Conclusions and Future Directions

  • Tongtong Li
  • Tianlong Song
  • Yuan Liang


In this chapter, we summarize what we have learned from our study on jamming and anti-jamming, including the jamming models, the essential techniques in anti-jamming system design, a brief summary of innovative anti-jamming systems, and the ultimate game between smart transmission and cognitive jamming. We also look into some future research directions on jamming and anti-jamming in 5G IoT systems and 5G wireless network design and performance evaluation under hostile environments.


  1. 1.
    R.V. Alred. Naval radar anti-jamming technique. Journal of the Institution of Electrical Engineers - Part III A: Radiolocation, 93(10):1593–1601, 1946.Google Scholar
  2. 2.
    M.G. Amin. Interference mitigation in spread spectrum communication systems using time-frequency distributions. IEEE Transactions on Signal Processing, 45(1):90–101, 1997.MathSciNetCrossRefGoogle Scholar
  3. 3.
    Wei Sun and M.G. Amin. A self-coherence anti-jamming gps receiver. IEEE Transactions on Signal Processing, 53(10):3910–3915, 2005.MathSciNetCrossRefGoogle Scholar
  4. 4.
    I. Bergel, E. Fishler, and H. Messer. Narrowband interference mitigation in impulse radio. IEEE Transactions on Communications, 53(8):1278–1282, 2005.CrossRefGoogle Scholar
  5. 5.
    Yongle Wu, Beibei Wang, K.J.R. Liu, and T.C. Clancy. Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1):4–15, 2012.CrossRefGoogle Scholar
  6. 6.
    C. Popper, M. Strasser, and S. Capkun. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications, 28(5):703–715, 2010.CrossRefGoogle Scholar
  7. 7.
    R.C. Dixon. Spread Spectrum Systems with Commercial Applications. John Wiley & Son, Inc, third edition, 1994.Google Scholar
  8. 8.
    Run Tian, Yuan Liang, Xuezhi Tan, and Tongtong Li. Overlapping user grouping in iot oriented massive mimo systems. IEEE Access, 5:14177–14186, 2017.CrossRefGoogle Scholar
  9. 9.
    H. Q. Ngo, E. G. Larsson, and T. L. Marzetta. Aspects of favorable propagation in massive MIMO. In European Signal Processing Conference, pages 76–80, September 2014.Google Scholar
  10. 10.
    Ulrike Von Luxburg. A tutorial on spectral clustering. Statistics and computing, 17(4):395–416, 2007.MathSciNetCrossRefGoogle Scholar
  11. 11.
    A.S. Rawat, P. Anand, Hao Chen, and P.K. Varshney. Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Transactions on Signal Processing, 59(2):774–786, Feb. 2011.Google Scholar
  12. 12.
    Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2):247–260, Feb.Google Scholar
  13. 13.
    Mai Abdelhakim, Leonard Lightfoot, Jian Ren, and T. Li. Distributed detection in mobile access wireless sensor networks under byzantine attacks. IEEE Transactions on Parallel and Distributed Systems, 99, 2013.Google Scholar
  14. 14.
    Lei Zhang and Tongtong Li. Anti-jamming message-driven frequency hopping; part ii: Capacity analysis under disguised jamming. IEEE Transactions on Wireless Communications, 12(1):80–88, 2013.CrossRefGoogle Scholar
  15. 15.
    R. Niu and P.K. Varshney. Performance analysis of distributed detection in a random sensor field. IEEE Transactions on Signal Processing, 56(1):339–349, Jan. 2008.MathSciNetCrossRefGoogle Scholar
  16. 16.
    C. Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. IEEE International Workshop on Sensor Network Protocols and Applications, pages 113–127, May 2003.Google Scholar
  17. 17.
    Tongtong Li, M. Abdelhakim, and Jian Ren. N-hop networks: a general framework for wireless systems. IEEE Wireless Communications, 21(2):98–105, April 2014.CrossRefGoogle Scholar
  18. 18.
    M. Abdelhakim, L.E. Lightfoot, Jian Ren, and Tongtong Li. Distributed detection in mobile access wireless sensor networks under Byzantine attacks. IEEE Transactions on Parallel and Distributed Systems, 25(4):950–959, April 2014.CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Tongtong Li
    • 1
  • Tianlong Song
    • 2
  • Yuan Liang
    • 1
  1. 1.Department of Electrical and Computer EngineeringMichigan State UniversityEast LansingUSA
  2. 2.Zillow IncSeattleUSA

Personalised recommendations