Fankun ZENG Xin QIU Jinhai LI Haiyang LIU Xiaoran CHEN
Global Navigation Satellite System (GNSS) receivers often realize anti-jamming capabilities by combining array antennas with space-time adaptive processing (STAP). Unfortunately, in suppressing the interference, basic STAP degrades the GNSS signal. For one thing, additional carrier phase errors and code phase errors to the GNSS signal are introduced; for another, the shape of the cross-correlation function (CCF) will be distorted by STAP, introducing tracking errors when the receiver is in tracking mode. Both of them will eventually cause additional Pseudo-Range (PR) bias, and these problems prevent STAP from being directly applied to high-precision satellite navigation receivers. The paper proposes a novel anti-jamming method based on STAP that solves the above problems. First, the proposed method constructs a symmetric STAP by constraining the STAP coefficients. Subsequently, with the information of the steering vector, a compensation FIR filter is cascaded after the symmetric STAP. This approach ensures that the proposed method introduces only a fixed offset to the code phase and carrier phase, and the order of the STAP completely determines the offset, which can be compensated during PR measurements. Meanwhile, the proposed method maintains the symmetry of the CCF, and the receiver can accurately track the carrier phase and code phase in tracking mode. The effectiveness of the proposed method is validated through simulations, which suggest that, in the worst case, our method does not increase carrier and code phase errors and tracking error at the expense of only a 2.86dB drop in interference suppression performance.
Ning TAI Huan LIN Chao WEI Yongwei LU Chao WANG Kaibo CUI
Since ISAR is widely applied in many occasions and provides high resolution images of the target, ISAR countermeasures are attracting more and more attention. Most of the present methods of deception jamming are not suitable for engineering realization due to the heavy computation load or the large calculation delay. Deception jamming against ISAR requires large computation resource and real-time performance algorithms. Many studies on false target jamming assume that the jammer is able to receive the target echo or transmit the jamming signal to the real target, which is sometimes not possible. How to impose the target property onto the intercepted radar signal is critical to a deception jammer. This paper proposes a jamming algorithm based on parallel convolution and one-bit quantization. The algorithm is able to produce a single false target on ISAR image by the jammer itself. The requirement for computation resource is within the capabilities of current digital signal processors such as FPGA or DSP. The method processes the samples of radar signal in parallel and generates the jamming signal at the rate of ADC data, solving the problem that the real-time performance is not satisfied when the input data rate for convolution is far higher than the clock frequency of FPGA. In order to reduce the computation load of convolution, one-bit quantization is utilized. The complex multiplication is implemented by logical resources, which significantly reduces the consumption of FPGA multipliers. The parallel convolution jamming signal, whose date rate exceeds the FPGA clock rate, is introduced and analyzed in detail. In theory, the bandwidth of jamming signal can be half of the sampling frequency of high speed ADC, making the proposed jamming algorithm able to counter ultra-wideband ISAR signals. The performance and validity of the proposed method are verified by simulations. This jamming method is real-time and capable of producing a false target of large size at the low cost of FPGA device.
Shaoshuai ZHUANSUN Jun-an YANG Cong TANG
It is generally believed that jamming signals similar to communication signals tend to demonstrate better jamming effects. We believe that the above conclusion only works in certain situations. To select the correct jamming scheme for a multi-level quadrature amplitude modulation (MQAM) signal in a complex environment, an optimal jamming method based on orthogonal decomposition (OD) is proposed. The method solves the jamming problem from the perspective of the in-phase dimension and quadrature dimension and exhibits a better jamming effect than normal methods. The method can construct various unconventional jamming schemes to cope with a complex environment and verify the existing jamming schemes. The Experimental results demonstrate that when the jammer ideally knows the received power at the receiver, the proposed method will always have the optimal jamming effects, and the constructed unconventional jamming scheme has an excellent jamming effect compared with normal schemes in the case of a constellation distortion.
Xuanxuan TANG Wendong YANG Yueming CAI Weiwei YANG Yuyang ZHANG Xiaoli SUN Yufeng QIAN
This paper studies the secrecy throughput performance of the three-node wireless-powered networks and proposes two secure transmission schemes, namely the half-duplex maximal ratio combining (HD&MRC) scheme and the full-duplex jamming scheme based on time switching simultaneous wireless information and power transfer (FDJ&TS-SWIPT). The closed-form expressions of the secrecy throughput are derived, and intuitive comparison of the two schemes is provided. It is illustrated that the HD&MRC scheme only applies to the low and medium signal-to-noise ratio (SNR) regime. On the contrary, the suitable SNR regime of the FDJ&TS-SWIPT is much wider. It is depicted that FDJ&TS-SWIPT combing with current passive self-interference cancellation (SIC) algorithm outperforms HD&MRC significantly, especially when a medium or high transmit SNR is provided. Numerical simulations are conducted for verifying the validity of the analysis.
This letter considers a legitimate proactive eavesdropping scenario, where a half-duplex legitimate monitor hires a third-party jammer for jamming the suspicious communication to improve the eavesdropping performance. The interaction between the third-party jammer and the monitor is modeled as a Stackelberg game, where the jammer moves first and sets the price for jamming the suspicious communication, and then the legitimate monitor moves subsequently and determines the requested transmit power of the jamming signals. We derive the optimal jamming price and the optimal jamming transmit power. It is shown that the proposed price-based proactive eavesdropping scheme is effective in improving the successful eavesdropping probability compared to the case without jamming. It is also shown that the proposed scheme outperforms the existing full-duplex scheme when the residual self-interference cannot be neglected.
This research addresses improvements in the efficiency of spectrum utilization by defending against jamming attacks and corrupting the communications of the adversary network by executing its own jamming strategy. The proposed scheme, based on game theory, selects the best operational strategy (i.e., communications and jamming strategies) to maximize the successful communications and jamming rates of the network. Moreover, an estimation algorithm is investigated to predict the behavior of the adversary network in order to improve the efficiency of the proposed game theory-based scheme.
Yu Min HWANG Jun Hee JUNG Kwang Yul KIM Yong Sin KIM Jae Seang LEE Yoan SHIN Jin Young KIM
The aim of this letter is to guarantee the ability of low probability of intercept (LPI) and anti-jamming (AJ) by maximizing the energy efficiency (EE) to improve wireless communication survivability and sustain wireless communication in jamming environments. We studied a scenario based on one transceiver pair with a partial-band noise jammer in a Rician fading channel and proposed an EE optimization algorithm to solve the optimization problem. With the proposed EE optimization algorithm, the LPI and AJ can be simultaneously guaranteed while satisfying the constraint of the maximum signal-to-jamming-and-noise ratio and combinatorial subchannel allocation condition, respectively. The results of the simulation indicate that the proposed algorithm is more energy-efficient than those of the baseline schemes and guarantees the LPI and AJ performance in a jamming environment.
Ying-Ren CHIEN Po-Yu CHEN Shih-Hau FANG
Powerful jammers are able to disable consumer-grade global navigation satellite system (GNSS) receivers under normal operating conditions. Conventional anti-jamming techniques based on the time-domain are unable to effectively suppress wide-band interference, such as chirp-like jammer. This paper proposes a novel anti-jamming architecture, combining wavelet packet signal analysis with adaptive filtering theory to mitigate chirp interference. Exploiting the excellent time-frequency resolution of wavelet technologies makes it possible to generate a reference chirp signal, which is basically a “de-noised” jamming signal. The reference jamming signal then is fed into an adaptive predictor to function as a refined jamming signal such that it predicts a replica of the jammer from the received signal. The refined chirp signal is then subtracted from the received signal to realize the aim of anti-jamming. Simulation results demonstrate the effectiveness of the proposed method in combating chirp interference in Galileo receivers. We achieved jamming-to-signal power ratio (JSR) of 50dB with an acquisition probability exceeding 90%, which is superior to many anti-jamming techniques based on the time-domain, such as conventional adaptive notch filters. The proposed method was also implemented in an software-defined GPS receiver for further validation.
Outside wireless signals often obstruct GNSS receivers from acquiring satellite signals. Traditional anti-jamming algorithms are used to suppress interference using a convex optimization method based on minimizing output power. These algorithms can reduce interference. However, these models suppress satellite signals as well as jamming interference. Under the high-dynamic condition, the output signal-to-interference-and-noise ratio (SINR) deteriorates seriously and the success rate in acquiring satellite signals falls accordingly. This paper introduces a novel, broadened model with a no-main-lobe-and-multi-virtual-null-constraints (NMLCB) method based on maximizing output power and constraining interference sources. With the new method, GNSS receivers can receive satellite signals more easily than using the power inversion (PI) and power minimization with derivative constraints null (NB) methods under the high-dynamic condition.
Guangteng FAN Xiaomei TANG Junwei NIE Yangbo HUANG Guangfu SUN
Global navigation satellite system (GNSS) receivers equipped with the frequency domain interference suppression (FDIS) filter can operate in environments with harsh interference. The FDIS will not cause tracking error bias for an ideal analog receiver channel as its magnitude response and phase response are constant. However, the analog receiver channel distortion is induced by RF cables, amplifiers, and mixers. The distortion of the channel caused asymmetry correlation function. The correlation function is further deformed by the FDIS filter. More seriously, since the FDIS filter is adaptive, the bias will vary with the jamming pattern, especially when the frequency of interference is varying. For precision navigation applications, this bias must be mitigated. Fortunately, to prevent power loss, the analog receiver channel filter is a real function or the imaginary part is negligible. Therefore, the magnitude response and the phase response are even functions. Based on these channel features, a new FDIS filter based on mirror frequency amplitude compensation (MFAC) method is proposed in this paper. The amplitude of the symmetry position of the notch frequency is doubled in the MFAC method in order to mitigate the tracking bias. Simulation results show that the MFAC-based FDIS method is capable of reducing the bias error to less than 0.1ns, which is significant smaller than that achieved by the traditional FDIS method.
Haiyan XU Qian TIAN Jianhui WU Fulong JIANG
In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.
Jaemin JEUNG Seungmyeong JEONG JaeSung LIM
We propose a deception mechanism to combat a compromised station in IEEE 802.11 channel hopping systems. A compromised station can follow the hopping channels and continuously attack them, since it recognizes the channel-hopping sequence. The key concept of the deception mechanism is that an access point notifies a new hopping seed but not to the jammer, while a deception station deceives the jammer. Simulations show that the proposed scheme increases network throughput compared to conventional channel hopping schemes when they are under compromised station attacks.
We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.
Yanqiang SUN Xiaodong WANG Xingming ZHOU
Classical jamming attack models in the time domain have been proposed, such as constant jammer, random jammer, and reactive jammer. In this letter, we consider a new problem: given k jammers, how does the attacker minimize the pair-wise connectivity among the nodes in a Wireless Sensor Network (WSN)? We call this problem k-Jammer Deployment Problem (k-JDP). To the best of our knowledge, this is the first attempt at considering the position-critical jamming attack against wireless sensor network. We mainly make three contributions. First, we prove that the decision version of k-JDP is NP-complete even in the ideal situation where the attacker has full knowledge of the topology information of sensor network. Second, we propose a mathematical formulation based on Integer Programming (IP) model which yields an optimal solution. Third, we present a heuristic algorithm HAJDP, and compare it with the IP model. Numerical results show that our heuristic algorithm is computationally efficient.
Jae-Joon LEE Jihye LEE Jaesung LIM
When a jamming attack occurs, existing ad hoc routing protocols can experience significant throughput degradation and unnecessary control overhead due to the inclusion of unreliable links into routing paths. In this work, we identify which factors hinder establishment of reliable routing paths by the existing routing protocols in the face of jamming attacks. Our solution is Jamming-Aware Routing (JAR) based on OLSR protocol, which provides explicit route recovery procedures to counteract jamming attack. By establishing a reliable routing path, the proposed scheme achieves significant throughput gains as well as control overhead reduction.
This paper proposes a lightweight, fast and efficient method for the detection of jamming attacks, interference, and other anomalies in electronic shelf label (ESL) systems and wireless sensor networks (WSNs) with periodic data transmission. The proposed method is based on the thresholding technique, which is applied to selected parameters of traffic and allows discrimination of random failures from anomalies and intrusions. It does not require the installation of additional hardware and does not create extra communication costs; its computational requirements are negligible, since it is based on statistical methods. Herein recommendations are provided for choosing a thresholds type. Extensive simulations, made by Castalia simulator for WSNs, show that the proposed method has superior accuracy compared to existing algorithms.
Jeong Hwan SHIN Jun HEO Seokho YOON Sun Young KIM
This paper presents an interference cancellation and multipath mitigation algorithm for use in Global Positioning System (GPS) with an array antenna. It is shown that interference signals and multipath signals are effectively suppressed using a serial subspace projection method without any knowledge of the incoming directional information. After the subspace projections, a beamformer is used to maximize the SNR of the received signal. The enhancement in the performance is presented in terms of the cross correlation value and beam patterns.
Zdravko M. PONOS Miroslav L. DUKIC
One of the basic GPS features is its inherent anti-jamming (AJ) characteristics based on great processing gain as a result of using direct sequence spread spectrum (DS-SS) technique. For calculated jamming threshold for GPS receivers operating with L1 C/A, L1 P(Y) and L2 P(Y) signals, jamming range has been analyzed with respect to the characteristic jamming signals and under various effective radiated power of jamming signals. The tests of C/A GPS receiver jamming resistance on different jamming strategies, during the tracking and acquisition phase have been performed. The influence of jamming strategy on jamming efficiency has been proved. At the same time AJ characteristics of GPS receiver have been checked.
WooSub BYUN SeongJoon BAEK Koeng-Mo SUNG
In this letter, the bit error probability of a hybrid DS/SFH-SS (Direct-Sequence/Slow-Frequency-Hopped Spread-Spectrum) system is derived for a Nakagami fading channel in the presence of multiple tone jamming. At a low JSR (jamming-to-signal power ratio), a pure DS-SS system can achieve lower bit error probability than a hybrid DS/SFH-SS system. But at a high JSR, a hybrid DS/SFH-SS system is shown to be superior to a pure DS-SS system. Especially, the worst case performance of a hybrid DS/SFH-SS system is almost equal to that of a pure DS-SS system.
This paper presents a new approach to computing symbol error probability of fast frequency-hopped M-ary frequency shift keying (FFH/MFSK) systems with majority vote under multitone jamming. For illustrating the applications, we first consider the case in which the source data rate is fixed and the hopping rate is allowed to vary. In this case, the optimum orders of diversity for several values of M are examined. Results show that M=4 outperforms other values. Then, we treat another case in which the hopping rate is fixed and the data rate is adjusted so as to obtain maximum throughput under a given constraint of error probability. In addition to the case of diversity alone, we also evaluate the performances of the fixed hopping rate case with channel coding using convolutional code and BCH code.