메뉴 건너뛰기




Volumn 11, Issue 7, 2016, Pages 1486-1499

Jamming Resilient Communication Using MIMO Interference Cancellation

Author keywords

interference cancellation; MIMO; Reactive jamming; software defined radio; transmit precoding

Indexed keywords

COCHANNEL INTERFERENCE; EFFICIENCY; FREQUENCY DIVISION MULTIPLEXING; MIMO SYSTEMS; ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING; RADIO; RADIO RECEIVERS; SOFTWARE RADIO; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84966341202     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2535906     Document Type: Article
Times cited : (119)

References (43)
  • 1
    • 84904438141 scopus 로고    scopus 로고
    • Mimo-based jamming resilient communication in wireless networks
    • Apr./May
    • Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, "Mimo-based jamming resilient communication in wireless networks," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2697-2706.
    • (2014) Proc. IEEE INFOCOM , pp. 2697-2706
    • Yan, Q.1    Zeng, H.2    Jiang, T.3    Li, M.4    Lou, W.5    Hou, Y.T.6
  • 2
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Oct
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 4
    • 77956561765 scopus 로고    scopus 로고
    • Detection of reactive jamming in sensor networks
    • M. Strasser, B. Danev, and S. Čapkun, "Detection of reactive jamming in sensor networks," ACM Trans. Sensor Netw., vol. 7, no. 16, 2010, Art. no. 16.
    • (2010) ACM Trans. Sensor Netw. , vol.7 , Issue.16
    • Strasser, M.1    Danev, B.2    Čapkun, S.3
  • 5
    • 80051801375 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • May
    • K. Pelechrinis, M. Iliofotou, and S. Krishnamurthy, "Denial of service attacks in wireless networks: The case of jammers," IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245-257, May 2011.
    • (2011) IEEE Commun. Surveys Tuts. , vol.13 , Issue.2 , pp. 245-257
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, S.3
  • 6
    • 80051886930 scopus 로고    scopus 로고
    • Reactive jamming in wireless networks: How realistic is the threat?
    • Jun
    • M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "reactive jamming in wireless networks: How realistic is the threat?" in Proc. WiSec, Jun. 2011, pp. 47-52.
    • (2011) Proc. WiSec , pp. 47-52
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.B.3    Lenders, V.4
  • 8
    • 44849093231 scopus 로고    scopus 로고
    • OFDM channel estimation with jammed pilot detector under narrow-band jamming
    • May
    • M. Han et al., "OFDM channel estimation with jammed pilot detector under narrow-band jamming," IEEE Trans. Veh. Technol., vol. 57, no. 3, pp. 1934-1939, May 2008.
    • (2008) IEEE Trans. Veh. Technol. , vol.57 , Issue.3 , pp. 1934-1939
    • Han, M.1
  • 9
    • 80052148438 scopus 로고    scopus 로고
    • Efficient OFDM denial: Pilot jamming and pilot nulling
    • Jun
    • T. C. Clancy, "Efficient OFDM denial: Pilot jamming and pilot nulling," in Proc. IEEE ICC, Jun. 2011, pp. 1-5.
    • (2011) Proc. IEEE ICC , pp. 1-5
    • Clancy, T.C.1
  • 10
    • 70450260680 scopus 로고    scopus 로고
    • Interference alignment and cancellation
    • Aug
    • S. Gollakota, S. D. Perli, and D. Katabi, "Interference alignment and cancellation," in Proc. SIGCOMM, Aug. 2009, pp. 159-170.
    • (2009) Proc. SIGCOMM , pp. 159-170
    • Gollakota, S.1    Perli, S.D.2    Katabi, D.3
  • 11
    • 80053152170 scopus 로고    scopus 로고
    • Clearing the RF smog: Making 802.11n robust to cross-technology interference
    • Aug
    • S. Gollakota, F. Adib, D. Katabi, and S. Seshan, "Clearing the RF smog: Making 802.11n robust to cross-technology interference," in Proc. SIGCOMM, Aug. 2011, pp. 170-181.
    • (2011) Proc. SIGCOMM , pp. 170-181
    • Gollakota, S.1    Adib, F.2    Katabi, D.3    Seshan, S.4
  • 12
    • 80053138825 scopus 로고    scopus 로고
    • Random access heterogeneous MIMO networks
    • Aug
    • K. C.-J. Lin, S. Gollakota, and D. Katabi, "Random access heterogeneous MIMO networks," in Proc. SIGCOMM, Aug. 2011, pp. 146-157.
    • (2011) Proc. SIGCOMM , pp. 146-157
    • Lin, K.C.-J.1    Gollakota, S.2    Katabi, D.3
  • 13
    • 80051902256 scopus 로고    scopus 로고
    • Thwarting inside jamming attacks on wireless broadcast communications
    • Jun
    • S. Liu, L. Lazos, and M. Krunz, "Thwarting inside jamming attacks on wireless broadcast communications," in Proc. WiSec, Jun. 2011, pp. 29-40.
    • (2011) Proc. WiSec , pp. 29-40
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 14
    • 80051869457 scopus 로고    scopus 로고
    • JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks
    • Jun
    • R. Zhang, Y. Zhang, and X. Huang, "JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks," in Proc. ICDCS, Jun. 2011, pp. 529-538.
    • (2011) Proc. ICDCS , pp. 529-538
    • Zhang, R.1    Zhang, Y.2    Huang, X.3
  • 15
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • May
    • M. Strasser, C. Popper, S. Capkun, and C. Mario, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE SP, May 2008, pp. 64-78.
    • (2008) Proc. IEEE SP , pp. 64-78
    • Strasser, M.1    Popper, C.2    Capkun, S.3    Mario, C.4
  • 17
    • 79960855950 scopus 로고    scopus 로고
    • Delay-bounded adaptive UFH-based anti-jamming wireless communication
    • Apr
    • Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Delay-bounded adaptive UFH-based anti-jamming wireless communication," in Proc. IEEE INFOCOM, Apr. 2011, pp. 1413-1421.
    • (2011) Proc. IEEE INFOCOM , pp. 1413-1421
    • Wang, Q.1    Xu, P.2    Ren, K.3    Li, X.-Y.4
  • 18
    • 84855955465 scopus 로고    scopus 로고
    • Jamming-resistant collaborative broadcast using uncoordinated frequency hopping
    • Feb
    • L. Xiao, H. Dai, and P. Ning, "Jamming-resistant collaborative broadcast using uncoordinated frequency hopping," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 297-309, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 297-309
    • Xiao, L.1    Dai, H.2    Ning, P.3
  • 19
    • 85008524827 scopus 로고    scopus 로고
    • Thwarting control-channel jamming attacks from inside jammers
    • Sep
    • S. Liu, L. Lazos, and M. Krunz, "Thwarting control-channel jamming attacks from inside jammers," IEEE Trans. Mobile Comput., vol. 11, no. 9, pp. 1545-1558, Sep. 2012.
    • (2012) IEEE Trans. Mobile Comput. , vol.11 , Issue.9 , pp. 1545-1558
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 20
    • 77953306472 scopus 로고    scopus 로고
    • Randomized differential DSSS: Jamming-resistant wireless broadcast communication
    • Mar
    • Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Liu, Y.1    Ning, P.2    Dai, H.3    Liu, A.4
  • 22
    • 80051912129 scopus 로고    scopus 로고
    • On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
    • Jun
    • G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, "On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming," in Proc. WiSec, Jun. 2011, pp. 97-108.
    • (2011) Proc. WiSec , pp. 97-108
    • Noubir, G.1    Rajaraman, R.2    Sheng, B.3    Thapa, B.4
  • 23
    • 56749150049 scopus 로고    scopus 로고
    • Anti-jamming timing channels for wireless networks
    • W. Xu, W. Trqappe, and Y. Zhang, "Anti-jamming timing channels for wireless networks," in Proc. WiSec, 2008, pp. 203-213.
    • (2008) Proc. WiSec , pp. 203-213
    • Xu, W.1    Trqappe, W.2    Zhang, Y.3
  • 24
    • 84861602103 scopus 로고    scopus 로고
    • BitTrickle: Defending against broadband and high-power reactive jamming attacks
    • Mar
    • Y. Liu and P. Ning, "BitTrickle: Defending against broadband and high-power reactive jamming attacks," in Proc. IEEE INFOCOM, Mar. 2012, pp. 909-917.
    • (2012) Proc. IEEE INFOCOM , pp. 909-917
    • Liu, Y.1    Ning, P.2
  • 25
    • 84879544324 scopus 로고    scopus 로고
    • Counter-jamming using mixed mechanical and software interference cancellation
    • Apr
    • T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "Counter-jamming using mixed mechanical and software interference cancellation," in Proc. WiSec, Apr. 2013, pp. 31-42.
    • (2013) Proc. WiSec , pp. 31-42
    • Vo-Huu, T.D.1    Blass, E.-O.2    Noubir, G.3
  • 26
    • 84959202314 scopus 로고    scopus 로고
    • User-centric view of jamming games in cognitive radio networks
    • Dec
    • L. Xiao, J. Liu, Q. Li, N. Mandayam, and H. V. Poor, "User-centric view of jamming games in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.12 , pp. 2578-2590
    • Xiao, L.1    Liu, J.2    Li, Q.3    Mandayam, N.4    Poor, H.V.5
  • 27
    • 85031986809 scopus 로고    scopus 로고
    • Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown
    • Mar
    • A. Garnaev, Y. Liu, and W. Trappe, "Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown," IEEE Trans. Signal Inf. Process. Netw., vol. 2, no. 1, pp. 49-56, Mar. 2016.
    • (2016) IEEE Trans. Signal Inf. Process. Netw. , vol.2 , Issue.1 , pp. 49-56
    • Garnaev, A.1    Liu, Y.2    Trappe, W.3
  • 28
    • 84966387883 scopus 로고    scopus 로고
    • Jamming-resistant multiradio multi-channel opportunistic spectrum access in cognitive radio networks
    • to be published
    • Q. Wang, K. Ren, P. Ning, and S. Hu, "Jamming-resistant multiradio multi-channel opportunistic spectrum access in cognitive radio networks," IEEE Trans. Veh. Technol., to be published.
    • IEEE Trans. Veh. Technol.
    • Wang, Q.1    Ren, K.2    Ning, P.3    Hu, S.4
  • 29
    • 77952347741 scopus 로고    scopus 로고
    • Subverting MIMO wireless systems by jamming the channel estimation procedure
    • Mar
    • R. Miller and W. Trappe, "Subverting MIMO wireless systems by jamming the channel estimation procedure," in Proc. WiSec, Mar. 2010, pp. 19-24.
    • (2010) Proc. WiSec , pp. 19-24
    • Miller, R.1    Trappe, W.2
  • 30
    • 84921498554 scopus 로고    scopus 로고
    • MCR decoding: A MIMO approach for defending against wireless jamming attacks
    • Oct
    • W. Shen, P. Ning, X. He, H. Dai, and Y. Liu, "MCR decoding: A MIMO approach for defending against wireless jamming attacks," in Proc. IEEE CNS, Oct. 2014, pp. 133-138.
    • (2014) Proc. IEEE CNS , pp. 133-138
    • Shen, W.1    Ning, P.2    He, X.3    Dai, H.4    Liu, Y.5
  • 31
    • 84866598205 scopus 로고    scopus 로고
    • Rate adaptation for 802.11 multiuser MIMO networks
    • Aug
    • W.-L. Shen et al., "Rate adaptation for 802.11 multiuser MIMO networks," in Proc. MobiCom, Aug. 2012, pp. 29-40.
    • (2012) Proc. MobiCom , pp. 29-40
    • Shen, W.-L.1
  • 32
    • 60149086999 scopus 로고    scopus 로고
    • In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?
    • Sep
    • H. Kim and K. G. Shin, "In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?" in Proc. MobiCom, Sep. 2008, pp. 14-25.
    • (2008) Proc. MobiCom , pp. 14-25
    • Kim, H.1    Shin, K.G.2
  • 36
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • May
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in Proc. IEEE SP, May 2010, pp. 286-301.
    • (2010) Proc. IEEE SP , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 37
    • 66549100735 scopus 로고    scopus 로고
    • ZigZag decoding: Combating hidden terminals in wireless networks
    • Aug
    • S. Gollakota and D. Katabi, "ZigZag decoding: Combating hidden terminals in wireless networks," in Proc. SIGCOMM, Aug. 2008, pp. 159-170.
    • (2008) Proc. SIGCOMM , pp. 159-170
    • Gollakota, S.1    Katabi, D.2
  • 41
    • 51349151249 scopus 로고    scopus 로고
    • A distributed optimization algorithm for multihop cognitive radio networks
    • Apr
    • Y. Shi and Y. T. Hou, "A distributed optimization algorithm for multihop cognitive radio networks," in Proc. IEEE INFOCOM, 27th Conf. Comput. Commun., Apr. 2008, pp. 1966-1974.
    • (2008) Proc. IEEE INFOCOM, 27th Conf. Comput. Commun. , pp. 1966-1974
    • Shi, Y.1    Hou, Y.T.2
  • 42
    • 84966339469 scopus 로고    scopus 로고
    • Online accessed Jan. 15, 2016
    • Ettus Research LLC. [Online]. Available: http://www.ettus.com/, accessed Jan. 15, 2016.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.