315 research outputs found

    Mitigating Jamming Attacks Using Energy Harvesting

    Full text link
    The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power. We formulate the strategic interaction between a pair of legitimate nodes and a malicious jammer as a zero-sum game. Our analysis demonstrates that the legitimate nodes are able to neutralize the jammer. However, this policy is not necessarily a Nash equilibrium and hence is sub-optimal. Instead, harvesting the jamming interference can lead to relative gains of up to 95%, on average, in terms of Shannon capacity, when the jamming interference is high

    How to Model the Near-to-the-Carrier Regime and the Lower Knee Frequency of Real RF Oscillators

    Get PDF
    Numerous empirical data demonstrate that real noisy RF oscillators are affected by power-law phase noise. However, until recently, the robust analytic modeling of the deep-into-the-carrier spectral regime of RF oscillators was intangible due to the infinities involved in the relevant power-law regions. In this letter we demonstrate how recent advances in oscillator spectral modeling can be applied to extrapolate the near-to-the-carrier regime as well as estimate the oscillator lower knee frequency of transition between the deep-into-the-carrier regime and the power-law regions of real RF oscillators.</jats:p

    Optimal signalling strategies and power allocation for secret key generation schemes in the presence of a jammer

    Get PDF
    Secret key generation (SKG) schemes have been shown to be vulnerable to denial of service (DoS) attacks in the form of jamming. In this paper, a comprehensive study on the impact of correlated and uncorrelated jamming in wireless SKG systems is presented. First, optimal signalling schemes for the legitimate users and jamming approaches for an active adversary launching a DoS attack on the SKG system are derived. It is shown that the legitimate users should employ constant signalling. On the other hand, the jammer should inject either correlated jamming when imperfect channel state information (CSI) regarding the main channel is at their disposal, or, uncorrelated jamming when the main channel CSI is completely unknown. In both cases, optimal power allocation policies are studied under short-term power constrains for M block fading additive white Gaussian noise (BF-AWGN) channels. Numerical evaluations demonstrate that equidistribution of the jamming power is near-optimal in the case of uncorrelated jamming

    Helping interferer physical layer security strategies for M-QAM and M-PSK systems

    Get PDF
    Physical layer security encompasses information theoretic approaches that could guarantee perfect secrecy in wireless communication systems. In this framework, helping interferer strategies rely on intentionally creating confusion at a potential eavesdropper by injecting a jamming signal. In cases where the information signal has a Gaussian probability density function (pdf) it has been demonstrated that the optimal jamming signal, under an overall power constraint, should also be Gaussian. However, in practical communication systems where data symbols are typically drawn from discrete uniform probability mass functions (pmf), commonly M-ary Quadrature Amplitude and M-ary Phase Shift Keying modulation schemes, the structure of the optimal jamming signal is still an open question. In the present work we aim at shedding light into this question. Our approach is based on formulating a secrecy capacity maximization problem by expressing the optimal arbitrary helping interferer pdf as a mixture of unknown Gaussians. The proposed approximation is well-suited for jamming signals of practical interest, i.e. Gaussian or M-QAM interferers and reveals that in certain scenarios it is advantageous to use jamming signals whose statistical structure resembles the data rather than the noise. © 2012 IEEE

    Teaching old sensors New tricks: archetypes of intelligence

    No full text
    In this paper a generic intelligent sensor software architecture is described which builds upon the basic requirements of related industry standards (IEEE 1451 and SEVA BS- 7986). It incorporates specific functionalities such as real-time fault detection, drift compensation, adaptation to environmental changes and autonomous reconfiguration. The modular based structure of the intelligent sensor architecture provides enhanced flexibility in regard to the choice of specific algorithmic realizations. In this context, the particular aspects of fault detection and drift estimation are discussed. A mixed indicative/corrective fault detection approach is proposed while it is demonstrated that reversible/irreversible state dependent drift can be estimated using generic algorithms such as the EKF or on-line density estimators. Finally, a parsimonious density estimator is presented and validated through simulated and real data for use in an operating regime dependent fault detection framework

    Use of the Extended Kalman Filter for State Dependent Drift Estimation in Weakly Nonlinear Sensors

    No full text
    A number of mechanisms are responsible for the generation of reversible or irreversible drift in the response of a sensor. In this letter, we discuss three approaches for the identification of reversible state dependent drift in sensors through the use of the Extended Kalman Filter. We compare their performance by simulation and demonstrate their validity by estimating the drift of an accelerometer, modeled as a weakly nonlinear system

    On the effects of memoryless nonlinearities on M-QAM and DQPSK OFDM signals

    No full text
    Published versio

    Energy Harvesting in Secret Key Generation Systems under Jamming Attacks

    Get PDF
    Secret key generation (SKG) from shared randomness at two remote locations has been shown to be vulnerable to denial of service attacks in the form of jamming. Typically, such attacks are alleviated with frequency hopping/spreading techniques that rely on expansion of the system bandwidth. In the present study, energy harvesting (EH) is exploited as a novel counter-jamming approach that alleviates the need for extra bandwidth resources. Assuming the legitimate users have EH capabilities, the idea is that part of the jamming signal can potentially be harvested and converted into useful communication power. In this framework, the competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game. A critical transmission power for the legitimate users is identified which allows to completely characterize the unique NE of the game in closed form. Remarkably, this threshold also provides the option to effectively neutralize the jammer, i.e., prevent the jammer from carrying out the attack altogether. Through numerical evaluations, EH is shown to be a counter-jamming approach that can offer substantial gains in terms of relative SKG rates
    corecore