Li / Song / Liang | Wireless Communications under Hostile Jamming: Security and Efficiency | E-Book | www.sack.de
E-Book

E-Book, Englisch, 230 Seiten

Li / Song / Liang Wireless Communications under Hostile Jamming: Security and Efficiency


1. Auflage 2018
ISBN: 978-981-13-0821-5
Verlag: Springer Nature Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 230 Seiten

ISBN: 978-981-13-0821-5
Verlag: Springer Nature Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark



This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency.  We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques.  We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Tongtong Li received her Ph.D. degree in Electrical Engineering in 2000 from Auburn University. From 2000 to 2002, she was with Bell Labs, and had been working on the design and implementation of 3G and 4G systems. Since 2002, she has been with Michigan State University, where she is now an Associate Professor. Prof. Li's research interests fall into the areas of wireless and wired communications, wireless security, information theory, and statistical signal processing, with applications in computational neuroscience. She is a recipient of a National Science Foundation (NSF) CAREER Award (2008) for her research on efficient and reliable wireless communications. In the past, Prof. Li served as an Associate Editor for IEEE Transactions on Signal Processing, IEEE Signal Processing Letters, and an Editorial Board Member for EURASIP Journal Wireless Communications and Networking.Tianlong Song received his Ph.D. degree in Electrical and Computer Engineering in 2016 from Michigan State University. During his Ph.D. study, he had been working on efficient and secure system design in wireless communications under jamming, as well as brain neuroimaging data mining. Since 2016, he has been with Zillow Inc., where he is now a Big Data Software Development Engineer, and working on big data related study and development. His research interests lie in the areas of secure communications under jamming and big data infrastructure. He is also enthusiastic about machine learning, natural language processing and artificial intelligence. Yuan Liang received his B.S. degree in Electrical Engineering from Nanjing University of Posts and Telecommunications in 2012, and the M.S. degree in Electrical Engineering from Southeast University in 2015. He is currently working toward his Ph.D. degree in the Department of Electrical and Computer Engineering at Michigan State University. His research focuses on architecture design, performance analysis and resource allocation in heterogeneous wireless networks. He is also highly interested in computational neuroscience, big data, natural language processing and artificial intelligence.

Li / Song / Liang Wireless Communications under Hostile Jamming: Security and Efficiency jetzt bestellen!

Weitere Infos & Material


1;Preface;6
2;Acknowledgments;9
3;Contents;10
4;Acronyms;15
5;1 Introduction;18
5.1;1.1 Hostile Jamming: A Brief Introduction;18
5.1.1;1.1.1 Existing Jamming Models;18
5.1.2;1.1.2 Disguised Jamming: A New Concept;20
5.2;1.2 Jamming Resistance of General Communication Systems;20
5.3;1.3 Limitations with Existing Anti-Jamming Techniques;21
5.3.1;1.3.1 Inadequate Jamming Resistance Dueto Security Weaknesses;22
5.3.2;1.3.2 Low Spectral Efficiency Due to Self-Jamming and Repeated Coding;23
5.4;1.4 The Arbitrarily Varying Channel Model and Channel Capacity Under Jamming;24
5.5;1.5 Book Overview: Anti-Jamming System Design and Capacity Analysis Under Jamming;26
5.6;References;29
6;2 Enhanced CDMA System with Secure Scrambling;31
6.1;2.1 Introduction;31
6.1.1;2.1.1 CDMA and Its Security;31
6.1.2;2.1.2 Existing Work;32
6.1.2.1;2.1.2.1 Capacity of CDMA Systems Under Jamming;32
6.1.2.2;2.1.2.2 Deterministic/Random Codes and Most Effective Jamming;33
6.1.2.3;2.1.2.3 Built-In Security Analysis of Existing CDMA Systems;34
6.2;2.2 System Model and Problem Identification;35
6.2.1;2.2.1 System Model;35
6.2.2;2.2.2 Problem Identification;37
6.3;2.3 Jamming Mitigation with Robust Receiver Design;39
6.4;2.4 Jamming Mitigation with Secure Scrambling;41
6.4.1;2.4.1 AES-Based Secure Scrambling;41
6.4.2;2.4.2 Security Analysis;42
6.4.3;2.4.3 Complexity Analysis;43
6.5;2.5 Capacity of CDMA with and without Secure Scrambling Under Disguised Jamming;44
6.5.1;2.5.1 Capacity of CDMA Systems without Secure Scrambling Under Disguised Jamming;45
6.5.2;2.5.2 Symmetricity Analysis of CDMA Systems with Secure Scrambling Under Disguised Jamming;46
6.5.3;2.5.3 Capacity Calculation of CDMA Systems with Secure Scrambling Under Disguised Jamming;52
6.6;2.6 Numerical Results;54
6.6.1;2.6.1 Jamming Mitigation with Robust Receiver Design;54
6.6.2;2.6.2 Jamming Mitigation with Secure Scrambling;57
6.7;2.7 Conclusions;58
6.8;References;59
7;3 Message-Driven Frequency Hopping Systems;61
7.1;3.1 The Concept of Message-Driven Frequency Hopping (MDFH);61
7.1.1;3.1.1 A Brief Revisit to Existing Work;61
7.1.2;3.1.2 The Basic Idea of MDFH;62
7.1.3;3.1.3 Transmitter Design;62
7.1.4;3.1.4 Receiver Design;64
7.2;3.2 Efficiency Enhanced MDFH;66
7.2.1;3.2.1 The Modified Hopping Frequency Selection Process;66
7.2.2;3.2.2 Signal Detection;67
7.2.3;3.2.3 Collision-Free MDFH in Multiple Access Environment;68
7.3;3.3 Performance Analysis for E-MDFH;69
7.3.1;3.3.1 BER Analysis;69
7.3.1.1;3.3.1.1 BER of the Carrier Bits;69
7.3.1.2;3.3.1.2 BER of the Ordinary Bits;73
7.3.1.3;3.3.1.3 Overall BER for E-MDFH;75
7.3.2;3.3.2 Spectral Efficiency Analysis of MDFH;75
7.3.3;3.3.3 Performance Analysis of MDFH Under Hostile Jamming;78
7.4;3.4 Anti-jamming Message-Driven Frequency Hopping:System Design;80
7.4.1;3.4.1 What Is AJ-MDFH?;80
7.4.2;3.4.2 Transmitter Design;81
7.4.3;3.4.3 Receiver Design;82
7.4.3.1;3.4.3.1 Demodulation;82
7.4.3.2;3.4.3.2 Signal Detection and Extraction;82
7.4.4;3.4.4 Extension to Multi-carrier AJ-MDFH;84
7.4.4.1;3.4.4.1 Multi-carrier AJ-MDFH without Diversity;85
7.4.4.2;3.4.4.2 Multi-carrier AJ-MDFH with Diversity;85
7.4.5;3.4.5 ID Constellation Design and Its Impact on System Performance;85
7.4.5.1;3.4.5.1 Design Criterion and Jamming Classification;86
7.4.5.2;3.4.5.2 Constellation Design Under Noise Jamming;86
7.4.5.3;3.4.5.3 Constellation Design Under ID Jamming;89
7.4.6;3.4.6 Spectral Efficiency Analysis of AJ-MDFH;92
7.4.7;3.4.7 Numerical Analysis of AJ-MDFH Under Jamming;94
7.5;3.5 Capacity Analysis of MDFH and AJ-MDFH Under Disguised Jamming;96
7.5.1;3.5.1 Capacity of MDFH Under Disguised Jamming;97
7.5.2;3.5.2 Capacity of AJ-MDFH Under Disguised Jamming;99
7.5.2.1;3.5.2.1 AVC Symmetricity Analysis;100
7.5.2.2;3.5.2.2 Capacity Calculation;106
7.6;3.6 Conclusions;110
7.7;References;111
8;4 Collision-Free Frequency Hopping and OFDM;114
8.1;4.1 Enhance Jamming Resistance: The Combination of OFDM and Frequency Hopping;114
8.2;4.2 Secure Subcarrier Assignment;116
8.2.1;4.2.1 Secure Permutation Index Generation;116
8.2.2;4.2.2 Secure Permutation Algorithm and SubcarrierAssignment;117
8.3;4.3 The Collision-Free Frequency Hopping (CFFH) Scheme;119
8.3.1;4.3.1 Signal Transmission;119
8.3.2;4.3.2 Signal Detection;120
8.4;4.4 Space-Time Coded Collision-Free Frequency Hopping;122
8.4.1;4.4.1 Transmitter Design;122
8.4.2;4.4.2 Receiver Design;125
8.5;4.5 Performance Analysis of STC-CFFH;126
8.5.1;4.5.1 System Performance in Jamming-Free Case;127
8.5.2;4.5.2 System Performance Under Hostile Jamming;128
8.5.2.1;4.5.2.1 Jamming Models;128
8.5.2.2;4.5.2.2 System Performance Under Rayleigh Fading and Full-Band Jamming;129
8.5.2.3;4.5.2.3 System Performance Under Rayleigh Fading and Partial-Band Jamming;129
8.5.3;4.5.3 Spectral Efficiency;130
8.6;4.6 Simulation Examples;131
8.7;4.7 Conclusions;133
8.8;References;133
9;5 Securely Precoded OFDM;136
9.1;5.1 Introduction;136
9.2;5.2 Secure OFDM System Design Under Disguised Jamming;138
9.2.1;5.2.1 Transmitter Design with Secure Precoding;138
9.2.2;5.2.2 Receiver Design with Secure Decoding;140
9.2.3;5.2.3 PN Sequence Synchronization Between the Secure Precoder and Decoder;141
9.3;5.3 Symmetricity and Capacity Analysis using the AVC Model;143
9.3.1;5.3.1 AVC Symmetricity Analysis;143
9.3.2;5.3.2 Capacity Analysis;147
9.4;5.4 Performance of SP-OFDM Under Disguised Jamming;149
9.5;5.5 Discussion on the Worst Jamming Distribution for SP-OFDM;153
9.5.1;5.5.1 Existence of the Worst Jamming Distribution;154
9.5.2;5.5.2 Discreteness of the Worst Jamming Distribution;158
9.5.3;5.5.3 Numerical Results;160
9.6;5.6 Conclusions;165
9.7;References;167
10;6 Multiband Transmission Under Jamming: A Game Theoretic Perspective;170
10.1;6.1 Game Theory and Communication Under Jamming;170
10.1.1;6.1.1 The Concept of Game Theory;170
10.1.2;6.1.2 Game Theory and Its Applications in Communications;171
10.1.3;6.1.3 Game Theory and Multiband Communications;173
10.1.3.1;6.1.3.1 A Bayesian Jamming Game in an OFDM Wireless Network;173
10.1.3.2;6.1.3.2 CSI Usage Over Parallel Fading Channels Under Jamming Attacks: A Game Theory Study;174
10.1.3.3;6.1.3.3 Equilibrium Strategies for an OFDM Network That Might Be Under a Jamming Attack;176
10.2;6.2 Problem Formulation;177
10.2.1;6.2.1 System Description;177
10.2.2;6.2.2 Strategy Spaces for the Authorized User and the Jammer;178
10.2.3;6.2.3 The Minimax Problem in the Zero-Sum Game Between the Authorized User and the Jammer;179
10.3;6.3 Multiband Communications Under JammingOver AWGN Channels;180
10.3.1;6.3.1 The Minimax Problem for Fixed Ks and KJ;181
10.3.2;6.3.2 Capacity Optimization Over Ks and KJ;183
10.4;6.4 Multiband Communications Under Jamming Over Frequency Selective Fading Channels;185
10.4.1;6.4.1 The Minimax Problem for Fading Channels;185
10.4.2;6.4.2 Correlated Fading Channels: A Two-Step Water-Filling Algorithm;188
10.4.3;6.4.3 Arbitrary Fading Channels: An Iterative Water-Filling Algorithm;191
10.5;6.5 Numerical Results;193
10.5.1;6.5.1 AWGN Channels;193
10.5.2;6.5.2 Frequency Selective Fading Channels;194
10.6;6.6 Conclusions;200
10.7;References;200
11;7 Conclusions and Future Directions;203
11.1;7.1 What We Learned About Jamming and Anti-jamming;203
11.1.1;7.1.1 On Jamming;203
11.1.2;7.1.2 On Anti-jamming System Design;204
11.2;7.2 Discussions on Future Directions;206
11.2.1;7.2.1 Jamming and Anti-jamming in 5G IoT Systems;206
11.2.2;7.2.2 5G Wireless Network Design and Performance Evaluation Under Hostile Environments;206
11.2.2.1;7.2.2.1 Network Failure Detection and Network Performance Evaluation Under Malicious Attacks;207
11.2.2.2;7.2.2.2 Improving Network Reliability Through Topology Design and Dynamic Routing Protocol Development;208
11.3;7.3 Concluding Remarks;209
11.4;References;209
12;Appendix A Proof of Lemma 3.3;211
12.1;References;213
13;Appendix B Calculation of the Probability Matrix W1;214
14;Appendix C Subchannel Selection with Nonuniform Preferences;217
14.1;Reference;219
15;Appendix D Uniqueness of the Solution to Theorem 6.3;220
16;Appendix E Proof of Lemma 6.3;222
17;Appendix F Convergence Analysis of the Iterative Water Filling Algorithm;224
18;Index;226



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.