Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Worst-Case Jamming on MIMO Gaussian Channels

Published: 01 November 2015 Publication History

Abstract

Worst-case jamming of legitimate communications over multiple-input multiple-output Gaussian channels is studied in this paper. A worst-case scenario with a `smart' jammer that knows all channels and the transmitter's strategy and is only power limited is considered. It is shown that the simplification of the system model by neglecting the properties of the jamming channel leads to a loss of important insights regarding the effects of the jamming power and jamming channel on optimal jamming strategies of the jammer. Without neglecting the jamming channel, a lower-bound on the rate of legitimate communication subject to jamming is derived, and conditions for this bound to be positive are given. The lower-bound rate can be achieved regardless of the quality of the jamming channel, the power limit of the jammer, and the transmit strategy of the jammer. Moreover, general forms of an optimal jamming strategy, on the basis of which insights into the effect of jamming power and jamming channel are exposed, are given. It is shown that the general forms can lead to closed-form optimal jamming solutions when the power limit of the jammer is larger than a threshold. Subsequently, the scenario in which the effect of jamming dominates the effect of noise (the case of practical interest) is considered, and an optimal jamming strategy is derived in closed-form. Simulation examples demonstrate lower-bound rates, performance of the derived jamming strategy, and an effect of inaccurate channel information on the jamming strategy.

References

[1]
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, “Security in vehicular ad hoc networks,” in IEEE Commun. Mag., vol. 46, no. 4, pp. 88–95, Apr. 2008.
[2]
C. Pöpper, M. Strasser, and S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques,” in IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 703–715, Jun. 2010.
[3]
A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, “On the resilience of wireless multiuser networks to passive and active eavesdroppers,” in IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1850–1863, Sep. 2013.
[4]
E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi, “Communication security for smart grid distribution networks,” in IEEE Commun. Mag., vol. 51, no. 1, pp. 42–49, Jan. 2013.
[5]
Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: A tutorial,” in IEEE Wireless Commun., vol. 18, no. 2, pp. 66–74, Apr. 2011.
[6]
W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), Urbana-Champaign, IL USA, May 2005, pp. 46–57.
[7]
R. A. Poisel, Modern Communications Jamming: Principles and Techniques, 2nd ed., Norwood, MA USA: Artech House, 2011.
[8]
M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attack strategies and network defense policies in wireless sensor networks,” in IEEE Trans. Mobile Comput., vol. 9, no. 8, pp. 1119–1133, Aug. 2010.
[9]
Q. Peng, P. C. Cosman, and L. B. Milstein, “Spoofing or jamming: Performance analysis of a tactical cognitive radio adversary,” in IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 903–911, Apr. 2011.
[10]
S. Sodagari and T. C. Clancy, “Efficient jamming attacks on MIMO channels,” in Proc. IEEE Int. Conf. Commun., Ottawa, ON Canada, Jun. 2012, pp. 852–856.
[11]
S. Wei and R. Kannan, “Jamming and counter-measure strategies in parallel Gaussian fading channels with channel state information,” in Proc. IEEE Military Commun. Conf., San Diego, USA, Nov. 2008, pp. 1–7.
[12]
D. J. Torrieri, “Fundamental limitations on repeater jamming of frequency-hopping communications,” in IEEE J. Sel. Areas Commun., vol. 7, no. 4, pp. 569–575, May 1989.
[13]
S. Prasad and D. J. Thuente, “Jamming attacks in 802.11g: A cognitive radio based approach,” in Proc. IEEE Military Commun. Conf., Baltimore, MD USA, Nov. 2011, pp. 1219–1224.
[14]
A. A. Ali, “Worst-case partial-band noise jamming of Rician fading channels,” in IEEE Trans. Commun., vol. 44, no. 6, pp. 660–662, Jun. 1996.
[15]
M. Soysa, P. C. Cosman, and L. B. Milstein, “Optimized spoofing and jamming a cognitive radio,” in IEEE Trans. Commun., vol. 62, no. 8, pp. 2681–2695, Aug. 2014.
[16]
H. M. Kwon and P. Lee, “Combined tone and noise jamming against coded FH/MFSK ECCM radios,” in IEEE J. Sel. Area Commun., vol. 8, no. 5, pp. 871–883, Jun. 1990.
[17]
A. Bayesteh, M. Ansari, and A. K. Khandani, “Effect of jamming on the capacity of MIMO channels,” in Proc. Allerton Conf. Commun. Contr. Comput., Monticello, CA USA, Sep.–Oct. 2004, pp. 401–410.
[18]
E. A. Jorswieck, H. Boche, and M. Weckerle, “Optimal transmitter and jamming strategies in Gaussian MIMO channels,” in Proc. IEEE Veh. Tech. Conf., Stockholm, Sweden, May–Jun. 2005, pp. 978–982.
[19]
M. H. Brady, M. Mohseni, and J. M. Cioffi, “Spatially-correlated jamming in Gaussian multiple access and broadcast channels,” in Proc. 40th Annu. Conf. Inf. Sci. Syst., Princeton, NJ USA, Mar. 2006, pp. 1635–1639.
[20]
M. R. D. Rodrigues and G. Ramos, “On multiple-input multiple-output Gaussian channels with arbitrary inputs subject to jamming,” in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun.–Jul. 2009, pp. 2512–2516.
[21]
X. Song, P. Willett, S. Zhou, and P. B. Luh, “The MIMO radar and jammer games,” in IEEE Trans. Signal Process., vol. 60, no. 2, pp. 687–699, Feb. 2012.
[22]
E. A. Jorswieck and H. Boche, “Performance analysis of capacity of MIMO systems under multiuser interference based on worst-case noise behavior,” in EURASIP J. Wireless Commun. Netw., vol. 2, pp. 273–285, 2004.
[23]
J. Gao, S. A. Vorobyov, and H. Jiang, “Efficient jamming strategies on a MIMO Gaussian channel with known target signal covariance,” in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Florence, Italy, May 2014, pp. 5700–5704.
[24]
S. N. Diggavi and T. M. Cover, “The worst additive noise under a covariance constraint,” in IEEE Trans. Inf. Theory, vol. 47, no. 7, pp. 3072–3081, Nov. 2001.
[25]
A. Kashyap, T. Başar, and R. Srikant, “Correlated jamming on MIMO Gaussian fading channels,” in IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119–2123, Sept. 2004.
[26]
K. T. Phan, S. A. Vorobyov, C. Tellambura, and T. Le-Ngoc, “Power control for wireless cellular systems via D.C. programming,” in Proc. IEEE Workshop Statist. Signal Process., Madison, WI USA, Aug. 2007, pp. 507–511.
[27]
A. Beck, A. Ben-Tal, and L. Tetruashvili, “A sequential parametric convex approximation method with applications to nonconvex truss topology design problems,” in J. Global Optimiz., vol. 47, no. 1, pp. 29–51, May 2010.
[28]
A. Khabbazibasmenj, F. Roemer, S. A. Vorobyov, and M. Haardt, “Sum-rate maximization in two-way AF MIMO relaying: Polynomial time solutions to a class of DC programming problems,” in IEEE Trans. Signal Process., vol. 60, no. 10, pp. 5478–5493, Oct. 2012.
[29]
H. Lütkepohl, Handbook of Matrices, New York, NY USA: Wiley, 1997.
[30]
F. Zhang, Matrix Theory: Basic Results and Techniques, Berlin, Germany: Springer Science & Business Media, 2011.
[31]
F. A. Dietrich, Robust Signal Processing for Wireless Communications, Berlin, Germany: Springer-Verlag, 2008.
[32]
R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed., Cambridge, MA USA: Cambridge Univ. Press, 2012.

Cited By

View all
  • (2024)Smart Jamming Using Reconfigurable Intelligent Surface: Asymptotic Analysis and OptimizationIEEE Transactions on Wireless Communications10.1109/TWC.2023.328097523:1(637-651)Online publication date: 1-Jan-2024
  • (2023)Jamming the Relay-Assisted Multi-User Wireless Communication System: A Zero-Sum Game ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327722218(3198-3211)Online publication date: 17-May-2023
  • (2022)Multiple Correlated Jammers Suppression: A Deep Dueling Q-Learning Approach2022 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC51071.2022.9771672(998-1003)Online publication date: 10-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing  Volume 63, Issue 21
Nov.1, 2015
281 pages

Publisher

IEEE Press

Publication History

Published: 01 November 2015

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Smart Jamming Using Reconfigurable Intelligent Surface: Asymptotic Analysis and OptimizationIEEE Transactions on Wireless Communications10.1109/TWC.2023.328097523:1(637-651)Online publication date: 1-Jan-2024
  • (2023)Jamming the Relay-Assisted Multi-User Wireless Communication System: A Zero-Sum Game ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327722218(3198-3211)Online publication date: 17-May-2023
  • (2022)Multiple Correlated Jammers Suppression: A Deep Dueling Q-Learning Approach2022 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC51071.2022.9771672(998-1003)Online publication date: 10-Apr-2022
  • (2022)The impact of intentional interference on the performances of ML detector in MIMO systemsPhysical Communication10.1016/j.phycom.2022.10166352:COnline publication date: 1-Jun-2022
  • (2022)Efficient jamming attack against MIMO transceiverDigital Signal Processing10.1016/j.dsp.2022.103593127:COnline publication date: 1-Jul-2022
  • (2021)The Resilience of Massive MIMO PNC to Jamming Attacks in Vehicular NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2020.301690722:7(4110-4117)Online publication date: 1-Jul-2021
  • (2019)Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart GridIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.285474514:2(498-513)Online publication date: 1-Feb-2019
  • (2016)Optimal Jammer Placement in Wireless Localization SystemsIEEE Transactions on Signal Processing10.1109/TSP.2016.255250364:17(4534-4549)Online publication date: 22-Jul-2016

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media