Detection of Stealthy Jamming for UAV-Assisted Wireless Communications: An HMM-Based Method

被引:9
作者
Zhang, Chen [1 ]
Zhang, Leyi [1 ]
Mao, Tianqi [1 ]
Xiao, Zhenyu [1 ]
Han, Zhu [2 ]
Xia, Xiang-Gen [3 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[3] Univ Delaware, Dept Elect & Comp Engn, Newark, NJ 19716 USA
关键词
Jamming; Hidden Markov models; Wireless communication; Testing; Authentication; Training data; Monitoring; Communication security; unmanned aerial vehicle; Index Terms; jamming detection; hidden Markov model; hypothesis test; PHYSICAL-LAYER; COGNITIVE RADIO; PHY-LAYER; AUTHENTICATION; NETWORKS; SECURITY; ALLOCATION; ATTACK;
D O I
10.1109/TCCN.2023.3244539
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Due to the high mobility, low cost and high robustness of line-of-sight (LoS) channels, unmanned aerial vehicles (UAVs) have begun to play an important role in assisting wireless communications. However, the broadcasting nature of wireless communication networks makes the electromagnetic spectrum vulnerable to jamming attacks. To ensure communication security, this paper investigates the jamming detection issue for UAV-assisted wireless communications. Different from the existing works, we consider detection of stealthy jamming with no prior knowledge of legitimate users or channel statistics, which makes the detection more challenging. To solve this problem, we design a hidden Markov model (HMM) based jamming detection (HBJD) method. First, we process the received signals with a sliding window to calculate the logarithmic received energy and use HMM to model the signal transmission under a jamming attack. Specifically, the spectrum state and logarithmic received energy are modeled as the hidden state and observable variable of HMM. Then, the Expectation-Maximization (EM) algorithm is applied to estimate the parameters of HMM. With the estimated parameters, the spectrum state of each logarithmic received energy sample can be decided according to the maximum posterior probability (MAP) criterion. Finally, we design the test statistics and derive the threshold based on the estimated HMM parameters for the final decision. Simulation results demonstrate the superiority of the proposed solution for the detection of stealthy jamming without prior knowledge of legitimate users or the channel statistics.
引用
收藏
页码:779 / 793
页数:15
相关论文
共 47 条
[11]   Self-Learning Bayesian Generative Models for Jammer Detection in Cognitive-UAV-Radios [J].
Krayani, Ali ;
Baydoun, Mohamad ;
Marcenaro, Lucio ;
Alam, Atm S. ;
Regazzoni, Carlo .
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
[12]   PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement [J].
Kumar, Vireshwar ;
Park, Jung-Min ;
Bian, Kaigui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :1027-1038
[13]   Symbiotic Radio: Cognitive Backscattering Communications for Future Wireless Networks [J].
Liang, Ying-Chang ;
Zhang, Qianqian ;
Larsson, Erik G. ;
Li, Geoffrey Ye .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (04) :1242-1255
[14]  
Lijun Qian, 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P1026, DOI 10.1109/ICCNC.2013.6504232
[15]   Detecting anomalous spectrum usage in dynamic spectrum access networks [J].
Liu, Song ;
Greenstein, Larry J. ;
Trappe, Wade ;
Chen, Yingying .
AD HOC NETWORKS, 2012, 10 (05) :831-844
[16]   Resource Allocation and 3-D Placement for UAV-Enabled Energy-Efficient IoT Communications [J].
Liu, Yanming ;
Liu, Kai ;
Han, Jinglin ;
Zhu, Lipeng ;
Xiao, Zhenyu ;
Xia, Xiang-Gen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) :1322-1333
[17]   A Survey on Rapidly Deployable Solutions for Post-Disaster Networks [J].
Miranda, Karen ;
Molinaro, Antonella ;
Razafindralambo, Tahiry .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :117-123
[18]   Security and Enforcement in Spectrum Sharing [J].
Park, Jung-Min ;
Reed, Jeffrey H. ;
Beex, A. A. ;
Clancy, T. Charles ;
Kumar, Vireshwar ;
Bahrak, Behnam .
PROCEEDINGS OF THE IEEE, 2014, 102 (03) :270-281
[19]   Denial of Service Attacks in Wireless Networks: The Case of Jammers [J].
Pelechrinis, Konstantinos ;
Iliofotou, Marios ;
Krishnamurthy, Srikanth V. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (02) :245-257
[20]  
Poor H.V., 1998, INTRO SIGNAL DETECTI