scispace - formally typeset
Journal ArticleDOI

Jamming Resilient Communication Using MIMO Interference Cancellation

Reads0
Chats0
TLDR
A MIMO-based anti-jamming scheme that exploits MIMo interference cancellation and transmit precoding technologies to turn a jammed non-connectivity scenario into an operational network and is implemented using software-defined radios.
Abstract
Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when the targets are communicating, which can be readily implemented using software-defined radios. In this paper, we explore the use of the multi-input multi-output (MIMO) technology to achieve jamming resilient orthogonal frequency-division multiplexing (OFDM) communication. In particular, MIMO interference cancellation treats jamming signals as noise and strategically cancels them out, while transmit precoding adjusts the signal directions to optimize the decoding performance. We first investigate the reactive jamming strategies and their impacts on the MIMO-OFDM receivers. We then present a MIMO-based anti-jamming scheme that exploits MIMO interference cancellation and transmit precoding technologies to turn a jammed non-connectivity scenario into an operational network. We implement our jamming resilient communication scheme using software-defined radios. Our testbed evaluation shows the destructive power of reactive jamming attack, and also validates the efficacy and efficiency of our defense mechanisms in the presence of numerous types of reactive jammers with different jamming signal powers.

read more

Citations
More filters
Journal ArticleDOI

Reinforcement Learning-Based NOMA Power Allocation in the Presence of Smart Jamming

TL;DR: Simulation results show that the proposed reinforcement learning-based power control scheme for the downlink NOMA transmission can significantly increase the sum data rates of users, and thus, the utilities compared with the standard Q-learning-based strategy.
Journal ArticleDOI

Jamming Strategies for Physical Layer Security

TL;DR: This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications and classification from three different perspectives and explains the major related designs in various scenarios.
Journal ArticleDOI

Two-Dimensional Antijamming Mobile Communication Based on Reinforcement Learning

TL;DR: A hotbooting deep Q-network based 2-D mobile communication scheme is proposed that exploits experiences in similar scenarios to reduce the exploration time at the beginning of the game, and applies deep convolutional neural network and macro-action techniques to accelerate learning in dynamic situations.
Journal ArticleDOI

Deep Reinforcement Learning-Enabled Secure Visible Light Communication Against Eavesdropping

TL;DR: Simulation results show that the proposed learning-based VLC beamforming control schemes can significantly decrease the bit error rate of the legitimate receiver and increase the secrecy rate and utility of the anti-eavesdropping MISO VLC system, compared with the benchmark strategy.
Journal ArticleDOI

Jamming-Resistant Receivers for the Massive MIMO Uplink

TL;DR: Interestingly, the proposed jamming-resistant receiver scheme works particularly well under strong jamming attacks, since the improved estimate of the jamming channel outweighs the extra jamming power.
References
More filters
Book

Fundamentals of Wireless Communication

TL;DR: In this paper, the authors propose a multiuser communication architecture for point-to-point wireless networks with additive Gaussian noise detection and estimation in the context of MIMO networks.
Journal ArticleDOI

Denial of service in sensor networks

TL;DR: To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.
Book

Data and Computer Communications

TL;DR: Emphasizing both the fundamental principles as well as the critical role of performance in driving protocol and network design, this book explores in detail all the critical technical areas in data communications, wide-area networking, local area networking, and protocol design.
Proceedings ArticleDOI

The feasibility of launching and detecting jamming attacks in wireless networks

TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Book

Error-Correction Coding for Digital Communications

TL;DR: This paper presents a meta-modelling architecture for Convolutional Code Structure and Viterbi Decoding, and some of the techniques used in this architecture can be applied to Group Codes and Block Codes.
Related Papers (5)