Analysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systems

dc.contributor.authorMahal, Jasmin Araen
dc.contributor.committeechairClancy, Thomas Charles IIIen
dc.contributor.committeememberSaad, Waliden
dc.contributor.committeememberSilva, Luiz A.en
dc.contributor.committeememberRoan, Michael J.en
dc.contributor.committeememberMcGwier, Robert W.en
dc.contributor.departmentElectrical Engineeringen
dc.date.accessioned2018-06-20T08:01:51Zen
dc.date.available2018-06-20T08:01:51Zen
dc.date.issued2018-06-19en
dc.description.abstractThe ever-increasing demand for private and sensitive data transmission over wireless networks has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, wireless researchers have tried hard to continuously analyze the jamming threats and come up with improved countermeausres. In this research, we have analyzed the jamming-vulnerabilities of the leading multi-carrier communication systems, Orthogonal Frequency Division Multiplexing (OFDM) and Single-Carrier Frequency Division Multiple Access (SC-FDMA). In order to lay the necessary theoretical groundwork, first we derived the analytical BER expressions for BPSK/QPSK and analytical upper and lower bounds for 16-QAM for OFDMA and SC-FDMA using Pilot Symbol Assisted Channel Estimation (PSACE) techniques in Rayleigh slow-fading channel that takes into account channel estimation error as well as pilot-jamming effect. From there we advanced to propose more novel attacks on the Cyclic Prefix (CP) of SC-FDMA. The associated countermeasures developed prove to be very effective to restore the system. We are first to consider the effect of frequency-selectivity and fading correlation of channel on the achievable rates of the legitimate system under pilot-spoofing attack. With respect to jamming mitigation techniques, our approaches are more focused on Anti-Jamming (AJ) techniques rather than Low Probability of Intercept (LPI) methods. The Channel State Information (CSI) of the two transceivers and the CSI between the jammer and the target play critical roles in ensuring the effectiveness of jamming and nulling attacks. Although current literature is rich with different channel estimation techniques between two legitimate transceivers, it does not have much to offer in the area of channel estimation from jammer's perspective. In this dissertation, we have proposed novel, computationally simple, deterministic, and optimal blind channel estimation techniques for PSK-OFDM as well as QAM-OFDM that estimate the jammer channel to the target precisely in high Signal-to-Noise (SNR) environment from a single OFDM symbol and thus perform well in mobile radio channel. We have also presented the feasibility analysis of estimating transceiver channel from jammer's perspective at the transmitter as well as receiver side of the underlying OFDM system.en
dc.description.abstractgeneralSusceptibility to interferences is one of the major inherent vulnerabilities of open and pervasive wireless communications systems. The recent trends to more and more decentralized and ad-hoc communication systems that allow various types of network mobile terminals to join and leave simply add to this susceptibility. As these networks continue to flourish worldwide, the issues of privacy and security in wireless communication networks have become a major research problem. The increasingly severe hostile environments with advanced jamming threats has prompted the corresponding advancement in jamming detection and mitigation techniques. This dissertation has analyzed the jamming-vulnerabilities of the leading multi-carrier communication systems of the modern world. We have designed some novel jamming attacks and the corresponding countermeasures. The performance of these novel more-effective techniques are compared with their less-effective conventional counterparts. The information of the channel between the legitimate transmitter-receiver pair and between the jammer and the target play critical roles in ensuring the effectiveness of these smart jamming attacks. Although current literature is rich with different channel estimation techniques between the legitimate pair, it does not have much to offer in the area of channel estimation from jammer’s perspective. In this dissertation, we have proposed novel channel estimation techniques from jammer’s perspective.en
dc.description.degreePh. D.en
dc.format.mediumETDen
dc.identifier.othervt_gsexam:16447en
dc.identifier.urihttp://hdl.handle.net/10919/83570en
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectJammingen
dc.subjectAnti-jammingen
dc.subjectOFDMen
dc.subjectOFDMAen
dc.subjectSC-FDMAen
dc.subjectMISOen
dc.subjectPilot-spoofingen
dc.subjectChannel estimationen
dc.subjectMulti-carrier Systemsen
dc.subjectPhysical Layer Securityen
dc.titleAnalysis of Jamming-Vulnerabilities of Modern Multi-carrier Communication Systemsen
dc.typeDissertationen
thesis.degree.disciplineElectrical Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mahal_JA_D_2018.pdf
Size:
2.34 MB
Format:
Adobe Portable Document Format