Skip to main content
Log in

A feature fusion-based communication jamming recognition method

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The electromagnetic environment is becoming increasingly complex, with communication jamming intensifying. Accurately identifying the type of jamming is essential for maintaining the integrity of communication and ensuring the safety of individuals and organizations. In this article, a jamming identification method based on feature fusion is proposed for the rapid and accurate identification of communication jamming. Five typical communication jamming signals are simulated and a set of features is extracted from the time domain, frequency domain, and time–frequency domain that are resistant to noise and distinguishable from one another. These features are then input into various classifiers, including support vector machine, K-nearest neighbor, decision tree model, and naive bayesian model, and their identification results are compared. It is shown that the combination of features selected has a strong classification performance for the five types of communication jamming signals. When the jamming-to-noise ratio is − 4 dB, the overall recognition accuracy of the method exceeds 90% and reaches 100% at 3 dB.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Saarnisaari, H., & Bräysy, T. (2017). Future military mobile radio communication systems from electronic warfare perspective. In 2017 International Conference on Military Communications and Information Systems (ICMCIS), pp. 1–8. https://doi.org/10.1109/icmcis.2017.7956494

  2. Long, H., Xiang, W., Wang, J., Zhang, Y., & Wang, W. (2014). Cooperative jamming and power allocation with untrusty two-way relay nodes. Iet Communications, 8(13), 2290–2297. https://doi.org/10.1049/iet-com.2013.0580

    Article  Google Scholar 

  3. Gui, G., Liu, M., Tang, F., Kato, N., & Adachi, F. (2020). 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wireless Communications, 27(5), 126–132. https://doi.org/10.1109/MWC.001.1900516

    Article  Google Scholar 

  4. Wang, S., Liu, X., Liu, S., Muhammad, K., Heidari, A. A., Del Ser, J., & de Albuquerque, V. H. C. (2021). Human short long-term cognitive memory mechanism for visual monitoring in IoT-assisted smart cities. IEEE Internet of Things Journal, 9(10), 7128–7139. https://doi.org/10.1109/JIOT.2021.3077600

    Article  Google Scholar 

  5. Tian, X., Tang, B., & Gui, G. (2013). Product spectrum matrix feature extraction and recognition of radar deception jamming. International Journal of Electronics, 100(12), 1621–1629. https://doi.org/10.1080/00207217.2012.743095

    Article  Google Scholar 

  6. Lin, Y., Zhu, X., Zheng, Z., Dou, Z., & Zhou, R. (2019). The individual identification method of wireless device based on dimensionality reduction and machine learning. The journal of supercomputing, 75(6), 3010–3027. https://doi.org/10.1007/s11227-017-2216-2

    Article  Google Scholar 

  7. Gao, P., Sun, S., Zeng, Z., & Wang, C. (2018). GNSS spoofing jamming recognition based on machine learning. In Signal and Information Processing, Networking and Computers: Proceedings of the 3rd International Conference on Signal and Information Processing, Networking and Computers (ICSINC) 3, 221–228. https://doi.org/10.1007/978-981-10-7521-6_27

  8. Xingyu, Y., Huailin, R., & Haoran, F. (2017). A recognition algorithm of deception jamming based on image of time-frequency distribution. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 275–278. https://doi.org/10.1109/iceiec.2017.8076561

  9. Yang, X., Fu, T., & Wang, Y. (2020, May). Wireless communication jamming recognition based on lightweight residual network. In 2020 IEEE 3rd International Conference on Electronics Technology (ICET), pp. 765–769. https://doi.org/10.1109/icet49382.2020.9119641

  10. Bao, Z., Lin, Y., Zhang, S., Li, Z., et al. (2021). Threat of adversarial attacks on DL-based IoT device identification. IEEE Internet of Things Journal, 9(11), 9012–9024. https://doi.org/10.1109/jiot.2021.3120197

    Article  Google Scholar 

  11. Hou, C., Liu, G., Tian, Q., Zhou, Z., et al. (2022). Multisignal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal, 9(19), 19438–19449. https://doi.org/10.1109/jiot.2022.3167107

    Article  Google Scholar 

  12. Liu, M., Liu, Z., Lu, W., Chen, Y., Gao, X., & Zhao, N. (2021). Distributed few-shot learning for intelligent recognition of communication jamming. IEEE Journal of Selected Topics in Signal Processing, 16(3), 395–405. https://doi.org/10.1109/jstsp.2021.3137028

    Article  Google Scholar 

  13. Liu, Y., Xing, S., Li, Y., Hou, D., & Wang, X. (2017). Jamming recognition method based on the polarisation scattering characteristics of chaff clouds. IET Radar, Sonar & Navigation, 11(11), 1689–1699. https://doi.org/10.1049/iet-rsn.2017.0121

    Article  Google Scholar 

  14. Ruo-Ran F. (2016). Compound jamming signal recognition based on neural networks. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), pp.737–740. https://doi.org/10.1109/imccc.2016.163

  15. Wang, Y., Gui, G., Gacanin, H., Ohtsuki, T., Sari, H., & Adachi, F. (2020). Transfer learning for semi-supervised automatic modulation classification in ZF-MIMO systems. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 10(2), 231–239. https://doi.org/10.1109/JETCAS.2020.2992128

    Article  Google Scholar 

  16. Liu, S., & Zhu, C. (2022). Jamming recognition based on feature fusion and convolutional neural network. Journal of Beijing Institute of Technology, 31(2), 9. https://doi.org/10.15918/j.jbit1004-0579.2021.105

    Article  Google Scholar 

  17. Tian, Q., Zhang, S., Mao, S., et al. (2023). Adversarial attacks and defenses for digital communication signals identification. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2022.10.010

    Article  Google Scholar 

  18. Ya, T., Yun, L., Haoran, Z., Zhang, J., et al. (2022). Large-scale real-world radio signal recognition with deep learning. Chinese Journal of Aeronautics, 35(9), 35–48. https://doi.org/10.1016/j.cja.2021.08.016

    Article  Google Scholar 

  19. Liu, S., Wang, S., Liu, X., Gandomi, A. H., Daneshmand, M., Muhammad, K., & De Albuquerque, V. H. C. (2021). Human memory update strategy: A multi-layer template update mechanism for remote visual monitoring. IEEE Transactions on Multimedia, 23, 2188–2198. https://doi.org/10.1109/TMM.2021.3065580

    Article  Google Scholar 

  20. Han, G., Xu, Z., Chen, C., Liu, L., & Zhu, H. (2022). Fault diagnosis in industrial control networks using transferability-measured adversarial adaptation network. IEEE Transactions on Network and Service Management. https://doi.org/10.1109/TNSM.2022.3225428

    Article  Google Scholar 

  21. Xu, Z., Han, G., Liu, L., Zhu, H., & Peng, J. (2022). A lightweight specific emitter identification model for IIoT devices based on adaptive broad learning. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3206309

    Article  Google Scholar 

  22. Boashash, B., Khan, N. A., & Ben-Jabeur, T. (2015). Time–frequency features for pattern recognition using high-resolution TFDs: A tutorial review. Digital Signal Processing, 40, 1–30. https://doi.org/10.1016/j.dsp.2014.12.015

    Article  MathSciNet  Google Scholar 

  23. Benco, M., Hudec, R., Kamencay, P., Zachariasova, M., & Matuska, S. (2014). An advanced approach to extraction of colour texture features based on GLCM. International Journal of Advanced Robotic Systems, 11(7), 104. https://doi.org/10.5772/58692

    Article  Google Scholar 

  24. Bhunia, A. K., Alaei, A., & Roy, P. P. (2019). Signature verification approach using fusion of hybrid texture features. Neural Computing and Applications, 31, 8737–8748. https://doi.org/10.1007/s00521-019-04220-x

    Article  Google Scholar 

  25. Liu, D., & Liu, J. (2010). A novel signal recognition algorithm based on SVM in cognitive networks. In 2010 IEEE 12th International Conference on Communication Technology, pp.1264–1267. https://doi.org/10.1109/ICCT.2010.5689090

  26. Myles, A. J., Feudale, R. N., Liu, Y., Woody, N. A., & Brown, S. D. (2004). An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society, 18(6), 275–285. https://doi.org/10.1002/cem.873

    Article  Google Scholar 

  27. Guo, G., Wang, H., Bell, D., Bi, Y., & Greer, K. (2003). KNN model-based approach in classification. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", pp.986–996. https://doi.org/10.1007/978-3-540-39964-3_62

  28. Yager, R. R. (2006). An extension of the naive Bayesian classifier. Information Sciences, 176(5), 577–588. https://doi.org/10.1016/j.ins.2004.12.006

    Article  MathSciNet  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuoran Cai.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Human or animal rights

The article does not involve ethical research on humans or animals.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xin, M., Cai, Z. A feature fusion-based communication jamming recognition method. Wireless Netw 29, 2993–3004 (2023). https://doi.org/10.1007/s11276-023-03272-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03272-1

Keywords

Navigation