Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMO

Published: 01 December 2017 Publication History

Abstract

We present a method for jamming a time-division duplex link using a transceiver with a large number of antennas. By utilizing beamforming, a jammer with <inline-formula> <tex-math notation="LaTeX">$M$ </tex-math></inline-formula> antennas can degrade the spectral efficiency of the primary link more than conventional omnidirectional jammers under the same power constraint, or perform equally well with approximately <inline-formula> <tex-math notation="LaTeX">$1/M$ </tex-math></inline-formula> of the output power. The jammer operates without any prior knowledge of channels to the legitimate transmitters, or the legitimate signals by relying on channel reciprocity.

References

[1]
T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590–3600, Nov. 2010.
[2]
MAMMOET. The MAMMOET Project, accessed on Jul. 17, 2017. [Online]. Available: https://mammoet-project.eu/
[3]
J. Vieiraet al., “A flexible 100-antenna testbed for massive MIMO,” in Proc. IEEE Globecom Workshops (GC Wkshps), Dec. 2014, pp. 287–293.
[4]
C. Shepardet al., “Argos: Practical many-antenna base stations,” in Proc. 18th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), New York, NY, USA, 2012, pp. 53–64.
[5]
J. H. Reed and M. Lichtman, “Virginia Tech’s response to FirstNet NOI,” Wireless @ Virginia Tech, Blacksburg, VA, USA, Tech. Rep. 120928505-2505-01 RIN 0660-XC002, Nov. 2012.
[6]
M. Lichtman, R. P. Jover, M. Labib, R. Rao, V. Marojevic, and J. H. Reed, “LTE/LTE-A jamming, spoofing, and sniffing: Threat assessment and mitigation,” IEEE Commun. Mag., vol. 54, no. 4, pp. 54–61, Apr. 2016.
[7]
J. A. Volpe, “Vulnerability assessment of the transportation infrastructure relying on GPS,” ResearchGate, Berlin, Germany, Tech. Rep. 00816459, Jan. 2001.
[8]
(Jan. 2002). Regeringen och Regeringskansliet, Göteborg 2001 (SOU 2002:122). [Online]. Available: http://www.regeringen.se/rattsdokument/statens-offentligautredningar/2002/01/sou-2002122/
[9]
T. Song, K. Zhou, and T. Li, “CDMA system design and capacity analysis under disguised jamming,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2487–2498, Nov. 2016.
[10]
Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “MIMO-based jamming resilient communication in wireless networks,” in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Apr./May 2014, pp. 2697–2706.
[11]
Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “Jamming resilient communication using MIMO interference cancellation,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 7, pp. 1486–1499, Jul. 2016.
[12]
T. Basar, “The Gaussian test channel with an intelligent jammer,” IEEE Trans. Inf. Theory, vol. 29, no. 1, pp. 152–157, Jan. 1983.
[13]
E. A. Jorswieck, H. Boche, and M. Weckerle, “Optimal transmitter and jamming strategies in Gaussian MIMO channels,” in Proc. IEEE 61st Veh. Technol. Conf., vol. 2. May/Jun. 2005, pp. 978–982.
[14]
M. Lichtmanet al., “A communications jamming taxonomy,” IEEE Security Privacy, vol. 14, no. 1, pp. 47–54, Jan. 2016.
[15]
A. Bayesteh, M. Ansari, and A. K. Khandani, “Effect of jamming on the capacity of MIMO channels,” in Proc. 42nd Annu. Allerton Conf. Commun., Control Comput., 2004.
[16]
Q. Liu, M. Li, X. Kong, and N. Zhao, “Disrupting MIMO communications with optimal jamming signal design,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5313–5325, Oct. 2015.
[17]
S. Sodagari and T. C. Clancy, “Efficient jamming attacks on MIMO channels,” in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 852–856.
[18]
C. Shahriar, S. Sodagari, and T. C. Clancy, “Performance of pilot jamming on MIMO channels with imperfect synchronization,” in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 898–902.
[19]
R. Miller and W. Trappe, “On the vulnerabilities of CSI in MIMO wireless communication systems,” IEEE Trans. Mobile Comput., vol. 11, no. 8, pp. 1386–1398, Aug. 2012.
[20]
A. Kashyap, T. Basar, and R. Srikant, “Correlated jamming on MIMO Gaussian fading channels,” IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119–2123, Sep. 2004.
[21]
V. S. S. Nadendla, V. Sharma, and P. K. Varshney, “On strategic multi-antenna jamming in centralized detection networks,” IEEE Signal Process. Lett., vol. 24, no. 2, pp. 186–190, Feb. 2017.
[22]
D. J. Bachmann, R. J. Evans, and B. Moran, “Game theoretic analysis of adaptive radar jamming,” IEEE Trans. Aerosp. Electron. Syst., vol. 47, no. 2, pp. 1081–1100, Apr. 2011.
[23]
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in wireless networks with incomplete information,” IEEE Commun. Mag., vol. 49, no. 8, pp. 112–118, Aug. 2011.
[24]
D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 21–27, Jun. 2015.
[25]
J. Zhu, R. Schober, and V. K. Bhargava, “Secure transmission in multicell massive MIMO systems,” IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766–4781, Sep. 2014.
[26]
J. Vinogradova, E. Björnson, and E. G. Larsson, “Detection and mitigation of jamming attacks in massive MIMO systems using random matrix theory,” in Proc. IEEE 17th Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Jul. 2016, pp. 1–5.
[27]
Y. O. Basciftci, C. E. Koksal, and A. Ashikhmin, “Securing massive MIMO at the physical layer,” in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), Sep. 2015, pp. 272–280.
[28]
H. Pirzadeh, S. M. Razavizadeh, and E. Björnson, “Subverting massive MIMO by smart jamming,” IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 20–23, Feb. 2016.
[29]
M. R. D. Rodrigues and G. Ramos, “On multiple-input multiple-output Gaussian channels with arbitrary inputs subject to jamming,” in Proc. IEEE Int. Symp. Inf. Theory, Jun./Jul. 2009, pp. 2512–2516.
[30]
X. Zhou, D. Niyato, and A. Hjorungnes, “Optimizing training-based transmission against smart jamming,” IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2644–2655, Jul. 2011.
[31]
S. Shafiee and S. Ulukus, “Capacity of multiple access channels with correlated jamming,” in Proc. IEEE Military Commun. Conf. (MILCOM), vol. 1. Oct. 2005, pp. 218–224.
[32]
M. Karlsson and E. G. Larsson, “Massive MIMO as a cyber-weapon,” in Proc. 48th Asilomar Conf. Signals, Syst. Comput., Nov. 2014, pp. 661–665.
[33]
ETS Institute, document TR 102 300-3, Jun. 2009.
[34]
D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.: Cambridge Univ. Press, 2005.
[35]
S. Amuru and R. M. Buehrer, “Optimal jamming against digital modulation,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2212–2224, Oct. 2015.
[36]
S. M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory, vol. 2, 1st ed. Englewood Cliffs, NJ, USA: Prentice-Hall, Feb. 1998.
[37]
T. W. Anderson, “Asymptotic theory for principal component analysis,” Ann. Math. Statist., vol. 34, no. 1, pp. 122–148, Mar. 1963.
[38]
M. T. Heath, Scientific Computing: An Introductory Survey, 2nd ed. New York, NY, USA: McGraw-Hill, 2005.
[39]
B. Hassibi and B. M. Hochwald, “How much training is needed in multiple-antenna wireless links?” IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 951–963, Apr. 2003.
[40]
S. Kritchman and B. Nadler, “Non-parametric detection of the number of signals: Hypothesis testing and random matrix theory,” IEEE Trans. Signal Process., vol. 57, no. 10, pp. 3930–3941, Oct. 2009.
[41]
H. Arslan and T. Yucek, “Delay spread estimation for wireless communication systems,” in Proc. 8th IEEE Symp. Comput. Commun. (ISCC), vol. 1.Jul. 2003, pp. 282–287.

Cited By

View all
  • (2024)Smart Jamming Using Reconfigurable Intelligent Surface: Asymptotic Analysis and OptimizationIEEE Transactions on Wireless Communications10.1109/TWC.2023.328097523:1(637-651)Online publication date: 1-Jan-2024
  • (2022)Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.314914517(628-643)Online publication date: 1-Jan-2022
  • (2022)Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackersWireless Networks10.1007/s11276-022-03144-029:1(403-412)Online publication date: 25-Sep-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 12, Issue 12
Dec. 2017
294 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2017

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Smart Jamming Using Reconfigurable Intelligent Surface: Asymptotic Analysis and OptimizationIEEE Transactions on Wireless Communications10.1109/TWC.2023.328097523:1(637-651)Online publication date: 1-Jan-2024
  • (2022)Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.314914517(628-643)Online publication date: 1-Jan-2022
  • (2022)Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackersWireless Networks10.1007/s11276-022-03144-029:1(403-412)Online publication date: 25-Sep-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media