Antifragile Communications

This paper introduces the concept of antifragile communications, which we define as the capability for a communications system to improve in performance due to a system stressor or harsh condition. Antifragility refers to systems that increase in capability, resilience, or robustness as a result of mistakes, faults, attacks, or failures. An antifragile system is fundamentally different from one that is resilient (able to recover from failure) and robust (able to resist failure). We apply the concept of antifragility to wireless communications where the system stressor is a jammer that intends to disrupt the underlying communications. Through a novel strategy, we exploit the communications jammer, providing an increase in communications capability such as bits per second. We show that an antifragile gain is possible under a wide variety of reactive jamming scenarios and provide guidelines for realizing these gains by creating an antifragile waveform.

[1]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[2]  S. Chuprun,et al.  Comparison of FH/CDMA and DS/CDMA for wireless survivable networks , 1998, Proceedings RAWCON 98. 1998 IEEE Radio and Wireless Conference (Cat. No.98EX194).

[3]  Jeffrey H. Reed,et al.  Anomaly-based intrusion detection of protocol-aware jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[4]  Hung Nguyen-Le,et al.  ML-based follower jamming rejection in slow FH/MFSK systems with an antenna array , 2008, IEEE Transactions on Communications.

[5]  Jeffrey H. Reed,et al.  Analysis and Mitigation of Interference to the LTE Physical Control Format Indicator Channel , 2014, 2014 IEEE Military Communications Conference.

[6]  A. Nejat İnce Digital speech processing : speech coding, synthesis, and recognition , 1992 .

[7]  Antoine Danchin,et al.  Antifragility and Tinkering in Biology (and in Business) Flexibility Provides an Efficient Epigenetic Way to Manage Risk , 2011, Genes.

[8]  R. Michael Buehrer,et al.  Optimal Jamming Against Digital Modulation , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[10]  Arnaud Gorgeon Anti-Fragile Information Systems , 2015, ICIS.

[11]  Alexander M. Wyglinski,et al.  A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[12]  Jeffrey H. Reed,et al.  Reinforcement Learning for Reactive Jamming Mitigation , 2014, J. Cyber Secur. Mobil..

[13]  Hannu Tenhunen,et al.  Positioning Antifragility for Clouds on Public Infrastructures , 2014, ANT/SEIT.

[14]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[15]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[16]  Jingbo Guo,et al.  Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[17]  R. Michael Buehrer,et al.  A communications jamming taxonomy , 2016, IEEE Security & Privacy.

[18]  Roger Piqueras Jover,et al.  LTE/LTE-A jamming, spoofing, and sniffing: threat assessment and mitigation , 2016, IEEE Communications Magazine.

[19]  Jeffrey H. Reed,et al.  PHY-Layer Resiliency in OFDM Communications: A Tutorial , 2015, IEEE Communications Surveys & Tutorials.

[20]  Jr. K.L. Jordan The Performance of Sequential Decoding in Conjunction with Efficient Modulation , 1966 .

[21]  Mihaela van der Schaar,et al.  A systematic learning method for optimal jamming , 2015, 2015 IEEE International Conference on Communications (ICC).

[22]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[23]  Harry R. Anderson,et al.  Fixed Broadband Wireless System Design , 2003 .

[24]  R. Michael Buehrer,et al.  Optimal jamming strategies in digital communications — Impact of modulation , 2014, 2014 IEEE Global Communications Conference.

[25]  Taieb Znati,et al.  A Novel Approach Against Reactive Jamming Attacks , 2011, Ad Hoc Sens. Wirel. Networks.

[26]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[27]  Rich Caruana,et al.  An empirical comparison of supervised learning algorithms , 2006, ICML.

[28]  Piet Van Mieghem,et al.  Data communications networking , 2006 .

[29]  Youping Zhao,et al.  Enabling Cognitive Radios through Radio Environment Maps , 2007 .

[30]  Giuseppe Primiero,et al.  A Framework for Trustworthiness Assessment based on Fidelity in Cyber and Physical Domains , 2015, ANT/SEIT.

[31]  Maher Ben Jemaa,et al.  Toward Antifragile Cloud Computing Infrastructures , 2014, ANT/SEIT.

[32]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[33]  Eric Verhulsta Applying Systems and Safety Engineering Principles for Antifragility , 2014 .

[34]  Mark A. Richards,et al.  Fundamentals of Radar Signal Processing , 2005 .

[35]  T. Charles Clancy,et al.  Security Challenges with LTE-Advanced Systems and Military Spectrum , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[36]  Tamer Basar,et al.  With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .

[37]  Robert W. Lucky Antifragile systems [Reflections] , 2013 .

[38]  Shabnam Sodagari,et al.  An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.

[39]  Jeffrey H. Reed,et al.  Detection and Mitigation of Uplink Control Channel Jamming in LTE , 2014, 2014 IEEE Military Communications Conference.

[40]  Gregory W. Wornell,et al.  Energy-efficient antenna sharing and relaying for wireless networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[41]  Matthew J. P. Baker,et al.  Downlink Physical Data and Control Channels , 2011, LTE - The UMTS Long Term Evolution.

[42]  Aldri Santos,et al.  Resilience and Knowledge in a Metric for Heterogeneous Wireless Connectivity , 2013 .

[43]  Wenyuan Xu,et al.  Anti-jamming timing channels for wireless networks , 2008, WiSec '08.

[44]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[45]  David L. Adamy,et al.  EW 102: A Second Course in Electronic Warfare , 2004 .

[46]  Nagarajan Kandasamy,et al.  A real-time and protocol-aware reactive jamming framework built on software-defined radios , 2014, SRIF@SIGCOMM.

[47]  Makoto Itoh,et al.  An initial approach towards the implementation of human error identification services for antifragile systems , 2014, 2014 Proceedings of the SICE Annual Conference (SICE).

[48]  Janise McNair,et al.  A Survey of Communication Sub-systems for Intersatellite Linked Systems and CubeSat Missions , 2012, J. Commun..

[49]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[50]  Vincenzo De Florio,et al.  On environments as systemic exoskeletons: crosscutting optimizers and antifragility enablers , 2015, Journal of Reliable Intelligent Environments.

[51]  David Grace,et al.  Cognitive radio with reinforcement learning applied to heterogeneous multicast terrestrial communication systems , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[52]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[53]  K. McKernan,et al.  The chloroplast genome hidden in plain sight, open access publishing and anti-fragile distributed data sources , 2016, Mitochondrial DNA. Part A, DNA mapping, sequencing, and analysis.

[54]  Vincenzo De Florio,et al.  Antifragility = Elasticity + Resilience + Machine Learning: Models and Algorithms for Open System Fidelity , 2014, ANT/SEIT.

[55]  Bo Li,et al.  Optimal Adaptive Antijamming in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[56]  L. Kleinrock,et al.  Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics , 1975, IEEE Transactions on Communications.

[57]  R. Michael Buehrer,et al.  Optimal Jamming using Delayed Learning , 2014, 2014 IEEE Military Communications Conference.

[58]  Kennie H. Jones International Workshop : From Dependable to Resilient , from Resilient to Antifragile Ambients and Systems ( ANTIFRAGILE 2014 ) Engineering Antifragile Systems : A Change In Design Philosophy , 2014 .

[59]  Kjell Jørgen Hole Toward Anti-fragility: A Malware-Halting Technique , 2015, IEEE Security & Privacy.

[60]  Angel P. del Pobil,et al.  Fostering Progress in Performance Evaluation and Benchmarking of Robotic and Automation Systems [TC Spotlight] , 2014, IEEE Robotics & Automation Magazine.

[61]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[62]  Giuseppe Primiero,et al.  Software Theory Change for Resilient Near-Complete Specifications , 2015, ANT/SEIT.

[63]  Hüseyin Arslan,et al.  Sidelobe suppression in OFDM-based spectrum sharing systems using adaptive symbol transition , 2008, IEEE Communications Letters.

[64]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[65]  Mihaela van der Schaar,et al.  Jamming Bandits—A Novel Learning Method for Optimal Jamming , 2016, IEEE Transactions on Wireless Communications.

[66]  M. Win,et al.  Analysis of hybrid selection/maximal-ratio combining of diversity branches with unequal SNR in Rayleigh fading , 1999, 1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363).

[67]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[68]  Paramvir Bahl,et al.  Distributed fair scheduling in a wireless LAN , 2000, IEEE Transactions on Mobile Computing.

[69]  Injong Rhee,et al.  DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[70]  K. J. Ray Liu,et al.  Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[71]  Carole L. Palmer,et al.  Value and context in data use: Domain analysis revisited , 2012, ASIST.

[72]  J.D. Mosinski Electronic countermeasures , 1992, [1992] Proceedings of the Tactical Communications Conference.

[73]  C. Goose,et al.  Glossary of Terms , 2004, Machine Learning.

[74]  Mihaela van der Schaar,et al.  To Send or Not to Send - Learning MAC Contention , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[75]  Jim Miller,et al.  Spectrum Management Issues Related to the AEHF System , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[76]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[77]  Jeffrey H. Reed,et al.  Automatic Modulation Classification under IQ Imbalance Using Supervised Learning , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[78]  T. Charles Clancy,et al.  Protecting physical layer synchronization: mitigating attacks against OFDM acquisition , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[79]  Norman M. Abramson,et al.  THE ALOHA SYSTEM: another alternative for computer communications , 1899, AFIPS '70 (Fall).

[80]  Roger Piqueras Jover,et al.  Enhancing the security of LTE networks against jamming attacks , 2014, EURASIP J. Inf. Secur..

[81]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[82]  Ariel Tseitlin,et al.  The antifragile organization , 2013, CACM.

[83]  Michael R. Souryal,et al.  LTE Physical Layer Performance Analysis , 2014 .

[84]  Vincenzo De Florio On resilient behaviors in computational systems and environments , 2015, Journal of Reliable Intelligent Environments.

[85]  Jingbo Guo,et al.  Evaluation of Security for DSSS Under Repeater Jamming , 2007, 2007 IEEE International Conference on Communications.

[86]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[87]  Dongweon Yoon,et al.  On the general BER expression of one- and two-dimensional amplitude modulations , 2002, IEEE Trans. Commun..

[88]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[89]  Davor Svetinovic,et al.  Identifying signs of systems fragility: A crowdsourcing requirements case study , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.

[90]  Saurabh Mittal,et al.  Model engineering for cyber complex adaptive systems , 2014 .

[91]  Keith D. Swenson Designing for an Innovative Learning Organization , 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference.

[92]  Mostafa Kaveh,et al.  Exact symbol error probability of a Cooperative network in a Rayleigh-fading environment , 2004, IEEE Transactions on Wireless Communications.

[93]  Hai Jiang,et al.  Energy Detection for Spectrum Sensing in Cognitive Radio , 2014, SpringerBriefs in Computer Science.

[94]  Jeffrey H. Reed,et al.  Vulnerability of LTE to hostile interference , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[95]  Paolo Ciancarini,et al.  A Proposal for an Antifragile Software Manifesto , 2016, ANT/SEIT.

[96]  Jeffrey H. Reed,et al.  Analysis of reactive jamming against satellite communications , 2016, Int. J. Satell. Commun. Netw..

[97]  Sergio Verdú,et al.  A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.

[98]  Gordon L. Stüber,et al.  Analysis of OFDM/MC-CDMA under channel estimation and jamming , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[99]  I. M. Jacobs,et al.  Principles of Communication Engineering , 1965 .

[100]  Vuk Marojevic,et al.  Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing , 2015, 2015 IEEE Conference on Standards for Communications and Networking (CSCN).

[101]  Erol Gelenbe,et al.  Storms in mobile networks , 2014, Q2SWinet '14.

[102]  William M. Kroshl,et al.  Detecting antifragile decisions and models lessons from a conceptual analysis model of Service Life Extension of aging vehicles , 2014, 2014 IEEE International Systems Conference Proceedings.

[103]  T. Charles Clancy,et al.  Efficient OFDM Denial: Pilot Jamming and Pilot Nulling , 2011, 2011 IEEE International Conference on Communications (ICC).

[104]  Xiaofu Ma,et al.  Practical Issues for Spectrum Management With Cognitive Radios , 2014, Proceedings of the IEEE.

[105]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.

[106]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[107]  Louis J. Ippolito,et al.  Attenuation by Atmospheric Gases , 1986 .

[108]  Laura Galluccio,et al.  Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.

[109]  Jin-Ghoo Choi,et al.  Flexible and efficient aggregation framework for antifragile wireless mesh networks , 2015, Journal of Reliable Intelligent Environments.

[110]  Wayne E. Stark,et al.  Capacity and Cutoff Rate of Noncoherent FSK with Nonselective Rician Fading , 1985, IEEE Trans. Commun..

[111]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[112]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[113]  Syed Asad Hussain,et al.  Taxonomy and issues for antifragile-based multimedia cloud computing , 2016, Journal of Reliable Intelligent Environments.

[114]  Don J. Torrieri,et al.  Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..

[115]  Ivan Cosovic,et al.  Sidelobe Suppression in OFDM Systems , 2006 .

[116]  Stefano Marrone,et al.  Automatic Resource Allocation for High Availability Cloud Services , 2015, ANT/SEIT.

[117]  Pil Lee Computation of the Bit Error Rate of Coherent M-ary PSK with Gray Code Bit Mapping , 1986, IEEE Trans. Commun..

[118]  Saidhiraj Amuru Intelligent Approaches for Communication Denial , 2015 .

[119]  Michael Schnell,et al.  Reduction of out-of-band radiation in OFDM systems by insertion of cancellation carriers , 2006, IEEE Communications Letters.

[120]  N. Taleb Antifragile: Things That Gain from Disorder , 2012 .

[121]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[122]  Yang Xiao,et al.  IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.

[123]  Michael Schnell,et al.  Subcarrier weighting: a method for sidelobe suppression in OFDM systems , 2006, IEEE Communications Letters.

[124]  Timothy Pratt,et al.  Satellite communications , 1986 .

[125]  James R. Wertz,et al.  Space Mission Analysis and Design , 1992 .