Skip to main content

Advertisement

Log in

Friendly spectrum jamming against MIMO eavesdropping

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Friendly spectrum jamming is a flexible scheme to establish secure communications among heterogeneous wireless devices without the need of encryption. Previous works have indicated that this scheme however has weak security strength against multiple antenna eavesdropper in today’s wireless communication systems, which limits its wide applicability. To tackle this challenge, we propose a novel modulation method, called energy modulation. The basic idea of our method is to keep the secrecy of the channel state information in modulation, so as to bring high uncertainty to the MIMO’s separation and the eavesdropper’s decoding. As a result, the security strength of friendly jamming notably increases facing multiple antenna eavesdropper. To demonstrate the effectiveness of our method, we perform independent component analysis to decouple the components of the measured signals with maximum likelihood separation. We find that our solution dramatically decreases the eavesdropper’s partial information and has much less bits being compromised comparing with common amplitude and phase modulation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Encryption is not applied because of the resource constraint problem in Alice for example.

  2. because of the distance advantage that Carol is closer to Eve than Alice and Bob for example.

  3. Because of the changing of environment, the channel coefficients evolve continuously in time. However, as we consider a short period of time within a data frame, which is much smaller than the coherence time, the channel states keep invariant.

  4. In wireless communications, the most notable effects caused by physical phenomena are fading and path-loss. Fading is a self-interference phenomenon that results from the multi-path propagation of radio frequency waves while path-loss is simply the attenuation of wave amplitude with distance. As a consequence of these effects, the wireless channel coefficients are normally unpredictable since the exact knowledge of the wave paths and their lengths are unavailable.

  5. It is assumed that the channels over which it receives these N signals are sufficiently different, i.e. the antennas are not located significantly smaller than half of a wavelength.

  6. For example, Zhou et al. [49] proposed a subspace based blind channel estimation method for space-time coded MIMO-OFDM systems using properly designed redundant linear precoding and the noise subspace method. Bolcskei et al. [50] proposed an algorithm for blind channel estimation and equalization for MIMO-OFDM systems using second-order cyclostationary statistics induced by employing a periodic nonconstant-modulus antenna precoding. Muquet et al. [51] developed a subspace method by utilizing the redundancy introduced by the cyclic prefix (CP) insertion.

  7. For multi-path Rayleigh fading channels, the two wireless channels can be considered uncorrelated, \(\rho _{ij} = 0\), if the distance between the ith and the jth receiving antennas is greater than half wavelength; the two wireless channels are partially correlated, \(0< \rho _{ij} <1\), if the distance between the ith and the jth receiving antennas is less than half wavelength.

  8. For a given system configuration and communication bandwidth, the secrecy capacity of friendly jamming can be calculated according to (13), (11) and (12) and an appropriate bit rate has to be set smaller than the secrecy capacity.

  9. The problem of how to set the jamming power has been studied in [5, 11, 24, 25]. Generally, as jamming power increases, in the early stage when the jamming power is not significant, jamming is beneficial as the secrecy outage probability becomes lower; while at the later stage when the jamming signal becomes much stronger, the harmful effect of jamming signal to legitimate decoding becomes dominant. So there is normally an optimal jamming power leading to the highest jamming efficiency. Our jamming-to-signal-ratio is set based on these previous works.

References

  1. Chaudhary, S., & Garg, N. (2014). Internet of things: A revolution. Compusoft International Journal of Advanced Computer Technology, 3(4), 714.

    Google Scholar 

  2. Tippenhauer, N. O., Malisa, L., Ranganathan, A., & Capkun, S. (2013). On limitations of friendly jamming for confidentiality. In Security and privacy, pp. 160–173.

  3. Vilela, J. P., Bloch, M., Barros, J., & Mclaughlin, S. W. (2011). Wireless secrecy regions with friendly jamming. IEEE Transactions on Information Forensics and Security, 6(2), 256–266.

    Article  Google Scholar 

  4. Vilela, J. P., Bloch, M., Barros, J., & Mclaughlin, S. W. (2010). Friendly jamming for wireless secrecy. In IEEE International Conference on Communications, pp. 1–6

  5. Chen, L., Zhu, Q., Meng, W., & Hua, Y. (2017). Fast power allocation for secure communication with full-duplex radio. IEEE Transactions on Signal Processing, 65(14), 3846–3861.

    Article  MathSciNet  MATH  Google Scholar 

  6. Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys and Tutorials, 13(2), 245–257.

    Article  Google Scholar 

  7. Lin, P. H., Gabry, F., Thobaben, R., Jorswieck, E. A., & Skoglund, M. (2016). Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks. IEEE Transactions on Cognitive Communications & Networking, 2(1), 38–52.

    Article  Google Scholar 

  8. Dong, L., Han, Z., Petropulu, A. P., & Vincent Poor, H. (2009). Cooperative jamming for wireless physical layer security. IEEE Workshop on Statistical Signal Processing, 8(4), 417–420.

    Google Scholar 

  9. Gan, Z., Choo, L. C., & Wong, K. K. (2011). Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 59(3), 1317–1322.

    Article  MathSciNet  MATH  Google Scholar 

  10. Liu, Y., Li, J., & Petropulu, A. P. (2013). Destination assisted cooperative jamming for wireless physical-layer security. IEEE Transactions on Information Forensics and Security, 8(4), 682–694.

    Article  Google Scholar 

  11. Yang, J., Kim, I. M., & Dong, I. K. (2014). Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Transactions on Communications, 62(9), 3285–3298.

    Article  Google Scholar 

  12. Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., & Fu, K. (2011). They can hear your heartbeats: Non-invasive security for implantable medical devices. In ACM SIGCOMM 2011 Conference, pp. 2–13.

  13. Siyari, P., Krunz, M., & Nguyen, D. N. (2017). Friendly jamming in a mimo wiretap interference network: A nonconvex game approach. IEEE Journal on Selected Areas in Communications, PP(99), 1–1.

    Google Scholar 

  14. Cao, X.-R., & Liu, R.-W. (1996). General approach to blind source separation. IEEE Transactions on Signal Processing, 44(3), 562–571.

    Article  Google Scholar 

  15. Oggier, F., & Hassibi, B. (2011). The secrecy capacity of the mimo wiretap channel. IEEE Transactions on Information Theory, 57(8), 4961–4972.

    Article  MathSciNet  MATH  Google Scholar 

  16. Comon, P. (1994). Independent component analysis, a new concept? Signal Processing, 36(3), 287–314.

    Article  MATH  Google Scholar 

  17. Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.

    Article  Google Scholar 

  18. Tang, X., Liu, R., Spasojevic, P., & Poor, H. V. (2008). The gaussian wiretap channel with a helping interferer. In 2008 IEEE International Symposium on Information Theory, pp. 389–393.

  19. Jin, R., Zeng, K., & Zhang, K. (2021). A reassessment on friendly jamming efficiency. IEEE Transactions on Mobile Computing, 20(1), 32–47.

    Google Scholar 

  20. Wolf, A., & Jorswieck, E. A. (2010). On the zero forcing optimality for friendly jamming in miso wiretap channels. In IEEE Eleventh International Workshop on Signal Processing Advances in Wireless Communications, pp. 1–5.

  21. Akgun, B., Koyluoglu, O. O., & Krunz, M. (2015). Receiver-based friendly jamming with single-antenna full-duplex receivers in a multiuser broadcast channel. In IEEE Global Communications Conference, pp. 1–6.

  22. Xiao, L., Zhang, T., Shen, X., Yang, D., & Cuthbert, L. (2017). Secrecy in wireless information and power transfer for one-way and two-way untrusted relaying with friendly jamming. In Mobile Information Systems, 2017, (2017-8-10), 2017, pp. 1–10.

  23. Ali, B., Zamir, N., Fasih, M., Butt, U., & Ng, S. X. (2016). Physical layer security: Friendly jamming in an untrusted relay scenario. In Signal Processing Conference, pp. 958–962.

  24. Ara, M., Reboredo, H., Renna, F., & Rodrigues, M. R. D. (2013). Power allocation strategies for OFDM gaussian wiretap channels with a friendly jammer. In IEEE International Conference on Communications, pp. 3413–3417.

  25. Sarma, S., & Kuri, J. (2015). Optimal power allocation for protective jamming in wireless networks. Elsevier North-Holland Inc.

    Google Scholar 

  26. Mobini, Z., Mohammadi, M., & Tellambura, C. (2019). Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications. IEEE Transactions on Information Forensics and Security, 14(3), 621–634.

    Article  Google Scholar 

  27. Qi, N., Wang, W., Xiao, M., Jia, L., & Tsiftsis, T. (2021). A learning-based spectrum access Stackelberg game: Friendly jammer-assisted communication confrontation. IEEE Transactions on Vehicular Technology, PP(99), 1.

    Google Scholar 

  28. Berger, D. S., Gringoli, F., Martinovic, I., & Schmitt, J. (2014). Gaining insight on friendly jamming in a real-world IEEE 802.11 network. In ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 105–116.

  29. Berger, D. S., Gringoli, F., Facchi, N., Martinovic, I., & Schmitt, J. B. (2016). Friendly jamming on access points: Analysis and real-world measurements. IEEE Transactions on Wireless Communications, 15(9), 6189–6202.

    Article  Google Scholar 

  30. Kim, Y. S., Tague, P., Lee, H., & Kim, H. (2015). A jamming approach to enhance enterprise wi-fi secrecy through spatial access control. Wireless Networks, 21(8), 2631–2647.

    Article  Google Scholar 

  31. Eletreby, R., Rahbari, H., & Krunz, M. (2015). Supporting phy-layer security in multi-link wireless networks using friendly jamming. In IEEE Global Communications Conference, pp. 1–6.

  32. Adams, M., & Bhargava, V. K. (2017). Using friendly jamming to improve route security and quality in ad hoc networks. In Electrical and computer engineering.

  33. Mostafa, A., & Lampe, L. (2014). Securing visible light communications via friendly jamming. In GLOBECOM Workshops, pp. 524–529.

  34. Pham, T. V., & Pham, A. T. (2021). Energy-efficient friendly jamming for physical layer security in visible light communication. In 2021 IEEE International Conference on Communications Workshops (ICC Workshops).

  35. Li, X., Dai, H. N., Wang, H., & Xiao, H. (2016). On performance analysis of protective jamming schemes in wireless sensor networks. Sensors, 16(12), 1987.

    Article  Google Scholar 

  36. Dang-Ngoc, H., Nguyen, D. N., Ho-Van, K., Hoang, D. T., Dutkiewicz, E., Pham, Q. V., & Hwang, W. J. (2021). Secure swarm UAV-assisted communications with cooperative friendly jamming.

  37. Li, X., Dai, H. N., Shukla, M. K., Li, D., & Imran, M. (2021). Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5g and beyond communications. Computer Standards and Interfaces, 78(2), 103540.

    Article  Google Scholar 

  38. Jin, R., & Zeng, K. (2018). Secure inductive-coupled near field communication at physical layer. IEEE Transactions on Information Forensics and Security, 13(12), 3078–3093.

    Article  Google Scholar 

  39. Hassanieh, H., Wang, J., Katabi, D., Kohno, T. (2015). Securing RFIDs by randomizing the modulation and channel. In Usenix Conference on Networked Systems Design and Implementation, pp. 235–249.

  40. Bharadia, D., Mcmilin, E., & Katti, S. (2013). Full duplex radios. Computer Communication Review, 43(4), 375–386.

    Article  Google Scholar 

  41. Sabharwal, A., Schniter, P., Guo, D., & Bliss, D. W. (2014). In-band full-duplex wireless: Challenges and opportunities. IEEE Journal on Selected Areas in Communications, 32(9), 1637–1652.

    Article  Google Scholar 

  42. Shen, D., & Li, V. O. K. (2006). Fundamentals of wireless communications.

  43. Kashyap, A., Basar, T., & Srikant, R. (2004). Correlated jamming on mimo gaussian fading channels. IEEE Transactions on Information Theory, 50(9), 2119–2123.

    Article  MathSciNet  MATH  Google Scholar 

  44. Telatar, E. (1999). Capacity of multi-antenna gaussian channels. European Transactions on Telecommunications, 10(6), 585–595.

    Article  MathSciNet  Google Scholar 

  45. Rao, C., & Hassibi, B. (2004). Analysis of multiple-antenna wireless links at low snr. IEEE Transactions on Information Theory, 50(9), 2123–2130.

    Article  MathSciNet  MATH  Google Scholar 

  46. Pollock, T., Abhayapala, T., & Kennedy, R. (2003). Antenna saturation effects on mimo capacity. In IEEE International Conference on Communications.

  47. Biguesh, M., & Gershman, A. B. (2006). Training-based mimo channel estimation: A study of estimator tradeoffs and optimal training signals. IEEE Transactions on Signal Processing, 54(3), 884–893.

    Article  MATH  Google Scholar 

  48. Shin, C., Heath, R. W., & Powers, E. J. (2007). Blind channel estimation for mimo-ofdm systems. IEEE Transactions on Vehicular Technology, 56(2), 670–685.

    Article  Google Scholar 

  49. Zhou, S., Muquet, B., & Giannakis, G. B. (2002). Subspace-based (semi-) blind channel estimation for block precoded space-time ofdm. IEEE Transactions on Signal Processing, 50(5), 1215–1228.

    Article  Google Scholar 

  50. Bolcskei, H., Heath, R. W., & Paulraj, A. J. (2002). Blind channel identification and equalization in ofdm-based multiantenna systems. IEEE Transactions on Signal Processing, 50(1), 96–109.

    Article  Google Scholar 

  51. Muquet, B., de Courville, M., & Duhamel, P. (2002). Subspace-based blind and semi-blind channel estimation for ofdm systems. IEEE Transactions on Signal Processing, 50(7), 1699–1712.

    Article  Google Scholar 

  52. Stewart, G. W. (1990). Matrix perturbation theory. Academic Press.

    MATH  Google Scholar 

  53. Hyvarinen, A., & Oja, E. (2000). Independent component analysis: Algorithms and applications. Neural Networks, 13(4), 411–430.

    Article  Google Scholar 

  54. Tropp, J. A., & Gilbert, A. C. (2007). Signal recovery from partial information via orthogonal matching pursuit. IEEE Transactions on Information Theory, 53(12), 4655–4666.

    Article  MathSciNet  MATH  Google Scholar 

  55. Cardoso, J. (1997). Infomax and maximum likelihood for blind source separation. IEEE Signal Processing Letters, 4(4), 112–114.

    Article  Google Scholar 

  56. Giannakis, G. B., & Tsatsanis, M. K. (1992). A unifying maximum-likelihood view of cumulant and polyspectral measures for non-gaussian signal classification and estimation. IEEE Transactions on Information Theory, 38(2), 386–406.

    Article  MathSciNet  MATH  Google Scholar 

  57. Marquardt, D. W. (1963). An algorithm for least-squares estimation of nonlinear parameters. Journal of the Society for Industrial and Applied Mathematics, 11(2), 431–441.

    Article  MathSciNet  MATH  Google Scholar 

  58. Mor, J. J. (1978). The Levenberg-Marquardt algorithm: Implementation and theory. Lecture Notes in Mathematics, 630, 105–116.

    Article  MathSciNet  Google Scholar 

  59. Duncan, T. E. (1970). On the calculation of mutual information. Siam Journal on Applied Mathematics, 19(1), 215–220.

    Article  MathSciNet  MATH  Google Scholar 

  60. Brown, G., Pocock, A., Zhao, M. J., & Lujan, M. (2012). Conditional likelihood maximisation: A unifying framework for information theoretic feature selection. Journal of Machine Learning Research, 13(1), 27–66.

    MathSciNet  MATH  Google Scholar 

  61. Thomas, R. D., Moses, N. C., Semple, E. A., & Strang, A. J. (2014). An efficient algorithm for the computation of average mutual information: Validation and implementation in Matlab. Journal of Mathematical Psychology, 61, 45–59.

    Article  MathSciNet  MATH  Google Scholar 

  62. Belouchrani, A., Abed-Meraim, K., Cardoso, J. F., & Moulines, E. (2002). A blind source separation technique using second-order statistics. IEEE Transactions on Signal Processing, 45(2), 434–444.

    Article  Google Scholar 

  63. Gopala, P. K., Lai, L., & El Gamal, H. (2006). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory, 54(10), 4687–4698.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Science Foundation of China (NSFC) under grant 61801187 and in part by the U.S. National Science Foundation (NSF) under grants CNS-1619073 and CNS-1464487.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong Jin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, R., Zeng, K. & Jiang, C. Friendly spectrum jamming against MIMO eavesdropping. Wireless Netw 28, 2437–2453 (2022). https://doi.org/10.1007/s11276-022-02967-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-02967-1

Keywords

Navigation