Detection of Stealthy Jamming for UAV-Assisted Wireless Communications: An HMM-Based Method

被引:9
作者
Zhang, Chen [1 ]
Zhang, Leyi [1 ]
Mao, Tianqi [1 ]
Xiao, Zhenyu [1 ]
Han, Zhu [2 ]
Xia, Xiang-Gen [3 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[3] Univ Delaware, Dept Elect & Comp Engn, Newark, NJ 19716 USA
关键词
Jamming; Hidden Markov models; Wireless communication; Testing; Authentication; Training data; Monitoring; Communication security; unmanned aerial vehicle; Index Terms; jamming detection; hidden Markov model; hypothesis test; PHYSICAL-LAYER; COGNITIVE RADIO; PHY-LAYER; AUTHENTICATION; NETWORKS; SECURITY; ALLOCATION; ATTACK;
D O I
10.1109/TCCN.2023.3244539
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels, unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless communications. However, the broadcasting nature of wireless communication networks makes the electromagnetic spectrum vulnerable to jamming attacks. To ensure communication security, this paper investigates the jamming detection issue for UAV-assisted wireless communications. Different from the existing works, we consider detection of stealthy jamming with no prior knowledge of legitimate users or channel statistics, which makes the detection more challenging. To solve this problem, we design a hidden Markov model (HMM) based jamming detection (HBJD) method. First, we process the received signals with a sliding window to calculate the logarithmic received energy and use HMM to model the signal transmission under a jamming attack. Specifically, the spectrum state and logarithmic received energy are modeled as the hidden state and observable variable of HMM. Then, the Expectation-Maximization (EM) algorithm is applied to estimate the parameters of HMM. With the estimated parameters, the spectrum state of each logarithmic received energy sample can be decided according to the maximum posterior probability (MAP) criterion. Finally, we design the test statistics and derive the threshold based on the estimated HMM parameters for the final decision. Simulation results demonstrate the superiority of the proposed solution for the detection of stealthy jamming without prior knowledge of legitimate users or the channel statistics.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 47 条
[1]   A Recursive Algorithm for Wideband Temporal Spectrum Sensing [J].
Bruno, Joseph M. ;
Mark, Brian L. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (01) :26-38
[2]   Joint Power Allocation and Placement Scheme for UAV-Assisted IoT With QoS Guarantee [J].
Chen, Ruirui ;
Sun, Yanjing ;
Liang, Liping ;
Cheng, Wenchi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (01) :1066-1071
[3]   UAV-Assisted Data Collection With Nonorthogonal Multiple Access [J].
Chen, Weichao ;
Zhao, Shengjie ;
Zhang, Rongqing ;
Chen, Yi ;
Yang, Liuqing .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) :501-511
[4]   Predicting Spectrum Occupancies Using a Non-Stationary Hidden Markov Model [J].
Chen, Xianfu ;
Zhang, Honggang ;
MacKenzie, Allen B. ;
Matinmikko, Marja .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (04) :333-336
[5]  
DeBruhl Bruce, 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), P496, DOI 10.1109/SAHCN.2013.6645021
[6]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[7]  
Han Z., 2010, EURASIP J WIREL COMM, P1
[8]   HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing [J].
He, Xiaofan ;
Dai, Huaiyu ;
Ning, Peng .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (11) :2196-2208
[9]   Design of Anti-Jamming Waveforms for Time-Hopping Spread Spectrum Systems in Tone Jamming Environments [J].
Jung, Hyoyoung ;
Binh Van Nguyen ;
Song, Iickho ;
Kim, Kiseon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) :728-737
[10]   DL-Based Anomaly Detection at the Physical-Layer of Cognitive Radio by Deep Support Vector Data Description [J].
Kang, Ying ;
Wu, Hao ;
Zhao, Zhihua ;
Li, Yaxing ;
Meng, Jin .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) :1689-1705