Académique Documents
Professionnel Documents
Culture Documents
Abstract—Cognitive radio (CR) is a promising technology for exploits the cyclostationarity of modulated signals by detecting
future wireless spectrum allocation to improve the use of licensed spectral peaks in spectral correlation function (SCF) or spectral
bands. However, security challenges faced by cognitive radio tech- coherence function (SOF) [5–7], which are sparse in both
nology are still a hot research topic. One of prevailing challenges
is the radio frequency jamming attack, where adversaries are angular (f ) and cyclic (α) frequency domain. Major advantage
able to exploit on-the-fly reconfigurability potentials and learning of CFD based detector lies on its abilities to perform better
mechanism of cognitive radios in order to devise and deploy than energy detector at low SNR values and to distinguish
advanced jamming tactics. Jamming attacks can significantly different modulated signals. Furthermore, the cyclic spectral
impact the performance of wireless communication systems analysis has been used as a robust tool for signal classification
and lead to significant overheads in terms of retransmission
and increment of power consumption. In this context, a novel when the carrier frequency and bandwidth information is
jammer detection algorithm is proposed using cyclic spectral unavailable [8], [9]. A comparison among the most common
analysis and artificial neural networks (ANN) for wide-band sensing methods in terms of complexity and accuracy is made
(WB) cognitive radios. The proposed approach assumes a WB by [10]. In Fig. 2, those methods are mapped into a plane that
spectrum occupied by various narrow-band (NB) signals, which allows to compare them easily.
can be either legitimate or jamming signals. The second order
statistics, namely, the spectral correlation function (SCF) and Radio frequency (RF) jamming refers to the process of
ANN are used to classify each NB signal as a legitimate or illegitimate RF transmission on one or more RF channels
jamming signal. The algorithm performance is shown with the with the objective of causing maximum distortion to the
help of simulations. communication of the targeted system. The RF jamming and
Index Terms—Cognitive radio, jamming attacks, spectral cor- anti-jamming concepts are classical in radio communication
relation function, artificial neural network
itself, but recent progresses in CR technology has enabled
devising and deploying of more advanced, self-reconfigurable
I. I NTRODUCTION
jamming [11] and anti-jamming [12] solutions. Spectrum
Over the years, cognitive radio (CR) has attained great sensing information plays a key role in anti-jamming systems.
attention from the communication society due to its ability of This information may be used to detect potential jamming
allowing dynamic / opportunistic spectrum access in a spec- entities [13], [14] and to take proactive measures to ensure
trum sparse environment [1], [2]. A CR dynamically interacts communication continuity [15] and security [16]. Moreover, a
with the environment and updates the operating parameters history of observations can be maintained and used to devise
with mission of exploiting the spectrum holes without affecting more effective anti-jamming tactics. For example, when a
primary (licensed) user activity. To gain the knowledge of frequency hoping spread spectrum (FHSS) based system is
spectrum holes, spectrum sensing is the primary task needed considered, CR may modify its hopping sequence to avoid
to be performed by a CR terminal [3]. the channels which are occupied by potential jamming entities
In literature, various spectrum sensing techniques have been [17]. In order to design the proper anti-jamming system, there
proposed for CRs, such as, energy detection, cyclostationary is a need for a reliable jammer detection algorithm.
feature detection (CFD) and matched filtering detection [4]. This paper introduces a new algorithm for jammmer detec-
Among these methods, the CFD [4] is capable of detecting tion for WB CRs. A WB spectrum is assumed to be consisting
the primary signal from the interference and noise even in of multiple sub-bands, each occupied by a narrow-band (NB)
very low signal-to-noise ratio (SNR) regions. This perfor- signal. These NB signals can be legitimate or jammers. The
mance is achieved at the cost of increased implementation cyclic frequency profile (α-profile) and angular frequency
complexity. The Federal Communications Commission (FCC) profile (f -profile) of the cyclic spectral analysis are used as
of the United States has suggested CFD as an alternative to input features for an artificial neural network (ANN). Based on
improve the detection sensitivity in CR networks. Generally, the ANN classifier, each of the NB signal is classified either
energy detector fails at low SNRs while matched filtering as a licit or a jamming signal. Finally, the proposed algorithm
detector requires a dedicated receiver structure which may performance is evaluated for various SNRs to observe the
not be possible in a practical cognitive radio terminal. CFD effects of diverse parameters on the classification.
Accuracy
Radio
Identification
Cyclostastionary
Energy
Detector
Complexity
Where Sn (t) denotes the n-th transmitted signal, hn (t) is III. PROPOSED ALGORITHM
the channel coefficient between n-th transmitter and receiver, In this section we will first introduce SCF, then neural
* denotes the convolution operation and w(t) is the additive networks and at the end we will present our newly proposed
white Gaussian noise (AWGN) with zero mean and power algorithm.
2
spectral density σw . We assume that NB signals can be gener- 1) Cyclostationary Spectral Analysis: A process x(t) is
ated by different types of modulation schemes, such as, binary said to be wide-sense cyclostationary with period T0 if its
frequency shift keying (BFSK), binary phase shift keying mean E[x(t)] = μx (t) and autocorrelation E[x(t)x(t + τ )] =
(BPSK), quadrature amplitude modulation (QAM), quadrature Rx (t, τ ) are both periodic with period T0 , in such case, they
phase shift keying (QPSK), or any other modulation scheme can be defined respectively as:
as shown in Fig. 1(a). The WB is divided into multiple equal
bandwidth SBs and each of these SBs can be occupied by NB Mx (t + T0 ) = Mx (t) ; Rs (t + T0 , τ ) = Rx (t, τ ) (4)
signals with no spill over energy into neighboring SBs. The autocorrelation function of a wide-sense cyclostationary
For our proposed system, a single tone is considered as a process can be expressed in terms of its Fourier series com-
jamming signal. The jammer is considered to be a cognitive ponents.
jammer, which has the knowledge of carrier frequencies of
legitimate signals. This jammer can jam any of SBs, if it has Rx (t, τ ) = E[x(t + τ /2)x∗ (t + τ /2)] (5)
247
Rx (t, τ ) = Rxα ej2παt (6)
α
2
modulated signals (BPSK, AM, FSK, MSK, QAM, PAM)
with overlapping power spectral densities have highly distinct 1.5
SCFs. Our simulations are restricted to the BPSK and QPSK
modulation schemes due to the fact that higher order QAM 1
248
0.1
Output 1 We=0.65, Wt=0.35
Input 1 Neuron 1 0.09 We=0.75, Wt=0.25
We=0.85, Wt=0.15
0.08 We=0.95, Wt=0.05
Output 2 We=1, Wt=0
Input 2 Neuron 2
0.07
0.06
Output 3
0.05
0.03
0.01
1 2 3 4 5 6 7 8 9 10
Number of neurons (m)
Fig. 5. Proposed Neural Network
Fig. 6. Neural Network performance for different number of neurons
249
Algorithm 1 Pseudo-code for proposed algorithm
Pd with 10% False Alarm Rate
1: function JAMMER D ETECTOR 1
250
Signal classification results
jamming performance of the system. The knowledge about
1 band occupied by jammer and its type (modulated or tone)
0.95
can be used to avoid the bands frequently jammed and to
design an efficient anti-jamming system against such attacks.
0.9
R EFERENCES
0.85
[1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios
Classification rate
0.8 more personal,” IEEE Personal Communications, vol. 6, pp. 13–18, Aug
1999.
0.75 [2] S. Haykin, “Cognitive radio: brain-empowered wireless communica-
BPSK--f tions,” IEEE Journal on Selected Areas in Communications, vol. 23,
0.7 BPSK- pp. 201–220, Feb 2005.
QPSK--f [3] H. B. Yilmaz, T. Tugcu, F. Alagz, and S. Bayhan, “Radio environment
QPSK- map as enabler for practical cognitive radio networks,” IEEE Commu-
0.65
Jammer--f
nications Magazine, vol. 51, pp. 162–169, December 2013.
Jammer-
0.6 BPSK+Jammer--f
[4] S. Haykin, D. Thomson, and J. Reed, “Spectrum sensing for cognitive
BPSK+Jammer- radio,” Proceedings of the IEEE, vol. 97, no. 5, pp. 849–877, 2009.
0.55 QPSK+Jammer--f [5] W. Gardner and J. A. Cadzow, “Statistical spectral analysis: a nonprob-
QPSK+Jammer- abilistic theory,” Applied Optics, vol. 29, p. 1399, 1990.
0.5 [6] R. S. Roberts, W. A. Brown, and H. H. Loomis, “Computationally
-9 -6 -3 0 3 6 9 efficient algorithms for cyclic spectral analysis,” IEEE Signal Processing
SNR (dB) Magazine, vol. 8, pp. 38–49, April 1991.
[7] C. M. Spooner, “On the utility of sixth-order cyclic cumulants for rf
Fig. 8. Classification results for different types of signals signal classification,” in Conference on Signals, Systems and Computers,
vol. 1, pp. 890–897 vol.1, Nov 2001.
[8] Z. Wu, E. Like, and V. Chakravarthy, “Reliable modulation classification
Signal classification results at low snr using spectral correlation,” in 4th IEEE Consumer Commu-
1 nications and Networking Conference, pp. 1134–1138, Jan 2007.
[9] E. Like, V. Chakravarthy, R. Husnay, and Z. Wu, “Modulation recog-
0.95 nition in multipath fading channels using cyclic spectral analysis,” in
IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6,
0.9 Nov 2008.
[10] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for
0.85 cognitive radio applications,” IEEE Communications Surveys Tutorials,
and f-profiles
Classification rate
251