A Reassessment on Friendly Jamming Efficiency

被引:6
作者
Jin, Rong [1 ]
Zeng, Kai [2 ]
Zhang, Kai [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
[2] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[3] Beijing Beike Technol Co, Beijing, Peoples R China
基金
美国国家科学基金会;
关键词
Friendly jamming; reassessment; time-frequency analysis; symbol level; non-stationary; secrecy capacity; jamming efficiency; waveform design;
D O I
10.1109/TMC.2019.2940941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid and continuous growth of various types of wireless devices in IoT, securing the communications among heterogeneous devices becomes an emerging issue. A physical layer security scheme, called "friendly jamming", has drawn great attention recently owing to its ability to protect the confidentiality of the communication as well as to enable message authentication and access control for those already employed, unencrypted, weakly encrypted, or resource constrained devices. We notice that in a large number of cases in which friendly jamming are preferable, the transmitting signals to be protected have varying spectrum utilization at symbol level. In this paper, we rebuild secrecy capacity models and re-evaluate the jamming efficiency by taking this micro time scale non-stationary characteristic into consideration. Our reassessments reveal that jamming efficiency is greatly overestimated in the existing literature. The second part of our work further proposes a waveform design on jamming signal as a means to enhance the jamming efficiency. The basic idea is to consider both time and frequency domain structure of the transmitting signal when designing the jamming signal, making both time and frequency bandwidth largely match to each other. We discuss the implementation details for jamming common QAM and PSK modulated signals. Both simulations and proof-of-concept experiments validate the theoretical correctness of our reassessment and practical effectiveness of our method.
引用
收藏
页码:32 / 47
页数:16
相关论文
共 38 条
[21]   A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control [J].
Kim, Yu Seung ;
Tague, Patrick ;
Lee, Heejo ;
Kim, Hyogon .
WIRELESS NETWORKS, 2015, 21 (08) :2631-2647
[22]   TIME, CLOCKS, AND ORDERING OF EVENTS IN A DISTRIBUTED SYSTEM [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1978, 21 (07) :558-565
[23]   On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks [J].
Li, Xuran ;
Dai, Hong-Ning ;
Wang, Hao ;
Xiao, Hong .
SENSORS, 2016, 16 (12)
[24]  
Mostafa A, 2014, IEEE GLOBE WORK, P524, DOI 10.1109/GLOCOMW.2014.7063485
[25]   Denial of Service Attacks in Wireless Networks: The Case of Jammers [J].
Pelechrinis, Konstantinos ;
Iliofotou, Marios ;
Krishnamurthy, Srikanth V. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (02) :245-257
[26]  
Proakis J. G., 2008, DIGITAL COMMUN, V73, P3
[27]  
Sarma S., 2015, OPTIMAL POWER ALLOCA
[28]  
Sejdic E., 2009, TIME FREQUENCY FEATU
[29]   Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach [J].
Siyari, Peyman ;
Krunz, Marwan ;
Nguyen, Diep N. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) :601-614
[30]  
Soltani R, 2014, ANN ALLERTON CONF, P1078, DOI 10.1109/ALLERTON.2014.7028575