Next Article in Journal
Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
Previous Article in Journal
Radiation Damage Mechanisms and Research Status of Radiation-Resistant Optical Fibers: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Antijamming Schemes for the Generalized MIMO Y Channel

by
Karolina Lenarska
* and
Krzysztof Wesołowski
Institute of Radiocommunications, Poznan University of Technology, 60-965 Poznan, Poland
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(10), 3237; https://doi.org/10.3390/s24103237
Submission received: 7 April 2024 / Revised: 12 May 2024 / Accepted: 16 May 2024 / Published: 20 May 2024
(This article belongs to the Section Communications)

Abstract

:
Signal space alignment (SSA) is a promising technique for interference management in wireless networks. However, despite the excellent work done on SSA, its robustness against jamming attacks has not been considered in the literature. In this paper, we propose two antijamming strategies for the SSA scheme applied in the multiple-input–multiple-output (MIMO) Y channel. The first scheme involves projecting the jamming signal into the null space of each source’s precoding vectors, effectively eliminating it entirely. The second scheme removes interference originating from the jammer by subtracting the disturbance estimate from the incoming signal. The estimate is derived on the basis of the criterion of minimizing the received signal energy. The block error rate (BLER) performance of the proposed strategies in various channel configurations is verified by link level simulations and is presented to show the efficiency in mitigating jamming signals within the SSA-based MIMO Y channel.

Graphical Abstract

1. Introduction and Related Work

In wireless communication, various transceiver designs have been investigated to address the challenge of limited radio resources such as time and frequency. Due to the broadcast nature of the wireless medium, simultaneous transmissions from multiple transmitters to their respective receivers within the same frequency band inevitably results in interference among them, which is a crucial factor that determines the performance limits of wireless networks. Consequently, effectively managing this interference at the receiver, where signals from multiple transmitters converge simultaneously, emerges as one of the primary challenges. Among all signaling schemes explored by numerous researchers that address the issue of interference and increase transmission rates, two have gained particular interest: interference alignment (IA) and network coding (NC).
Interference alignment was introduced by Jafar in [1] and is based on the overlap of the interference signals at each receiver, thus reducing the dimensionality of the signal space occupied by the interference signals, while the desired signal remains. The concept of network coding was originally introduced by Ahlswede in [2] for wired multihop networks, and it found application in two-way relay channels in wireless networks, where two users need to exchange information through a relay node. NC can be applied at various layers, including the physical layer, the MAC layer, and even higher layer protocols. At the physical layer, techniques such as physical-layer network coding (PNC) [3] and analog network coding (ANC) [4] have been proposed.
In recent years, the use of relaying techniques has become increasingly recognized as an effective method to improve the reliability and throughput of wireless networks. To accommodate more than two users in the two-way relay channel, researchers in [5] introduced a multi-user two-way relaying system. However, this system model faces a limitation on the traffic pattern, since message exchange occurs separately for each user pair: thus, point-to-multipoint transmission cannot be supported. To overcome this issue, the concept of a three-user relay channel was proposed in [6] and is a generalized version of the two-way relay channel for more than two users. In this setup, each of the three users aims to transmit separate data signals to the other users through a shared relay node. The authors describe this channel model as the MIMO Y channel and propose a new signaling method for the first time slot, which is called signal space alignment (SSA) for PNC. SSA is similar to the IA scheme, since both techniques make efficient use of the dimension of the signal space. However, while IA focuses on minimizing the dimension occupied by the interference signals, the key idea of SSA is that the beamforming vectors are chosen in such a way as to align the desired signal vectors received from different users to jointly perform detection and encoding for network coding in the relay.
Further exploration of the MIMO Y channel has been carried out in several studies. In ref. [7], the authors analyzed the achievable degrees of freedom (DOF), while in [8], an extended model was proposed to accommodate any number of K users. Furthermore, in [9], Wang et al. introduced an iterative random beamforming algorithm. An optimization problem aimed at maximizing system throughput in MIMO Y channels while meeting bit error rate (BER) requirements through adaptive modulation was formulated in [10]. The combined scheme of IA and signal detection to optimize the performance of the MIMO Y channel was addressed in [11]. Lastly, refs. [12,13] investigated the achievable DOF under the assumption of imperfect channel state information (CSI).
Research on the SSA technique was continued in [14], where the optimal precoding and power allocation problem of PNC-SA was explored to maximize signal-to-noise ratio (SNR) at the receiver. Using SSA, Liu et al. [15] developed an iterative algorithm to select beamforming vectors to enhance the minimum effective signal-to-interference-and-noise ratio (SINR) between all data streams in the two-way MIMO X relay channel. In ref. [16], a novel generalized signal alignment (GSA) transmission scheme was introduced for the MIMO X channel, where signal subspace alignment was achieved after relay processing, diverging from traditional methods. Subsequent works by the authors, including [17,18], extended these concepts to different antenna conditions and analyzed achievable DOF. Additional contributions related to SSA can be found in [19,20,21,22].
Although the authors of [6,7,8] were the first to consider the application of SSA in the MIMO Y channel, they did not address the optimal design of the beamforming vectors. Precoding selection appeared for the first time in [9], where a random algorithm was proposed. However, due to its random nature, for any given channel realization, the precoders could be far from optimal. In refs. [23,24] the authors examined a generalized MIMO Y channel for K users and introduced a deterministic beamforming design to maximize the effective SNR for any specific channel realization. In addition, an optimal power allocation algorithm was investigated to maximize the sum rate. The proposed scheme significantly outperformed the random algorithm considered in [9].
SSA is a prospective technique for interference management in wireless networks. However, despite the excellent work done on SSA, none have considered its robustness against jamming attacks. As our dependence on wireless services increases, security risks related to privacy, reliability, and accessibility of wireless communications have become an underlying concern. Among various security threats, such as eavesdropping and data fabrication, wireless networks are especially vulnerable to radio jamming attacks, where legitimate transmission is intentionally interrupted, degrading reception performance [25]. During the past decades, significant attention has been devoted to studying strategies that mitigate these impacts and ensure uninterrupted legitimate transmissions (see [26,27,28,29,30,31]). A comprehensive survey [32] collected and analyzed existing jammer attacks and defensive strategies in wireless networks. In the context of IA, antijamming issues were first examined in [33,34] for the MIMO X channel. Subsequent research in [35] proposed a beneficial jamming scheme, in which the precoding vector of the jammer was designed to restrict its signal into the same subspace as the interference between users in each receiver. Further contributions can be found in [36], where the authors developed a minimizing interference leakage (MinIL) algorithm for IA-based networks in jamming scenarios, optimizing power splitting and transmit power of users simultaneously.
This paper focuses on the issue of anitjamming in the SSA-based MIMO Y channel, which, to our knowledge, is the first work concerning this topic. The main contributions of this paper can be summarized as follows.
  • Two antijamming schemes are proposed for the SSA-based MIMO Y channel with a single-antenna jammer. In the first scheme, the jamming signal and interferences are projected onto the null space of each signal pair, while the second scheme removes interference originating from the jammer at the relay by subtracting the disturbance estimate from the incoming signal.
  • The results of Monte Carlo simulations are provided and compared with those received for the SSA-based MIMO Y channel for the iterative beamforming optimization algorithm presented in [24] for two scenarios when the jammer is present or not. These results can be treated as an upper bound for the proposed jammer scenarios.
Notations: ( . ) T and ( . ) H represent a vector/matrix transpose and a Hermitian transpose, respectively. ( . ) denotes the Moore–Penrose pseudoinverse. | x | stands for the 2-norm of vector x . s p a n ( a ) represents the subspace spanned by a vector a . r a n ( H ) denotes the range (column space) of matrix H . x represents normalization operation on vector x , i.e., x = x | x | .

2. System Model

We examine a generalized MIMO Y channel model, where K source nodes/users, denoted as U 1 , U 2 , , U K , ( K 3 ) , each equipped with N S antennas, communicate through a relay station (RS) with N R antennas. Users exchange K 1 independent messages and anticipate receiving the same number of messages from others. Communication between the relay and source nodes is distorted by an adversarial jammer. Suppose a flat fading channel; the channel coefficients between user i and the relay form an N R × N S matrix H i with full CSI assumed at all nodes. Such a channel model reflects well a realistic transmission on a single subcarrier of a MIMO-OFDM system. The system model with K = 3 and a single-antenna jammer is presented in Figure 1. Transmission is divided into two phases: the multiple access (MA) phase and the broadcast (BC) phase. In the MA interval, all users send messages to the RS, which jointly detects and broadcasts them in the BC phase.
If the message sent by user i to user j is denoted as s [ j , i ] , the signal sent by user i to all K 1 users can be expressed as
x i = j = 1 , j i K κ [ j , i ] v [ j , i ] s [ j , i ]
where κ [ j , i ] is the power scaling factor, and v [ j , i ] is the unit norm beamforming vector. The signal received by the relay in the MA phase is represented as
r = i = 1 K H i x i + h J z J + n R
where h J is the vector of the channel coefficients between the jammer and the relay, z J is the jamming signal, and n R is the additive white Gaussian noise (AWGN) vector, with variance σ n 2 . Let us note that the dimensions of the received signals and noise vectors are [ N R × 1 ] . Substituting (1) into (2), we get
r = i = 1 K j = 1 , j i K H i κ [ j , i ] v [ j , i ] s [ j , i ] + h J z J + n R
The basic idea of SSA is to pair the reciprocal messages s [ j , i ] and s [ i , j ] ( i < j ) so that (3) consists of n K = Δ K 2 message pairs. Then, Equation (3) may be rewritten as
r = k = 1 n K H i κ [ j , i ] v [ j , i ] s [ j , i ] + H j κ [ i , j ] v [ i , j ] s [ i , j ] + h J z J + n R
The precoding vectors must be designed to align signal components within a pair, i.e., s p a n ( H i v [ j , i ] ) = s p a n ( H j v [ i , j ] ) , i < j . With a proper power allocation, we can write
u k = κ [ j , i ] H i v [ j , i ] = κ [ i , j ] H j v [ i , j ] , k = π ( i , j )
where k = π ( i , j ) is a one-to-one index mapping function. Inserting (5) into (4), we get the following equation:
r = k = 1 n K u k s [ j , i ] + s [ i , j ] + h j z j + n R = k = 1 n K u k s k + h j z j + n R = U s + h J z J + n R
where s k = s [ j , i ] + s [ i , j ] is the k-th physical layer network coded symbol, U = u 1 , u 2 , , u n K , and s = s 1 , s 2 , , s n K T .
To decode the physical layer network coded symbols s k , the relay station combines a received signal r with a unit norm combining vector w k as
w k H r = w k H u k s k + l = 1 , l k n K w k H u l s l + w k H h J z J + w k H n R

2.1. Antijamming Schemes in the MA Phase

2.1.1. Antijamming Signal Space Alignment (AJ-SSA)

In the antijamming scheme based on SSA proposed in our paper, the beamforming design presented in [24] is generalized to the scenario that contains an adversarial jammer. The combining vector w k is chosen so that λ k = | w k H u k | 2 is maximized, while w k H u l = 0 and w k H h J = 0 . To design a w k , let us define G k = u 1 , , u k 1 , u k + 1 , , u n k , h j . w K should be placed in a null space of G k H , and the effective gain λ k should be maximized. Similarly to [37], given u k , we can derive that the optimal combining vector w k is
w k = M k u k
where
M k = I G k ( G k H G k ) 1 G k H
and the maximum effective channel gain is
λ k = u k H M k u k .
Thus, Equation (7) takes the form
w k H r = λ k s k + w k H n R
and the effective SNR for the message pair k is equal to
γ k = 2 λ k σ n 2
for k = 1 , 2 , , n K .
The optimization problem for the design of precoding vectors and power allocation presented in [24] was reused in our research and reported in our article, and after several derivations performed by the authors of [24], it takes the form
maximize v [ j , i ] v [ j , i ] H H i H M k H i v [ j , i ] v [ j , i ] H I + H j H i H H j H i v [ j , i ] subject to | v [ j , i ] | = 1
for the case when N S N R , where the maximum is obtained when v [ j , i ] is the generalized eigenvector corresponding to the largest generalized eigenvalue of H i H M k H i and I + H j H i H H j H i .
For N S < N R , the optimization reduces to
maximize c k c k B k H M k B k c k c k H B k H H i H H i + H j H H j B k c k subject to | c k | = 1
where B k is an orthonormal basis of the intersection subspace r a n ( H i ) r a n ( H j ) , c k is a vector with a unit norm of the length n I = 2 N S N R , and the relation between B k , c k and the beamforming vectors v [ i , j ] , v [ j , i ] takes the following form:
v [ j , i ] = H i B k c k , v [ i , j ] = H j B k c k
The optimization problem (14), similar to (13), takes the form of a generalized Rayleigh quotient, where the solution is the largest generalized eigenvector corresponding to the largest generalized eigenvalue of B k H M k B k and B k H H i H H i + H j H H j B k . Once c k is obtained, the precoding vectors v [ j , i ] , v [ i , j ] can be calculated.
Whereas the beamforming optimization determines the “shape” of the precoding vectors, power allocation determines their “length”. The power optimization problem receives the form [24]
minimize κ [ j , i ] i < j k = 1 n k κ [ j , i ] λ [ j , i ] 1 subject to j = 1 i 1 λ [ i , j ] λ [ j , i ] κ [ i , j ] + j = i + 1 K κ [ j , i ] P i , i = 1 , , K .
It can be easily seen that the above problem is a convex optimization problem that can be solved by the interior point method.

2.1.2. Jammer’s Interference Cancellation (J-IC)

In this method, the combining vector w k is chosen so that λ k = | w k H u k | 2 is maximized while w k H u l = 0 . The beamforming vectors are chosen according to (13) and (14). The interference from the jammer is canceled in the relay according to the formula
r ˜ = r h J d ^ where d ^ = arg min { d i } r h J d i 2
As in the previously considered antijamming method, it is assumed that the channel coefficients h J between the jammer and the receiving antenna relays are known. Assuming the additive white Gaussian noise contained in the received signal r (see (3)), the most probable jamming data symbol d ^ drawn from the data symbol set { d 1 , d 2 , , d M } (where M is the modulation size) is the one that minimizes the norm in (17). The brute-force search over all data symbols contained in a given modulation format is the simplest, yet a sufficient, method to find the most likely jamming data symbol.

2.2. Computational Complexity of the Proposed Algorithms

To compare the computational complexity of the two proposed algorithms, let us examine the differences in terms of the calculation of the precoding vectors for each message to be transmitted and the equalizer operations at the relay’s receiver. With the AJ-SSA algorithm, the matrix G k in (9) has N J more columns compared to the matrix G k used in the J-IC algorithm, leading to higher computational complexity for the calculation of precoding vectors in the AJ-SSA algorithm. The operations on matrix G k of size N R × P in (9), where P = n K 1 + N J for the AJ-SSA and P = n K 1 for the J-IC, begin with the computation of the matrix M k , which involves the following steps:
  • G k H —transposing an N R × P matrix has time complexity O ( N R · P ) ;
  • G k H G —matrix multiplication resulting in a P × P matrix with complexity O ( P 2 · N R ) ;
  • ( G k H G k ) 1 —inverting an P × P matrix has complexity O ( P 3 ) ;
  • G k ( ) 1 —multiplying N R × P with P × P has complexity O ( P 2 · N R ) ;
  • multiplying the N R × P result with G k H P × N R has complexity of O ( N R 2 · P ) ;
  • subtracting with I of size N R × N R is straightforward and has complexity O ( N R 2 ) ;
The total computational complexity equals O ( ( 1 + P ) N R 2 + ( 2 P 2 + P ) N R + P 3 ) . Since the size of the matrix M k is equal to N R × N R and does not depend on the size P, the complexity of the remaining calculations stays the same for both algorithms. Since the channel is assumed flat for each virtual resource block (VRB), these operations are performed only once for each VRB, resulting in a complexity of O ( N V R B ( ( 1 + P ) N R 2 + ( 2 P 2 + P ) N R + P 3 ) ) , where N V R B is the number of VRBs per transmission slot.
In the relays’ equalizer, the received data are multiplied by the vector w k H . As shown in (9), to calculate the vector w k H , the matrix M k must first be calculated. As derived in the previous paragraph, the computational complexity of the calculation of the matrix M k equals O ( N V R B ( ( 1 + P ) N R 2 + ( 2 P 2 + P ) N R + P 3 ) ) . In addition, for the J-IC algorithm, cancellation of jammer interference is performed according to (17). The computational complexity of this operation equals O ( N D ( ( 1 + M ) N R ) ) , where N D is the number of data symbols, and M is the modulation size (for QPSK M = 4 ).
Taking the derived computational complexities for both algorithms, we can notice that the calculation of the precoding vectors takes more operations for the AJ-SSA algorithm; however, the equalization process is more time-consuming for the J-IC solution. Since N D is much larger than N V R B , the J-IC algorithm requires many more operations than AJ-SSA. For the simulated scenario with N V R B = 6 , M = 4 , and N D = 648 , the J-IC algorithm required 6.34 and 5.4 times more operations than AJ-SSA for N R = 4 and N R = 8 , respectively.

2.3. Antijamming Signal Space Alignment in the BC Phase

Similarly to [9], we assume the symmetry between the MA and BC phases. This enables the utilization of identical transmit precoding vectors and receive combining vectors from the MA phase as the receive combining and transmit beamforming vectors, respectively, in the BC phase.

3. Simulation Results

3.1. Simulation Procedure and Parameters

The performance of the proposed antijamming schemes is evaluated through link-level simulations. The most important simulation parameters are presented in Table 1. The channel between each source node and the relay node is a multipath fading channel model with the delay profile according to extended pedestrian A model (EPA) and a maximum Doppler frequency of 5 Hz. OFDM transmission is applied; thus, multipath propagation is neutralized by the cyclic prefix CP, and the channel seen on each subcarrier is flat fading. As MIMO technology is applied, the channels for each subcarrier between the terminals and the relay station are fully characterized by the matrices, the sizes of which result from the number of transmit and receive antennas in the MIMO system. The channel coefficients between each antenna are assumed to be uncorrelated.
As we see in Table 1, the parameters of the applied transmission system are specific to the numerology selected for 5G New Radio. The main aim of our simulations is to estimate the achievable block error rate (BLER). We treat a single subframe for the transmission parameters in Table 1 as a data block. We assumed that, as in many other systems, the final performance is achieved after application of the hybrid ARQ technique or the ARQ technique implemented in the radio link control sublayer. Thus, obtaining a BLER on the order of 10 2 10 3 before using ARQ is sufficient to achieve satisfactory transmission system performance.
To obtain accurate results in the form of BLER values as a function of SNR, each SNR point was simulated for a minimum of 500 different channel realizations. In each channel realization, results from the transmission of 20 slots were collected. If the minimum number of erroneous blocks (100) was not reached after simulating a minimum of 10,000 slots, the simulation was continued until either 100 errors had been accumulated or the maximum number of simulated slots (1,000,000) had been reached.
When applying the proposed antijamming schemes during the MA phase, it is assumed that the relay has complete knowledge of all channel coefficients and that the source nodes receive notification along with their corresponding precoding vectors, which are computed by the relay. The ideal CSI is a common assumption in numerous other publications that focus on signal space alignment or interference alignment techniques. In this context, our results represent the upper limit of the performance achievable with both methods. However, it would be valuable to validate the proposed algorithms under conditions of real channel estimation, which will be the focus of our future work. In that case, the channel between the source nodes and the relay could be estimated using 5G NR demodulation reference signal (DMRS), with the pattern being best suited to the given use case scenario. The channel coefficient vector between the jammer and the relay should be estimated based on the blind channel estimation, which can obtain CSI without a training sequence or pilots, as proposed in the following publications [38,39,40,41,42,43,44].

3.2. Simulation Results

Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8 present the BLER curves of the proposed schemes (called AJ-SSA and J-IC) for the MA phase for various antenna configurations and jammer powers. Furthermore, for comparison purposes, we incorporate the results of the iterative beamforming optimization algorithm presented in [24] (marked SSA) for two scenarios: one without a jammer (serving as the upper bound results) and another with the presence of a jammer.
In Figure 2, Figure 3 and Figure 4, the results are presented for four transmit antennas and four receive antennas. The curves between the source nodes and the relay are denoted as S1 → R, S2 → R, and S3 → R, where S1, S2, and S3 represent each of the three source nodes. It can be seen that the best results are achieved for iterative beamforming in the scenario where a jammer is not present (denoted as “SSA no jammer”). The performance of this algorithm decreases significantly when the jammer generates interference. In the figures mentioned above, we assume the jammer power P J = 0 dB. In that case, transmission is not possible since, despite the increase in the SNR level, BLER does not drop below 75%. Compared to the SSA scheme, we can see that both of the proposed antijamming schemes significantly mitigate the negative impact of the jammer. The results obtained for the antijamming SSA and jammer interference cancellation schemes achieve performance similar to the SSA scheme with no jammer. There is around 1.5 dB loss between the upper bound solution without the jammer and the proposed J-IC scheme, and there is another 1 dB for the proposed AJ-SSA scheme. For the 4 × 4 antenna configuration, J-IC slightly outperforms the AJ-SSA scheme.
The 8 × 8 antenna configuration is presented in Figure 5. The presented BLER curves are the averages of the achieved BLER values for each source node when P J = 0 dB. Similarly, when the jammer generates interference, the transmission is interrupted when the regular SSA scheme is applied. Both of the proposed antijamming schemes, AJ-SSA and J-IC, effectively reduce the adverse effects caused by the jammer. The loss to the SSA scheme without the jammer is less compared to the 4 × 4 antenna configuration, achieving around 0.5 dB. The J-IC scheme slightly outperforms AJ-SSA. The improvement fluctuates around 0.25 dB.
We also conducted additional investigations that aimed at determining which of the two applied algorithms is the most robust when the jammer power changes. We performed our simulations for P J = 3 , 0, 3, and 6 dB with respect to the useful signals generated by the data sources (Figure 6, Figure 7 and Figure 8). Based on our simulations, we conclude that the proposed antijamming signal space alignment algorithm results in better performance than the jammer’s interference canceler when the jammer power is relatively low. However, in the opposite case where the jammer power rises above the power of the useful signals, the algorithm based on jammer cancellation retains very good quality and outperforms the algorithm using the signal space alignment approach for all of the signal sources, including the jamming one. In such cases, finding the QPSK jamming symbol by the interference canceler is reliable, which, in turn, results in reliable jammer compensation.

4. Conclusions and Future Work

In our investigation, we derived two methods of jamming suppression in a wireless MIMO Y-channel data exchange system. The first takes into account the presence of a jamming terminal as an additional source of information in the overall optimization of precoding vectors based on the signal space alignment method. The second method relies on simple cancellation of the jamming signal by searching for data symbols that minimize the received signal power after cancellation. In both methods, CSI for all composite channels is assumed. Let us admit that CSI is a frequent assumption in many other publications dealing with signal space alignment or interference alignment techniques. From that point of view, our results can be viewed as the upper bound of the performance of both methods. We show in our simulations that both jamming suppression methods result in similar performance and are worth implementing, particularly if an effective estimation of all composite channels is worked out.
Our further investigations will be directed at overcoming the drawback of the assumption of ideal jamming channel knowledge, e.g., by the application of a blind signal separation technique [45] well-suited for the scenario considered.

Author Contributions

Conceptualization, K.L. and K.W.; methodology, K.L. and K.W.; software, K.L.; validation, K.L. and K.W.; formal analysis, K.L. and K.W.; investigation, K.L. and K.W.; writing—original draft preparation, K.L. and K.W.; writing—review and editing, K.L. and K.W.; visualization, K.L.; supervision, K.W.; project administration, K.W.; funding acquisition, K.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Poznan University of Technology, Poznan, Poland, within project 0312/SBAD/8163, and the National Center for Research and Development within project 5GSTAR (0312/NCBR/8161-7).

Institutional Review Board Statement

The Institutional Review Board Statement is not relevant to our study.

Data Availability Statement

The original data presented in the study are openly available in Zenodo at https://zenodo.org/records/11182030 (accessed on 12 May 2024).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ANCAnalog Network Coding
ARQAutomatic Repeat reQuest
AWGNAdditive White Gaussian Noise
BCBroadcast
BERBit Error Rate
BLERBlock Error Rate
CSIChannel State Information
DOFDegrees Of Freedom
EPAExtended Pedestrian A Model
GSAGeneralized Signal Alignment
IAInterference Alignment
MAMultiple Access
MIMOMultiple-Input–Multiple-Output
MinILMinimizing Interference Leakage
NCNetwork Coding
OIAOpportunistic IA
PNCPhysical-Layer Network Coding
RSRelay Station
SINRSignal-to-Interference-and-Noise Ratio
SNRSignal-to-Noise Ratio
SSASignal Space Alignment
SVDSingular Value Decomposition
VRBVirtual Resource Block

References

  1. Jafar, S.; Shamai, S. Degrees of freedom region for the MIMO X channel. IEEE Trans. Inf. Theory 2008, 54, 151–170. [Google Scholar] [CrossRef]
  2. Ahlswede, R.; Cai, N.; Li, S.-Y.R.; Yeung, R.W. Network information flow. IEEE Trans. Inf. Theory 2000, 46, 1204–1216. [Google Scholar] [CrossRef]
  3. Zhang, S.; Liew, S.C.; Lam, P. Physical Layer Network Coding. In Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking ACM MobiCom’06, Los Angeles, CA, USA, 23–29 September 2006. [Google Scholar]
  4. Katti, S.; Gollakota, S.; Katabi, D. Embracing wirelss interference: Analog network coding. In Computer Science and Artificial Intelligence Laboratory Technical Report; Association for Computing Machinery: New York, NY, USA, 2007. [Google Scholar]
  5. Chen, M.; Yener, A. Multiuser two-way relaying for interference limited systems. In Proceedings of the IEEE International Conference on Communication, Beijing, China, 19–23 May 2008. [Google Scholar]
  6. Lee, N.; Lim, J.B. A novel signaling for communication on MIMO Y channel: Signal space alignment for network coding. In Proceedings of the 2009 IEEE International Symposium on Information Theory, Seoul, Republic of Korea, 28 June–3 July 2009; pp. 2892–2896. [Google Scholar]
  7. Lee, N.; Lim, J.B.; Chun, J. Degrees of freedom of the MIMO Y channel: Signal space alignment for network coding. IEEE Trans. Inf. Theory 2010, 56, 3332–3342. [Google Scholar] [CrossRef]
  8. Lee, K.; Lee, N.; Lee, I. Feasibility conditions of signal space alignment for network coding on k-user MIMO Y channels. In Proceedings of the IEEE International Conference on Communications, Kyoto, Japan, 5–9 June 2011. [Google Scholar]
  9. Wang, N.; Ding, Z.; Dai, X.; Vasilakos, A.V. On Generalized MIMO Y Channels: Precoding Design, Mapping, and Diversity Gain. IEEE Trans. Veh. Technol. 2011, 60, 3525–3532. [Google Scholar] [CrossRef]
  10. Teav, K.K.; Zhou, Z.; Vucetic, B. Throughput Optimization for MIMO Y Channels with Physical Network Coding and Adaptive Modulation. In Proceedings of the IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, 6–9 May 2012; pp. 1–5. [Google Scholar]
  11. Teav, K.K.; Zhou, Z.; Vucetic, B. Performance Optimization of MIMO Y Channels: Interference Alignment and Signal Detection. IEEE Commun. Lett. 2014, 18, 66–69. [Google Scholar] [CrossRef]
  12. Li, Q.; Li, H.; Wu, G.; Li, S. Retrospective Network Coding Alignment Over K-User MIMO Y Channel. IEEE Commun. Lett. 2016, 20, 502–505. [Google Scholar] [CrossRef]
  13. Li, Q.; Li, H.; Wu, G.; Li, S. Degrees of freedom of MIMO Y channel with three semi-blind users. In Proceedings of the 2016 25th Wireless and Optical Communication Conference (WOCC), Chengdu, China, 21–23 May 2016; pp. 1–5. [Google Scholar]
  14. Zhou, R.; Li, Z.; Wu, C.; Williamson, C. Signal Alignment: Enabling Physical Layer Network Coding for MIMO Networking. IEEE Trans. Wirel. Commun. 2013, 12, 3012–3023. [Google Scholar] [CrossRef]
  15. Liu, K.; Xiang, Z.; Tao, M.; Wang, X. An efficient beamforming scheme for generalized MIMO two-way X relay channels. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 5306–5310. [Google Scholar]
  16. Liu, K.; Tao, M.; Xiang, Z.; Long, X. Generalized signal alignment for MIMO two-way X relay channels. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 4436–4441. [Google Scholar]
  17. Liu, K.; Tao, M.; Yang, D. Generalized signal alignment for arbitrary MIMO two-way relay channels. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 1661–1666. [Google Scholar]
  18. Liu, K.; Tao, M. Generalized Signal Alignment: On the Achievable DoF for Multi-User MIMO Two-Way Relay Channels. IEEE Trans. Inf. Theory 2015, 61, 3365–3386. [Google Scholar]
  19. Long, W.; Gao, H.; Lv, T. Asymmetric signal space alignment for multi-pair two-way relaying network. In Proceedings of the 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 308–313. [Google Scholar]
  20. Ali, S.S.; Castanheira, D.; Silva, A.; Gameiro, A. Joint signal alignment and physical network coding for heterogeneous networks. In Proceedings of the 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016; pp. 1–5. [Google Scholar]
  21. Chan, T.-T.; Lok, T.-M. Signal-Aligned Network Coding in Interference Channels with Limited Receiver Cooperation. In Proceedings of the 2018 IEEE/CIC International Conference on Communications in China (ICCC), Beijing, China, 16–18 August 2018; pp. 573–577. [Google Scholar]
  22. Chan, T.-T.; Lok, T.-M. Reverse Signal-Aligned Network Coding in Interference Channels with Limited Transmitter Cooperation. In Proceedings of the 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Qingdao, China, 14–16 September 2018; pp. 1–6. [Google Scholar]
  23. Zhou, Z.; Vucetic, B. Beamforming optimization for generalized MIMO Y channels with both multiplexing and diversity. In Proceedings of the 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, 6–9 May 2012; pp. 1–5. [Google Scholar]
  24. Zhou, Z.; Vucetic, B. An iterative beamforming optimization algorithm for generalized MIMO Y channels. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; IEEE: New York, NY, USA, 2012; pp. 4595–4599. [Google Scholar]
  25. Xu, W.; Ma, K.; Trappe, W.; Zhang, Y. Jamming sensor networks: Attack and defense strategies. IEEE Netw. 2006, 20, 41–47. [Google Scholar]
  26. Zhang, Y.; Dill, J. An anti-jamming algorithm using wavelet packet modulated spread spectrum. MILCOM 1999. In Proceedings of the IEEE Military Communications. Conference Proceedings, Atlantic City, NJ, USA, 31 October–3 November 1999; Volume 2, pp. 846–850. [Google Scholar]
  27. Popper, C.; Strasser, M.; Capkun, S. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J. Sel. Areas Commun. 2010, 28, 703–715. [Google Scholar] [CrossRef]
  28. Wang, B.; Wu, Y.; Liu, K.J.R.; Clancy, T.C. An anti-jamming stochastic game for cognitive radio networks. IEEE J. Sel. Areas Commun. 2011, 29, 877–889. [Google Scholar] [CrossRef]
  29. He, X.; Dai, H.; Ning, P. Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE Trans. Wirel. Commun. 2014, 13, 4374–4388. [Google Scholar] [CrossRef]
  30. Fang, S.; Liu, Y.; Ning, P. Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 394–408. [Google Scholar] [CrossRef]
  31. Akhlaghpas, H.; Björnson, E.; Razavizadeh, S.M. Jamming Suppression in Massive MIMO Systems. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 182–186. [Google Scholar]
  32. Pirayesh, H.; Zeng, H. Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
  33. Guo, J.; Zhao, N.; Yu, F.R.; Li, M.; Leung, V.C.M. A novel anti-jamming scheme for interference alignment (IA)-based wireless networks. In Proceedings of the 2015 IEEE/CIC International Conference on Communications in China (ICCC), Shenzhen, China, 2–4 November 2015; pp. 1–5. [Google Scholar]
  34. Zhao, N.; Guo, J.; Yu, F.R.; Li, M.; Leung, V.C.M. Antijamming schemes for interference-alignment-based wireless networks. IEEE Trans. Veh. Technol. 2017, 66, 1271–1283. [Google Scholar] [CrossRef]
  35. Guo, J.; Cao, Y.; Yang, Z.; Zhao, N.; Yu, F.R.; Chen, Y.; Leung, V.C.M. Beneficial jamming design for interference alignment networks. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–6. [Google Scholar]
  36. Kumar, N.; Pradhan, P.M. Development of a minimum interference leakage based interference aligned network in presence of jammers. In Proceedings of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India, 16–19 December 2018; pp. 1–5. [Google Scholar]
  37. Zhou, Z.; Vucetic, B. An orthogonal projection optimization algorithm for multi-user MIMO channels. In Proceedings of the 2010 IEEE 71st Vehicular Technology Conference, Taipei, Taiwan, 16–19 May 2010; IEEE: New York, NY, USA, 2010; pp. 1–5. [Google Scholar]
  38. Tong, L.; Zhao, Q. Joint order detection and blind channel estimation by least squares smoothing. IEEE Trans. Signal Process. 1999, 47, 2345–2355. [Google Scholar] [CrossRef]
  39. Scaglione, A.; Giannakis, G.B.; Barbarossa, S. Redundant filterbank precoders and equalizers. II. Blind channel estimation, synchronization, and direct equalization. IEEE Trans. Signal Process. 1999, 47, 2007–2022. [Google Scholar] [CrossRef]
  40. Darsena, D.; Gelli, G.; Iudice, I.; Verde, F. Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack. IEEE Internet Things J. 2022, 9, 11932–11950. [Google Scholar] [CrossRef]
  41. Lu, C.; Chen, P. Robust channel estimation scheme for multi-UAV mmWave MIMO communication with jittering. Electronics 2023, 12, 2102. [Google Scholar] [CrossRef]
  42. Muranov, K.; Smida, B.; Devroye, N. On blind channel estimation in full-duplex relay systems. IEEE Trans. Wirel. Commun. 2021, 20, 4685–4701. [Google Scholar] [CrossRef]
  43. Lin, T.-C.; Phoong, S.-M. Blind channel estimation in OFDM-based amplify-and-forward two-way relay networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Shanghai, China, 20–25 March 2016; pp. 3816–38120. [Google Scholar]
  44. Chiong, C.W.R.; Xiang, Y. Blind estimation of MIMO relay channels. In Proceedings of the IEEE Workshop on Statistical Signal Processing (SSP), Gold Coast, QLD, Australia, 29 June–2 July 2014; pp. 400–403. [Google Scholar]
  45. Luo, W.; Jin, H.; Li, H.; Liu, K.; Yang, E. A Novel complex-valued blind source separation and its applications in integrated reception. Electronics 2023, 12, 3954. [Google Scholar] [CrossRef]
Figure 1. System model for K = 3.
Figure 1. System model for K = 3.
Sensors 24 03237 g001
Figure 2. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 1 and Relay.
Figure 2. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 1 and Relay.
Sensors 24 03237 g002
Figure 3. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 2 and Relay.
Figure 3. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 2 and Relay.
Sensors 24 03237 g003
Figure 4. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 3 and Relay.
Figure 4. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; link between Source 3 and Relay.
Sensors 24 03237 g004
Figure 5. BLER performance: N R = 8 , N S = 8 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; the average of all sources.
Figure 5. BLER performance: N R = 8 , N S = 8 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 0 dB; the average of all sources.
Sensors 24 03237 g005
Figure 6. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 3 dB; the average of all sources.
Figure 6. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 3 dB; the average of all sources.
Sensors 24 03237 g006
Figure 7. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 3 dB; the average of all sources.
Figure 7. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 3 dB; the average of all sources.
Sensors 24 03237 g007
Figure 8. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 6 dB; the average of all sources.
Figure 8. BLER performance: N R = 4 , N S = 4 (SSA—signal space alignment, AJ-SSA—antijamming SSA, J-IC—jammer’s interference cancellation), P J = 6 dB; the average of all sources.
Sensors 24 03237 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Radio channelEPA 5 Hz
Channel estimationIdeal
Channel codingLDPC NR, rate 1/3
ModulationQPSK
MultiplexingOFDM
Subcarrier spacing60 kHz
Slot length0.25 ms
OFDM symbol length16.67 μs
CP length 1.2 μs
Subframes in a frame10
Slots in a subframe4
Slot length0.25 ms
OFDM symbols in a slot14
Subcarriers in a PRB12
PRB width0.72 MHz
Number of PRBs6
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lenarska, K.; Wesołowski, K. Antijamming Schemes for the Generalized MIMO Y Channel. Sensors 2024, 24, 3237. https://doi.org/10.3390/s24103237

AMA Style

Lenarska K, Wesołowski K. Antijamming Schemes for the Generalized MIMO Y Channel. Sensors. 2024; 24(10):3237. https://doi.org/10.3390/s24103237

Chicago/Turabian Style

Lenarska, Karolina, and Krzysztof Wesołowski. 2024. "Antijamming Schemes for the Generalized MIMO Y Channel" Sensors 24, no. 10: 3237. https://doi.org/10.3390/s24103237

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop