TY - JOUR
T1 - Convolution Attack on Frequency Hopping by Full-Duplex Radios
AU - Jagadeesh, Harshan
AU - Hu, Yih Chun
N1 - Funding Information:
Manuscript received May 17, 2018; revised November 25, 2018 and January 19, 2019; accepted March 4, 2019. Date of publication March 28, 2019; date of current version June 18, 2019. This work was supported by the Indigenous 5G Test Bed project from the Department of Telecommunications, Ministry of Communications, New Delhi, India. The review of this paper was coordinated by Prof. R. Q. Hu. (Corresponding author: J. Harshan.) H. Jagadeesh is with the Indian Institute of Technology Delhi, New Delhi 110016, India (e-mail:,jharshan@ee.iitd.ac.in).
Publisher Copyright:
© 1967-2012 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - In this paper, we propose a new adversarial attack on frequency-hopping-based wireless communication between two users, namely Alice and Bob. In this attack, the adversary referred to as Eve, instantaneously modifies the transmitted signal by Alice before forwarding it to Bob within the symbol period. We show that this attack forces Bob to incorporate Eve's signal in the decoding process; otherwise, treating it as noise would further degrade the performance akin to jamming. Through this attack, we show that Eve can convert a slow-fading channel between Alice and Bob to a rapid-fading one by modifying every transmitted symbol independently. As a result, neither pilot-Assisted coherent detection techniques nor blind-detection methods are directly applicable as countermeasures. As potential mitigation strategies, we explore the applicability of frequency hopping along with on-off keying (OOK) and binary frequency-shift keying (BFSK) as modulation schemes. In the case of OOK, the attacker attempts to introduce deep fades on the tone carrying the information bit, whereas in the case of BFSK, the attacker pours comparable energy levels on the tones carrying bit-0 and bit-1, thereby degrading the performance. Based on extensive analyses and experimental results, we show that when using OOK, Bob must be equipped with a large number of receive antennas to reliably detect Alice's signal, and when using BFSK, Alice and Bob must agree upon a secret key to randomize the location of the tones carrying the bits, in addition to randomizing the carrier frequency of communication.
AB - In this paper, we propose a new adversarial attack on frequency-hopping-based wireless communication between two users, namely Alice and Bob. In this attack, the adversary referred to as Eve, instantaneously modifies the transmitted signal by Alice before forwarding it to Bob within the symbol period. We show that this attack forces Bob to incorporate Eve's signal in the decoding process; otherwise, treating it as noise would further degrade the performance akin to jamming. Through this attack, we show that Eve can convert a slow-fading channel between Alice and Bob to a rapid-fading one by modifying every transmitted symbol independently. As a result, neither pilot-Assisted coherent detection techniques nor blind-detection methods are directly applicable as countermeasures. As potential mitigation strategies, we explore the applicability of frequency hopping along with on-off keying (OOK) and binary frequency-shift keying (BFSK) as modulation schemes. In the case of OOK, the attacker attempts to introduce deep fades on the tone carrying the information bit, whereas in the case of BFSK, the attacker pours comparable energy levels on the tones carrying bit-0 and bit-1, thereby degrading the performance. Based on extensive analyses and experimental results, we show that when using OOK, Bob must be equipped with a large number of receive antennas to reliably detect Alice's signal, and when using BFSK, Alice and Bob must agree upon a secret key to randomize the location of the tones carrying the bits, in addition to randomizing the carrier frequency of communication.
KW - Jamming
KW - cognitive radio
KW - convolution attack
KW - frequency-hopping
KW - wireless security
UR - http://www.scopus.com/inward/record.url?scp=85067820352&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85067820352&partnerID=8YFLogxK
U2 - 10.1109/TVT.2019.2908008
DO - 10.1109/TVT.2019.2908008
M3 - Article
AN - SCOPUS:85067820352
SN - 0018-9545
VL - 68
SP - 5642
EP - 5656
JO - IEEE Transactions on Vehicular Communications
JF - IEEE Transactions on Vehicular Communications
IS - 6
M1 - 8676089
ER -