Defend jamming attacks: How to make enemies become friends

Thai Hoang DInh, Mohammad Abu Alsheikh, Shimin Gong, Dusit Niyato, Zhu Han, Ying Chang Liang

Research output: A Conference proceeding or a Chapter in BookConference contribution

Abstract

In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with smart jamming attacks, we propose an intelligent deception strategy in which the legitimate device will send fake transmissions to lure the jammer. Then, if the jammer launches attacks to the channel, the legitimate device can either backscatter the jamming signals to transmit data or harvest energy from the jamming signals for future active transmission. In this way, we can not only undermine the attack ability of the jammer, but also leverage jamming attacks as means to enhance system performance. In addition, to find an optimal defense strategy for the legitimate device under uncertainty of wireless environment as well as incomplete information from the jammer, we develop Q-learning and deep Q-learning algorithms based on the Markov decision process. Through simulation results, we demonstrate that our proposed solution is able to not only deal with smart jamming attacks, but also successfully leverage jamming attacks to improve the system performance.

Original languageEnglish
Title of host publicationIEEE Global Communications Conference (GLOBECOM)
EditorsDouglas N. Zuckerman, Hsiao-Hwa Chen, Mehmet Ulema, James Won-Ki Hong
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-6
Number of pages6
ISBN (Electronic)9781728109626
ISBN (Print)9781728109633
DOIs
Publication statusPublished - Dec 2019
Event2019 IEEE Global Communications Conference, GLOBECOM 2019 - Waikoloa, United States
Duration: 9 Dec 201913 Dec 2019

Publication series

Name2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings

Conference

Conference2019 IEEE Global Communications Conference, GLOBECOM 2019
CountryUnited States
CityWaikoloa
Period9/12/1913/12/19

Fingerprint Dive into the research topics of 'Defend jamming attacks: How to make enemies become friends'. Together they form a unique fingerprint.

  • Cite this

    DInh, T. H., Alsheikh, M. A., Gong, S., Niyato, D., Han, Z., & Liang, Y. C. (2019). Defend jamming attacks: How to make enemies become friends. In D. N. Zuckerman, H-H. Chen, M. Ulema, & J. W-K. Hong (Eds.), IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). [9014094] (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings). IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/GLOBECOM38437.2019.9014094