Next Article in Journal
Thin CdTe Layers Deposited by a Chamberless Inline Process using MOCVD, Simulation and Experiment
Next Article in Special Issue
Theory and Design of Blink Jamming
Previous Article in Journal
Distributed Adaptive Neural Network Control Applied to a Formation Tracking of a Group of Low-Cost Underwater Drones in Hazardous Environments
Previous Article in Special Issue
Performance Analysis of Amplitude Comparison Monopulse Direction-of-Arrival Estimation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator

Electronics engineering, Inha University, 100, Inha-ro, Michuhol-gu, Incheon 22212, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(5), 1733; https://doi.org/10.3390/app10051733
Submission received: 30 January 2020 / Revised: 26 February 2020 / Accepted: 29 February 2020 / Published: 3 March 2020
(This article belongs to the Special Issue Recent Advances in Electronic Warfare Networks and Scenarios)

Abstract

:
In frequency-hopping spread-spectrum (FHSS) systems, jammer detection and mitigation are important but difficult. Each slot of the FHSS experiences frequency-selective fading and unequal transceiver-frequency gains that hinder the detection of jammed slots and result in a poor bit-error rate (BER). To increase BER performance, we first propose a noise-jammer power estimator (NJPE) that estimates noise and jammer powers regardless of different channel gains, and derived its normalized Cramér–Rao bound (NCRB). Second, we developed a jammer detector based on gamma distribution, and designed a restoration method combining all nonjammed slots. Computer simulations verified the derived NCRB of the proposed NJPE by normalized mean squared error (NMSE), and showed that the jammer-detection probability of the proposed jammer detector was better than that of conventional detectors. The BER performance of the proposed method was also shown to be better than that of conventional methods.

1. Introduction

In military wireless communication systems, the bit-error rate (BER) in a receiver is degraded when a transmitted signal is jammed [1,2]. Military wireless communications need to mitigate jammers to attain reliability. To reduce jamming, several antijam techniques, such as frequency-hopping spread spectrum (FHSS) and direct-sequence spread spectrum (DSSS), were researched [3,4,5,6,7,8,9,10,11,12,13,14,15]. When jammer power is large, the FHSS is known to be more effective [16], but BER degradation remains.
FHSS randomly changes carrier frequency according to time within a transmission-frequency band, which reduces jammer probability for a slot. As a jammer to FHSS, a partial-band noise jammer (PBNJ) was considered in this study [17,18]. When jamming occurs, the BER of jammed slots is so large that the receiver may not be able to decode the transmitted information. To overcome the jammer problem, a duplication method was studied where several slots with the same data are transmitted and combined to increase signal-to-jammer-plus-noise ratio (SJNR) [19]. However, when the jammer was strong, the SJNR was still small. A selective combining method was developed [19], and the detection of jammed slot methods was also researched [20,21]. In FHSS systems, however, multipath channels cause frequency-selective fading, and nonlinear devices at the transmitter also generate an unequal frequency response. Since the unequal frequency response makes the detection of jammed slots difficult, a solution for measuring jammer power on all empty slots and detecting jammed slots was developed [21]. This full search of all empty slots requires large computational complexity.
To overcome jammer-detection and -mitigation problems, we developed a proposal for a noise-jammer power estimator (NJPE), a jammer detector based on gamma distribution, and a slot combiner for nonjammed slots. The proposed NJPE estimates the pure power of the noise and jammer of each slot regardless of transmitted-symbol existence and unequal frequency response. The probability distribution of the NJPE output was approximated as gamma distribution on the basis of simulations, and the jammer detector based on gamma distribution was developed to precisely detect the jammer. The normalized Cramér–Rao bound (NCRB) of the proposed NJPE was also derived to theoretically prove estimation performance. Computer simulations demonstrated that the normalized mean squared error (NMSE) of the proposed NJPE was well-matched with the derived NCRB, and the detection performance of the jammer detector based on gamma distribution was better than those of conventional jammer detectors. The BER of the proposed method indicated better performance than that of conventional methods.
This paper consists of five sections: Section 2 discusses how the proposed NJPE works; Section 3 analyzes how to assess the performance of the proposed NJPE; Section 4 compares the NCRB of the proposed scheme with NMSE and BER performance using computer simulations; and Section 5 concludes the paper.

2. Proposed Estimator and Detector

In FHSS systems for military communications, the same data are repeatedly transmitted over several slots and combined in the receiver to mitigate jammers. When jammer power is strong, and jammed slots are not discarded, BER performance degrades. Thus, the detection of jammed slots is important. In FHSS systems, however, frequency-selective fading and unequal frequency responses cause different slot powers and make the detection of jammed slots difficult. In this section, we show the developed NJPE and the jammer detector based on gamma distribution of NJPE. The proposed detector can detect both narrowband and wideband jammers. Figure 1 demonstrates the proposed method that detects and discards jammed slots, and combines the remaining slots.

2.1. Noise-Jammer Power Estimator

In order to estimate pure noise-jammer power regardless of transmitted-symbol power, the received symbol was multiplied by its conjugation, and its mean and variance were calculated. With a simple manipulation of mean and variance, the pure noise-jammer power was easily estimated.
Assume that the data of a slot are copied and repeatedly transmitted to L slots, the received symbol of the l-th slot is r l , and X l is the multiplication of r l and its conjugation r l * . Then, X l can be written as
X l = r l r l * = ( h l s l + n ˜ l ) ( h l s l + n ˜ l ) * = | h l | 2 | s l | 2 + n ˜ l s l * h l * + h l s l n ˜ l * + | n ˜ l | 2 ,
where h l denotes a channel coefficient of the l-th slot, s l denotes a transmitted symbol of the l-th slot, and * denotes a complex conjugate. h l is uncorrelated to other channel coefficients by frequency-selective fading. n ˜ l denotes noise with or without jammer on the l-th slot, which is defined by
n ˜ l = { n l ,   w . o .   j a m m e r n l + j l ,   w .   j a m m e r ,
where n l and j l denote pure noise and the jammer on the l-th slot, respectively.
To develop the proposed NJPE, the mean and variance of X l in Equation (1) were calculated. Assume that noise, transmitted symbol, and channel gain are independent. The PBNJ was modeled as zero-mean Gaussian noise [22,23]. Therefore, the mean of X l was obtained as
E [ X l ] = E [ | h l | 2 | s l | 2 ] + E [ n ˜ l s l * h l * ] + E [ h l s l n ˜ l * ] + E [ | n ˜ l | 2 ] = { E s E [ | h l | 2 ] + σ l , N 2 ,   w . o .   j a m m e r E s E [ | h l | 2 ] + σ l , N 2 + σ l , J 2 ,   w .   j a m m e r ,
where σ l , N 2 and σ l , J 2 denote the pure noise power and jammer power on the l-th slot, respectively, and E s denotes a symbol power. Next, the variance of X l was obtained as
Var [ X l ] = Var [ | h l | 2 | s l | 2 ] + Var [ n ˜ l s l * h l * ] + Var [ h l s l n ˜ l * ] + Var [ | n ˜ l | 2 ] + 2 Cov ( | h l | 2 | s l | 2 , n ˜ l s l * h l * )                         + 2 Cov ( | h l | 2 | s l | 2 , h l s l n ˜ l * ) + 2 Cov ( | h l | 2 | s l | 2 , | n ˜ l | 2 ) + 2 Cov ( n ˜ l s l * h l * , h l s l n ˜ l * )                         + 2 Cov ( n ˜ l s l * h l * , | n ˜ l | 2 ) + 2 Cov ( h l s l n ˜ l * , | n ˜ l | 2 ) .
Equation (4) was classified as with- or without-jammer since n ˜ l had with- or without-jammer cases in Equation (2). In FHSS, the length of each slot was designed to be shorter than coherence time, and channel gain was assumed as constant in a slot. Then, Equation (4) was simplified as
Var [ X l ] = { σ l , N 4 + 2 E s E [ | h l | 2 ] σ l , N 2 ,   w . o .   j a m m e r ( σ l , N 2 + σ l , J 2 ) 2 + 2 E s E [ | h l | 2 ] ( σ l , N 2 + σ l , J 2 ) ,   w .   j a m m e r .
Equations (3) and (5) both have noise, symbol, jammer powers, and channel gain. To estimate the pure noise-jammer power regardless of channel gain, E s E [ | h l | 2 ] in Equation (3) needed to be removed. E s E [ | h l | 2 ] was calculated by taking the square root of ( E s E [ | h l | 2 ] ) 2 , which was obtained by subtracting the squared Equation (3) from Equation (5). Then, the proposed NJPE could be derived as
Z l = E [ X l ] E [ X l ] 2 Var [ X l ] = { σ l , N 2 ,   w . o .   j a m m e r σ l , N 2 + σ l , J 2 ,   w .   j a m m e r .
In Equation (6), if a jammer existed, NJPE estimated the sum of pure noise and jammer power; if not, NJPE only estimated pure noise power. Because the noise was generated from a low-noise amplifier (LNA) at the receiver, the noise powers of all slots were similar. Therefore, jammed slots were easily detected by comparing with other slots. The estimation performance of the proposed NJPE is explained in Section 3.

2.2. Jammer Detector wirh Gamma Distribution

Jammer detectors determine a jammed slot when an estimated noise power of a slot is greater than those of the other slots. A robust jammer-detection method is the constant false-alarm-rate (CFAR) detector, which calculates a threshold obtained from a given false-alarm-rate probability ( P f a ) and compares the threshold with a test sample. The conventional CFAR detector of radar systems assumes that background noise follows Gaussian distribution. However, the output distribution of the proposed NJPE was not Gaussian because of the square and square-root terms in Equation (6).
In this study, we approximated that the NJPE output followed gamma distribution on the basis of simulations, and derived the jammer detector based on gamma distribution. In the experiment section, we demonstrate that the detection performance of the derived jammer detector attained better detection probability than those of conventional Gaussian-distribution-based detectors.
To calculate a relationship between threshold and false-alarm rate P f a , let an actual and an estimated noise-jammer power be θ and z, respectively. The conditional probability-density function (PDF) of z given θ ( f Z ( z | θ ) ), follows gamma distribution and is given as (see Appendix A)
f Z ( z | θ ) = 1 Γ ( α ( θ ) ) β ( θ ) α ( θ ) z α ( θ ) 1 exp ( z / β ( θ ) ) ,
where α ( θ ) and β ( θ ) denote
α ( θ ) = N P r , l 2 θ 2 + 4 P r , l θ + 2 P r , l 2 ,
β ( θ ) = θ ( θ 2 + 4 P r , l θ + 2 P r , l 2 ) N P r , l 2 ,
where N denotes the number of samples, and P r , l denotes a received symbol power of the l-th slot ( E s E [ | h l | 2 ] ) from Equation (3). Then, a relationship between P f a and threshold V T of the proposed jammer detector is obtained as
P f a = V T f Z ( z | θ ) d z = 1 Γ ( α ( θ ) ) Γ ( α ( θ ) , V T β ( θ ) ) ,
where Γ ( s , x ) denotes an upper incomplete gamma function by
Γ ( s , x ) = x t s 1 e t d t .
Thus, for a given P f a , V T is calculated by Equation (10), and a jammed slot can be determined.
After detecting all jammed slots, the index set ( S c o m b ) of the combining slots is obtained as
S c o m b = { l   |   Z l < V T ,   l { 1 , 2 , , L } } ,
where Z l denotes the estimated power of the noise and jammer in the l-th slot from Equation (6). If the only nonjammed slots based on S c o m b were combined, a larger signal-to-noise ratio (SNR) and a better BER could be attained.

3. Proposed-Method Analysis

For NJPE, the limited number of symbols in a slot is utilized for calculation, which causes an estimation error. In this section, we derived the NCRB of the proposed NJPE, analyzed the detection performance of the proposed jammer detector, and calculated the detection probability.
The characteristic of the NCRB of the proposed NJPE is described in Lemma 1.
Lemma 1.
The estimation error of NJPE is inversely proportional to the number of symbols in a slot. When the SNR is large, the estimation error only depends on the number of symbols.
Proof. 
Let the estimated noise power of the proposed NJPE be θ ^ for actual power θ . The variance of θ ^ is bounded by Fisher information ( I ( θ ) ), which is given as [24]
Var [ θ ^ ] 1 I ( θ ) ,
where I ( θ ) is calculated as (see Appendix B for detail derivation)
I ( θ ) = E [ 2 ln f Z ( z | θ ) θ 2 ] = N P r 2 θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) .
where N denotes the number of symbols, and P r denotes the received symbol power. Thus, the Cramér–Rao bound (CRB) is obtained as
Var [ θ ^ ] C R B ( θ ) = θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) N P r 2 .
NCRB is defined as N C R B ( θ ) = def C R B ( θ ) / θ 2 [25]. NCRB is written as
N C R B ( θ ) = θ 2 + 4 P r θ + 2 P r 2 N P r 2 = 1 + 4 Ω + 2 Ω 2 N Ω 2 ,
where Ω = P r / θ , which is SNR. In Equation (16), NCRB is inversely proportional to N and is functional of Ω . When Ω is large, NCRB becomes 2 / N . □
The detection probability ( P D ) of the proposed jammer detector was calculated from threshold V T , which was obtained from P f a . Because the proposed NJPE followed gamma distribution, P D needed to be calculated on the basis of the conditional probability of the gamma function in Equation (7). If the jammer existed in the observation slot, θ in Equation (7) became the sum of the noise power and jammer power ( σ N 2 + σ J 2 ). Then, P D with threshold V T was obtained by an integration over the region greater than V T , which was given as
P D = V T f Z ( z | σ N 2 + σ J 2 ) d z = 1 Γ ( α ( σ N 2 + σ J 2 ) ) Γ ( α ( σ N 2 + σ J 2 ) , V T β ( σ N 2 + σ J 2 ) ) ,
where α ( σ N 2 + σ J 2 ) and β ( σ N 2 + σ J 2 ) were defined as in Equations (8) and (9), respectively. Thus, in Equation (17), as α ( σ N 2 + σ J 2 ) increased and β ( σ N 2 + σ J 2 ) decreased, P D increased. In other words, a larger SNR provided better detection probability. In the next section, we outline the computer simulations that were executed to show the detection performance of the proposed and conventional schemes.

4. Computer Simulations

The validation of gamma approximation and the derived NCRB were verified through computer simulations. The detection probability and the BER of the proposed methods were evaluated alongside conventional schemes. For the validation of gamma approximation, the distribution of the NJPE output was fitted to gamma, normal, and Weibull, and the root mean squared errors (RMSEs) of moments for the three fitted distributions were compared to select best-fit distribution. The derived NCRB was compared with the NMSE of the proposed NJPE. The detection probability of the proposed jammer detector based on gamma distribution was compared with those of the conventional cell average (CA)-CFAR, smallest of (SO)-CFAR, and differential jammer rejection (DJR) [20,21]. The BERs of the combining slots without jammed slots were tested alongside conventional methods.
Experiment parameters are shown in Table 1, where ρ denotes the ratio of the bandwidths of FHSS system and jammer. A small ρ indicates a strong and narrowband jammer for the same jammer power.
In order to verify gamma approximation, maximum-likelihood estimation was utilized to fit the distribution of the NJPE output to gamma, normal, and Weibull distributions [26], and the RMSEs of the n-th moment from 1 to 4 were compared to select the best-fit distribution.
The PDFs of the three fitted distributions and the RMSEs are shown in Figure 2 and Table 2, respectively. In Figure 2, the black solid line denotes the PDF of the output of NJPE. Red-triangle, green-square, and blue-circle lines denote the PDFs of the fitted distributions with gamma, normal, and Weibull, respectively. Gamma distribution was well-matched with the distribution of the NJPE output. In Table 2, μ n denotes the n-th moment, and the gamma distribution displayed the smallest RMSEs from the three fitted distributions.
In Figure 3, the NCRB of the proposed NJPE was compared with the NMSE of the simulated NJPE according to bit-energy-to-noise-power spectral-density ratio ( E b / N 0 ) with N = 50 , and according to N with E b / N 0 = 12 dB. In Figure 3a, for a large SNR region, NMSE and NCRB converged to 0.04, which was also calculated by 2 / N . In Figure 3b, NMSE and NCRB were inversely proportional to the number of symbols. These results were well-matched with Lemma 1.
In Figure 4, the detection probabilities of the proposed jammer detector based on NJPE versus bit-energy-to-jammer-power spectral-density ratio ( E b / J 0 ) at P f a = 10 10 are shown for ρ = 0.0005, 0.005, and 0.05. The jammer with ρ = 0.0005 was a strong and narrowband signal. The red-triangle line denotes CA-CFAR, the green-asterisk line denotes SO-CFAR, the blue-hexagram line denotes DJR, and the magenta-diamond line denotes the proposed detector. The Gaussian-distribution-based detector is also depicted as a dotted-magenta-diamond line for comparison with the proposed gamma-distribution-based detector. When E b / J 0 was small, i.e., large jammer power, the jammer was easily detected, and the detection probability of jammer was close to 1; the inverse was also true. For the same E b / J 0 , a small ρ in Figure 4a demonstrates larger detection probability than a large ρ in Figure 4c. The proposed method had about 15, 13, and 5 dB detection-probability gain, respectively, compared to the conventional CA-CFAR, SO-CFAR, and DJR. In addition, the proposed gamma-distribution-based detector had about 3 dB better gain than the Gaussian-distribution-based detector.
In Figure 5, the receiver-operating-characteristic (ROC) curves of the proposed method and the conventional methods were evaluated to show detection probability according to various P f a . In Figure 5, the proposed method exhibited greater detection probability than conventional methods at small P f a regions, and required a smaller P f a for specific detection probability. As seen in Figure 4 and Figure 5, the proposed detector demonstrated the best detection performance.
Figure 6 illustrates the BER performance of the combining slots without jammed slots versus E b / J 0 at P f a = 10 10 for ρ = 0.0005, 0.005, and 0.05. The tested detection methods were the same as in Figure 4. For reference comparison, the BER from combining without- and with-discard of known jammed slots is also plotted with a black solid line and a dashed line, respectively. If perfectly jammed slots were discarded, the BER was about 2 × 10 4 regardless of E b / J 0 . If not, when E b / J 0 was less than 5 dB, and ρ was 0.0005, 0.005, and 0.05, the BER from combining all slots increased up to 0.001, 0.009, and 0.07, respectively. These results demonstrated that rejecting jammed slots by the jammer detector was important in increasing BER performance in FHSS systems.
In Figure 6, the methods ranked by increasing BER performance are CA-CFAR, SO-CFAR, DJR, and the proposed method. This result matched with detection performance in Figure 4. In Figure 6b, when ρ was 0.005 and E b / J 0 varied from 10 to 30 dB, the BER performance of the proposed method was similar to that of perfect jammer detection, while the BER performance of other detectors decreased at the E b / J 0 region. When E b / J 0 was larger than 30 dB, the BER of all schemes encountered an error floor. In this case, even though jammer power was small, BER performance did not increase at all for all cases. As seen in BER comparisons, the proposed method demonstrated the best BER performance.

5. Conclusions

We proposed a NJPE and jammer detector based on gamma distribution for detecting jammed slots and combining nonjammed slots in FHSS systems. We theoretically derived the NCRB of the proposed estimator, and developed the jammer detector based on gamma distribution. By computer simulations, the derived NCRB was tested using NMSE, and BER performance for the proposed and the conventional methods was evaluated. The detection performance of the proposed method had a 15, 13, and 5 dB E b / J 0 gain compared to the conventional jammer detectors. The proposed scheme showed the best detection and BER performance for all scenarios.

Author Contributions

Conceptualization, H.L. and J.C.; methodology, H.L.; software, H.L.; validation, J.A., Y.K., and J.C.; investigation, H.L., Y.K., and J.A.; writing—original-draft preparation, H.L.; writing—review and editing, J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Inha university research program.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In this appendix, we calculate the parameters of the probability distribution for the proposed NJPE. Let the NJPE output be a random variable Z, and its sample mean and variance be M and S 2 , respectively. NJPE (Z) is expressed as Equation (6). We rewrite the equation as
Z = M M 2 S 2 .
The multiplication of the received symbol and its complex conjugate is set as a random variable X. When the number of observation samples is N, X 1 ,   X 2 ,   ,   X N are assumed as independent and identically distributed (i.i.d.) random variables. Then, sample mean M and sample variance S 2 are defined as
M = 1 N i = 1 N X i ,
S 2 = 1 N 1 i = 1 N ( X i E [ X ] ) 2 .
The mean and variance of M and S 2 are obtained as follows [27].
E [ M ] = μ ,
Var [ M ] = μ 2 N ,
E [ S 2 ] = μ 2 ,
Var [ S 2 ] = μ 4 N μ 2 2 N + 2 μ 2 2 N ( N 1 ) ,
where μ and μ 2 denote the mean and variance of X, respectively; μ 3 and μ 4 are the third and fourth central moment of X, respectively.
In FHSS, if the length of each slot was designed to be shorter than coherence time, and the channel gain was assumed to be constant in a slot. Then, random variable X follows gamma distribution [28]. When the number of samples is sufficiently large, M follows Gaussian distribution by the central limit theorem (CLT). Without loss of generality, the distribution of the sample variance was assumed to be Gaussian distribution [29]. As in Equation (A1), i.e., Z = M M 2 S 2 , since M and S 2 follow Gaussian distributions, the distribution of Z cannot be obtained in a closed form because of the square and square-root terms. This paper approximated the distribution of Z as gamma distribution on the basis of simulations.
The parameters of gamma distribution were determined by the mean and variance of random variable Z. The mean of Z could be calculated by second-order Taylor’s approximation. Let g ( · ) be   ·   . Then, the mean of Z is
E [ Z ] = E [ M ] E [ g ( M 2 S 2 ) ] E [ M ] g ( E [ M 2 S 2 ] ) Var [ M 2 S 2 ] 2 g ( E [ M 2 S 2 ] ) .
In Equation (A4), E [ M 2 S 2 ] and Var [ M 2 S 2 ] are calculated as
E [ M 2 S 2 ] = E [ M 2 ] E [ S 2 ] = Var [ M ] + E [ M ] 2 E [ S 2 ]
Var [ M 2 S 2 ]   = Var [ M 2 ] + Var [ S 2 ] 2 Cov ( M 2 , S 2 ) ,
where
Var [ M 2 ] = E [ ( M 2 ) 2 ] E [ M 2 ] 2 = μ 4 N 3 + ( 2 N 3 ) μ 2 2 N 3 + 4 μ 3 μ N 2 + 4 μ 2 μ 2 N ,
Cov ( M 2 , S 2 ) = E [ M 2 S 2 ] E [ M 2 ] E [ S 2 ] = μ 4 N ( N 1 ) + 2 μ 3 μ N 1 + μ 2 μ 2 + μ 2 .
From Equations (A9) and (A10), the mean of Z can be rewritten as
E [ Z ] = μ μ 2 μ 2 .
The variance of Z can be calculated by linearizing the square root of Equation (A1). The linearized Z can be expressed as
Z = M 1 2 E [ M 2 ] E [ S 2 ] M 2 + 1 2 E [ M 2 ] E [ S 2 ] S 2 E [ M 2 ] E [ S 2 ] 2 .
The variance of Z can be calculated using [27] and [30], and is written as
Var [ Z ] = Var [ M ] + ( 1 2 E [ M 2 ] E [ S 2 ] ) 2 × ( Var [ M 2 ] + Var [ S 2 ] Cov ( M 2 , S 2 ) ) 1 E [ M 2 ] E [ S 2 ] × ( Cov ( M , M 2 ) Cov ( M , S 2 ) ) = 4 μ 2 μ 2 + μ 4 μ 2 2 4 μ 3 μ 4 ( μ 2 + N μ 2 N μ 2 ) 1 μ 2 N + μ 2 μ 2 ( 2 μ 2 μ N μ 3 N ) + μ 2 N ,
where
Cov ( M , M 2 )   = μ 3 N 2 + 2 μ 2 μ N ,
Cov ( M , S 2 ) = μ 3 N .
Let the output of NJPE be θ . To define mean and variance in Equations (A13) and (A15) using θ , the moments of X are first defined as
μ = P r + θ ,
μ 2 = 2 P r θ + θ 2 ,
μ 3 = 6 P r θ 2 + 2 θ 3 ,
μ 4 = 12 P r 2 θ 2 + 36 P r θ 3 + 9 θ 4 ,
where P r denotes E s E [ | h | 2 ] . After substituting these moments of Equations (A18)–(A21) into Equations (A13) and (A15), the mean and variance are calculated as
E [ Z ] = θ ,
Var [ Z ] = θ { ( θ + P r ) 3 + P r ( θ P r ) 2 } ( N 1 ) P r 2 + ( θ + P r ) 2 + θ ( θ + 2 P r ) N 4 P r 2 θ N ( N 1 ) P r 2 + N ( θ + P r ) 2 .
When the number of samples is sufficiently large, Equation (A23) can be simplified as
Var [ Z ] = θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) N P r 2 .
Therefore, the conditional PDF of z, given θ , f Z ( z | θ ) , is given as
f Z ( z | θ ) = 1 Γ ( α ( θ ) ) β ( θ ) α ( θ ) z α ( θ ) 1 exp ( z / β ( θ ) ) ,
where
α ( θ ) = E [ Z ] 2 Var [ Z ] = N P r 2 θ 2 + 4 P r θ + 2 P r 2 ,
β ( θ ) = Var [ Z ] E [ Z ] = θ ( θ 2 + 4 P r θ + 2 P r 2 ) N P r 2 .

Appendix B

In this appendix, the CRB of the proposed NJPE using Fisher information is derived. CRB is defined as Var [ θ ^ ] 1 / I ( θ ) [24], and I ( θ ) is defined as
I ( θ ) = E [ ( ln f Z ( z | θ ) θ ) 2 ] = E [ 2 ln f Z ( z | θ ) θ 2 ] ,
where ln f Z ( z | θ ) can be written as
ln f Z ( z | θ ) = ln ( 1 Γ ( α ( θ ) ) β ( θ ) α ( θ ) z α ( θ ) 1 exp ( z / β ( θ ) ) ) = ln Γ ( α ( θ ) ) α ( θ ) ln β ( θ ) + ( α ( θ ) 1 ) ln z z β ( θ ) .
From [31], Equation (A29) can be rewritten as
ln f Z ( z | θ ) = α ( θ ) ln α ( θ ) + 1 2 ln α ( θ ) + α ( θ ) 1 2 ln 2 π α ( θ ) ln β ( θ ) + ( α ( θ ) 1 ) ln z z β ( θ ) .
The second derivative of θ in Equation (A30) is given as
2 ln f Z ( z | θ ) θ 2 = 2 α ( θ ) θ 2 ( ln z ln θ + 1 2 α ( θ ) ) α ( θ ) θ ( 1 θ + α ( θ ) θ 1 2 α ( θ ) 2 )               + ( 2 β ( θ ) θ 2 1 β ( θ ) 2 ( β ( θ ) θ ) 2 2 β ( θ ) 3 ) ( z θ ) β ( θ ) θ 1 β ( θ ) 2 .
From Equations (A28) and (A31), I ( θ ) can be calculated as
I ( θ ) = E [ 2 ln f Z ( z | θ ) θ 2 ] = 2 α ( θ ) θ 2 ( E [ ln Z ] ln θ + 1 2 α ( θ ) ) + α ( θ ) θ ( 1 θ + α ( θ ) θ 1 2 α ( θ ) 2 ) ( 2 β ( θ ) θ 2 1 β ( θ ) 2 ( β ( θ ) θ ) 2 2 β ( θ ) 3 ) ( E [ Z ] θ ) + β ( θ ) θ 1 β ( θ ) 2 ,
where E [ Z ] is equal to θ by Equation (A22), and E [ ln Z ] is calculated using second-order Taylor’s approximation, and calculated as
E [ ln Z ] = ln E [ Z ] Var [ Z ] 2 E [ Z ] 2 = ln θ 1 2 α ( θ ) .
Using Equation (A33), Equation (A32) can be rewritten as
I ( θ ) = α ( θ ) θ ( 1 θ + α ( θ ) θ 1 2 α ( θ ) 2 ) + β ( θ ) θ 1 β ( θ ) 2 .
Fisher information I ( θ ) is calculated as
I ( θ ) = N P r 2 ( θ 2 + 4 P r θ + 2 P r 2 ) + 2 θ 2 ( θ + P r ) 2 θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) 2 .
When the number of samples is sufficiently large, Equation (A35) is simplified as
I ( θ ) = N P r 2 θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) .
Therefore, CRB is obtained as
Var [ θ ^ ] C R B ( θ ) = θ 2 ( θ 2 + 4 P r θ + 2 P r 2 ) N P r 2 .

References

  1. Lee, E.; Oh, S.; Gerla, M. Randomized channel hopping scheme for anti-jamming communication. In Proceedings of the IFIP Wireless Days, Venice, Italy, 20–22 October 2010. [Google Scholar]
  2. Kristem, V.; Molisch, A.; Christen, L. Jammer sensing and performance analysis of MC-CDMA ultrawideband systems in the presence of wideband jammer. IEEE Trans. Wirel. Commun. 2018, 17, 3807–3821. [Google Scholar] [CrossRef]
  3. Teh, K.C.; Kot, A.C.; Li, K.H. Partial-Band jammer suppression in FFH spread-spectrum system using FFT. IEEE Trans. Veh. Technol. 1999, 48, 478–486. [Google Scholar] [CrossRef]
  4. Hassan, A.; Stark, W.; Hershey, J. Frequency-Hopped spread spectrum in the presence of a follower partial-band jammer. IEEE Trans. Commun. 1993, 41, 1125–1131. [Google Scholar] [CrossRef]
  5. Chang, C.; Tu, T. Performance analysis of FFH/BFSK product-combining receiver with partial-band jamming over independent Rician fading channels. IEEE Trans. Wirel. Commun. 2005, 4, 2629–2635. [Google Scholar] [CrossRef]
  6. El-Mahdy, A. Partial band jamming of multicarrier frequency hopping/binary phase shift keying receiver over a Rayleigh fading channel with imperfect channel estimation. IET Commun. 2010, 4, 285–294. [Google Scholar] [CrossRef]
  7. Phoel, W. Iterative demodulation and decoding of frequency-hopped PSK in partial-band jamming. IEEE J. Sel. Areas Commun. 2005, 23, 1026–1033. [Google Scholar] [CrossRef]
  8. Dizdar, O.; Yilmaz, A. Blind channel estimation based on the Lloyd-Max algorithm in narrowband fading channels and partial-band jamming. IEEE Trans. Commun. 2012, 60, 1986–1995. [Google Scholar] [CrossRef]
  9. Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
  10. Baier, P.; Friederichs, K. A nonlinear device to suppress strong interfering signals with arbitrary angle modulation in spread-spectrum receivers. IEEE Trans. Commun. 1985, 33, 300–302. [Google Scholar] [CrossRef]
  11. Gao, G.; Sgammini, M.; Lu, M. Protecting GNSS receivers from jamming and interference. Proc. IEEE 2016, 11, 1327–1338. [Google Scholar] [CrossRef]
  12. Grover, K.; Lim, A.; Yang, Q. Jamming and anti-jamming techniques in wireless networks: A survey. Int. J. Ad Hoc Ubiquitous Comput. 2014, 17, 197–215. [Google Scholar] [CrossRef] [Green Version]
  13. Ahsan, F.; Zahir, A.; Mohsin, S.; Hussain, K. Survey on survival approaches in wireless network against jamming attack. J. Theor. Appl. Inf. Technol. 2011, 30, 55–67. [Google Scholar]
  14. Dai, W.; Qiao, C.; Wang, Y.; Zhou, C. Improved anti-jamming scheme for direct-sequence spread-spectrum receivers. Electron. Lett. 2015, 52, 161–163. [Google Scholar] [CrossRef]
  15. Laster, J.; Reed, J. Interference rejection in digital wireless communications. IEEE Signal Process. Mag. 1997, 14, 37–62. [Google Scholar] [CrossRef]
  16. Lu, R.; Ye, J.; Li, Y.; Huang, W. A numerical comparison between FHSS and DSSS in satellite communication systems with on-board processing. In Proceedings of the 2nd International Congress on Image and Signal Processing, Tianjin, China, 17–19 October 2009. [Google Scholar]
  17. He, Y.; Cheng, Y.; Wu, G.; Li, S. Performance analysis of coherently detected FFH/BPSK with maximal ratio combining receiver over Rayleigh fading channel with multitone jamming and imperfect channel estimation. In Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 3–6 February 2014. [Google Scholar]
  18. Teh, K.C.; Kot, A.C.; Li, K.H. Performance analysis of an FFG/BFSK product-combining receiver under multitone jamming. IEEE Trans. Veh. Technol. 1999, 48, 1946–1953. [Google Scholar] [CrossRef]
  19. Simon, M.; Omura, J.; Scholtz, R.; Levitt, B. Spread Spectrum Communications Handbook, 2nd ed.; McGraw-Hill: New York, NY, USA, 1994. [Google Scholar]
  20. Lee, H.; Kim, S.; Chung, J. Performance analysis of antijamming by CFAR detector in frequency-hopping spread spectrum systems. J. Korean Inf. Commun. Soc. 2017, 42, 2069–2078. [Google Scholar]
  21. Yading, C.; Gongming, L.; Shaoqian, L.; Yufan, C. A new anti-jam receiver for MFSK/FFH system with multitone jamming. In Proceedings of the 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, 19–21 November 2008. [Google Scholar]
  22. Sehier, P.; Brelivet, P.; Aubry, I. A new jammer estimation method adapted to FH-PSK waveforms. In Proceedings of the MILCOM, Fort Monmouth, NJ, USA, 2–5 October 1994. [Google Scholar]
  23. Sklar, B. Digital Communications: Fundamentals and Applications, 2nd ed.; Prentice-Hall: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  24. Rao, C. Information and accuracy attainable in the estimation of statistical parameters. Bull. Calcutta Math. Soc. 1945, 37, 81–91. [Google Scholar]
  25. Gappmair, W.; López-Valcarce, R.; Mosquera, C. Cramér-Rao lower bound and EM algorithm for envelope-based SNR estimation of nonconstant modulus constellations. IEEE Trans. Commun. 2009, 57, 1622–1627. [Google Scholar] [CrossRef]
  26. Cousineau, D.; Brown, S.; Heathcote, A. Fitting distributions using maximum likelihood: Methods and packages. Behav. Res. Methods Instrum. Comput. 2004, 36, 742–756. [Google Scholar] [CrossRef]
  27. Angelova, J. On moments of sample mean and variance. Int. J. Pure Appl. Math. 2012, 79, 67–85. [Google Scholar]
  28. Chen, Y. Improved energy detector for random signals in gaussian noise. IEEE Trans. Wirel. Commun. 2010, 9, 558–563. [Google Scholar] [CrossRef] [Green Version]
  29. Mudholkar, G.; Trivedi, M. A Gaussian approximation to the distribution of the sample variance for nonnormal populations. J. Am. Stat. Assoc. 1981, 76, 479–485. [Google Scholar] [CrossRef]
  30. Zhang, L. Sample mean and sample variance: Their covariance and their (in)dependence. J. Am. Stat. 2007, 61, 159–160. [Google Scholar] [CrossRef]
  31. Rocktaschel, O. Methoden zur Berechnung der Gammafunktion fur Komplexes Argument. Ph.D. Thesis, University of Dresden, Dresden, Germany, 1922. [Google Scholar]
Figure 1. Block diagram of proposed method.
Figure 1. Block diagram of proposed method.
Applsci 10 01733 g001
Figure 2. Probability-density functions of fitted distributions.
Figure 2. Probability-density functions of fitted distributions.
Applsci 10 01733 g002
Figure 3. Cramér–Rao bound according to (a) bit-energy-to-noise-power spectral-density ratio and (b) number of symbols in a slot.
Figure 3. Cramér–Rao bound according to (a) bit-energy-to-noise-power spectral-density ratio and (b) number of symbols in a slot.
Applsci 10 01733 g003
Figure 4. Detection probability: (a) ρ = 0.0005 , (b) ρ = 0.005 , (c) ρ = 0.05 .
Figure 4. Detection probability: (a) ρ = 0.0005 , (b) ρ = 0.005 , (c) ρ = 0.05 .
Applsci 10 01733 g004
Figure 5. Receiver-operating-characteristic (ROC) curve for ρ = 0.05 .
Figure 5. Receiver-operating-characteristic (ROC) curve for ρ = 0.05 .
Applsci 10 01733 g005
Figure 6. Bit-error-rate (BER) performance: (a) ρ = 0.0005 , (b) ρ = 0.005 , (c) ρ = 0.05 .
Figure 6. Bit-error-rate (BER) performance: (a) ρ = 0.0005 , (b) ρ = 0.005 , (c) ρ = 0.05 .
Applsci 10 01733 g006aApplsci 10 01733 g006b
Table 1. Experiment parameters.
Table 1. Experiment parameters.
ParametersValues
Bandwidth1 MHz
Modulation scheme π / 4 differential QPSK
Repetition (the number of slots)4
E b / N 0 12 dB
ρ 0.0005, 0.005, 0.05
Channel modelRician channel
P f a 10 10
Number of symbols in a slot50
Table 2. Root mean squared errors (RMSEs) of moments of fitted distributions.
Table 2. Root mean squared errors (RMSEs) of moments of fitted distributions.
DistributionRMSE ( μ 1 )RMSE ( μ 2 )RMSE ( μ 3 )RMSE ( μ 4 )
Gamma 6.03   ×   10 7 2.03   ×   10 7 3.23   ×   10 8 3.60   ×   10 9
Normal 3.71   ×   10 6 2.62   ×   10 7 1.44   ×   10 7 1.89   ×   10 8
Weibull 1.52   ×   10 5 7.63   ×   10 7 2.41   ×   10 7 9.40   ×   10 9

Share and Cite

MDPI and ACS Style

Lee, H.; Ahn, J.; Kim, Y.; Chung, J. Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator. Appl. Sci. 2020, 10, 1733. https://doi.org/10.3390/app10051733

AMA Style

Lee H, Ahn J, Kim Y, Chung J. Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator. Applied Sciences. 2020; 10(5):1733. https://doi.org/10.3390/app10051733

Chicago/Turabian Style

Lee, Hojun, Jongmin Ahn, Yongcheol Kim, and Jaehak Chung. 2020. "Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator" Applied Sciences 10, no. 5: 1733. https://doi.org/10.3390/app10051733

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop