This invention relates to the field of communication, and more particularly to characterizing reactive jamming of wireless communications.
Due to the ever increasing dependence on wireless communication in both civilian and military environments, the blocking of wireless communication, i.e., jamming, is one of the major security threats that must be addressed. Several jammer categories have been identified, according to their channel-awareness and “statefulness.” Traditionally, constant and random jammers have been the prevalent approaches to jamming, because they are easy to implement. However, these methods lack channel-awareness, and are generally inefficient in blocking communications, especially when the “signals of interest” (SOI's) utilize sophisticated protocols such as “channel-hopping.” In addition, constant or random jamming is relatively easy to detect, and therefore disadvantageous for hostile entities that may wish to elude detection and apprehension.
On the other end of the spectrum, reactive jammers which target only packets that are already “on the air,” base their jamming decisions on both the current and previous channel states of the SOI. This allows for effective and efficient jamming, because only short jamming bursts are required to interfere with packets. In particular, reactive jamming enables the implementation of optimal jamming strategies, since channel-awareness is a major factor for such strategies. For example, it has been shown that a reactive jammer can be four orders of magnitude more efficient than a pre-emptive jammer. Furthermore, by corrupting the reception of only selected packets, only limited interference with other nodes is experienced, thereby minimizing the risk of detection.
Detection and characterization of reactive jamming requires that received signals must be analyzed to determine if they include significant interactions and correlations with the SOI. Currently, such estimations of interactions between communications systems and a periodic jammer that is recording and replaying receptions of the communication system are calculated using blind estimation. This current method is inaccurate and produces too many errors.
What is needed, therefore, are improved techniques for reliable detection and characterization of reactive jamming attacks.
An improved system and method is disclosed of reliably detecting a reactive jamming attack and estimating the jammer's listening interval for exploitation by a communication system.
The disclosed method comprises channelizing one or more signals of interest (SOI), channelizing one or more interferer signals, identifying support for the SOI and interferer signals using Bayes thresholds, comparing SOI and interferer detection map histories, and determining a percent match, whereby in embodiments an attack is indicated if the percent match is above a predetermined minimum value.
Embodiments identify jammers that track the frequency support of a signal of interest (SOI). In certain embodiments, the system further analyzes whether the jammer is reacting to changes in the SOI's frequency support, and in some of these embodiments the system determines how well the reactive jammer tracks the SOI's frequency set.
Various embodiments include detectors that are insensitive to jammer modulation or signal type. In certain embodiments, for example where the primary concern is if the jammer overlaps with the SOI's frequency support, the system estimates, if possible, the reaction delay and the size and periodicity of a jammer's receive window. And in certain embodiments, the system determines if the jammer is copying and retransmitting the SOI's waveform(s).
In embodiments, the system can determine if a jammer is purely reactive, i.e. merely reacts to energy in its receiving window, or is also anticipatory.
In some embodiments where there is a need for the jammer detection to be robust in the presence of impairments, the invention assesses SOI “leakage” into the jammer waveform, i.e. the residual energy from the SOI that is included erroneously with the jammer waveform due to imperfect decomposing of the received signal into SOI and jammer waveforms. And in various embodiments, the disclosed system is effective even when the jammer receive window parameters are unknown.
In certain embodiments, the disclosed system does not rely on any prior information about the jammer or its capabilities, and is effective over a diverse range of relationships between what the jammer records and what it transmits (e.g., IFFT/FFT, DRFM, detect/follow, and the like). In embodiments the system is able to detect and characterize jammers that employ only reactive interference, for example if the jammer is listening and replaying what it has heard (e.g. radar applications, telecommunications, etc.).
In embodiments, the disclosed method further comprises utilizing edge detection to obtain a receiver gate for improved time/frequency support detection. Some embodiments further comprise evaluating the likelihood that the interferer is reacting to the behavior of the SOI.
The features and advantages described herein are not all-inclusive and, in particular, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings, specification, and claims. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and not to limit the scope of the inventive subject matter.
The present disclosure is an improved system and method of reliably detecting a reactive jamming attack and estimating the jammer's listening interval for exploitation by a communication system.
In particular, the system and method compares time/frequency detection maps of communications systems to time/frequency detection maps of jammers or other interferers. Certain embodiments perform this comparison while being aware of times when the SOI communication system is not sensing the environment, typically because it is transmitting.
P(H1(n)|x(n),γ)=(1+(γ+(γ+1)(ηn−1−1)exp(−(γ+1))|y(n)2|)−1 (Eq. 1)
where H1(n) is the amplitude of the SOI in frequency channel n, x(n) is the amplitude of the jammer signal in frequency channel n, ηn is the prior probability, and γ is the signal-and-interference-to-noise-ratio (SINR) of the jamming signal. Based on the probability, a specified threshold can be used to determine if the SOU is an interferer attack. The specified threshold in one example is a predetermined value based on simulations and/or actual data.
The result of this FFT 402 is shown in
Embodiments of the present system compare the SOI's time/frequency detection maps to the jammer detector's time/frequency detection maps. In certain embodiments, during the comparison the system is aware of time intervals when the communication system is not sensing the environment. These intervals are usually when the communication systems are transmitting. In certain embodiments, the system does not require prior information regarding the jammer and is capable of comparing various instances of recording and jammer transmitting including, but not limited to, IFFT/FFT, DRFM, detect/follow, and the like.
β=−Σk ln(1−βk) (Eq. 2)
where 1−βk is the normalized mean square SOI-jammer error for channel k.
In some embodiments, the system can detect DRFM with arbitrary filtering. Embodiments use a hypothesis test over many local frequency shifts to further extend the detection capabilities.
In some embodiments, the system detects replay jammers that are on a fixed schedule. In other embodiments, the system recognizes jammers that have stochastic or irregular listening intervals. In embodiments, the system recognizes jammers that filter or change the received signal, but preserve the time/frequency content of the SOI. In various embodiments, the system provides “look-throughs,” i.e. time periods where the transceiver is forced to receive even if it is in a high-duty cycle transmit state and would otherwise have continued to transmit, therefore ensuring that receive time is provided to measure a jamming waveform and thereby aid in jammer behavior estimation. In various embodiments, the system is able to recognize jammers that are not otherwise clearly separable by correlating the SOI with itself when no jamming waveform can be decomposed from the received signal. In some of these embodiments, the zero time offset correlation is ignored and later correlations are considered to determine if they are reactive a tracks or simply multipath reflections.
In embodiments, the delay at the peak 606 gives the delay of a jammer relative to the SOI. “Unobserved” times (e.g., where the receiver has no information about the jammer because it is transmitting or in a wait state) are weighted 608 to properly compute the likelihoods that the interferer is reacting to the behavior of the SOI. In the embodiment of
In certain embodiments, to find the jammer's listening window, the system evaluates the periodic nature of the jammer's timing. This is achieved coarsely through frequency analysis of the on/off periods 614, followed by refinement in the time domain 616. Embodiments then compute an observable dubbed IsListening 618 which indicates if a periodic receive window has not been identified, implying that the jammer does not remain in a receive state for a predetermined period of time, but instead bases its receive timing on whether or not it has detected energy on the channels it is scanning.
It will be understood by one of skill in the art that the modules 702, 706, 708 shown in
The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. Each and every page of this submission, and all contents thereon, however characterized, identified, or numbered, is considered a substantive part of this application for all purposes, irrespective of form or placement within the application.
The invention illustratively disclosed herein suitably may be practiced in the absence of any element which is not specifically disclosed herein and is not inherently necessary. However, this specification is not intended to be exhaustive. Although the present application is shown in a limited number of forms, the scope of the invention is not limited to just these forms, but is amenable to various changes and modifications without departing from the spirit thereof. One or ordinary skill in the art should appreciate after learning the teachings related to the claimed subject matter contained in the foregoing description that many modifications and variations are possible in light of this disclosure. Accordingly, the claimed subject matter includes any combination of the above-described elements in all possible variations thereof, unless otherwise indicated herein or otherwise clearly contradicted by context. In particular, the limitations presented in dependent claims below can be combined with their corresponding independent claims in any number and in any order without departing from the scope of this disclosure, unless the dependent claims are logically incompatible with each other.
This application claims the benefit of U.S. Provisional Application No. 62/255,781, filed Nov. 16, 2015, which is herein incorporated by reference in its entirety for all purposes.
This invention was made with U.S. Government support under Contract No. FA8750-11-C-0189 awarded by the United States Air Force. The U.S. Government has certain rights in this invention.
Number | Name | Date | Kind |
---|---|---|---|
8351842 | Hori | Jan 2013 | B2 |
20070192870 | Lynn | Aug 2007 | A1 |
20120051239 | Thai | Mar 2012 | A1 |
20140347978 | Kim | Nov 2014 | A1 |
20160127404 | Baxley | May 2016 | A1 |
20170026205 | Agee | Jan 2017 | A1 |
20170261615 | Ying | Sep 2017 | A1 |
Number | Date | Country | |
---|---|---|---|
20170139034 A1 | May 2017 | US |
Number | Date | Country | |
---|---|---|---|
62255781 | Nov 2015 | US |