Jammers

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 155676 Experts worldwide ranked by ideXlab platform

Zhu Han - One of the best experts on this subject based on the ideXlab platform.

  • "Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks.
    arXiv: Signal Processing, 2019
    Co-Authors: Dinh Thai Hoang, Mohammad Abu Alsheikh, Shimin Gong, Diep N. Nguyen, Eryk Dutkiewicz, Dusit Niyato, Zhu Han
    Abstract:

    In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive Jammers by leveraging their own jamming signals. More specifically, by stimulating the jammer to attack the channel through transmitting fake transmissions, the IoT system can not only undermine the jammer's power, but also harvest energy or utilize jamming signals as a communication means to transmit data through using RF energy harvesting and ambient backscatter techniques, respectively. Furthermore, we develop a low-cost deep reinforcement learning framework that enables the hardware-constrained IoT device to quickly obtain an optimal defense policy without requiring any information about the jammer in advance. Simulation results reveal that our proposed framework can not only be very effective in defeating reactive jamming attacks, but also leverage jammer's power to enhance system performance for the IoT network.

  • secure transmission in misome wiretap channel with multiple assisting Jammers maximum secrecy rate and optimal power allocation
    IEEE Transactions on Communications, 2017
    Co-Authors: Xiaofeng Tao, Zhu Han
    Abstract:

    This paper investigates the secrecy rate maximization problem for the multiple-input-single-output multiple-antenna-eavesdropper (MISOME) wiretap channel with multiple randomly located Jammers. The multi-antenna base station (BS) transmits information signals along with artificial noise (AN) to disturb the eavesdropper. Moreover, the friendly Jammers are properly selected to assist the legitimate link for better secure transmission with some payoffs. With this system model, we first formulate a Stackelberg game between the BS and the assisting Jammers with full channel state information. Stackelberg equilibriums, including optimal fraction of transmit power for AN, optimal transmit power, and asking prices of assisting Jammers, are first proved to exist and then analytically derived. A policy iterative algorithm is also proposed to obtain the optimal solutions. We then extend the Stackelberg game to the case of MISOME broadcast wiretap channel with channel distribution information of eavesdropper. Numerical results verify the accuracy of the derived results and the efficiency of the proposed algorithm. The results reveal that the proposed jammer-assisted secure transmission can greatly improve the secrecy performance and meanwhile save more energy for information signals, which is significant for future wireless communication.

  • distributed coalition formation of relay and friendly Jammers for secure cooperative networks
    International Conference on Communications, 2011
    Co-Authors: Rongqing Zhang, Zhu Han, Lingyang Song, Bingli Jiao
    Abstract:

    In this paper, we investigate cooperation of conventional relays and friendly Jammers subject to secrecy constraints for cooperative networks consisting of one source node, one corresponding destination node, one malicious eavesdropper node, and several intermediate nodes. In order to obtain a higher secrecy rate, the source selects one conventional relay and several friendly Jammers from the intermediate nodes to assist message transmission, and in return, it needs to make a payment. Each intermediate node here has two possible identities to choose, i.e., to be a conventional relay or a friendly jammer, which results in a direct impact on the final utility of the intermediate node. After the intermediate nodes determine their identities, they seek to find optimal partners forming coalitions, which improves their chances to be selected by the source and thus to obtain the payoffs in the end. We formulate this cooperation as a coalitional game with transferable utility and also study its properties. Furthermore, we define a Max-Pareto order for comparison of the coalition value, based on which we employ the merge-and-split rules. We also construct a distributed merge-and-split coalition formation algorithm for the defined coalition formation game. The simulation results verify the efficiency of the proposed coalition formation algorithm.

Hui-ming Wang - One of the best experts on this subject based on the ideXlab platform.

  • opportunistic jamming for enhancing security stochastic geometry modeling and analysis
    IEEE Transactions on Vehicular Technology, 2016
    Co-Authors: Chunxiang Wang, Hui-ming Wang
    Abstract:

    This correspondence studies the secrecy commu- nication of the single-input single-output multi-eavesdropper (SISOME) channel with multiple single-antenna Jammers, where the Jammers and eavesdroppers are distributed according to the independent two-dimensional homogeneous Poisson point process (PPP). For enhancing the physical layer security, we propose an opportunistic multiple jammer selection scheme, where the Jammers whose channel gains to the legitimate receiver less than a threshold, are selected to transmit independent and identically distributed (i.i.d.) Gaussian jamming signals to confound the eavesdroppers. We characterize the secrecy throughput achieved by our proposed jammer selection scheme, and show that the secrecy throughput is a quasi-concave function of the selection threshold. Index Terms—Secrecy communication, SISOME, Poisson point process, jammer selection, secrecy throughput.

  • Opportunistic Jamming for Enhancing Security: Stochastic Geometry Modeling and Analysis
    IEEE Transactions on Vehicular Technology, 2016
    Co-Authors: Chen Wang, Huahui Wang, Chao Wang, Hui-ming Wang
    Abstract:

    This correspondence studies the secrecy communication of the single-input single-output multi-eavesdropper (SISOME) channel with multiple single-antenna Jammers, where the Jammers and eavesdroppers are distributed according to the independent two-dimensional homogeneous Poisson point process (PPP). For enhancing the physical layer security, we propose an opportunistic multiple jammer selection scheme, where the Jammers whose channel gains to the legitimate receiver less than a threshold, are selected to transmit independent and identically distributed (\emph{i.i.d.}) Gaussian jamming signals to confound the eavesdroppers. We characterize the secrecy throughput achieved by our proposed jammer selection scheme, and show that the secrecy throughput is a quasi-concave function of the selection threshold.

  • Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
    IEEE Transactions on Wireless Communications, 2015
    Co-Authors: Chao Wang, Huahui Wang, Xiang-gen Xia, Hui-ming Wang, Chaowen Liu
    Abstract:

    This paper studies a single-input multi-output multi-eavesdropper (SIMOME) wiretap channel with multiple friendly single-antenna Jammers. We consider random networks where the Jammers and the eavesdroppers are distributed according to independent two-dimensional homogeneous Poisson point processes (PPP). We propose an opportunistic jammer selection scheme for the physical layer security enhancement, where the Jammers whose channels are nearly orthogonal to the channel direction information (CDI) of the legitimate channel are selected to transmit independent and identically distributed (i.i.d.) Gaussian jamming signals to confound the eavesdroppers. The proposed scheme does not require a centralized design and signal coordinations among multiple Jammers are not needed anymore. Furthermore, we analyze both the achievable secrecy throughput and the ergodic secrecy rate of the proposed jammer selection scheme. Based on the analysis results, we optimize the selection threshold for the secrecy throughput maximization and ergodic secrecy rate maximization. Simulation results show that the proposed jammer selection scheme can achieve a substantial performance gain.

Qingyang Sun - One of the best experts on this subject based on the ideXlab platform.

  • effective moving target deception jamming against multichannel sar gmti based on multiple Jammers
    IEEE Geoscience and Remote Sensing Letters, 2020
    Co-Authors: Qingyang Sun, Ting Shu, Mang Tang
    Abstract:

    This letter presents a novel scheme for moving target deception jamming (MTDJ) against multichannel synthetic aperture radar (SAR)-ground moving target indication (GMTI) based on multiple Jammers. The multichannel SAR signal models for the real and false moving targets are established first. Then, the proposed MTDJ method based on multiple Jammers is derived according to the principle that the interferometric phase matches the across-track velocity of the moving target. To ensure efficient deception jamming and to resolve the accurate scattering coefficient modulated in each jammer, the interferometric phase of the false moving target is decomposed into two parts, one is the term that matches the across-track velocity, while the other is the additional term generated by each jammer. Hence, the expected modulation coefficient in each jammer can be determined based on the additional interference phase cancellation. Finally, the proposed MTDJ is realized by generating the jamming signals in each jammer via the efficient deception jamming technique. The simulation results demonstrate the effectiveness of the proposed MTDJ method.

  • a novel deceptive jamming method against two channel sar gmti based on two Jammers
    IEEE Sensors Journal, 2019
    Co-Authors: Qingyang Sun, Ting Shu
    Abstract:

    The traditional synthetic aperture radar (SAR) deceptive jamming can effectively create false static and moving targets in the SAR image. However, the deceptive capability could be significantly reduced or denied by the two-channel SAR-ground moving target indication (GMTI) system. To achieve the effective deception, the impact of SAR deceptive jamming against two-channel SAR-GMTI system is first analyzed. Then, a novel effective deceptive jamming method based on two Jammers is described. Using this method, the two stationary Jammers are made to be located at different positions along the azimuth direction. By applying the complex modulation in each jammer, the additional phase term of the synthetic jamming signals in the two coregistered SAR images is canceled. It is shown that the expected modulation coefficient for each jammer can be precisely calculated by solving a linear system of equations of two unknowns. Finally, the proposed deceptive jamming against the two-channel SAR-GMTI system is achieved by generating the jamming signal in each jammer via the efficient deceptive jamming technique. By utilizing the optimal layout of the Jammers, this scheme is both robust and computationally efficient. It will generate false static and moving targets with high fidelity in the two SAR images. Only the false moving targets can be detected by the displaced phase center antenna (DPCA) and then relocated to the correct positions by along-track interferometry (ATI) in the two-channel SAR-GMTI system. Some simulations are provided to demonstrate the effectiveness of the proposed method.

Dinh Thai Hoang - One of the best experts on this subject based on the ideXlab platform.

  • Defeating Smart and Reactive Jammers with Unlimited Power
    2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020
    Co-Authors: Nguyen Van Huynh, Diep N. Nguyen, Dinh Thai Hoang, Eryk Dutkiewicz, Markus Mueck
    Abstract:

    Among all wireless Jammers, dealing with reactive ones is most challenging. This kind of jammer attacks the channel whenever it detects transmission from legitimate radios. With recent advances in self-interference suppression or in-band full-duplex radios, a reactive jammer can jam and simultaneously sense/discern/detect the legitimate transmission. Such a jammer is referred to as a smart reactive jammer. However, all existing solutions, e.g., frequency hopping and rate adaptation, cannot effectively deal with this type of jammer. This is because a smart reactive jammer with sufficient power budget can theoretically jam most, if not all, frequency channels at sufficiently high power. This work proposes to augment the transmitter with an ambient backscatter tag. Specifically, when the jammer attacks the channel, the transmitter deceives it by continuing to transmit data to attract the jammer while the tag backscatters data based on both the jamming signals and active signals from the jammer and transmitter, respectively. However, backscattering signals from multiple radio sources results in a high bit error rate (BER). Thus, we propose to use multiple antennas at the receiver. The theoretical analysis and simulation results show that by using multiple antennas at the receiver, the BER and hence the throughput of the system can be significantly improved. More importantly, we demonstrate that with our proposed solutions, the average throughput increases and the BER decreases when the jammer attacks with higher power levels. We believe that this is the first anti-jamming solution that can cope effectively with a high- or even unlimited-power Jammers.

  • "Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks.
    arXiv: Signal Processing, 2019
    Co-Authors: Dinh Thai Hoang, Mohammad Abu Alsheikh, Shimin Gong, Diep N. Nguyen, Eryk Dutkiewicz, Dusit Niyato, Zhu Han
    Abstract:

    In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks. Our proposed strategy allows resource-constrained IoT devices to be able to defeat powerful reactive Jammers by leveraging their own jamming signals. More specifically, by stimulating the jammer to attack the channel through transmitting fake transmissions, the IoT system can not only undermine the jammer's power, but also harvest energy or utilize jamming signals as a communication means to transmit data through using RF energy harvesting and ambient backscatter techniques, respectively. Furthermore, we develop a low-cost deep reinforcement learning framework that enables the hardware-constrained IoT device to quickly obtain an optimal defense policy without requiring any information about the jammer in advance. Simulation results reveal that our proposed framework can not only be very effective in defeating reactive jamming attacks, but also leverage jammer's power to enhance system performance for the IoT network.

Ting Shu - One of the best experts on this subject based on the ideXlab platform.

  • effective moving target deception jamming against multichannel sar gmti based on multiple Jammers
    IEEE Geoscience and Remote Sensing Letters, 2020
    Co-Authors: Qingyang Sun, Ting Shu, Mang Tang
    Abstract:

    This letter presents a novel scheme for moving target deception jamming (MTDJ) against multichannel synthetic aperture radar (SAR)-ground moving target indication (GMTI) based on multiple Jammers. The multichannel SAR signal models for the real and false moving targets are established first. Then, the proposed MTDJ method based on multiple Jammers is derived according to the principle that the interferometric phase matches the across-track velocity of the moving target. To ensure efficient deception jamming and to resolve the accurate scattering coefficient modulated in each jammer, the interferometric phase of the false moving target is decomposed into two parts, one is the term that matches the across-track velocity, while the other is the additional term generated by each jammer. Hence, the expected modulation coefficient in each jammer can be determined based on the additional interference phase cancellation. Finally, the proposed MTDJ is realized by generating the jamming signals in each jammer via the efficient deception jamming technique. The simulation results demonstrate the effectiveness of the proposed MTDJ method.

  • a novel deceptive jamming method against two channel sar gmti based on two Jammers
    IEEE Sensors Journal, 2019
    Co-Authors: Qingyang Sun, Ting Shu
    Abstract:

    The traditional synthetic aperture radar (SAR) deceptive jamming can effectively create false static and moving targets in the SAR image. However, the deceptive capability could be significantly reduced or denied by the two-channel SAR-ground moving target indication (GMTI) system. To achieve the effective deception, the impact of SAR deceptive jamming against two-channel SAR-GMTI system is first analyzed. Then, a novel effective deceptive jamming method based on two Jammers is described. Using this method, the two stationary Jammers are made to be located at different positions along the azimuth direction. By applying the complex modulation in each jammer, the additional phase term of the synthetic jamming signals in the two coregistered SAR images is canceled. It is shown that the expected modulation coefficient for each jammer can be precisely calculated by solving a linear system of equations of two unknowns. Finally, the proposed deceptive jamming against the two-channel SAR-GMTI system is achieved by generating the jamming signal in each jammer via the efficient deceptive jamming technique. By utilizing the optimal layout of the Jammers, this scheme is both robust and computationally efficient. It will generate false static and moving targets with high fidelity in the two SAR images. Only the false moving targets can be detected by the displaced phase center antenna (DPCA) and then relocated to the correct positions by along-track interferometry (ATI) in the two-channel SAR-GMTI system. Some simulations are provided to demonstrate the effectiveness of the proposed method.