On the Anti-Interference Tolerance of Cognitive Frequency Hopping Communication Systems

Massive malicious jamming devices and advanced jamming techniques have been emerged along with the development of wireless communication networks. In order to effectively eliminate the harmful interference, a new scheme known as the cognitive frequency hopping (CHF) is proposed recently, which can evaluate the occupancy of frequency hopping slots and adjust the parameters dynamically according to the spectrum sensing results. Although the existing literature only shows that CFH systems can achieve reliable data transmission, the factors affecting the reliability are rarely analyzed. Therefore, we analyze the reliability performance of the CHF systems in this article, and define a new metric named anti-interference tolerance to measure the reliability performance of the CHF systems. Moreover, we derive the analytic expression of anti-interference tolerance by analyzing the effect of false alarm probability, missed detection probability, and communication link convergence delay. Simulation results validate the effectiveness of our analyses for measuring the reliability capacity of the CHF systems. To satisfy the demands of different communication scenarios, the CFH systems can adjust relevant parameters in the light of our theoretical derivation.

[1]  Salman Durrani,et al.  Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum , 2017, IEEE Transactions on Wireless Communications.

[2]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[3]  Yih-Chun Hu,et al.  Convolution Attack on Frequency Hopping by Full-Duplex Radios , 2019, IEEE Transactions on Vehicular Technology.

[4]  Zhaoyue Zhang,et al.  Trust Management Method of D2D Communication Based on RF Fingerprint Identification , 2018, IEEE Access.

[5]  Zhengchun Zhou,et al.  Strictly Optimal Frequency-Hopping Sequence Sets With Optimal Family Sizes , 2016, IEEE Transactions on Information Theory.

[6]  Marwan Krunz,et al.  Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems , 2016, IEEE Transactions on Mobile Computing.

[7]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[8]  Hui Wang,et al.  A New Method of Cognitive Signal Recognition Based on Hybrid Information Entropy and D-S Evidence Theory , 2018, Mob. Networks Appl..

[9]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[10]  Zheng Dou,et al.  The individual identification method of wireless device based on dimensionality reduction and machine learning , 2019, The Journal of Supercomputing.

[11]  Derrick Wing Kwan Ng,et al.  Key technologies for 5G wireless systems , 2017 .

[12]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.

[13]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[14]  Zan Li,et al.  Analysis of FHMA performance on block cipher based frequency-hopping sequences , 2004, IEEE Communications Letters.

[15]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[16]  Ya Tu,et al.  Digital Signal Modulation Classification With Data Augmentation Using Generative Adversarial Nets in Cognitive Radio Networks , 2018, IEEE Access.

[17]  James Gross,et al.  Experimental Characterization and Modeling of RF Jamming Attacks on VANETs , 2015, IEEE Transactions on Vehicular Technology.

[18]  Zan Li,et al.  Generation and Characteristics Analysis of Cognitive-Based High-Performance Wide-Gap FH Sequences , 2015, IEEE Transactions on Vehicular Technology.

[19]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2014, IEEE Transactions on Vehicular Technology.

[20]  Xuemin Shen,et al.  Risk-Aware Cooperative Spectrum Access for Multi-Channel Cognitive Radio Networks , 2014, IEEE Journal on Selected Areas in Communications.

[21]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[22]  Peng Zhao,et al.  Modeling Network Systems Under Simultaneous Cyber-Attacks , 2019, IEEE Transactions on Reliability.

[23]  Jia Shi,et al.  Multiobjective Optimization Based Sensor Selection for TDOA Tracking in Wireless Sensor Network , 2019, IEEE Transactions on Vehicular Technology.

[24]  Jingyu Hua,et al.  Interference Analysis in the Asynchronous f-OFDM Systems , 2019, IEEE Transactions on Communications.

[25]  Jin Wang,et al.  Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Mod-ulation Classification , 2018 .

[26]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[27]  Xiang Chen,et al.  Abnormal Information Identification and Elimination in Cognitive Networks , 2018 .

[28]  Liming Shi,et al.  Convex Combination of Adaptive Filters under the Maximum Correntropy Criterion in Impulsive Interference , 2014, IEEE Signal Processing Letters.

[29]  Hailiang Xiong An Efficient Narrowband Interference Suppression Approach in Ultra-Wideband Receiver , 2017, IEEE Sensors Journal.

[30]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[31]  Jin Cui,et al.  A Novel Approach to Modeling and Verifying Real-Time Systems for High Reliability , 2018, IEEE Transactions on Reliability.

[32]  Bo Hu,et al.  Soft-Limiting Receiver Structures for Time-Hopping UWB in Multiple-Access Interference , 2008, IEEE Transactions on Vehicular Technology.

[33]  Huaji Zhou,et al.  Spectrum sensing based on deep learning classification for cognitive radios , 2019, China Communications.

[34]  Zan Li,et al.  Intelligent Spectrum Control in Heterogeneous Networks With High Security Capability , 2020, IEEE Wireless Communications Letters.

[35]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[36]  Wei-Chih Chen,et al.  Construction and Analysis of Shift-Invariant, Asynchronous-Symmetric Channel-Hopping Sequences for Cognitive Radio Networks , 2017, IEEE Transactions on Communications.

[37]  Xiaojiang Du,et al.  TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET , 2022, IEEE Transactions on Services Computing.

[38]  Yun Lin,et al.  Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification , 2018 .

[39]  Tong Liu,et al.  Research on modulation recognition with ensemble learning , 2017, EURASIP J. Wirel. Commun. Netw..

[40]  Emmanuel Chaput,et al.  Two-Color Scheme for a Multi-Beam Satellite Return Link: Impact of Interference Coordination , 2018, IEEE Journal on Selected Areas in Communications.

[41]  Jon W. Mark,et al.  Interference Analysis and Mitigation for Time-Asynchronous OFDM CoMP Systems , 2018, IEEE Transactions on Wireless Communications.

[42]  Zan Li,et al.  Leveraging High Order Cumulants for Spectrum Sensing and Power Recognition in Cognitive Radio Networks , 2018, IEEE Transactions on Wireless Communications.