Documente Academic
Documente Profesional
Documente Cultură
Sensor networks
Manuscript received March 30, 2017; revised May 10, 2017; accepted May 19, 2017. Date of publication May 23, 2017; date of current version June 1, 2017.
AbstractAnti-jamming interference alignment (IA) can battle with the adversarial jamming signals for IA sensor networks
effectively. In this letter, we design jamming signals to optimally disrupt the transmission of anti-jamming IA sensor networks.
Specifically, with only the jamming channel information known for the jammer, we design the jamming signal to minimize
the signal-to-jamming-plus-noise ratio (SJNR) at a certain targeted IA receiver with the jamming power constraints.
Furthermore, an approximate expression of the minimized SJNR is presented to estimate the jamming performance
theoretically. Simulation results are provided to verify the effectiveness of the proposed optimal jamming scheme towards
IA sensor networks.
Index TermsSensor networks, anti-jamming scheme, interference alignment sensor networks, jamming design, multiple-input-multiple-
output (MIMO), signal-to-jamming-plus-noise ratio (SJNR).
1949-307X C 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
[] []
expressed as z = E z z
R[] is the autocorrelation matrix of z[] , in which z[]
is the jamming signal that is specially designed towards the th user.
K
[] []
y [k] = u[k] H[ki] v[i] x [i] + u[k] H[k] H[]
j Rz H j is the autocorrelation matrix of the received jamming
j z+u
[k] [k]
n (1)
i=1 j z at the th receiver.
signal H[]
According to (5), if we want to minimize SJNR[] , the received
where H[ki] C N M denotes the CSI along the link from the ith
[k] [i]
jamming power at the th user J [] should be maximized by properly
N [k] N j
transmitter to the kth receiver. H[k] j C represents the channel designing R[]z . The objective function can be expressed as
gain matrix between the adversarial jammer and the kth receiver. Each
element in H[ki] and H[k]
R[] = arg max J []
j is assumed to be independent and identically z
R[]
z
distributed and follow CN (0, 1). v[k] C M 1 and u[k] C N 1 are
[k] [k]
z } P j , Rz = Rz .
s.t. Tr{R[] [] []
(9)
unitary precoding and decoding vectors for the kth user, respectively.
x [k] denotes the transmit signal of the kth user with the power con- To solve this optimization problem of (9), we first set n = min{N j , N },
straint P [k] . n[k] C N 1 denotes the additive white Gaussian noise
[k]
[] []
which represents the rank of the autocorrelation matrix H[] j Rz H j .
(AWGN) vector at the kth receiver, which follows the distribution of Let ei , i = 1, ..., n, represent the orthonormal basis of the received
[]
CN (0, n2 I N [k] ). z represents the jamming signal emitted by the adver- jamming signal H[] j z, and we have
sarial jammer, with the power constraint E z z = P j .
n
To enhance the performance of the kth receiver, we can resort to H[] [] []
= i[] ei[] ei[]
j Rz H j (10)
the anti-jamming IA scheme [15], and simultaneously eliminate both i=1
the jamming and interferences among different users if the following
where i[] is the corresponding transmit power for the ith jamming
conditions are satisfied:
spatial dimension. Since the CSI among the legitimate transmitters
u[k] H[ki] v[i] = 0, i = k (2) and receivers is unknown by the jammer, the optimal method for the
jammer to minimize the SJNR is to maximize the power of each
j = 0.
u[k] H[k] (3)
jamming spatial dimension. Thus we set 1[] = ... = n[] = [] , and
For notational simplicity, all the legitimate users are assumed to the objective function of (9) can be rewritten as
have the same parameters, i.e., M [k] = M, N [k] = N and P [k] = P,
R[] = arg max []
z
k = 1, 2, . . . , K . With the constraints from (2) to (3), we can obtain R[]
z
z } P j , Rz = Rz .
Tr{R[] [] []
(11)
The jamming signal can be eliminated effectively according to the
anti-jamming IA scheme. However, the jamming signal in (1) is not First, we consider the case of N < N j + 1, i.e., N j N , and the
specially designed towards the anti-jamming IA scheme, and the jam- feasibility condition in (4) cannot be met. The optimal design of the
ming performance still can be improved when it is properly designed. autocorrelation matrix R[] z can be summarized in Theorem 1.
Theorem 1: Decompose the th jamming channel as H[] j =
[] [] [] []
S j j D j , where S j , j and D j are the results of the sin-
[] []
III. OPTIMAL JAMMING SIGNAL DESIGN gular value decomposition (SVD) of H[] [] []
j . Specifically, S j and D j
N N j
In the performance analysis of Section II, the jamming signal is are two unitary matrices, and j C []
is a diagonal matrix with
not specially designed, and thus the performance of the anti-jamming the singular values j,1[]
, ..., j,n
[]
on the diagonal. Thus, the optimal
IA scheme can be guaranteed. In this section, the jamming signal design of R[]
z can be obtained as
is optimally designed aiming at disrupting the transmission of one 1
P 1
specific legitimate user, without loss of generality, the th user. z = N
R[]
j
D []
Diag , ..., , 0, .., 0 D[] . (12)
1 j
[] 2
[]
2 j
Assume that the jamming signal is optimally designed towards the i=1 2
[] j,1 j,N
j,i
th user. The SJNR for the th receiver can be expressed in (5), where
Accordingly, the received jamming signal power [] is maximized as
SJNR[] =
N
1
H v v H
Pu [] [] [] []
u [] [] [] = P j /
2
. (13)
K i=1 j,i
[]
[] [] []
u[] H j Rz H j + i=1,i= H v v H[i] + n2 I N u[]
[i] [i] [i]
N [] []
Proof: When N j N , [] i=1 ei ei = [] I N . Thus the equa-
S []
tion H j Rz H j = [] i=1 ei[] ei[] in (11) can be reformed as
[] [] [] N
= . (5)
J [] + I [] + n2
[] [] [] [] [] []
j j D j Rz D j j S j
S[] = [] I N
S [] = Pu[] H[] v[] v[] H[] u[] (6)
[] [] [] []
[]
j D j Rz D j j = [] I N
K
I [] = u[] H[i] v[i] v[i] H[i] u[] (7)
D[]
j Rz D j = j
[k] [k] [k] [k]
[k]
j
i=1,i=
[] [] []
J []
=u []
j Rz H j u .
H[] (8) z = Dj j
R[] [] [] []
[]
j D[]
j .
VOL. 1, NO. 3, JUNE 2017 7500204
1 1
J []
=u []
H[] [] [] []
j Rz H j u =u []
S[] [] []
j j Dj
[]
D[]
j Diag , ..., []
, 0, .., 0 D j [] []
j j Sj
D[] u[]
[] 2
[] 2
j,1 j,N
1 1
[] []
= u[] S[] []
[]
D D Diag , ..., , 0, .., 0 D[]
j Dj
[]
[]
j Sj
[]
u[]
j j j j
[] 2
[] 2
j,1 j,N
1 1
=
[] u[] S[] []
j Diag , ..., , 0, .., 0 [] [] []
S u =
[] []
u S [] []
S u[] =
[] . (16)
j
[] 2 []
2 j j j j
j,1 j,N
7500204 VOL. 1, NO. 3, JUNE 2017
V. CONCLUSION
In this paper, we studied the optimal design of jamming signal to-
wards the anti-jamming IA sensor network, standing on the position of
jammers. In the scheme, the jamming signal was optimally designed
to minimize the SJNR of a targeted IA receiver, with only the CSI
between the jammer and the targeted receiver. In addition, an approx-
imate expression of minimum SJNR was also derived to analyze the
jamming performance theoretically. Simulation results were presented
to verify the effectiveness of the proposed jamming scheme.
ACKNOWLEDGMENT
This work was supported in part by the Xinghai Scholars Program and in part by the
National Natural Science Foundation of China under Grant 61671101.
REFERENCES
[1] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, A survey on wireless security: Technical
challenges, recent advances and future trends, Proc. IEEE, vol. 104, no. 9, pp. 1727
1765, Sep. 2016.
[2] N. Zhao, F. R. Yu, M. Li, Q. Yan, and V. C. M. Leung, Physical layer security
issues in interference- alignment-based wireless networks, IEEE Commun. Mag.,
Fig. 1. Comparison of the average SJNR with different jamming power vol. 54, no. 8, pp. 162168, Aug. 2016.
in the cases when the jamming signal is optimally designed and when [3] A. Kashyap, T. Basar, and R. Srikant, Correlated jamming on MIMO gaussian
no jamming design is adopted (K = 3, M = 4, N = 4, N j = 6). fading channels, IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 21192123, Sep. 2004.
[4] R. H. Gohary, Y. Huang, Z.-Q. Luo, and J.-S. Pang, A generalized iterative water-
filling algorithm for distributed power control in the presence of a jammer, IEEE
Trans. Signal Process., vol. 57, no. 7, pp. 26602674, Jul. 2009.
[5] R. Miller and W. Trappe, On the vulnerabilities of CSI in MIMO wireless com-
munication systems, IEEE Trans. Mobile Comput., vol. 11, no. 8, pp. 13861393,
Aug. 2012.
[6] H. Pezeshki, X. Zhou, and B. Maham, Jamming energy allocation in training-based
multiple access systems, IEEE Commun. Lett., vol. 17, no. 6, pp. 11401143, Jun.
2013.
[7] C. Popper, M. Strasser, and S. Capkun, Anti-jamming broadcast communication
using uncoordinated spread spectrum techniques, IEEE J. Sel. Areas Commun.,
vol. 28, no. 5, pp. 703715, Jun. 2010.
[8] M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, Joint adaptation of frequency
hopping and transmission rate for anti-jamming wireless systems, IEEE Trans.
Mobile Comput., vol. 15, no. 9, pp. 22472259, Sep. 2016.
[9] B. Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, An anti-jamming stochastic
game for cognitive radio networks, IEEE J. Sel. Areas Commun., vol. 29, no. 4,
pp. 877889, Apr. 2011.
[10] X. He, H. Dai, and P. Ning, Dynamic adaptive anti-jamming via controlled mobil-
ity, IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 43744388, Aug. 2014.
[11] S. Fang, Y. Liu, and P. Ning, Wireless communications under broadband reactive
jamming attacks, IEEE Trans. Depend. Secure Comput., vol. 13, no. 3, pp. 394408,
May 2016.
[12] N. Zhao, F. R. Yu, M. Jin, Q. Yan, and V. C. M. Leung, Interference alignment and
its applications: A survey, research issues and challenges, IEEE Commun. Surveys
Tut., vol. 18, no. 3, pp. 17791803, Jul.Sep. 2016.
[13] F. Zhao, W. Wang, H. Chen, and Q. Zhang, Interference alignment and game-
theoretic power allocation in MIMO heterogeneous sensor networks communica-
Fig. 2. Comparison of the average SJNR with different jamming an- tions, Signal Process., vol. 126, pp. 173179, Sep. 2016.
tennas in the cases when the jamming signal is optimally designed [14] Z. Wu, L. Jiang, G. Ren, N. Zhao, and Y. Zhao, A novel joint spatial-code clustered
and when no jamming design is adopted (K = 3, M = 4, N = 4, interference alignment scheme for large-scale wireless sensor networks, Sensors,
P j = 10 mW). vol. 15, pp. 19641997, Jan. 2015.
[15] N. Zhao, J. Guo, F. R. Yu, M. Li, and V. C. M. Leung, Antijamming schemes
for interference-alignment-based wireless networks, IEEE Trans. Veh. Technol.,
vol. 66, no. 2, pp. 12711283, Feb. 2017.
proposed scheme can be improved with more jamming antennas. In [16] J. Guo, N. Zhao, F. R. Yu, X. Liu, and V. C. M. Leung, Exploiting adversarial jam-
addition, we can also find that the approximate value of SJNR is very ming signals for energy harvesting in interference networks, IEEE Trans. Wireless
Commun., vol. 16, no. 2, pp. 12671280, Feb. 2017.
close to the simulated value when N j > N , which is consistent with [17] A. M. Tulino and S. Verdu, Random matrix theory and wireless communications,
Theorem 2. Found. Trends Commun. Inf. Theory, vol. 1, no. 1, pp. 1182, Jun. 2004.