Saturday, November 27, 2021

Dissertation in jamming anti jamming wireless networks

Dissertation in jamming anti jamming wireless networks

dissertation in jamming anti jamming wireless networks

Oct 13,  · The proposed scheme provides great ability of anti-jamming and combating dispersive fading of radio channels and an exact bit-error-rate (BER) expression for uncoded systems is derived. Clustered OFDM has not only inherent ability to mitigate intersymbol interference (ISI) caused by delay spread of radio channels, but also great flexibility for multiple access This work aims at addressing two critical security issues residing in the physical layer of wireless networks, namely intelligent jamming and eavesdropping. In the first two chapters we study the problem of jamming in a fixed-rate transmission system with fading, under the general assumption that the jammer has no knowledge about either the codebook used by the legitimate communication Anti-jamming, MAC protocol, wireless sensor networks 1. INTRODUCTION Jamming is the radiation of electromagnetic energy in a communication channel which reduces the effec-tive use of the electromagnetic spectrum for legitimate communication. Jamming results in a loss of link reli-ability, increased energy consumption, extended packet



"Keyless Anti-Jamming Communication via Randomized DSSS" by Ahmad Alagil



Award Abstract NeTS: Small: Anti-Jamming Techniques for Secure Communications in Wireless Networks. ABSTRACT Jamming attack is one of the most commonly used techniques for limiting the effectiveness of an opponent's communication in wireless networks.


Along with the advent of user configurable intelligent devices, such as cognitive radios, jamming is no longer limited to military dissertation in jamming anti jamming wireless networks events, but has become an dissertation in jamming anti jamming wireless networks and serious threat to civilian communications as well.


Motivated by this observation, this project is devoted to the development of multi-layer anti-jamming techniques for secure communications over wireless networks. First, we introduce a systematic 2D model for cognitive jamming characterization, detection and classification. We also introduce the concept of disguised jamming, and point out that it can be much more harmful than the traditional strong jamming. Second, we investigate efficient anti-jamming system design for both point-to-point one-hop communications and multi-hop communications.


For one-hop communications, we enhance jamming resistance by incorporating advanced cryptographic techniques into network-centric spectrum access control and the physical layer transceiver design.


For multi-hop communications, we develop efficient and unconditionally secure cryptographic algorithms and protocols to maximize routing diversity and routing anonymity. The proposed highly efficient anti-jamming techniques lay a solid foundation for real-time jamming detection and reliable information transmission under dynamic jamming scenarios. It dissertation in jamming anti jamming wireless networks greatly improve the efficiency and reliability of high speed wireless services.


This project also dissertation in jamming anti jamming wireless networks a significant education component aimed at integrating frontier research with undergraduate and graduate curricula.


Research results will be presented at international conferences, meetings and published in scientific journals. Some full text articles may not yet be available without a charge during the embargo administrative interval. Some links on this page may take you to non-federal websites. Their policies may differ from this site. PROJECT OUTCOMES REPORT Disclaimer This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator PI for this award, dissertation in jamming anti jamming wireless networks.


Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content. As we are entering the era of Internet of Things IoTthe importance of secure, efficient and reliable wireless communications cannot be overemphasized.


It has become the key enabler in information exchange, remote sensing, monitoring and control, and is finding applications in nearly every field. Mainly due to limited total available spectrum and lack of a protective physical boundary, wireless communication is facing much more serious challenges in security and capacity than its wirelined counterpart.


In hostile jamming, the jammer intends to disable the legitimate transmission by saturating the receiver with noise or false information through deliberate radiation of radio signals. Comparing to passive attacks such as unauthorized detection and eavesdropping, hostile jamming is an active attack and is much more destructive. Along with the wide spread of advanced wireless devices, especially with the advent of user configurable intelligent devices, jamming attack is no longer limited to battlefield or military related events, but has become an urgent and serious threat to civilian communications as well.


This project was focused on secure and efficient anti-jamming system design for civilian applications. In communication system design, security is often achieved with a sacrifice on efficiency. Unlike in military applications where rich spectral diversity is generally available, civilian applications are often highly limited in both bandwidth and power.


As can be seen, the biggest challenge here lies in how to design secure anti-jamming systems which are robust, reliable and yet possess high spectral and power efficiency. For practical applications, the anti-jamming systems need to be feasible, cost effective, and ideally, can be implemented through smooth upgrades of existing systems.


These are the major criterions and guidelines in our study and research on anti-jamming system design. In this project, we revisited existing jamming patterns, and introduce new jamming patterns. We analyzed the limitations of existing communication systems and anti-jamming techniques.


We found that existing communication systems do not possess sufficient security features and are generally very fragile under disguised jamming. Most communication systems, such as EDGE and OFDM, are designed for efficient and accurate information transmission from the source to destination, and do not have inherent security features. When attacked by disguised jamming, the deterministic capacity of these systems will be reduced to zero. Existing work on anti-jamming system design or jamming mitigation is mainly based on spread spectrum techniques, including CDMA and frequency hopping FH.


Both CDMA and FH systems possess anti-jamming features by exploiting frequency diversity over large spectrum. We presented a whole family of innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping, TDMA and OFDM schemes.


We enhanced the security of CDMA systems through secure scrambling, in addition to its robustness to narrow-band jamming, CDMA with secure scrambling is proved to be secure and efficient under disguised jamming. We developed innovative frequency hopping techniques, known as messagedriven frequency hopping MDFHand collision-free frequency hopping CFFH. In MDFH, part of the encrypted message stream acts as the PN sequence, and transmitted through hopping frequency control. Transmission through hopping frequency control essentially introduces another dimension to the signal space, and the corresponding coding gain can increase the system efficiency by multiple times.


On the other hand, CFFH is developed to resolve the self-collision problem in conventional frequency hopping. CFFH can ensure that each user hops in dissertation in jamming anti jamming wireless networks pseudo-random manner, and different users always transmit on non-overlapping sets of subcarriers.


CFFH can be directly applied to any mutliband multiaccess systems to achieve secure and dynamic spectral access control. CFFH is proved to be particulary effective in mitigating partial band jamming and follower jamming. When applied to OFDMA system, the resulted CFFH-OFDM has the same spectral efficiency as the original OFDM system. We developed an innovative secure precoding scheme which can achieve constellation randomization, break the symmetricity between the authorized signal and dissertation in jamming anti jamming wireless networks, and hence achieve secure and efficient transmission under disguised jamming.


We applied it to the OFDM system, and come up with the securely precoded OFDM SP-OFDM. While achieving strong resistance against disguised jamming, SP-OFDM has the same high spectral efficiency as the traditional OFDM system. The innovative techniques developed in this project can serve as benchmarks for the design of next generation secure and efficient wireless communication systems under intentional interference.


Please report errors in award information by writing to: awardsearch nsf. Home Research Areas Biological Sciences BIO Computer and Information Science and Engineering CISE Education and Human Resources EHR Engineering ENG Environmental Research and Education ERE Geosciences GEO Integrative Activities OIA International Science and Engineering OISE Mathematical and Physical Sciences MPS Social, Behavioral and Economic Sciences SBE Related Links Interdisciplinary Research NSF Organization List Responsible and Ethical Conduct of Research Staff Directory Understanding NSF Research.


About Funding Archived Funding Search Due Dates Find Funding Merit Review Policies and Procedures Preparing Proposals Recent Opportunities Transformative Research Related Links Proposal and Award Policies and Procedures Guide PAPPG Research.


gov FastLane Funding Opportunities For Graduate Students K Educators Postdoctoral Fellows Undergraduate Students Small Business. About Awards Award Statistics Budget Internet Info System Award Conditions Managing Awards Policies and Procedures Presidential and Honorary Awards Search Awards Related Links Research.


gov FastLane Public Access Initiative. All Documents National Center for Science and Engineering Statistics NCSES Obtaining Documents Search Documents.


All News For News Media Multimedia Gallery News Archive Search News Special Reports Speeches and Lectures Related Links About NSF Logo Events. Awards Search Awards Recent Awards Presidential and Honorary Awards About Awards How to Manage Your Award Grant General Conditions Cooperative Agreement Conditions Special Conditions Federal Demonstration Partnership Policy Office Website. Award Abstract NeTS: Small: Anti-Jamming Techniques for Secure Communications in Wireless Networks.


Lei Zhang, Huahui Wang and Tongtong Li "Anti-Jamming Message-Driven Frequency Hopping: Part I -- System Design. Lei Zhang and Tongtong Li "Anti-Jamming Message-Driven Frequency Hopping: Part II -- Capacity Analysis Under Disguised Jamming. Tingting Jiang, Tongtong Li and Jian Ren "Towards Secure Cognitive Communications in Wireless Networks. Ahmed Alahmadi, Mai Abdelhakim, Jian Ren and Tongtong Li "Defense Against Primary User Emula- tion Attacks in Cognitive Radio Networks Using Advanced Encryption Standard" IEEE Transactions on Information Forensics and Security,v.


Tongtong Li, Mai Abdelhakim and Jian Ren "N-Hop Networks A General Framework for Wireless System" IEEE Wireless Communications Tianlong Song, dissertation in jamming anti jamming wireless networks, Tongtong Li and Jitendra Tugnait "Spectrally Efficient Multi-Carrier Transmission with Message-Driven Subcarrier Selection" IEEE Transactions on Communicationsv. Zhaoxi Fang, Tianlong Song and Tongtong Li "Energy Harvesting for Two-Way OFDM Communications under Hostile Jamming" IEEE Signal Processing Lettersv.


Ahmed Alahmadi, Zhaoxi Fang, Tianlong Song and Tongtong Li, "Mitigation of PUEA Using Energy Harvesting in OFDM-based Cognitive Radio Networks," IEEE Transactions on Information Forensics and Security, dissertation in jamming anti jamming wireless networks,v. Mai Abdelhakim, Yuan Liang and Tongtong Li "Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis" IEEE Transactions on Signal and Information Processing over Networksv.


Run Tian, Yuan Liang and Tongtong Li "Overlapping User Grouping in IoT Oriented Massive MIMO Systems" The International Conference on Computing, Networking and Communications ICNC Tianlong Song, Kai Zhou and Tongtong Li "CDMA System Design and Capacity Analysis Under Disguised Jamming" IEEE Transactions on Information Forensics and Securityv.


Tianlong Song, Wayne Stark, Tongtong Li and Jitendra Tugnait "Optimal Multiband Transmission Under Hostile Jamming" IEEE Transactions on Communicationsv. Tianlong Song, Yuan Liang, Tongtong Li "Physical Layer Security of Multiband Communications Under Hostile Jamming" The International Conference on Computing, Networking and Communications ICNC Yuan Liang, Yu Zheng, Jian Ren and Dissertation in jamming anti jamming wireless networks Li "End-to-End Delay in Multi-Hop Wireless Networks with Random Relay Deployment" Proceedings of IEEE ICNC Take our Customer Satisfaction Survey Follow Us See all NSF social media, dissertation in jamming anti jamming wireless networks.


Research Areas Funding Awards Document Library News About NSF. Website Policies Budget and Performance Inspector General Privacy FOIA No FEAR Act USA. gov Accessibility Plain Language Contact. National Science Foundation, Eisenhower Avenue, Alexandria, VirginiaUSA Tel:FIRS: TDD: Text Only Version View Mobile Site. CNS Division Of Computer and Network Systems. Thyagarajan Nandagopal tnandago nsf. Tongtong Li Principal Investigator tongli egr.


edu Jian Ren Co-Principal Investigator. Awardee Sponsored Research Office:. Michigan State University Office of Sponsored Programs East Lansing MI US Michigan State University MI US Primary Place of Performance Congressional District:.




WiFi Deauthing / Jamming \u0026 How To Protect Against it

, time: 9:38





Jamming and anti-Jamming Techniques - Krazytech


dissertation in jamming anti jamming wireless networks

Theses and Dissertations Thesis Collection Net-centric Controlled Distributed Stand-in-Jamming using UAVsTransmission Losses and Range Limitations Due to Geo-localization Problem Over terms parallel to the improvements in wireless network technologies. These relatively Jamming in wireless networks is defined as the disruption of existing wireless communications by decreasing the signal-to-noise ratio at receiver sides through the transmission of interfering wireless signals. Jamming is different from regular network interferences because it describes the deliberate use of wireless signalsin an attempt to disrupt communications whereas In this thesis, we investigate the fundamental primitives that enable jamming-resistant communication and propose novel anti-jamming tech-niques for scenarios where common anti-jamming techniques cannot be applied. This includes scenarios where network dynamics or lack of trust in the devices prohibits the pre-distribution of shared secrets (a

No comments:

Post a Comment