[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2716281.2836096acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Jamming mitigation by randomized bandwidth hopping

Published: 01 December 2015 Publication History

Abstract

We present bandwidth hopping spread spectrum (BHSS), a novel technique to improve the jamming resistance of wireless communications. In BHSS, the bandwidth of a signal is hopped rapidly in a manner that is unpredictable to the jammer. We show in this work that by combining bandwidth hopping at the transmitter with adaptive filtering at the receiver, BHSS is able to improve the jamming resistance of the communication beyond the processing gain of conventional spread spectrum techniques such as DSSS and FHSS without an increase in RF spectrum requirements. We have designed and implemented a BHSS transmitter and receiver system on off-the-shelf software-defined radios. Our experimental results with different hopping patterns show that BHSS is able to boost the power advantage of spread spectrum communication by 8 to 20 dB for jammers of fixed bandwidth. When both transmitter and jammer hop randomly, the average power advantage we achieve with our system is 11.4 dB.

References

[1]
R. A. Poisel, Modern communications jamming principles and techniques. Artech House Publishers, 2004.
[2]
D. L. Adamy, EW 102: A Second Course in Electronic Warfare. Artech House, 2004.
[3]
F. M. Hsu and A. A. Giordano, "Digital Whitening Techniques for Improving Spread Spectrum Communications Performance in the Presence of Narrow-band Jamming and Interference," IEEE Transactions on Communications, vol. 26, February 1978.
[4]
M. G. Amin, "Interference Mitigation in Spread Spectrum Communication Systems Using Time-Frequency Distributions," IEEE Transactions on Signal Processing, vol. 45, no. 1, January 1997.
[5]
M. G. Amin, C. Wang, and A. R. Lindsey, "Optimum Interference Excision in Spread Spectrum Communications Using Open-Loop Adaptive Filters," IEEE Transactions on Signal Processing, vol. 47, no. 7, July 1999.
[6]
L. B. Milstein and R. A. Iltis, "Signal Processing for Interference Rejection in Spread Spectrum Communications," IEEE ASSP Magazine, April 1986.
[7]
J. W. Ketchum and J. G. Proakis, "Adaptive Algorithms for Estimating and Supressing Narrow-Band Interference in PN Spread Spectrum Systems," IEEE Transactions on Communications, vol. 30, no. 5, May 1982.
[8]
A. Goldsmith, Wireless Communications. Cambridge University Press, 2004.
[9]
J. Proakis, Digital Communications, 3rd ed. McGraw Hill, 2001.
[10]
R. Chandra, R. Mahajan, T. Moscibroda, R. Raghavendra, and P. Bahl, "A case for adapting channel width in wireless networks," in ACM SIGCOMM '08, 2008, pp. 135--146.
[11]
V. Pejovic and E. M. Belding, "Whiterate: A context-aware approach to wireless rate adaptation," IEEE Transactions on Mobile Computing, vol. 13, no. 4, April 2014.
[12]
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Short paper: Reactive jamming in wireless networks: How realistic is the threat?" in Proceedings ACM Conference on Wireless Network Security (WiSec), 2011, pp. 47--52.
[13]
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. E. Pantziou, "A survey on jamming attacks and countermeasures in wsns," IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 42--56, 2009.
[14]
T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "Counter-jamming using mixed mechanical and software interference cancellation," in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec '13, New York, NY, USA, 2013, pp. 31--42.
[15]
D. Bharadia, E. McMilin, and S. Katti, "Full duplex radios," in ACM SIGCOMM, August 2013.
[16]
M. K. Simon, K. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook. McGraw-Hill, 2002.
[17]
C. Popper, M. Strasser, and S. Capkun, "Anti-jamming broadcast communication using uncoordinated spread spectrum techniques," IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 703--715, 2010.
[18]
M. S. Batlett, "Smoothing Periodograms from Time-Series with Continuous Spectra," Nature, vol. 161, May 1948.
[19]
P. D. Welch, "The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms," IEEE Transactions on Audio and Electroacoustics, vol. 15, no. 2, June 1967.
[20]
J. Proakis and M. Salehi, Digital Communications, ser. McGraw-Hill higher education. McGraw-Hill Education, 2007. {Online}. Available: http://books.google.ch/books?id=HroiQAAACAAJ
[21]
"IEEE Standard for Local and metropolitan area networks---Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)," IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), pp. 1--314, Sept 2011.
[22]
K. Mueller and M. Muller, "Timing recovery in digital synchronous data receivers," Communications, IEEE Transactions on, vol. 24, no. 5, pp. 516--531, May 1976.
[23]
F. M. Gardner, "A bpsk/qpsk timing-error detector for sampled receivers," Communications, IEEE Transactions on, vol. 34, no. 5, pp. 423--429, May 1986.
[24]
R. L. Pickholtz, D. L. Schilling, Laurence, B. Milstein, and S. Member, "Theory of spread spectrum communications: a tutorial," IEEE Transactions on Communications, vol. 30, pp. 855--884, 1982.
[25]
B. DeBruhl and P. Tague, "Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection," in International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), February 2012.
[26]
M. Strasser, C. Pöpper, and S. Čapkun, "Efficient uncoordinated fhss anti-jamming communication," in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc '09, 2009, pp. 207--218.

Cited By

View all
  • (2022)A Survey of Physical Layer Techniques for Secure Wireless Communications in IndustryIEEE Communications Surveys & Tutorials10.1109/COMST.2022.314885724:2(810-838)Online publication date: Oct-2023
  • (2019)Radio Frequency (RF) Security in Industrial Engineering ProcessesSecurity and Quality in Cyber-Physical Systems Engineering10.1007/978-3-030-25312-7_15(413-441)Online publication date: 10-Nov-2019
  • (2018)Interference Suppression in Bandwidth Hopping Spread Spectrum CommunicationsProceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/3212480.3212484(134-143)Online publication date: 18-Jun-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CoNEXT '15: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies
December 2015
483 pages
ISBN:9781450334129
DOI:10.1145/2716281
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bandwidth hopping
  2. interference filter
  3. jamming resistance
  4. software-defined radio
  5. spread spectrum
  6. wireless security

Qualifiers

  • Research-article

Funding Sources

Conference

CoNEXT '15
Sponsor:

Acceptance Rates

Overall Acceptance Rate 198 of 789 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A Survey of Physical Layer Techniques for Secure Wireless Communications in IndustryIEEE Communications Surveys & Tutorials10.1109/COMST.2022.314885724:2(810-838)Online publication date: Oct-2023
  • (2019)Radio Frequency (RF) Security in Industrial Engineering ProcessesSecurity and Quality in Cyber-Physical Systems Engineering10.1007/978-3-030-25312-7_15(413-441)Online publication date: 10-Nov-2019
  • (2018)Interference Suppression in Bandwidth Hopping Spread Spectrum CommunicationsProceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/3212480.3212484(134-143)Online publication date: 18-Jun-2018
  • (2017)DemoProceedings of the 23rd Annual International Conference on Mobile Computing and Networking10.1145/3117811.3119861(507-509)Online publication date: 4-Oct-2017
  • (2017)Jammer Localization in Multi-Hop Wireless Network: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2016.263114619:2(765-799)Online publication date: Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media