Do you want to publish a course? Click here

Convolution Attack on Frequency-Hopping by Full-Duplex Radios

156   0   0.0 ( 0 )
 Added by Jagadeesh Harshan
 Publication date 2019
and research's language is English




Ask ChatGPT about the research

We propose a new adversarial attack on frequency-hopping based wireless communication between two users, namely Alice and Bob. In this attack, the adversary, referred to as Eve, instantaneously modifies the transmitted signal by Alice before forwarding it to Bob within the symbol-period. We show that this attack forces Bob to incorporate Eves signal in the decoding process; otherwise, treating it as noise would further degrade the performance akin to jamming. Through this attack, we show that Eve can convert a slow-fading channel between Alice and Bob to a rapid-fading one by modifying every transmitted symbol independently. As a result, neither pilot-assisted coherent detection techniques nor blind-detection methods are directly applicable as countermeasures. As potential mitigation strategies, we explore the applicability of frequency-hopping along with (i) On-Off keying (OOK) and (ii) Binary Frequency-Shift-Keying (FSK) as modulation schemes. In the case of OOK, the attacker attempts to introduce deep-fades on the tone carrying the information bit, whereas in the case of BFSK, the attacker pours comparable energy levels on the tones carrying bit-$0$ and bit-$1$, thereby degrading the performance. Based on extensive analyses and experimental results, we show that (i) when using OOK, Bob must be equipped with a large number of receive antennas to reliably detect Alices signal, and (ii) when using BFSK, Alice and Bob must agree upon a secret-key to randomize the location of the tones carrying the bits, in addition to randomizing the carrier-frequency of communication.



rate research

Read More

In this work, we address reliable communication of low-latency packets in the presence of a full-duplex adversary that is capable of executing a jamming attack while also being able to measure the power levels on various frequency bands. Due to the presence of a strong adversary, first, we point out that traditional frequency-hopping does not help since unused frequency bands may not be available, and moreover, the victims transition between the frequency bands would be detected by the full-duplex adversary. Identifying these challenges, we propose a new cooperative mitigation strategy, referred to as the Semi-Coherent Fast-Forward Full-Duplex (SC-FFFD) relaying technique, wherein the victim node, upon switching to a new frequency band, seeks the assistance of its incumbent user, which is also a full-duplex radio, to instantaneously forward its messages to the destination using a portion of their powers. Meanwhile, the two nodes cooperatively use their residual powers on the jammed frequency band so as to engage the adversary to continue executing the jamming attack on the same band. Using on-off keying (OOK) and phase-shift-keying (PSK) as the modulation schemes at the victim and the helper node, respectively, we derive upper bounds on the probability of error of jointly decoding the information symbols of the two nodes, and subsequently derive analytical solutions to arrive at the power-splitting factor between the two frequency bands to minimize the error of both the nodes. We also present extensive simulation results for various signal-to-noise-ratio values and PSK constellations to showcase the efficacy of the proposed approach.
This work addresses a strategy to mitigate jamming attack on low-latency communication by a Full-Duplex (FD) adversary in fast-fading channel conditions. The threat model is such that the FD adversary can jam a frequency band and measure the jammed bands power level. We first point out that due to the presence of this FD adversary, Frequency Hopping (FH) fails. We then propose a fast-forward cooperative relaying scheme, wherein the victim node hops to the frequency band of a nearby FD helper node that fast-forwards the victims symbol along with its symbol. At the same time, the victim and the helper cooperatively pour some fraction of their power on the jammed band to engage the adversary. Due to fast-fading channel conditions, the victim and the helper use amplitude based non-coherent signalling referred to as Non-Coherent Fast-Forward Full-Duplex (NC-F2FD) relaying. To minimize the error-rate of this strategy, we jointly design the constellations at the helper node and the victim node by formulating an optimization problem. Using non-trivial results, we first analyse the objective function and then, based on the analytical results, propose a low-complexity algorithm to synthesize the fast-forwarded constellations. Through simulations, we show that the error performance of the victim improves after employing our countermeasure.
We consider a full-duplex decode-and-forward system, where the wirelessly powered relay employs the time-switching protocol to receive power from the source and then transmit information to the destination. It is assumed that the relay node is equipped with two sets of antennas to enable full-duplex communications. Three different interference mitigation schemes are studied, namely, 1) optimal 2) zero-forcing and 3) maximum ratio combining/maximum ratio transmission. We develop new outage probability expressions to investigate delay-constrained transmission throughput of these schemes. Our analysis show interesting performance comparisons of the considered precoding schemes for different system and link parameters.
Recently, several working implementations of in--band full--duplex wireless systems have been presented, where the same node can transmit and receive simultaneously in the same frequency band. The introduction of such a possibility at the physical layer could lead to improved performance but also poses several challenges at the MAC layer. In this paper, an innovative mechanism of channel contention in full--duplex OFDM wireless networks is proposed. This strategy is able to ensure efficient transmission scheduling with the result of avoiding collisions and effectively exploiting full--duplex opportunities. As a consequence, considerable performance improvements are observed with respect to standard and state--of--the--art MAC protocols for wireless networks, as highlighted by extensive simulations performed in ad hoc wireless networks with varying number of nodes.
Mobile traffic is projected to increase 1000 times from 2010 to 2020. This poses significant challenges on the 5th generation (5G) wireless communication system design, including network structure, air interface, key transmission schemes, multiple access, and duplexing schemes. In this paper, full duplex networking issues are discussed, aiming to provide some insights on the design and possible future deployment for 5G. Particularly, the interference scenarios in full duplex are analyzed, followed by discussions on several candidate interference mitigation approaches, interference proof frame structures, transceiver structures for channel reciprocity recovery, and super full duplex base station where each sector operates in time division duplex (TDD) mode. The extension of TDD and frequency division duplex (FDD) to full duplex is also examined. It is anticipated that with future standardization and deployment of full duplex systems, TDD and FDD will be harmoniously integrated, supporting all the existing half duplex mobile phones efficiently, and leading to a substantially enhanced 5G system performance.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا