ABSTRACT
Jamming attacks pose a serious threat to the normal functioning of cellular networks, disrupting communication services and compromising emergency situations. This paper introduces BeamArmor, a practical real-time application to monitor and mitigate jamming attacks in cellular networks. Hosted on a custom RAN controller utilizing the open-source srsRAN stack, it mitigates jamming by deploying beam-nulling techniques with MIMO antennas. This ensures reduced interference impact on desired communication signals. The system ensures real-time operation of the RAN stack by efficiently managing computational resources, meeting the time requirements of the cellular network's physical layer functionalities, and seamlessly integrating with srsRAN. The BeamArmor App is evaluated with over-the-air experiments that demonstrate over 10 dB of SNR improvement in real-time by suppressing the jamming signal through beam-nulling using only two antennas. Our broader vision includes expanding the BeamArmor platform to other real-time MIMO applications, such as advanced beamforming and localization techniques, and integrating it into O-RAN standards.
- Anti-jamming market size & share analysis - growth trends & forecasts (2023 - 2028). https://www.mordorintelligence.com/industry-reports/anti-jamming-equipment-market-growth, 2023.Google Scholar
- Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y Thomas Hou. MIMO-based jamming resilient communication in wireless networks. In IEEE INFOCOM, pages 2697--2706. IEEE, 2014.Google ScholarCross Ref
- Tan Tai Do, Emil Björnson, Erik G Larsson, and S Mohammad Razavizadeh. Jamming-resistant receivers for the massive MIMO uplink. IEEE Transactions on Information Forensics and Security, 13(1), 2017.Google ScholarCross Ref
- srsRAN. srsran: Open source 4g/5g software radio access network. https://github.com/srsran/srsRAN, 2023.Google Scholar
- Agrim Gupta, Ish Jain, and Dinesh Bharadia. Multiple smaller base stations are greener than a single powerful one: Densification of wireless cellular networks. In 1st Workshop on Sustainable Computer Systems Design and Implementation (HotCarbon), 2022.Google Scholar
- Mahmoud Kamel, Walaa Hamouda, and Amr Youssef. Ultra-dense networks: A survey. IEEE Communications surveys & tutorials, 18(4):2522--2545, 2016.Google Scholar
- IEEE Spectrum. Starlink and other LEO constellations face a new set of security risks. https://spectrum.ieee.org/satellite-jamming, May 2023.Google Scholar
- Hackrf one. https://greatscottgadgets.com/hackrf/one/, 2023.Google Scholar
- Bladerf. https://www.nuand.com/bladerf-1/, 2023.Google Scholar
- Xenofon Foukas, Bozidar Radunovic, Matthew Balkwill, and Zhihua Lai. Taking 5G RAN analytics and control to a new level. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, pages 1--16, 2023.Google ScholarDigital Library
- Michele Polese, Leonardo Bonati, Salvatore D'Oro, Stefano Basagni, and Tommaso Melodia. Understanding o-ran: Architecture, interfaces, algorithms, security, and research challenges. IEEE Communications Surveys & Tutorials, 2023.Google Scholar
- Robert Schmidt, Mikel Irazabal, and Navid Nikaein. Flexric: An sdk for next-generation sd-rans. In Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '21, page 411--425, New York, NY, USA, 2021. ACM.Google ScholarDigital Library
- Woo-Hyun Ko, Ujwal Dinesha, Ushasi Ghosh, Srinivas Shakkottai, Dinesh Bharadia, and Raini Wu. Edgeric: Empowering realtime intelligent optimization and control in nextg networks. arXiv preprint arXiv:2304.11199, 2023.Google Scholar
- ZeroMQ Documentation. http://zeromq.org. Accessed May 10, 2023.Google Scholar
- Frederik Jonathan Zumegen, Ish Kumar Jain, and Dinesh Bharadia. Beamarmor demo: Anti-jamming system in cellular networks with srsran software radios. In MILCOM 2023-2023 IEEE Military Communications Conference (MILCOM), pages 245--246. IEEE, 2023.Google ScholarCross Ref
- Harry L Van Trees. Optimum array processing: Part IV of detection, estimation, and modulation theory. John Wiley & Sons, 2002.Google ScholarCross Ref
- OAI. Open Air Interface 5G Radio Access Network Project. https://openairinterface.org/oai-5g-ran-project/, 2023.Google Scholar
- Felix Girke, Fabian Kurtz, Nils Dorsch, and Christian Wietfeld. Towards resilient 5G: Lessons learned from experimental evaluations of LTE uplink jamming. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops), pages 1--6. IEEE, 2019.Google ScholarCross Ref
- Grecia Romero, Virginie Deniau, and Olivier Stienne. LTE Physical layer vulnerability test to different types of jamming signals. In 2019 International Symposium on Electromagnetic Compatibility-EMC EUROPE, pages 1138--1143. IEEE, 2019.Google ScholarCross Ref
- Suzan Bayhan, Piotr Gawłowicz, Anatolij Zubow, and Adam Wolisz. Null-while-talk: Interference nulling for improved inter-technology coexistence in lte-u and wifi networks. Pervasive and Mobile Computing, 56:71--87, 2019.Google ScholarDigital Library
- Shyamnath Gollakota, Samuel David Perli, and Dina Katabi. Interference alignment and cancellation. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication, pages 159--170, 2009.Google ScholarDigital Library
- Sohrab Madani, Suraj Jog, Jesus O. Lacruz, Joerg Widmer, and Haitham Hassanieh. Practical null steering in millimeter wave networks. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21), pages 903--921. USENIX Association, April 2021.Google Scholar
- Julia Vinogradova, Emil Björnson, and Erik G Larsson. Detection and mitigation of jamming attacks in massive MIMO systems using random matrix theory. In 2016 IEEE 17th International Workshop on SPAWC, pages 1--5. IEEE, 2016.Google ScholarCross Ref
- Youness Arjoune and Saleh Faruque. Smart jamming attacks in 5G new radio: A review. In 2020 10th annual computing and communication workshop and conference (CCWC), pages 1010--1015. IEEE, 2020.Google Scholar
- Farhan M Aziz, Jeff S Shamma, and Gordon L Stüber. Jammer-type estimation in LTE with a smart jammer repeated game. IEEE Transactions on Vehicular Technology, 66(8):7422--7431, 2017.Google ScholarCross Ref
- Jose A Torres, Richard M Davis, J David R Kramer, and Ronald L Fante. Efficient wideband jammer nulling when using stretch processing. IEEE Transactions on Aerospace and Electronic Systems, 36(4):1167--1178, 2000.Google ScholarCross Ref
- Garret Okamoto. Jammer nulling via low complexity blind beamforming algorithm. In 2007 IEEE Antennas and Propagation Society International Symposium, pages 25--28. IEEE, 2007.Google ScholarCross Ref
- Shengbo Xu, Weiyang Xu, Cunhua Pan, and Maged Elkashlan. Detection of jamming attack in non-coherent massive simo systems. IEEE Transactions on Information Forensics and Security, 14(9):2387--2399, 2019.Google ScholarCross Ref
- Gian Marti, Torben Kölle, and Christoph Studer. Mitigating Smart Jammers in Multi-User MIMO. IEEE Transactions on Signal Processing, 71:756--771, 2023.Google ScholarDigital Library
- Hossein Akhlaghpasand, Emil Björnson, and S Mohammad Razavizadeh. Jamming suppression in massive MIMO systems. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(1):182--186, 2019.Google Scholar
Index Terms
- BeamArmor: Seamless Anti-Jamming in 5G Cellular Networks with MIMO Null-steering
Recommendations
Demo: Practical, Real-Time MIMO Apps with Programmable RAN Controller
HOTMOBILE '24: Proceedings of the 25th International Workshop on Mobile Computing Systems and ApplicationsOpen Radio Access Network (O-RAN) brings a revolutionary approach to cellular RANs through its flexible and interoperable RAN architecture. It involves the separation of hardware and software components, allowing RAN vendors to subscribe to applications ...
An energy-efficient anti-jam cognitive system for wireless OFDM communication
In this paper, anti-jamming capabilities are proposed for a generic OFDM-based wireless communication system. The performance of a wireless system may severely degrade in presence of jamming or intentional interferences. A malicious entity can send ...
Subverting MIMO wireless systems by jamming the channel estimation procedure
WiSec '10: Proceedings of the third ACM conference on Wireless network securityMultiple-input multiple-output (MIMO) technologies are popular in emerging wireless systems. Optimal MIMO communication is achieved by applying a waterfilling solution over the parallel subchannels associated with the channel matrix between a ...
Comments