Award Abstract # 1217206
NeTS: Small: Anti-Jamming Techniques for Secure Communications in Wireless Networks

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: MICHIGAN STATE UNIVERSITY
Initial Amendment Date: August 3, 2012
Latest Amendment Date: June 28, 2017
Award Number: 1217206
Award Instrument: Standard Grant
Program Manager: Thyagarajan Nandagopal
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2012
End Date: July 31, 2018 (Estimated)
Total Intended Award Amount: $380,000.00
Total Awarded Amount to Date: $380,000.00
Funds Obligated to Date: FY 2012 = $380,000.00
History of Investigator:
  • Tongtong Li (Principal Investigator)
    tongli@egr.msu.edu
  • Jian Ren (Co-Principal Investigator)
Recipient Sponsored Research Office: Michigan State University
426 AUDITORIUM RD RM 2
EAST LANSING
MI  US  48824-2600
(517)355-5040
Sponsor Congressional District: 07
Primary Place of Performance: Michigan State University
MI  US  48824-1046
Primary Place of Performance
Congressional District:
07
Unique Entity Identifier (UEI): R28EKN92ZTZ9
Parent UEI: VJKZC4D1JN36
NSF Program(s): Networking Technology and Syst
Primary Program Source: 01001213DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7923, 9102
Program Element Code(s): 736300
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Jamming attack is one of the most commonly used techniques for limiting the effectiveness of an opponent's communication in wireless networks. Along with the advent of user configurable intelligent devices, such as cognitive radios, jamming is no longer limited to military related events, but has become an urgent and serious threat to civilian communications as well. Motivated by this observation, this project is devoted to the development of multi-layer anti-jamming techniques for secure communications over wireless networks. First, we introduce a systematic 2D model for cognitive jamming characterization, detection and classification. We also introduce the concept of disguised jamming, and point out that it can be much more harmful than the traditional strong jamming. Second, we investigate efficient anti-jamming system design for both point-to-point (one-hop) communications and multi-hop communications. For one-hop communications, we enhance jamming resistance by incorporating advanced cryptographic techniques into network-centric spectrum access control and the physical layer transceiver design. For multi-hop communications, we develop efficient and unconditionally secure cryptographic algorithms and protocols to maximize routing diversity and routing anonymity.

The proposed highly efficient anti-jamming techniques lay a solid foundation for real-time jamming detection and reliable information transmission under dynamic jamming scenarios. It can greatly improve the efficiency and reliability of high speed wireless services. This project also includes a significant education component aimed at integrating frontier research with undergraduate and graduate curricula. Research results will be presented at international conferences, meetings and published in scientific journals.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 14)
Ahmed Alahmadi, Mai Abdelhakim, Jian Ren and Tongtong Li "Defense Against Primary User Emula-tion Attacks in Cognitive Radio Networks Using Advanced Encryption Standard" IEEE Transactions on Information Forensics and Security, , v.9 , 2014
Ahmed Alahmadi, Zhaoxi Fang, Tianlong Song and Tongtong Li, "Mitigation of PUEA Using Energy Harvesting in OFDM-based Cognitive Radio Networks," IEEE Transactions on Information Forensics and Security, , v.10 , 2015 , p.1002
Lei Zhang and Tongtong Li "Anti-Jamming Message-Driven Frequency Hopping: Part II -- Capacity Analysis Under Disguised Jamming." IEEE Transactions on Wireless Communications. , v.Vol. 12 , 2013 , p.80-88
Lei Zhang, Huahui Wang and Tongtong Li "Anti-Jamming Message-Driven Frequency Hopping: Part I -- System Design." IEEE Transactions on Wireless Communications. , v.Vol. 12 , 2013 , p.70-79
Mai Abdelhakim, Yuan Liang and Tongtong Li "Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis" IEEE Transactions on Signal and Information Processing over Networks , v.3 , 2017 , p.172
Run Tian, Yuan Liang and Tongtong Li "Overlapping User Grouping in IoT Oriented Massive MIMO Systems" The 2017 International Conference on Computing, Networking and Communications (ICNC) , 2017
Tianlong Song, Kai Zhou and Tongtong Li "CDMA System Design and CapacityAnalysis Under Disguised Jamming" IEEE Transactions on Information Forensics and Security , v.11 , 2016 , p.2487
Tianlong Song, Tongtong Li and Jitendra Tugnait "Spectrally Efficient Multi-Carrier Transmissionwith Message-Driven Subcarrier Selection" IEEE Transactions on Communications , v.Vol. 62 , 2014
Tianlong Song, Wayne Stark, Tongtong Li and Jitendra Tugnait "Optimal Multiband Transmission Under HostileJamming" IEEE Transactions on Communications , v.64 , 2016 , p.4013
Tianlong Song, Yuan Liang, Tongtong Li "Physical Layer Security of Multiband Communications Under Hostile Jamming" The 2017 International Conference on Computing, Networking and Communications (ICNC) , 2017
Tingting Jiang, Tongtong Li and Jian Ren "Towards Secure Cognitive Communications in Wireless Networks." IEEE Wireless Communications , v.Vol. 19 , 2013 , p.82-88
(Showing: 1 - 10 of 14)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

As we are entering the era of Internet of Things (IoT), the importance of secure, efficient and reliable wireless communications cannot be overemphasized. It has become the key enabler in information exchange, remote sensing, monitoring and control, and is finding applications in nearly every field. Mainly due to limited total available spectrum and lack of a protective physical boundary, wireless communication is facing much more serious challenges in security and capacity than its wirelined counterpart. In addition to the time and frequency dispersions, wireless signals are subjected to unauthorized detection, interception/eavesdropping and hostile jamming. 

In hostile jamming, the jammer intends to disable the legitimate transmission by saturating the receiver with noise or false information through deliberate radiation of radio signals. Comparing to passive attacks such as unauthorized detection and eavesdropping, hostile jamming is an active attack and is much more destructive. Along with the wide spread of advanced wireless devices, especially with the advent of user configurable intelligent devices, jamming attack is no longer limited to battlefield or military related events, but has become an urgent and serious threat to civilian communications as well.

This project was focused on secure and efficient anti-jamming system design for civilian applications. In communication system design, security is often achieved with a sacrifice on efficiency. Unlike in military applications where rich spectral diversity is generally available, civilian applications are often highly limited in both bandwidth and power. As can be seen, the biggest challenge here lies in how to design secure anti-jamming systems which are robust, reliable and yet possess high spectral and power efficiency. For practical applications, the anti-jamming systems need to be feasible, cost effective, and ideally, can be implemented through smooth upgrades of existing systems. These are the major criterions and guidelines in our study and research on anti-jamming system design.

In this project, we revisited existing jamming patterns, and introduce new jamming patterns. We analyzed the limitations of existing communication systems and anti-jamming techniques. We found  that existing communication systems do not possess sufficient security features and are generally very fragile under disguised jamming. Most communication systems, such as EDGE and OFDM, are designed for efficient and accurate information transmission from the source to destination, and do not have inherent security features. When attacked by disguised jamming, the deterministic capacity of these systems will be reduced to zero. Existing work on anti-jamming system design or jamming mitigation is mainly based on spread spectrum techniques, including CDMA and frequency hopping (FH). Both CDMA and FH systems possess anti-jamming features by exploiting frequency diversity over large spectrum. However, while these systems work reasonably well for voice-centric communication, their security feature and information capacity are far from adequate and acceptable for today’s high speed multimedia wireless services.

We presented a whole family of innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping, TDMA and OFDM schemes. We enhanced the security of CDMA systems through secure scrambling, in addition to its robustness to narrow-band jamming, CDMA with secure scrambling is proved to be secure and efficient under disguised jamming. We developed innovative frequency hopping techniques, known as messagedriven frequency hopping (MDFH), and collision-free frequency hopping (CFFH). In MDFH, part of the encrypted message stream acts as the PN sequence, and transmitted through hopping frequency control. Transmission through hopping frequency control essentially introduces another dimension to the signal space, and the corresponding coding gain can increase the system efficiency by multiple times. On the other hand, CFFH is developed to resolve the self-collision problem in conventional frequency hopping. CFFH can ensure that each user hops in a pseudo-random manner, and different users always transmit on non-overlapping sets of subcarriers. CFFH can be directly applied to any mutliband multiaccess systems to achieve secure and dynamic spectral access control. CFFH is proved to be particulary effective in mitigating partial band jamming and follower jamming. When applied to OFDMA system, the resulted CFFH-OFDM has the same spectral efficiency as the original OFDM system. We developed an innovative secure precoding scheme which can achieve constellation randomization, break the symmetricity between the authorized signal and jamming, and hence achieve secure and efficient transmission under disguised jamming.We applied it to the OFDM system, and come up with the securely precoded OFDM (SP-OFDM). While achieving strong resistance against disguised jamming, SP-OFDM has the same high spectral efficiency as the traditional OFDM system.The innovative techniques developed in this project can serve as benchmarks for the design of next generation secure and efficient wireless communication systems under intentional interference,

 

 


Last Modified: 09/25/2018
Modified by: Tongtong Li

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page