Advertisement

Introduction

  • Tongtong Li
  • Tianlong Song
  • Yuan Liang
Chapter

Abstract

In this chapter, we first explain that as an active attack, hostile jamming has become a serious threat to both military and civilian communications. We then introduce various jamming models, analyze the jamming resistance of general communication systems under jamming, and investigate the limitations with existing anti-jamming techniques. Third, we introduce the arbitrarily varying channel model and explain how to evaluate the channel capacity under hostile jamming using the arbitrarily varying channel model. Finally, we present the approach we take in anti-jamming system design: to incorporate the time-frequency-space diversity and advanced cryptographic techniques into the physical layer transceiver design and spectrum assignment control, so as to achieve jamming resistance through the synthesis of secure randomness and diversity. We end the chapter with an overview to the major contents covered in this book.

References

  1. 1.
    R. Pickholtz, D. Schilling, and L.B.Milstein, “Theory of spread spectrum communications – a tutorial,” IEEE Transactions on Communications, vol. 30, pp. 855–884, May 1982.CrossRefGoogle Scholar
  2. 2.
    M. Pursley and W. Stark, “Performance of reed-solomon coded frequency-hop spread-spectrum communications in partial-band interference,” IEEE Transactions on Communications, vol. 33, pp. 767–774, Aug 1985.MathSciNetCrossRefGoogle Scholar
  3. 3.
    B. Levitt, “FH/MFSK performance in multitone jamming,” vol. 3, no. 5, pp. 627–643, 1985.Google Scholar
  4. 4.
    A. Alahmadi, Z. Fang, T. Song, and T. Li, “Subband puea detection and mitigation in ofdm-based cognitive radio networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2131–2142, Oct 2015.CrossRefGoogle Scholar
  5. 5.
    Y. R. Chien, “Design of gps anti-jamming systems using adaptive notch filters,” IEEE Systems Journal, vol. 9, no. 2, pp. 451–460, June 2015.MathSciNetCrossRefGoogle Scholar
  6. 6.
    J.-W. Moon, J. Shea, and T. Wong, “Jamming estimation on block-fading channels,” in Proc. IEEE Military Communications Conference, vol. 3, Oct. 31- Nov. 3 2004, pp. 1310–1316.Google Scholar
  7. 7.
    N. Pronios and A. Polydoros, “Jamming optimization in fully-connected, spread-spectrum networks,” in Proc. IEEE Military Commun. Conf. IEEE, pp. 65–70.Google Scholar
  8. 8.
    M. Pursley and J. Skinner, “Turbo product coding in frequency-hop wireless communications with partial-band interference,” in Proc. IEEE Military Communications Conference, vol. 2, Oct 2002, pp. 774–779.Google Scholar
  9. 9.
    L. Zhang, J. Ren, and T. Li, “Time-varying jamming modeling and classification,” IEEE Transactions on Signal Processing, vol. 60, no. 7, pp. 3902–3907, July 2012.MathSciNetCrossRefGoogle Scholar
  10. 10.
    L. Zhang, H. Wang, and T. Li, “Jamming resistance reinforcement of message-driven frequency hopping,” in Proc. Intl. Conf. Acoust., Speech, Signal Processing, Mar. 2010, pp. 3974–3977.Google Scholar
  11. 11.
    ——, “Anti-Jamming Message-Driven Frequency Hopping: Part I — System Design,” IEEE Transactions on Wireless Communications, pp. 70–79, 2013.Google Scholar
  12. 12.
    L. Zhang and T. Li, “Anti-Jamming Message-Driven Frequency Hopping: Part II — Capacity Analysis Under Disguised Jamming,” IEEE Transactions on Wireless Communications, pp. 80–88, 2013.CrossRefGoogle Scholar
  13. 13.
    M. Medard, “Capacity of correlated jamming channels,” in Allerton Annual Conf. Commun., Control Comput., 1997.Google Scholar
  14. 14.
    A. Lapidoth and P. Narayan, “Reliable communication under channel uncertainty,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2148–2177, Oct 1998.MathSciNetCrossRefGoogle Scholar
  15. 15.
    R. Alred, “Naval radar anti-jamming technique,” Journal of the Institution of Electrical Engineers – Part III A: Radiolocation, vol. 93, no. 10, pp. 1593–1601, 1946.Google Scholar
  16. 16.
    M. Amin, “Interference mitigation in spread spectrum communication systems using time-frequency distributions,” IEEE Transactions on Signal Processing, vol. 45, no. 1, pp. 90–101, 1997.MathSciNetCrossRefGoogle Scholar
  17. 17.
    W. Sun and M. Amin, “A self-coherence anti-jamming gps receiver,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3910–3915, 2005.MathSciNetCrossRefGoogle Scholar
  18. 18.
    I. Bergel, E. Fishler, and H. Messer, “Narrowband interference mitigation in impulse radio,” IEEE Transactions on Communications, vol. 53, no. 8, pp. 1278–1282, 2005.CrossRefGoogle Scholar
  19. 19.
    Y. Wu, B. Wang, K. Liu, and T. Clancy, “Anti-jamming games in multi-channel cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, pp. 4–15, 2012.CrossRefGoogle Scholar
  20. 20.
    C. Popper, M. Strasser, and S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 703–715, 2010.CrossRefGoogle Scholar
  21. 21.
    R. Dixon, Spread Spectrum Systems with Commercial Applications, 3rd ed. John Wiley & Son, Inc, 1994.Google Scholar
  22. 22.
    F. Dominique and J. Reed, “Robust frequency hop synchronisation algorithm,” Electronics Letters, vol. 32, pp. 1450–1451, Aug. 1996.CrossRefGoogle Scholar
  23. 23.
    T. Li, J. Ren, Q. Ling, and W. Liang, “Physical Layer Built-in Security Analysis and Enhancement of CDMA Systems,” in Proc. Conference on Information Sciences and Systems, University of Princeton, Princeton, NJ, Mar. 2004.Google Scholar
  24. 24.
    J. Massey, “Shift-Register Synthesis and BCH Decoding,” IEEE Transactions on Information Theory, vol. 15, pp. 122–127, Jan. 1969.MathSciNetCrossRefGoogle Scholar
  25. 25.
    Q. Ling, T. Li, and Z. Ding, “A Novel Concept: Message Driven Frequency Hopping (MDFH),” in Proc. IEEE International Conference on Communications, 2007.Google Scholar
  26. 26.
    M. Zhang, C. Carroll, and A. H. Chan, “Analysis of IS-95 CDMA Voice Privacy,” in Selected Areas in Cryptography, 2000, pp. 1–13.Google Scholar
  27. 27.
    T. Rappaport, Wireless Communications–Principles and Practices, 2nd ed. Prentice Hall, 2002.Google Scholar
  28. 28.
    D. Blackwell, L. Breiman, and A. J. Thomasian, “The capacities of certain channel classes under random coding,” Ann. Math. Statist., vol. 31, no. 3, pp. 558–567, 09 1960. [Online]. Available:  https://doi.org/10.1214/aoms/1177705783 CrossRefGoogle Scholar
  29. 29.
    I. Csiszar and P. Narayan, “The capacity of the arbitrarily varying channel revisited: positivity, constraints,” IEEE Transactions on Information Theory, vol. 34, no. 2, pp. 181–193, Mar 1988.MathSciNetCrossRefGoogle Scholar
  30. 30.
    R. Ahlswede and V. Blinovsky, “Classical capacity of classical-quantum arbitrarily varying channels,” IEEE Transactions on Information Theory, vol. 53, no. 2, pp. 526–533, Feb 2007.MathSciNetCrossRefGoogle Scholar
  31. 31.
    V. Blinovsky, P. Narayan, and M. Pinsker, “Capacity of the arbitrarily varying channel under list decoding,” Problems of Information Transmission, vol. 31, no. 2, pp. 99–113, 1995.MathSciNetzbMATHGoogle Scholar
  32. 32.
    T. Ericson, “Exponential error bounds for random codes in the arbitrarily varying channel,” IEEE Transactions on Information Theory, vol. 31, no. 1, pp. 42–48, Jan 1985.MathSciNetCrossRefGoogle Scholar
  33. 33.
    T. Song, W. E. Stark, T. Li, and J. K. Tugnait “Optimal multiband transmission under hostile jamming,” IEEE Transactions on Communications, vol. 64, no. 9, pp. 4013–4027, Sept 2016.CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Tongtong Li
    • 1
  • Tianlong Song
    • 2
  • Yuan Liang
    • 1
  1. 1.Department of Electrical and Computer EngineeringMichigan State UniversityEast LansingUSA
  2. 2.Zillow IncSeattleUSA

Personalised recommendations