Defend Jamming Attacks: How to Make Enemies Become Friends

In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with smart jamming attacks, we propose an intelligent deception strategy in which the legitimate device will send fake transmissions to lure the jammer. Then, if the jammer launches attacks to the channel, the legitimate device can either backscatter the jamming signals to transmit data or harvest energy from the jamming signals for future active transmission. In this way, we can not only undermine the attack ability of the jammer, but also leverage jamming attacks as means to enhance system performance. In addition, to find an optimal defense strategy for the legitimate device under uncertainty of wireless environment as well as incomplete information from the jammer, we develop Q-learning and deep Q-learning algorithms based on the Markov decision process. Through simulation results, we demonstrate that our proposed solution is able to not only deal with smart jamming attacks, but also successfully leverage jamming attacks to improve the system performance.

[1]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[2]  Marwan Krunz,et al.  Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems , 2016, IEEE Transactions on Mobile Computing.

[3]  Victor C. M. Leung,et al.  Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks , 2017, IEEE Transactions on Wireless Communications.

[4]  Eryk Dutkiewicz,et al.  “Jam Me If You Can:” Defeating Jammer With Deep Dueling Neural Network Architecture and Ambient Backscattering Augmented Communications , 2019, IEEE Journal on Selected Areas in Communications.

[5]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[6]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[7]  David Wetherall,et al.  Ambient backscatter: wireless communication out of thin air , 2013, SIGCOMM.

[8]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[9]  Deniz Gündüz,et al.  A Learning Theoretic Approach to Energy Harvesting Communication System Optimization , 2012, IEEE Transactions on Wireless Communications.

[10]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[11]  Dong In Kim,et al.  Ambient Backscatter Communications: A Contemporary Survey , 2017, IEEE Communications Surveys & Tutorials.

[12]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.