• Title/Summary/Keyword: Cooperative jamming

Search Result 15, Processing Time 0.023 seconds

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

A Cooperative Smart Jamming Attack in Internet of Things Networks

  • Al Sharah, Ashraf;Owida, Hamza Abu;Edwan, Talal A.;Alnaimat, Feras
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.250-258
    • /
    • 2022
  • The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

A Study of Test and Evaluation Method for Performance Improvement of Air to Ground Communication Radios (공지통신무전기 성능개량을 위한 시험평가 방안 연구)

  • Lee, Byeongheon;Ahn, Seungbeom;Choi, Myungsuk;Hur, Jang-Wok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.267-274
    • /
    • 2022
  • The Republic of Korea has a close cooperative relationship with NATO, of which the United States is a member. NATO is encouraged to follow UHF coalition waveforms for military air operations(SATURN) as defined in STANAG 4372. SATURN is a high-speed frequency hopping waveform with enhanced anti-jamming and security functions. Plans to improve the performance of existing military aircraft with air to ground radios to which SATURN function is applied. IFF case analysis and MRT evaluation plan were established to present an efficient test and evaluation plan for air to ground radios.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Exclusion zones for GNSS signals when reconfiguring receiver hardware in the presence of narrowband RFI

  • Balaei, Asghar T.;Dempster, Andrew G.;Barnes, Joel
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.347-352
    • /
    • 2006
  • Narrowband interference can severely degrade the performance of GPS receivers. Detecting the presence of interference and then characterizing it can lead to its removal. Receivers can be reconfigured to focus on other signals or satellites that are less vulnerable to that interference at that moment. Using hardware reconfigurability of FPGA receivers and characterizing the effect of narrowband interference on the GNSS signal quality lead us to a new RFI mitigation technique in which the highest quality and less vulnerable signal can be chosen at each moment. In the previous work [1], the post processing capability of a software GPS receiver, has been used to detect and characterize the CW interference. This is achieved by passing the GPS signal and the interference through the correlator. Then, using the conventional definition of C/No as the squared mean of the correlator output divided by its variance, the actual C/No for each satellite is calculated. In this work, first the 'Exclusion zone' for each satellite signal has been defined and then by using some experiments the effects of different parameters like signal power, jamming power and the environmental noise power on the Exclusion zone have been analyzed. By monitoring the Doppler frequency of each satellite and using the actual C/No of each satellite using the traditional definition of C/No and actual data from a software GPS receiver, the decision to reconfigure the receiver to other signal can be made.

  • PDF