Performance Analysis of Reactive Symbol-Level Jamming Techniques

被引:13
作者
Jang, Han Seung [1 ]
Jung, Bang Chul [2 ]
机构
[1] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
[2] Chungnam Natl Univ, Dept Elect Engn, Daejeon 34134, South Korea
关键词
Reactive symbol-level jamming; bit error rate (BER); channel codes; power control; channel estimation error;
D O I
10.1109/TVT.2018.2877435
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The reactive symbol-level jamming (SLJ) technique is a simple but practical technique to disable or disrupt malicious communication links. After sensing the transmission and detecting the digital modulation scheme of the malicious transmitter, a communication node with the reactive SLJ technique, called a reactive jammer, generates random digital modulation symbols and then sends them to the malicious receiver. In this correspondence, we mathematically analyze both uncoded and coded bit error rate (BER) at the malicious receiver under not only reactive SLJ, but also Gaussian SLJ techniques. In particular, we consider the partial jamming scenario, in which a portion of symbols in a data frame are affected by the SLJ, which is a practical scenario under the reactive jamming techniques. We also consider the effect of imperfect power control and channel estimation error of the reactive jammer on the BER performance at the malicious receiver.
引用
收藏
页码:12432 / 12437
页数:6
相关论文
共 14 条
[1]   Optimal Jamming Against Digital Modulation [J].
Amuru, SaiDhiraj ;
Buehrer, R. Michael .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) :2212-2224
[2]   THE WEIGHT SPECTRA OF SOME SHORT LOW-RATE CONVOLUTIONAL-CODES [J].
CONAN, J .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1984, 32 (09) :1050-1053
[3]   Survey of automatic modulation classification techniques: classical approaches and new trends [J].
Dobre, O. A. ;
Abdi, A. ;
Bar-Ness, Y. ;
Su, W. .
IET COMMUNICATIONS, 2007, 1 (02) :137-156
[4]   LTE/LTE-A Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation [J].
Lichtman, Marc ;
Jover, Roger Piqueras ;
Labib, Mina ;
Rao, Raghunandan ;
Marojevic, Vuk ;
Reed, Jeffrey H. .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :54-61
[5]   A Communications Jamming Taxonomy [J].
Lichtman, Marc ;
Poston, Jeffrey D. ;
Amuru, SaiDhiraj ;
Shahriar, Chowdhury ;
Clancy, T. Charles ;
Buehrer, R. Michael ;
Reed, Jeffrey H. .
IEEE SECURITY & PRIVACY, 2016, 14 (01) :47-54
[6]   Modulation Classification Based on Signal Constellation Diagrams and Deep Learning [J].
Peng, Shengliang ;
Jiang, Hanyu ;
Wang, Huaxia ;
Alwageed, Hathal ;
Zhou, Yu ;
Sebdani, Marjan Mazrouei ;
Yao, Yu-Dong .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (03) :718-727
[7]   Secrecy beyond Encryption: Obfuscating Transmission Signatures in Wireless Communications [J].
Rahbari, Hanif ;
Krunz, Marwan .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :54-+
[8]   CONVOLUTIONAL CODES AND THEIR PERFORMANCE IN COMMUNICATION SYSTEMS [J].
VITERBI, AJ .
IEEE TRANSACTIONS ON COMMUNICATION TECHNOLOGY, 1971, CO19 (05) :751-+
[9]  
Wilhelm M, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P47
[10]   A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [J].
Wu, Yongpeng ;
Khisti, Ashish ;
Xiao, Chengshan ;
Caire, Giuseppe ;
Wong, Kai-Kit ;
Gao, Xiqi .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :679-695