probability of a hybrid DS/SFH-SS (Direct-Sequence/Slow-Frequency-Hopped Spread-Spectrum) system is derived for a Nakagami fading channel in the presence of multiple tone jamming. At a low JSR (jamming-to-signal power ratio), a pure DS-SS system can achieve lower bit error probability than a hybrid DS/SFH-SS system. But at a high JSR, a hybrid DS/SFH-SS system is shown to be superior to a pure DS-SS system. Especially, the worst case performance of a hybrid DS/SFH-SS system is almost equal to that of a pure DS-SS system.

  • Error Performance Analysis of FFH/MFSK Systems with Multitone Jamming

    Jyh-Horng WEN  Jee-Wey WANG  

     
    PAPER-Mobile Communication

      Vol:
    E81-B No:10
      Page(s):
    1912-1919

    This paper presents a new approach to computing symbol error probability of fast frequency-hopped M-ary frequency shift keying (FFH/MFSK) systems with majority vote under multitone jamming. For illustrating the applications, we first consider the case in which the source data rate is fixed and the hopping rate is allowed to vary. In this case, the optimum orders of diversity for several values of M are examined. Results show that M=4 outperforms other values. Then, we treat another case in which the hopping rate is fixed and the data rate is adjusted so as to obtain maximum throughput under a given constraint of error probability. In addition to the case of diversity alone, we also evaluate the performances of the fixed hopping rate case with channel coding using convolutional code and BCH code.

1-20hit(23hit)

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.