Wireless Communications under Hostile Jamming: Security and Efficiency (eBook)
XXI, 219 Seiten
Springer Singapore (Verlag)
978-981-13-0821-5 (ISBN)
This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
Tongtong Li received her Ph.D. degree in Electrical Engineering in 2000 from Auburn University. From 2000 to 2002, she was with Bell Labs, and had been working on the design and implementation of 3G and 4G systems. Since 2002, she has been with Michigan State University, where she is now an Associate Professor. Prof. Li's research interests fall into the areas of wireless and wired communications, wireless security, information theory, and statistical signal processing, with applications in computational neuroscience. She is a recipient of a National Science Foundation (NSF) CAREER Award (2008) for her research on efficient and reliable wireless communications. In the past, Prof. Li served as an Associate Editor for IEEE Transactions on Signal Processing, IEEE Signal Processing Letters, and an Editorial Board Member for EURASIP Journal Wireless Communications and Networking.
Tianlong Song received his Ph.D. degree in Electrical and Computer Engineering in 2016 from Michigan State University. During his Ph.D. study, he had been working on efficient and secure system design in wireless communications under jamming, as well as brain neuroimaging data mining. Since 2016, he has been with Zillow Inc., where he is now a Big Data Software Development Engineer, and working on big data related study and development. His research interests lie in the areas of secure communications under jamming and big data infrastructure. He is also enthusiastic about machine learning, natural language processing and artificial intelligence.
Yuan Liang received his B.S. degree in Electrical Engineering from Nanjing University of Posts and Telecommunications in 2012, and the M.S. degree in Electrical Engineering from Southeast University in 2015. He is currently working toward his Ph.D. degree in the Department of Electrical and Computer Engineering at Michigan State University. His research focuses on architecture design, performance analysis and resource allocation in heterogeneous wireless networks. He is also highly interested in computational neuroscience, big data, natural language processing and artificial intelligence.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G andthe upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
Tongtong Li received her Ph.D. degree in Electrical Engineering in 2000 from Auburn University. From 2000 to 2002, she was with Bell Labs, and had been working on the design and implementation of 3G and 4G systems. Since 2002, she has been with Michigan State University, where she is now an Associate Professor. Prof. Li’s research interests fall into the areas of wireless and wired communications, wireless security, information theory, and statistical signal processing, with applications in computational neuroscience. She is a recipient of a National Science Foundation (NSF) CAREER Award (2008) for her research on efficient and reliable wireless communications. In the past, Prof. Li served as an Associate Editor for IEEE Transactions on Signal Processing, IEEE Signal Processing Letters, and an Editorial Board Member for EURASIP Journal Wireless Communications and Networking.Tianlong Song received his Ph.D. degree in Electrical and Computer Engineering in 2016 from Michigan State University. During his Ph.D. study, he had been working on efficient and secure system design in wireless communications under jamming, as well as brain neuroimaging data mining. Since 2016, he has been with Zillow Inc., where he is now a Big Data Software Development Engineer, and working on big data related study and development. His research interests lie in the areas of secure communications under jamming and big data infrastructure. He is also enthusiastic about machine learning, natural language processing and artificial intelligence. Yuan Liang received his B.S. degree in Electrical Engineering from Nanjing University of Posts and Telecommunications in 2012, and the M.S. degree in Electrical Engineering from Southeast University in 2015. He is currently working toward his Ph.D. degree in the Department of Electrical and Computer Engineering at Michigan State University. His research focuses on architecture design, performance analysis and resource allocation in heterogeneous wireless networks. He is also highly interested in computational neuroscience, big data, natural language processing and artificial intelligence.
Preface 6
Acknowledgments 9
Contents 10
Acronyms 15
1 Introduction 18
1.1 Hostile Jamming: A Brief Introduction 18
1.1.1 Existing Jamming Models 18
1.1.2 Disguised Jamming: A New Concept 20
1.2 Jamming Resistance of General Communication Systems 20
1.3 Limitations with Existing Anti-Jamming Techniques 21
1.3.1 Inadequate Jamming Resistance Dueto Security Weaknesses 22
1.3.2 Low Spectral Efficiency Due to Self-Jamming and Repeated Coding 23
1.4 The Arbitrarily Varying Channel Model and Channel Capacity Under Jamming 24
1.5 Book Overview: Anti-Jamming System Design and Capacity Analysis Under Jamming 26
References 29
2 Enhanced CDMA System with Secure Scrambling 31
2.1 Introduction 31
2.1.1 CDMA and Its Security 31
2.1.2 Existing Work 32
2.1.2.1 Capacity of CDMA Systems Under Jamming 32
2.1.2.2 Deterministic/Random Codes and Most Effective Jamming 33
2.1.2.3 Built-In Security Analysis of Existing CDMA Systems 34
2.2 System Model and Problem Identification 35
2.2.1 System Model 35
2.2.2 Problem Identification 37
2.3 Jamming Mitigation with Robust Receiver Design 39
2.4 Jamming Mitigation with Secure Scrambling 41
2.4.1 AES-Based Secure Scrambling 41
2.4.2 Security Analysis 42
2.4.3 Complexity Analysis 43
2.5 Capacity of CDMA with and without Secure Scrambling Under Disguised Jamming 44
2.5.1 Capacity of CDMA Systems without Secure Scrambling Under Disguised Jamming 45
2.5.2 Symmetricity Analysis of CDMA Systems with Secure Scrambling Under Disguised Jamming 46
2.5.3 Capacity Calculation of CDMA Systems with Secure Scrambling Under Disguised Jamming 52
2.6 Numerical Results 54
2.6.1 Jamming Mitigation with Robust Receiver Design 54
2.6.2 Jamming Mitigation with Secure Scrambling 57
2.7 Conclusions 58
References 59
3 Message-Driven Frequency Hopping Systems 61
3.1 The Concept of Message-Driven Frequency Hopping (MDFH) 61
3.1.1 A Brief Revisit to Existing Work 61
3.1.2 The Basic Idea of MDFH 62
3.1.3 Transmitter Design 62
3.1.4 Receiver Design 64
3.2 Efficiency Enhanced MDFH 66
3.2.1 The Modified Hopping Frequency Selection Process 66
3.2.2 Signal Detection 67
3.2.3 Collision-Free MDFH in Multiple Access Environment 68
3.3 Performance Analysis for E-MDFH 69
3.3.1 BER Analysis 69
3.3.1.1 BER of the Carrier Bits 69
3.3.1.2 BER of the Ordinary Bits 73
3.3.1.3 Overall BER for E-MDFH 75
3.3.2 Spectral Efficiency Analysis of MDFH 75
3.3.3 Performance Analysis of MDFH Under Hostile Jamming 78
3.4 Anti-jamming Message-Driven Frequency Hopping:System Design 80
3.4.1 What Is AJ-MDFH? 80
3.4.2 Transmitter Design 81
3.4.3 Receiver Design 82
3.4.3.1 Demodulation 82
3.4.3.2 Signal Detection and Extraction 82
3.4.4 Extension to Multi-carrier AJ-MDFH 84
3.4.4.1 Multi-carrier AJ-MDFH without Diversity 85
3.4.4.2 Multi-carrier AJ-MDFH with Diversity 85
3.4.5 ID Constellation Design and Its Impact on System Performance 85
3.4.5.1 Design Criterion and Jamming Classification 86
3.4.5.2 Constellation Design Under Noise Jamming 86
3.4.5.3 Constellation Design Under ID Jamming 89
3.4.6 Spectral Efficiency Analysis of AJ-MDFH 92
3.4.7 Numerical Analysis of AJ-MDFH Under Jamming 94
3.5 Capacity Analysis of MDFH and AJ-MDFH Under Disguised Jamming 96
3.5.1 Capacity of MDFH Under Disguised Jamming 97
3.5.2 Capacity of AJ-MDFH Under Disguised Jamming 99
3.5.2.1 AVC Symmetricity Analysis 100
3.5.2.2 Capacity Calculation 106
3.6 Conclusions 110
References 111
4 Collision-Free Frequency Hopping and OFDM 114
4.1 Enhance Jamming Resistance: The Combination of OFDM and Frequency Hopping 114
4.2 Secure Subcarrier Assignment 116
4.2.1 Secure Permutation Index Generation 116
4.2.2 Secure Permutation Algorithm and SubcarrierAssignment 117
4.3 The Collision-Free Frequency Hopping (CFFH) Scheme 119
4.3.1 Signal Transmission 119
4.3.2 Signal Detection 120
4.4 Space-Time Coded Collision-Free Frequency Hopping 122
4.4.1 Transmitter Design 122
4.4.2 Receiver Design 125
4.5 Performance Analysis of STC-CFFH 126
4.5.1 System Performance in Jamming-Free Case 127
4.5.2 System Performance Under Hostile Jamming 128
4.5.2.1 Jamming Models 128
4.5.2.2 System Performance Under Rayleigh Fading and Full-Band Jamming 129
4.5.2.3 System Performance Under Rayleigh Fading and Partial-Band Jamming 129
4.5.3 Spectral Efficiency 130
4.6 Simulation Examples 131
4.7 Conclusions 133
References 133
5 Securely Precoded OFDM 136
5.1 Introduction 136
5.2 Secure OFDM System Design Under Disguised Jamming 138
5.2.1 Transmitter Design with Secure Precoding 138
5.2.2 Receiver Design with Secure Decoding 140
5.2.3 PN Sequence Synchronization Between the Secure Precoder and Decoder 141
5.3 Symmetricity and Capacity Analysis using the AVC Model 143
5.3.1 AVC Symmetricity Analysis 143
5.3.2 Capacity Analysis 147
5.4 Performance of SP-OFDM Under Disguised Jamming 149
5.5 Discussion on the Worst Jamming Distribution for SP-OFDM 153
5.5.1 Existence of the Worst Jamming Distribution 154
5.5.2 Discreteness of the Worst Jamming Distribution 158
5.5.3 Numerical Results 160
5.6 Conclusions 165
References 167
6 Multiband Transmission Under Jamming: A Game Theoretic Perspective 170
6.1 Game Theory and Communication Under Jamming 170
6.1.1 The Concept of Game Theory 170
6.1.2 Game Theory and Its Applications in Communications 171
6.1.3 Game Theory and Multiband Communications 173
6.1.3.1 A Bayesian Jamming Game in an OFDM Wireless Network 173
6.1.3.2 CSI Usage Over Parallel Fading Channels Under Jamming Attacks: A Game Theory Study 174
6.1.3.3 Equilibrium Strategies for an OFDM Network That Might Be Under a Jamming Attack 176
6.2 Problem Formulation 177
6.2.1 System Description 177
6.2.2 Strategy Spaces for the Authorized User and the Jammer 178
6.2.3 The Minimax Problem in the Zero-Sum Game Between the Authorized User and the Jammer 179
6.3 Multiband Communications Under JammingOver AWGN Channels 180
6.3.1 The Minimax Problem for Fixed Ks and KJ 181
6.3.2 Capacity Optimization Over Ks and KJ 183
6.4 Multiband Communications Under Jamming Over Frequency Selective Fading Channels 185
6.4.1 The Minimax Problem for Fading Channels 185
6.4.2 Correlated Fading Channels: A Two-Step Water-Filling Algorithm 188
6.4.3 Arbitrary Fading Channels: An Iterative Water-Filling Algorithm 191
6.5 Numerical Results 193
6.5.1 AWGN Channels 193
6.5.2 Frequency Selective Fading Channels 194
6.6 Conclusions 200
References 200
7 Conclusions and Future Directions 203
7.1 What We Learned About Jamming and Anti-jamming 203
7.1.1 On Jamming 203
7.1.2 On Anti-jamming System Design 204
7.2 Discussions on Future Directions 206
7.2.1 Jamming and Anti-jamming in 5G IoT Systems 206
7.2.2 5G Wireless Network Design and Performance Evaluation Under Hostile Environments 206
7.2.2.1 Network Failure Detection and Network Performance Evaluation Under Malicious Attacks 207
7.2.2.2 Improving Network Reliability Through Topology Design and Dynamic Routing Protocol Development 208
7.3 Concluding Remarks 209
References 209
Appendix A Proof of Lemma 3.3 211
References 213
Appendix B Calculation of the Probability Matrix W1 214
Appendix C Subchannel Selection with Nonuniform Preferences 217
Reference 219
Appendix D Uniqueness of the Solution to Theorem 6.3 220
Appendix E Proof of Lemma 6.3 222
Appendix F Convergence Analysis of the Iterative Water Filling Algorithm 224
Index 226
Erscheint lt. Verlag | 10.10.2018 |
---|---|
Zusatzinfo | XXI, 219 p. 84 illus., 8 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Anti-jamming techniques • collision-free frequency hopping • disguised jamming • message-driven frequency hopping • Physical Layer Security • secure carrier assignment • secure precoding |
ISBN-10 | 981-13-0821-7 / 9811308217 |
ISBN-13 | 978-981-13-0821-5 / 9789811308215 |
Haben Sie eine Frage zum Produkt? |
Größe: 5,1 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich