Advertisement

Multi-source, multi-object and multi-domain (M-SOD) electromagnetic interference system optimised by intelligent optimisation approaches

  • Yihua Hu
  • Minle LiEmail author
  • Xiangyu Liu
  • Ying Tan
Article
  • 30 Downloads

Abstract

With the wide use of electromagnetic information equipment, a large number of wireless radiation systems coexisting in the same region produce intentional or unintentional interference on electronic receivers. For the purpose of intentional electromagnetic interference, it is necessary to realise the efficient suppression of other receivers at little cost. When multiple transmitting sources are used to interfere with multiple receivers, the parameters of multiple transmitting sources are required to be comprehensively optimised and set so as to achieve a desired high-efficiency interference. Therefore, we propose a novel method to optimise the setting of parameters of a multi-source, multi-object and multi-domain (M-SOD) interference system based on intelligent optimisation approaches. Furthermore, this study also builds an intelligent optimisation model, which contains multiple transmitters and receivers which involved many parameters include position, direction of space domain, frequency, bandwidth, and power. Then the model is abstracted to the problem of single-objective optimisation with constraints and optimised through a traditional GA and an improved FWA method. The extensive experiments and comparisons show that the proposed algorithm is an effective approach for setting the parameters of an M-SOD electromagnetic interference system and superior to the conventional method.

Keywords

Electromagnetic interference Transmitting sources Parameter setting Intelligent optimisation Evolutionary computation algorithm 

Notes

Acknowledgements

This work was supported by the Natural Science Foundation of China (NSFC) under Grant Nos. 61673025, 61271353 and partially supported by National Key Basic Research Development Plan (973 Plan) Project of China under Grant No. 2015CB352302.

References

  1. Altman E, Avrachenkov K, Garnaev A (2010) Fair resource allocation in wireless networks in the presence of a jammer. Perform Eval 67(4):338–349CrossRefGoogle Scholar
  2. Altman E, Avrachenkov K, Garnaev A (2011) Jamming in wireless networks under uncertainty. Mob Netw Appl 16(2):246–254CrossRefGoogle Scholar
  3. Amuru SD, Buehrer RM (2015) Optimal jamming against digital modulation. IEEE Trans Inf Forensics Secur 10(10):2212–2224CrossRefGoogle Scholar
  4. Bayram S, Vanli ND, Dulek B et al (2012) Optimum power allocation for average. IEEE Commun Lett 16(8):1153–1156CrossRefGoogle Scholar
  5. Chen L, Leneutre J (2011) Fight jamming with jamming—a game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput Netw 55(9):2259–2270CrossRefGoogle Scholar
  6. Commander CW, Pardalos PM, Ryabchenko V et al (2008) Jamming communication networks under complete uncertainty. Optim Lett 2(1):53–70MathSciNetCrossRefzbMATHGoogle Scholar
  7. Dey BK, Jaggi S, Langberg M et al (2013) Upper bounds on the capacity of binary channels with causal adversaries. IEEE Trans Inf Theory 59(6):3753–3763MathSciNetCrossRefzbMATHGoogle Scholar
  8. Dong L, Han Z, Petropulu AP et al (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58(3 PART 2):1875–1888MathSciNetCrossRefzbMATHGoogle Scholar
  9. Dorigo M (1992) Optimization, learning and natural algorithms. Politecnico di Milano, MilanGoogle Scholar
  10. Eberhart R, Kennedy J (2002) A new optimizer using particle swarm theory. In: International symposium on MICRO machine and human science, pp 39–43Google Scholar
  11. Fan Y, Liao X, Gao Z et al (2016) Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels. In: 2016 IEEE international conference on communications workshops (ICC), (61302067), pp 207–212Google Scholar
  12. Filho C, Neto F, Lins A et al (2009) A novel search algorithm based on fish school behavior. In: IEEE international conference on systems, man and cybernetics, pp 2646–2651Google Scholar
  13. Fogel DB, Anderson RW (2000) Revisiting Bremermann’s genetic algorithm. I. Simultaneous mutation of all parameters. In: Congress on evolutionary computation, vol 2, pp 1204–1209Google Scholar
  14. Fraser A (1957a) Simulation of genetic systems by automatic digital computers I. Introduction. Aust J Biol Sci 10(4):484–491CrossRefGoogle Scholar
  15. Fraser A (1957b) Simulation of genetic systems by automatic digital computers II. Effects of linkage on rates of advance under selection. Aust J Biol Sci 10(4):492–500CrossRefGoogle Scholar
  16. Gao Y, Chen W, Xie T et al (2009) Doppler spread estimation for nonrayleigh fading channel. In: The 4th IEEE conference on industrial electronics and applications, Xi’an, pp 1106–1109Google Scholar
  17. Gencer C, Aydogan EK, Celik C (2008) A decision support system for locating VHF/UHF radio jammer systems on the terrain. Inf Syst Front 10(1):111–124CrossRefGoogle Scholar
  18. Goldsmith A (2005) Wireless communications. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  19. Gomaa A, Al-Dhahir N (2011) A sparsity-aware approach for NBI estimation in MIMO-OFDM. IEEE Trans Wirel Commun 10(6):1854–1862CrossRefGoogle Scholar
  20. Grover K, Lim A, Yang Q (2014) Jamming and anti-jamming techniques in wireless networks: a survey. Int J Ad Hoc Ubiquitous Comput 17(4):197CrossRefGoogle Scholar
  21. Heyns AM, van Vuuren JH (2018) Multi-type, multi-zone facility location. Geograph Anal 50(1):3–31CrossRefGoogle Scholar
  22. Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Erciyes University, KayseriGoogle Scholar
  23. Law YW, Palaniswami M, Van Hoesel L et al (2009a) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans Sens Netw (TOSN).  https://doi.org/10.1145/1464420.1464426 Google Scholar
  24. Law YW, Palaniswami M, Van Hoesel L et al (2009b) Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans Sens Netw 5(1):1–38CrossRefGoogle Scholar
  25. Lee K, Kwon HM, Ding Y et al (2011a) Noncooperative distributed MMSE relay schemes under jamming environment and node geometry in wireless relay networks. In: IEEE wireless telecommunications symposium (WTS), pp 1–5Google Scholar
  26. Lee K, Kwon HM, Ding Y et al (2011b) Node geometry and broadband jamming in noncooperative relay networks under received power constraint. In: The 34th IEEE Sarnoff symposium, pp 1–5Google Scholar
  27. Li C, Dai H (2013) Connectivity of multi-channel wireless networks under jamming attacks. In: IEEE Global Communications Conference (GLOBECOM), pp 706–711Google Scholar
  28. Li M, Koutsopoulos I (2010) Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Trans Mob Comput 9(8):1119–1133CrossRefGoogle Scholar
  29. Li J, Tanying (2017) Loser-out tournament based fireworks algorithm for multi-modal function optimization. IEEE Trans Evolut ComputGoogle Scholar
  30. Li H, Pei B, Huang Y (2010) Performance of the direct sequence spread spectrum system with single-tong jamming. In: IEEE international conference on information theory and information security, pp 458–461Google Scholar
  31. Liu Z, Liu H, Xu W et al (2011a) Exploiting jamming-caused neighbor changes for jammer localization. IEEE Trans Parallel Distrib Syst 23(3):547–555CrossRefGoogle Scholar
  32. Liu S, Bai W, Xue S et al (2011b) Research of the comparative analysis of the frame structure of TD-SCDMA and WCDMA. In: Global mobile congress, Shanghai, pp 1–3Google Scholar
  33. Liu Y, Li J, Petropulu AP (2013) Destination assisted cooperative jamming for wireless physical-layer security. IEEE Trans Inf Forensics Secur 8(4):682–694CrossRefGoogle Scholar
  34. Luo J, Andrian JH, Zhou C (2007) Bit error rate analysis of jamming for OFDM systems. In: Wireless telecommunications symposiumGoogle Scholar
  35. Medal HR (2016) The wireless network jamming problem subject to protocol interference. Networks 47(1):26–36MathSciNetzbMATHGoogle Scholar
  36. Naseem A, Khan SA, Malik AW (2017) A real-time man-in-loop threat evaluation and resource assignment in defense. J Oper Res Soc 68(6):725–738CrossRefGoogle Scholar
  37. Pelechrinis K, Koutsopoulos I, Broustis I et al (2016) Jammer localization in wireless networks: an experimentation-driven approach. Comput Commun 86:75–85CrossRefGoogle Scholar
  38. Price KV, Storn RM, Lampinen JA (2006) Differential evolution: a practical approach to global optimization. Springer, BerlinzbMATHGoogle Scholar
  39. Rechenberg I (1965) Cybernetic solution path of an experimental problem. In Royal Aircraft Establishment Translation No. 1122 (trans: Toms BF) (August 1965). Key: citeulike:1505176Google Scholar
  40. Rechenberg I (1971) Evolutionstrategie: optimierung technisher systeme nach prinzipien des biologischen evolution. Technical University of Berlin, BerlinGoogle Scholar
  41. Reed J, Toombs R, Barricelli NA (1967) Simulation of biological evolution and machine learning. J Theor Biol 17(3):319–342CrossRefGoogle Scholar
  42. Sagduyu YE, Berryt RA, Ephremidesi A (2010) Wireless jamming attacks under dynamic traffic uncertainty. In: Modeling and optimization in mobile, ad hoc and wireless networks (WiOpt), pp 303–312Google Scholar
  43. Sagduyu YE, Berry RA, Ephremides A (2011) Jamming games in wireless networks with incomplete information. IEEE Commun Mag 49(8):112–118CrossRefGoogle Scholar
  44. Schwefel HP (1975) Evolutionsstrategie und numerische optimierung. Technical University of Berlin, BerlinGoogle Scholar
  45. Song T, Stark WE, Li T et al (2016) Optimal multiband transmission under hostile jamming. IEEE Trans Commun 64(9):4013–4027CrossRefGoogle Scholar
  46. Storn R, Price K (1997) Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341–359MathSciNetCrossRefzbMATHGoogle Scholar
  47. Tanergüçlü T, Maraş H, Gencer C et al (2012) A decision support system for locating weapon and radar positions in stationary point air defence. Inf Syst Front 14(2):423–444CrossRefGoogle Scholar
  48. Tan Y, Zhu Y (2010) Fireworks algorithm for optimization. In: International conference on advances in swarm intelligence, pp 355–364Google Scholar
  49. Tayebi A, Berber S, Swain A (2017) A new approach for error rate analysis of wide-band DSSS-CDMA system with imperfect synchronization. Wirel Pers Commun 98(10):1–28Google Scholar
  50. Vadlamani S, Medal HR et al (2014) A bi-level programming model for the wireless network jamming placement problem. In: Proceedings of the 2014 industrial and systems engineering research conferenceGoogle Scholar
  51. Veronica Belmega E, Chorti A (2017) Protecting secret key generation systems against jamming: energy harvesting and channel hopping approaches. IEEE Trans Inf Forensics Secur 12(11):2611–2626CrossRefGoogle Scholar
  52. Wang L, Cao C, Ma JX et al (2013) Cluster-based cooperative jamming in wireless multi-hop networks. In: Personal indoor and mobile radio communications (PIMRC), pp 169–174Google Scholar
  53. Yang XS (2009) Firefly algorithms for multimodal optimization. In: Watanabe O, Zeugmann T (eds) Stochastic algorithms: foundations and applications. Lecture Notes in Computer Science, vol 5792. Springer, Berlin, pp 169–178CrossRefGoogle Scholar
  54. Yang D, Xue G, Zhang J et al (2013) Coping with a smart jammer in wireless networks: a Stackelberg game approach. IEEE Trans Wirel Commun 12(8):4038–4047CrossRefGoogle Scholar
  55. Zang G, Gao Y, Mu J (2010) Performance analysis of the cooperative DS/SS systems in single-tone interference over flat Rayleigh fading channels. In: International conference on communications, circuits and systems, pp 126–130Google Scholar
  56. Zhang Y, Yang L (2014) Triangle and GA methods for UAVs jamming. Math Probl Eng 2014(2):1–8Google Scholar
  57. Zhang L, Guan Z, Melodia T (2014) Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying. In: INFO-COM, pp 549–557Google Scholar

Copyright information

© Springer Nature B.V. 2019

Authors and Affiliations

  1. 1.College of Electronic EngineeringNational University of Defense TechnologyHefeiChina
  2. 2.School of Electronics Engineering and Computer SciencePeking UniversityBeijingChina

Personalised recommendations