robust cdma receiver design under disguised jamming
play

Robust CDMA Receiver Design under Disguised Jamming Kai Zhou - PowerPoint PPT Presentation

Robust CDMA Receiver Design under Disguised Jamming Kai Zhou Tianlong Song Jian Ren Tongtong Li Department of Electrical & Computer Engineering Michigan State University March, 2016 BAWC c Paper Presentation for IEEE ICASSP 2016


  1. Robust CDMA Receiver Design under Disguised Jamming Kai Zhou Tianlong Song Jian Ren Tongtong Li Department of Electrical & Computer Engineering Michigan State University March, 2016 � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016

  2. Outline • Introduction • Problem Formulation • Robust Receiver Design • Secure Scrambling • Conclusions � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 1

  3. Introduction (1/2) • Code Division Multiple Access (CDMA) [1] – Signal is spread over a bandwidth N times larger by using a specific PN code – Robust under narrow band jamming, low SNR levels and malicious detection/attacks • Security of Existing CDMA Systems [2,3] – The security of CDMA relies on the randomness in PN sequences – A sequence generated from an n-stage LFSR can be reconstructed with a 2n-bit sequence segment � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 2

  4. Introduction (2/2) • Disguised Jamming [4,5] – Disguised jamming can be launched if the PN code is known to the jammer – Highly correlated with the signal, and has a power level close or equal to the signal power. • Threats of Disguised Jamming [6] – Due to the symmetricity between the jamming and authorized signal, the receiver is fully confused and cannot really distinguish the authorized signal from jamming. – A stronger result shows that the capacity of the system is zero! – The result cannot be changed by bit-level error control coding. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 3

  5. Problem Formulation (1/3) • Transmitted Signal – The transmitted signal can be written as s ( t ) = uc ( t ) , (1) where u is the symbol to be transmitted, and c ( t ) the general baseband signal of the spreading sequence. • Disguised Jamming – Mimicking the transmission pattern of the authorized user, the disguised jamming can be written as j ( t ) = vγc ( t − τ ) . (2) � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 4

  6. Problem Formulation (2/3) • Received Signal – The received signal can be written as r ( t ) = s ( t ) + j ( t ) + n ( t ) = uc ( t ) + vγc ( t − τ ) + n ( t ) , (3) where n ( t ) is the noise. • Symbol Estimation – A conventional CDMA receiver estimates the transmitted symbol as � T u = 1 ˆ r ( t ) c ( t ) dt. (4) T 0 � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 5

  7. Problem Formulation (3/3) • Symbol Estimation – Replacing the received signal r ( t ) in (4) with (3), we have � T � T u = u + vγ 1 c ( t − τ ) c ( t ) dt + 1 ˆ n ( t ) c ( t ) dt. (5) T T 0 0 • Worst Case – In the worst case, when τ = 0 and γ = 1 , (5) can be simplified as � T u = u + v + 1 ˆ n ( t ) c ( t ) dt. (6) T 0 – Probability of symbol error: P s ≥ M − 1 2 M . LOWER BOUNDED!!! � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 6

  8. Robust Receiver Design (1/4) • MSE Minimization – The MSE between the received signal and the jammed signal can be calculated as � T J ( u, v, τ, γ ) = 1 | r ( t ) − uc ( t ) − vγc ( t − τ ) | 2 dt. (7) T 0 – Our goal is { ˆ u, ˆ v, ˆ τ, ˆ γ } = arg min J ( u, v, τ, γ ) . (8) u,v,τ,γ – Difficult task. Too many parameters! � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 7

  9. Robust Receiver Design (2/4) • Problem Reduction – To minimize (7), one necessary condition is that its partial derivatives regarding v and γ are zero, applying which (7) can be reduced to � T J = 1 | r ( t ) − uc ( t ) | 2 dt − | A ( u, τ ) | 2 , (9) T 0 which is a function depending only on u and τ . – In digital implementation, limited by the time resolution, τ becomes discrete and thus has only a few possible values with | τ | < T c . – Search on all ( u, τ ) pairs to find the minimum value. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 8

  10. Robust Receiver Design (3/4) • Numerical Results: Threats of Disguised Jamming BER v.s. Eb/N0 with Different Timing Differences 0 10 -1 10 -2 10 BER -3 10  = 0 -4  = 1/32Tc 10  = 1/16Tc  = 1/8Tc  = 1/4Tc No jamming -5 10 0 5 10 15 20 25 30 Eb/N0 (dB) � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 9

  11. Robust Receiver Design (4/4) • Numerical Results: Bit Error Rates BER v.s. Eb/N0 for the Conventional and Proposed Receivers 0 10 Proposed Conventional -1 10 BER -2 10 -3 10 -4 10 0 5 10 15 20 25 30 Eb/N0 (dB) � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 10

  12. Secure Scrambling • AES-based Secure Scrambling – Generate the scrambling sequence using AES. – Cracking AES-based secure scrambling is equivalently breaking AES, which is secure under all known attacks. • Secure Scrambling Sequence Generation IV KEY PN Sequence Generator AES � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 11

  13. Capacity Analysis (1/3) • Arbitrarily Varying Channel (AVC) Model [6] – An AVC channel model is generally characterized using a kernel W : S × J → Y , where S is the transmitted signal space, J is the jamming space (i.e., the jamming is viewed as the arbitrarily varying channel states) and Y is the estimated signal space. – For any s ∈ S , j ∈ J and y ∈ Y , W ( y | s , j ) denotes the conditional probability that y is detected at the receiver, given that s is the transmitted signal and j is the jamming. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 12

  14. Capacity Analysis: (2/3) • Definitions & Theorems – Definition 1 : The AVC is said to have a symmetric kernel, if S = J and W ( y | s , j ) = W ( y | j , s ) for any s , j ∈ S , y ∈ Y . ˆ ˆ W ( y | s , s ′ ) � – Definition 2 : Define W : S × S → Y by j ∈J ′ π ( j | s ′ ) W ( y | s , j ) , where π : S → J ′ is a probability ma- � trix and J ′ ⊆ J . If there exists a π : S → J ′ such that W ( y | s ′ , s ) , ∀ s , s ′ ∈ S , ∀ y ∈ Y , then W is said to be W ( y | s , s ′ ) = ˆ ˆ symmetrizable. – Existing Result [6] : The deterministic code capacity of an AVC for the average probability of error is positive if and only if the AVC is neither symmetric nor symmetrizable. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 13

  15. Capacity Analysis (3/3) • Symmetric & Symmetrizable Kernels Authorized Signal To Receiver  s S    Jamming Noise n j J S ( | , ) ( | , ) W y s j W y j s (a) Symmetric Kernel Authorized Signal To Receiver  s S    Jamming j J J ˆ ˆ    Noise n ( | , ) ( | , ) y s s y s s W W   ˆ ( | , ) Auxiliary      ( | ) ( | , ) W y s s j s W y s j ( | ) j s Channel   j J  s S (b) Symmetrizable Kernel � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 14

  16. Secure Scrambling: Summary • Comparison: without v.s. with Secure Scrambling Table 1: Comparison of CDMA Systems with and without Secure Scrambling under Disguised Jamming. Without S.S. With S.S. Symmetric Yes No Symmetrizable N/A No Nσ 2 SJNR N/A n , v ∈ Ω s | v | 2 + σ 2 Nσ 2 � � ≥ M − 1 1 � Error Probability v ∈ Ω P Ω s | v | 2 + σ 2 | Ω | 2 M n Nσ 2 � � B 1 � Capacity 0 v ∈ Ω log 2 1 + s | v | 2 + σ 2 | Ω | N n � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 15

  17. Numerical Results • Comparison: Symbol Error Rates Symbol Error Rates for CDMA in Different Scenarios 0 10 -1 Symbol Error Rate (SER) 10 -2 10 Jamming-Free Disguised Jamming without Secure Scrambling Disguised Jamming with Secure Scrambling Disguised Jamming with Secure Scrambling--Theoretical -3 10 0 1 2 3 4 5 6 7 8 9 10 Eb/N0 (dB) � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 16

  18. Conclusions • We designed a novel CDMA receiver that is robust against disguised jamming; • We developed a secure scrambling scheme to combat dis- guised jamming in CDMA systems; • We proved that the capacity of the conventional CDMA systems without secure scrambling under disguised jamming is zero; • The capacity can be significantly increased when CDMA systems are protected using secure scrambling. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 17

  19. Thank you! Questions? � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 18

  20. References [1] C.-L. Wang and K.-M. Wu, “A new narrowband interference suppression scheme for spread-spectrum CDMA communications,” vol. 49, no. 11, pp. 2832–2838, Nov 2001. [2] J. Massey, “Shift-register synthesis and BCH decoding,” vol. 15, no. 1, pp. 122–127, Jan 1969. [3] T. Li, Q. Ling, and J. Ren, “Physical layer built-in security analysis and enhancement algorithms for CDMA systems,” EURASIP Journal on Wireless Communications and Networking , vol. 2007, no. 1, p. 083589, 2007. [4] L. Zhang, H. Wang, and T. Li, “Anti-jamming message-driven frequency hopping-part i: System design,” IEEE Transactions on Wireless Communications , vol. 12, no. 1, pp. 70 –79, Jan. 2013. [5] M. Medard, “Capacity of correlated jamming channels,” in Allerton Conference on Communi- cations, Computing and Control , 1997. [6] T. Ericson, “Exponential error bounds for random codes in the arbitrarily varying channel,” vol. 31, no. 1, pp. 42–48, 1985. � BAWC c Paper Presentation for IEEE ICASSP 2016 March, 2016 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend