Professional Documents
Culture Documents
Icassp 2016
Icassp 2016
March, 2016
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016
Outline
• Introduction
• Problem Formulation
• Robust Receiver Design
• Secure Scrambling
• Conclusions
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 1
Introduction (1/2)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 2
Introduction (2/2)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 3
Problem Formulation (1/3)
• Transmitted Signal
– The transmitted signal can be written as
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 4
Problem Formulation (2/3)
• Received Signal
– The received signal can be written as
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 5
Problem Formulation (3/3)
• Symbol Estimation
– Replacing the received signal r(t) in (4) with (3), we have
Z T Z T
1 1
û = u + vγ c(t − τ )c(t)dt + n(t)c(t)dt. (5)
T 0 T 0
• Worst Case
– In the worst case, when τ = 0 and γ = 1, (5) can be simplified
as Z T
1
û = u + v + n(t)c(t)dt. (6)
T 0
−1
– Probability of symbol error: Ps ≥ M2M . LOWER BOUNDED!!!
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 6
Robust Receiver Design (1/4)
• MSE Minimization
– The MSE between the received signal and the jammed signal can
be calculated as
Z T
1
J(u, v, τ, γ) = |r(t) − uc(t) − vγc(t − τ )|2dt. (7)
T 0
– Our goal is
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 7
Robust Receiver Design (2/4)
• Problem Reduction
– To minimize (7), one necessary condition is that its partial
derivatives regarding v and γ are zero, applying which (7) can
be reduced to
Z T
1
J= |r(t) − uc(t)|2dt − |A(u, τ )|2, (9)
T 0
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 8
Robust Receiver Design (3/4)
-1
10
-2
10
BER
-3
10
= 0
-4
10 = 1/32Tc
= 1/16Tc
= 1/8Tc
= 1/4Tc
-5 No jamming
10
0 5 10 15 20 25 30
Eb/N0 (dB)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 9
Robust Receiver Design (4/4)
-1
10
-2
BER
10
-3
10
-4
10
0 5 10 15 20 25 30
Eb/N0 (dB)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 10
Secure Scrambling
IV KEY
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 11
Capacity Analysis (1/3)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 12
Capacity Analysis: (2/3)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 13
Capacity Analysis (3/3)
• Symmetric & Symmetrizable Kernels
Authorized Signal
To Receiver
sS
Jamming j J S Noise n W (y | s, j) W (y | j, s)
Authorized Signal
To Receiver
sS
Jamming j J J
Noise n Wˆ (y | s, s) Wˆ (y | s, s)
( j | s) Auxiliary Wˆ (y | s, s) ( j | s)W (y | s, j)
Channel jJ
s S
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 14
Secure Scrambling: Summary
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 15
Numerical Results
-1
Symbol Error Rate (SER)
10
-2
10
Jamming-Free
Disguised Jamming without Secure Scrambling
Disguised Jamming with Secure Scrambling
Disguised Jamming with Secure Scrambling--Theoretical
-3
10
0 1 2 3 4 5 6 7 8 9 10
Eb/N0 (dB)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 16
Conclusions
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 17
Thank you!
Questions?
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 18
References
[1] C.-L. Wang and K.-M. Wu, “A new narrowband interference suppression scheme for
spread-spectrum CDMA communications,” vol. 49, no. 11, pp. 2832–2838, Nov 2001.
[2] J. Massey, “Shift-register synthesis and BCH decoding,” vol. 15, no. 1, pp. 122–127, Jan 1969.
[3] T. Li, Q. Ling, and J. Ren, “Physical layer built-in security analysis and enhancement algorithms
for CDMA systems,” EURASIP Journal on Wireless Communications and Networking, vol.
2007, no. 1, p. 083589, 2007.
[4] L. Zhang, H. Wang, and T. Li, “Anti-jamming message-driven frequency hopping-part i: System
design,” IEEE Transactions on Wireless Communications, vol. 12, no. 1, pp. 70 –79, Jan. 2013.
[5] M. Medard, “Capacity of correlated jamming channels,” in Allerton Conference on Communi-
cations, Computing and Control, 1997.
[6] T. Ericson, “Exponential error bounds for random codes in the arbitrarily varying channel,”
vol. 31, no. 1, pp. 42–48, 1985.
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 19
Without Secure Scrambling (1/3)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 20
Without Secure Scrambling (2/3)
• Capacity Analysis: without Secure Scrambling
– Define the authorized signal space as S = {uc|u ∈ Ω}. It follows
immediately that the disguised jamming space
J = {vc|v ∈ Ω} = S. (13)
W0 : S × S → Ω, (14)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 21
Without Secure Scrambling (3/3)
• Capacity Analysis: without Secure Scrambling
– The jamming and the authorized signal are fully symmetric as
they are generated from exactly the same space S.
– Note that the recovery of the authorized symbol is fully based on
r in (12), so we further have
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 22
With Secure Scrambling (1/6)
• Capacity Analysis: with Secure Scrambling
– When the coding information of the authorized user is securely
hidden from the jammer, the best the jammer can do would be
using a randomly generated spreading sequence.
– Define D = {[d0, d1, ..., dN −1]|dn = ±1, ∀n}, and denote the
randomly generated spreading sequence by d ∈ D, the chip-rate
jamming can be represented as
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 24
With Secure Scrambling (3/6)
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 25
With Secure Scrambling (4/6)
• Proof: Nonsymmetrizable
– We pick s0 = uc, s00 = −uc, û1 = u and û2 = −u. Note that
“u” is picked such that R(u) and R(−u) are axial symmetric,
and |u| ≥ |v|, ∀v ∈ Ω.
Axis of symmetry Axis of symmetry
16QAM 8PSK
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 26
With Secure Scrambling (5/6)
• Proof: Nonsymmetrizable
– The idea is to prove that Ŵ (û1|s0, s00) = Ŵ (û1|s00, s0) and
Ŵ (û2|s0, s00) = Ŵ (û2|s00, s0) cannot hold simultaneously, by
showing that
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 27
With Secure Scrambling (6/6)
• Proof: Nonsymmetrizable
– A complete proof that the kernel, W , is nonsymmetrizable can
be found in our journal paper.
• Results for CDMA with Secure Scrambling
– Under disguised jamming, the kernel of the AVC corresponding to
a CDMA system with secure scrambling, W , is neither symmetric
nor symmetrizable.
– Under disguised jamming, the deterministic capacity of a CDMA
system with secure scrambling is NOT zero.
c BAWC Paper Presentation for IEEE ICASSP 2016 March, 2016 28