Abstract
The electromagnetic environment is becoming increasingly complex, with communication jamming intensifying. Accurately identifying the type of jamming is essential for maintaining the integrity of communication and ensuring the safety of individuals and organizations. In this article, a jamming identification method based on feature fusion is proposed for the rapid and accurate identification of communication jamming. Five typical communication jamming signals are simulated and a set of features is extracted from the time domain, frequency domain, and time–frequency domain that are resistant to noise and distinguishable from one another. These features are then input into various classifiers, including support vector machine, K-nearest neighbor, decision tree model, and naive bayesian model, and their identification results are compared. It is shown that the combination of features selected has a strong classification performance for the five types of communication jamming signals. When the jamming-to-noise ratio is − 4 dB, the overall recognition accuracy of the method exceeds 90% and reaches 100% at 3 dB.
Similar content being viewed by others
References
Saarnisaari, H., & Bräysy, T. (2017). Future military mobile radio communication systems from electronic warfare perspective. In 2017 International Conference on Military Communications and Information Systems (ICMCIS), pp. 1–8. https://doi.org/10.1109/icmcis.2017.7956494
Long, H., Xiang, W., Wang, J., Zhang, Y., & Wang, W. (2014). Cooperative jamming and power allocation with untrusty two-way relay nodes. Iet Communications, 8(13), 2290–2297. https://doi.org/10.1049/iet-com.2013.0580
Gui, G., Liu, M., Tang, F., Kato, N., & Adachi, F. (2020). 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wireless Communications, 27(5), 126–132. https://doi.org/10.1109/MWC.001.1900516
Wang, S., Liu, X., Liu, S., Muhammad, K., Heidari, A. A., Del Ser, J., & de Albuquerque, V. H. C. (2021). Human short long-term cognitive memory mechanism for visual monitoring in IoT-assisted smart cities. IEEE Internet of Things Journal, 9(10), 7128–7139. https://doi.org/10.1109/JIOT.2021.3077600
Tian, X., Tang, B., & Gui, G. (2013). Product spectrum matrix feature extraction and recognition of radar deception jamming. International Journal of Electronics, 100(12), 1621–1629. https://doi.org/10.1080/00207217.2012.743095
Lin, Y., Zhu, X., Zheng, Z., Dou, Z., & Zhou, R. (2019). The individual identification method of wireless device based on dimensionality reduction and machine learning. The journal of supercomputing, 75(6), 3010–3027. https://doi.org/10.1007/s11227-017-2216-2
Gao, P., Sun, S., Zeng, Z., & Wang, C. (2018). GNSS spoofing jamming recognition based on machine learning. In Signal and Information Processing, Networking and Computers: Proceedings of the 3rd International Conference on Signal and Information Processing, Networking and Computers (ICSINC) 3, 221–228. https://doi.org/10.1007/978-981-10-7521-6_27
Xingyu, Y., Huailin, R., & Haoran, F. (2017). A recognition algorithm of deception jamming based on image of time-frequency distribution. In 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 275–278. https://doi.org/10.1109/iceiec.2017.8076561
Yang, X., Fu, T., & Wang, Y. (2020, May). Wireless communication jamming recognition based on lightweight residual network. In 2020 IEEE 3rd International Conference on Electronics Technology (ICET), pp. 765–769. https://doi.org/10.1109/icet49382.2020.9119641
Bao, Z., Lin, Y., Zhang, S., Li, Z., et al. (2021). Threat of adversarial attacks on DL-based IoT device identification. IEEE Internet of Things Journal, 9(11), 9012–9024. https://doi.org/10.1109/jiot.2021.3120197
Hou, C., Liu, G., Tian, Q., Zhou, Z., et al. (2022). Multisignal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal, 9(19), 19438–19449. https://doi.org/10.1109/jiot.2022.3167107
Liu, M., Liu, Z., Lu, W., Chen, Y., Gao, X., & Zhao, N. (2021). Distributed few-shot learning for intelligent recognition of communication jamming. IEEE Journal of Selected Topics in Signal Processing, 16(3), 395–405. https://doi.org/10.1109/jstsp.2021.3137028
Liu, Y., Xing, S., Li, Y., Hou, D., & Wang, X. (2017). Jamming recognition method based on the polarisation scattering characteristics of chaff clouds. IET Radar, Sonar & Navigation, 11(11), 1689–1699. https://doi.org/10.1049/iet-rsn.2017.0121
Ruo-Ran F. (2016). Compound jamming signal recognition based on neural networks. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), pp.737–740. https://doi.org/10.1109/imccc.2016.163
Wang, Y., Gui, G., Gacanin, H., Ohtsuki, T., Sari, H., & Adachi, F. (2020). Transfer learning for semi-supervised automatic modulation classification in ZF-MIMO systems. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 10(2), 231–239. https://doi.org/10.1109/JETCAS.2020.2992128
Liu, S., & Zhu, C. (2022). Jamming recognition based on feature fusion and convolutional neural network. Journal of Beijing Institute of Technology, 31(2), 9. https://doi.org/10.15918/j.jbit1004-0579.2021.105
Tian, Q., Zhang, S., Mao, S., et al. (2023). Adversarial attacks and defenses for digital communication signals identification. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2022.10.010
Ya, T., Yun, L., Haoran, Z., Zhang, J., et al. (2022). Large-scale real-world radio signal recognition with deep learning. Chinese Journal of Aeronautics, 35(9), 35–48. https://doi.org/10.1016/j.cja.2021.08.016
Liu, S., Wang, S., Liu, X., Gandomi, A. H., Daneshmand, M., Muhammad, K., & De Albuquerque, V. H. C. (2021). Human memory update strategy: A multi-layer template update mechanism for remote visual monitoring. IEEE Transactions on Multimedia, 23, 2188–2198. https://doi.org/10.1109/TMM.2021.3065580
Han, G., Xu, Z., Chen, C., Liu, L., & Zhu, H. (2022). Fault diagnosis in industrial control networks using transferability-measured adversarial adaptation network. IEEE Transactions on Network and Service Management. https://doi.org/10.1109/TNSM.2022.3225428
Xu, Z., Han, G., Liu, L., Zhu, H., & Peng, J. (2022). A lightweight specific emitter identification model for IIoT devices based on adaptive broad learning. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3206309
Boashash, B., Khan, N. A., & Ben-Jabeur, T. (2015). Time–frequency features for pattern recognition using high-resolution TFDs: A tutorial review. Digital Signal Processing, 40, 1–30. https://doi.org/10.1016/j.dsp.2014.12.015
Benco, M., Hudec, R., Kamencay, P., Zachariasova, M., & Matuska, S. (2014). An advanced approach to extraction of colour texture features based on GLCM. International Journal of Advanced Robotic Systems, 11(7), 104. https://doi.org/10.5772/58692
Bhunia, A. K., Alaei, A., & Roy, P. P. (2019). Signature verification approach using fusion of hybrid texture features. Neural Computing and Applications, 31, 8737–8748. https://doi.org/10.1007/s00521-019-04220-x
Liu, D., & Liu, J. (2010). A novel signal recognition algorithm based on SVM in cognitive networks. In 2010 IEEE 12th International Conference on Communication Technology, pp.1264–1267. https://doi.org/10.1109/ICCT.2010.5689090
Myles, A. J., Feudale, R. N., Liu, Y., Woody, N. A., & Brown, S. D. (2004). An introduction to decision tree modeling. Journal of Chemometrics: A Journal of the Chemometrics Society, 18(6), 275–285. https://doi.org/10.1002/cem.873
Guo, G., Wang, H., Bell, D., Bi, Y., & Greer, K. (2003). KNN model-based approach in classification. In OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", pp.986–996. https://doi.org/10.1007/978-3-540-39964-3_62
Yager, R. R. (2006). An extension of the naive Bayesian classifier. Information Sciences, 176(5), 577–588. https://doi.org/10.1016/j.ins.2004.12.006
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Human or animal rights
The article does not involve ethical research on humans or animals.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xin, M., Cai, Z. A feature fusion-based communication jamming recognition method. Wireless Netw 29, 2993–3004 (2023). https://doi.org/10.1007/s11276-023-03272-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-023-03272-1