1. Introduction
Cognitive Radio (CR) is proposed as a promising solution to the spectrum scarcity and inefficient spectrum utilization problems, by enabling its capabilities of Opportunistic Spectrum Access (OSA) [
1,
2,
3]. CR has received significant interest, specifically in TV white spaces (TVWS) [
4,
5,
6,
7], 5G [
8], and 6G networks, where the Secondary Users (SU) sense a wide range of radio spectrum and dynamically alter their transmission parameters to access the spectrum licensed to Primary User (PU). For example, 5G NR Release 16 proposes Dynamic Spectrum Access (DSA) which is a new approach that allows the co-existence of Long-Term Evolution (LTE) and 5G in the same frequency band [
9]. Moreover, it is recommended that the communication system and radar will use the same spectral band [
10]. Therefore, spectrum sensing plays a fundamental role in CR-based Dynamic Spectrum Access (DSA) techniques.
Several sensing methods have been introduced in the previous decades, including the energy detector (ED) [
11], the matching filter detector (MFD) [
12], and the cyclostationary feature detector (CFD) [
13]. Because of its ease of implementation and lack of need for signal knowledge, ED is included in IEEE 802.22. However, it fails in situations where low-power signals are needed to be detected. On the other hand, MFD is the best detector, but it requires extensive knowledge of the transmitted signal and, therefore, needs a dedicated receiver architecture, which makes it inadequate for use in many practical spectrum-sensing applications in the context of CR. On the other hand, CFD not only detects the signals in low-SNR conditions but also has the potential to differential the legitimate signals from interference [
14,
15]. CFD exploits the built-in periodicity in man-made signals, such as carrier frequencies, and symbol rates, to differentiate between communications signals [
16]. It computes the spectral correlation function (SCF) of signals that is, in fact, the Fourier Transform of cyclic auto-correlation function (CAF), and hence it produces different patterns for different communications signals under the consideration [
17,
18]. Therefore, SCF can be used to differentiate between modulated legitimate signals and potentially malicious waveforms.
In most cases, CR monitors the wideband spectrum to find the multiple idle sub-bands for data transmission, hence increasing the throughput of the system. However, the bandwidth of the scanned wideband signals is very large, from a few hundred MHz to several GHz; therefore, as a result of the Nyquist rate sampling bottleneck, the analog-to-digital (A/D) converters with significantly high resolution and computational power are needed which results in heavy memory overhead and power consumption. On the other hand, Compressed sensing (CS) [
19] is a revolutionary signal processing technique that alleviates the requirements of Nyquist sampling rates on the condition that the signal under observation is scant in a proper domain. Hence, the fundamental need for CS in order to be used for spectrum sensing is signal sparsity, which is a practical assumption in the case of CR networks due to the fact of spectrum underutilization by primary system [
1]. As a result of the PU’s low spectral occupancy, the wideband signal is sparse in the frequency domain. To find the sparsest solution for wideband signal, CS requires non-linear optimization, which can be accomplished using greedy algorithms, for example, Matching Pursuit (MP) [
20] or Orthogonal MP [
21]. Another method is Basis Pursuit (BP) that uses Convex Programming to estimate the wideband. The SCF of the detected signals in the reconstructed wideband (WB) spectrum, must then be estimated by CFD. One method that has emerged is to first recover the WB at the Nyquist rate from sub-Nyquist samples, then find the SCF of each occupied sub-band signal and extract features. This method is described in [
22]. The author used a modulated wideband converter (MWC) to recover Nyquist samples [
23]. In contrast, the authors of [
24,
25] used a different method to compute SCF directly from sub-Nyquist samples by using sparsity in both cyclic and angular frequency domains.
Although CR technology was initially introduced as a solution for OSA, due to its intelligent nature it has also raised serious concerns about communications security. Due to its sensing capabilities, CR node can monitor activities over a wide range of the spectrum, and, therefore, is able to disrupt the ongoing communications by launching smart jamming attacks [
26,
27]. Further, it can imitate the legitimate user and conduct the primary user emulation (PUE) attacks [
28]. Because the radio communications channel is unprotected, therefore, the physical layer (PHY-layer) is particularly vulnerable to radio frequency (RF) jamming assaults. As a result, the need for communications security in the Cyber-Physical Systems (CPSs) and Internet-of-Things (IoT) frameworks [
29], has forced the development of a suitable paradigm. The SHIELD project, which incorporates approaches and algorithms for creating secure embedded communication systems [
29], is a significant progress in this direction. TVWS [
30] technology has also addressed the issue of detecting unauthorized users.
Our article focuses on stealthy jamming attacks; such jammers embed the spectrum sensing capability and therefore, only initiate transmission once energy is detected in a frequency band and terminate its transmission once the targeted signal stops transmission. Hence, such jamming attacks are hard to spot using conventional detection methods on the network layer. Most of the previous studies that explore RF jamming assumed tone-jamming attacks [
31,
32]. However, in more recent works [
33,
34], authors showed that modulated pulsed jamming attacks could be more effective than tone jamming in power-constrained environments; therefore, they are studied in this work. Moreover, a stealthy jammer embeds a feature detector (FD) and therefore extracts features of the targeted signals and identifies their modulation schemes, hence using the best jamming scheme to jam the targeted signal. A reliable detection technique is required to design an anti-jamming system to mitigate stealthy jamming attacks. Therefore, this work introduces a robust and energy-efficient algorithm to not only detect stealthy jamming attacks but also classify legitimate modulated signals. The key contributions of the article are as follows: (i) using CS, CFD, and artificial neural networks, classify the multiple available NB signals in the WB spectrum into their corresponding modulation schemes; and (ii) detect stealthy modulated pulse jamming attacks using the previously trained artificial neural network.
Our newly proposed algorithm can be explained as follows. The CR node scans a WB spectrum made up of M sub-bands. The WB is sparsely occupied with narrow-band (NB) communications, which could be either licit or blocked by the stealthy jammer. Compressed sensing is exploited to ease the requirements of Nyquist rate sampling and the WB spectrum that is sparsely occupied is reconstructed from sub-Nyquist samples. Then each NB signal in WB is sent to CFD which computes the SCF and the corresponding frequency (f) profile and cycle () frequency profile are used as a feature vector for training the artificial neural network that classifies signals as legitimate communications with a specific modulation type or as jammed by a pulse-modulated stealthy jammer. The algorithm’s performance is further evaluated with an independent set of signals that are obtained at different compression ratios and SNRs from the one used in the previous stage. The algorithm has been shown to achieve high accuracy for both jammer detection and signals classification at low compression rates and SNRs compared to techniques discussed in the literature.
The rest of the article is structured as follows.
Section 2 details the materials and methods.
Section 3 illustrates and discusses the results and in the end, the article is concluded in
Section 4.
2. Materials and Methods
We assumed a WB signal of
W Hz divided into M sub-bands is at the disposal of the CR node. The received WB signal is given as
shows the
k-
NB signal,
is the
k-
Rayleigh fading channel coefficient, * represents the convolution operation, and n(t) denotes the AWGN. NB signals
were produced using various modulation techniques, for example, binary modulation schemes such as binary phase shift keying (BPSK), binary amplitude shift keying (BASK), binary frequency shift keying (BFSK) and multi-level modulation schemes such as quadrature amplitude modulation (QAM), quadrature phase shift keying (QPSK) as depicted in
Figure 1. Moreover, the PUs in the vicinity may adopt any other modulation scheme over time.
For our system model, it is considered that the stealthy jammer embedded an FD, making it capable of identifying the modulations of the targeted signal and employing the most effective jamming techniques against them, as presented in
Figure 1. The pulsed (modulated) jamming is especially successful in energy-constrained conditions, and the jamming strategies against different target signals are provided in
Table 1. The transmitted signals are generated by the signal model:
here
A denotes the amplitude of the transmitted signal,
represents the root-raised-cosine filter (RRC) pulse shaping filter with a roll-off factor
,
denotes the symbol period,
denotes the symbol rate, and,
M denotes the number of phases,
denotes the carrier frequency, and
denotes the
i-th transmitted symbol.
2.1. Compressed Sensing
The WB signal can be represented in the frequency domain by taking the discrete Fourier transform of the
in (1):
here
is equivalent frequency domain WB signal,
is a channel matrix, and
,
, and
are acquired frequency-domain samples of
,
, and
, consecutively.
WB signal
in (2) could be expressed in a more generalized form as given below:
here
represents the NB received signals in frequency domain, and
is the corresponding channel matrix. From Equation (
3), it can be noticed that the WB sensing needs to measure the
when
and
are provided. Since a sparse WB signal is at its disposal, the receiver can exploit the compressed sensing, a sub-Nyquist signal recovery technique, to alleviate the Nyquist rate A/D sampling requirements. A number of computationally efficient techniques, for example, Orthogonal Matching Pursuit (OMP) [
21] or Basis Pursuit [
35], were used to estimate the received signal accurately from the samples acquired at the sub-Nyquist sampling rate. The receiver needs to collect the compressed time domain samples of the WB signal and, therefore,
measurement matrix is used to obtain a sample vector
of size
from the WB signal
as given:
where
is the discrete-time representations of
at the Nyquist sampling rate with
and
is the
projection matrix. Various schemes are reported in the literature for compressive sampler design such as random sampler [
36] and non-uniform sampler [
37]. It should be noted that
, and given
K compressive samples, the spectrum
could now be obtained in (4), as below:
here
shows white Gaussian noise vector. Due to the under-utilization of the spectrum by primary users in cognitive radio networks framework, the signal vector
is sparsely populated. The sparsity of the signal
is calculated using the
p-norm such as
,
, with
indicating definite sparsity. Therefore, (6) presents a linear regression problem with a sparsely populated WB (
) which could be approximated by solving the linear convex optimization problem:
The problem in (7) is solved using a variety of methods, including Convex Programming, as in BP [
21] which is opted in this work to estimate the sparse WB signal. After obtaining the reconstructed WB using compressive sensing, the SCF is computed for each NB signal in WB, which is given in
Section 2.2.
2.2. Spectral Correlation Function
The NB signal
is treated as a cyclostationary process if the mean and auto-correlation function of the
is periodic with
given as:
Therefore, the auto-correlation of a cyclostationary signal
can be represented by Fourier series.
here,
, where
a is an integer.
is CAF of signal
and can be given by the following equation
as
is periodic, therefore, (10) can be written as
SCF is obtained by taking the Fourier Transform (FT) of
in (11)
where
denotes the SCF of the NB signal
, the
shows cycle frequency and
f represents the linear frequency.
The main advantage of exploiting the SCF for feature extraction is that it is not impacted by background noise because noise is random in nature. Hence, it can also be used in low-SNR conditions. However, the estimated SCF is strongly influenced by how good the WB spectrum was approximated using compressed sensing, which is influenced by signal sparsity and compression rate. SCF of the signals considered in this work, namely, BPSK and QPSK, is depicted in
Figure 2a,b. Because SCF estimation produces a huge amount of data, it cannot be used as a feature vector to train a classifier. As a result, SCF yields two profiles,
-profile and
given in (13) and (14), which are merged to create a feature set, which is then fed to a classifier that is discussed in the following section.
2.3. Classifier and Proposed Algorithm
Artificial Neural Network (ANN) has been employed in different fields for classification problems. Our proposed algorithm uses an ANN classifier because of its successful applications for pattern recognition in both signal and image processing. Moreover, it has the ability to generalize the model to any compression ratio, SNRs, carrier frequency, and symbol rate. These characteristics make it a natural choice for spectrum characterization in the presence of stealthy jamming attacks that use modulated pulses to jam the targeted signal in WB. It is used to characterize the available NB signals in the received WB spectrum into four broad classes, with two legitimate signal classes, namely BPSK and QPSK, and two jamming signal classes, BPSK-jammed and QPSK-jammed. ANN consists of an input layer with 100 neurons related to the input features vector, one hidden layer that contains 16 neurons, and an output layer associated with targeted output classes. The hidden layer uses the sigmoid as a transfer function which is given as
The ANN like all other supervised learning algorithms works in two stages. First, the ANN is trained offline and then tested online. For training the ANN, we used a back-propagation algorithm, namely, scale conjugate gradient [
38]. The output layer produces four outputs between 0 and 1, corresponding to each class of signal, and the class with the highest value between (0,1) among the four is marked as the targeted signal class. A large dataset of 48,000 received WB signals, corresponding to different SNRs and compression ratios, is collected. The dataset is split into three parts, 70% is used for training, 15% for validation, and 15% for testing. ANN architecture is trained for hundred runs with the dataset being randomly divided and weights being randomly initialized in each run. An average accuracy of over 98% is reported for true positive classification; hence, increasing the number of layers will not increase accuracy further but only increase the training time. Therefore, the ANN architecture with 16 neurons in a hidden layer that offers the highest accuracy is used for spectrum characterization.
Figure 3 shows the ANN architecture discussed above.
Our proposed algorithm is reported in
Figure 4, where a CR received a WB composed of many NB signals. CR set the compression rate (K/N) to a specific value and used the random sampler to sample the WB signal and collect the related measurement matrix
. Then the WB signal is reconstructed by exploiting BP from sub-Nyquist samples. Following this, the cyclostationary spectral analysis is performed and SCF is computed for each NB signal, and the corresponding features vector is formed by combining the
f and
profiles. The features vector is then used to train the ANN that classifies each NB signal in the occupied subband as a normal communication with a specific modulation or NB signal blocked by the stealthy jammer. In the end, the classifier is tested with an independent dataset.
3. Results and Discussions
A WB of 100 MHZ, divided into 10 sub-bands, is sensed by a CR node. These sub-bands are sparsely populated by NB signals, which are generated using BPSK and QPSK modulations, and a stealthy jammer with modulated pulsed jamming capabilities is considered. The monitored WB signal is affected by AWGN and it is reconstructed through CS by using the BP algorithm. The spectrum analysis is performed at to extract the expert features as AWGN has no spectral correlation due to its random nature. The classification results are shown with the help Test confusion matrix. Further, the algorithm performances are evaluated in both AWGN and multipath Rayleigh fading channels with the independent signal set from the training phase that was created using various SNRs and compression rates.
An ANN architecture is selected by taking in account the procedure outlined in
Section 2.3. The ANN is trained, tested, and validated with a dataset of 48,000 signals, that was created by acquiring WB signals at different compression ratios, and SNRs. Therefore, the performance of the algorithm is independent of these parameters. In
Figure 5, the total accuracy of the ANN-based classifier in the existence of a pulsed modulated stealthy jammer is depicted as a test confusion matrix, demonstrating a classification accuracy of about 98.5%. The test signals account for 15% (7200) of the entire recorded signals in the dataset. Further, it can be seen from the figure that the licit signals, BPSK and QPSK, are identified with approximately 100% accuracy, whereas for jammed bands, BPSK-Jammed and QPSK-Jammed, the accuracy is 98.3% and 96.3%, respectively.
In the second phase, ANN is further tested online for the 1000 independent samples at multiple SNRs and compression ratios in the AWGN and Rayleigh fading channel.
Figure 6 shows the classification rate at −5 dB for different compression ratios, where, for
ANN classified the BPSK and QPSK with a rate of 0.63 and 0.64 respectively. On the other hand, the jammed sub-bands, BPSK-jammed and QPSK-jammed are classified with an accuracy of approximately 0.60. Then, by increasing the
ratio, more samples are available to reconstruct the WB signal, therefore, SCF has a better estimation compared to the previous case. Hence, accuracy is improved by increasing
to 0.25, it is approximately 0.86 for licit signals (BPSK to BPSK and QPSK to QPSK) and 0.88 for jammed signals (BPSK-jammed and QPSK-jammed). It is possible to infer from the figure that a classification accuracy of about 1 is obtained for
. On the other hand, for the Rayleigh fading channel, the classification rate is significantly low at low compression ratios (0.15–0.4) as compared to AWGN, whereas it is comparable to accuracy achieved at high compression ratios (0.5–1).
The algorithm’s performance is also evaluated at 0 dB and 5 dB, and results are reported in
Figure 7 and
Figure 8, respectively. A similar trend is observed when
is moved from 0.15 to 1. Classification performance is increased, for instance, the classification rate at 0 dB for
is approximately 0.72 as compared to 0.63 at −5 dB for un-jammed BPSK and QPSK signals, and similarly, the trend is noticed for the signals jammed by stealthy jammer (BPSK-jammed and QPSK-jammed) and it is 0.71, compared to 0.60 at −5 dB. An accuracy of approximately 100% is attained at and above
, which shows that the ANN correctly identifies all the signals. Similarly, it can also be inferred from
Figure 8 that an accuracy of 100% is also achieved for
at 5 dB.
The results show that even at low SNR −5 dB and 50% of Nyquist rate samples, the algorithm correctly classified all the signals to their targeted classes. Further, it is possible to get an error-free classification by using only 25% of Nyquist rate samples at 0 dB to reconstruct the WB signal. The algorithm obtained such a high performance because SCF of various types of communications signals produces highly diverse patterns, and hence yields highly distinct feature vectors. Further, the algorithm is shown as a robust and energy-efficient tool to recognize signals at low SNRs and compression ratios.
Our novel algorithm ensures high accuracy when compared to techniques reported in the literature [
32,
39,
40,
41,
42] that required 10–20 dB SNR to achieve comparable performances. Further, the performance of our algorithm is compared to work in [
43] where classification was performed using the traditional databases matching method. The authors used the same set of signals as considered in our work. They acquired signals only at 0 dB by varying compression ratio between 0.25 to 1 under the AWGN channel conditions.
Figure 9 shows that embedding the ANN to the spectrum characterization algorithm not only increased the signal classification accuracy but also remarkably increased the detection rates for the jammers. The detection rate for the jammer is about 1 for
at 0 dB as compared to 0.45 (average) in database parameters matching methods. Moreover, ref. [
43] could only able to detect the jammer with a rate of 0.9 at Nyquist rate sampling. On the other hand, in [
32], the algorithm used features like bandwidths, center frequencies, and maximum amplitude of the PSDs of the signals for the naive Bayes Classifier (NBC). They acquired the signals at 5 dB and 10 dB by varying the compression ratios between 0.7 and 1 under the Rayleigh fading channel. Our algorithm performance is compared for Rayleigh fading channel with this technique in
Table 2 and the result shows that our newly developed algorithm outperforms this technique both in terms of jammer detection and signal classification rates. The algorithm in [
32] is able to classify the un-jammed modulated signals BPSK and QPSK at 5 dB with a rate of 0.76, 0.80, 8.80, and 0.82 for K/N of 0.70, 0.80, 0.90 and 1, respectively. Similarly, for BPSK-Jammed and QPSK-Jammed, the jammer detection rate is 0.40, 0.48, 0.59, and 0.70 for K/N of 0.70, 0.80, 0.90, and 1, respectively. Our approach, on the other hand, obtained signal classification and jammer detection rates of 1 for all K/N (0.7 to 1). Further, it can be noticed from
Figure 6 and
Figure 7 that our algorithm obtained a total classification rate of approximately 0.9 and 0.95 at −5 dB and 0 dB, respectively, in Rayleigh fading environments for the compression rate of 0.50. These high performances are acquired by using SCF of the signals, which is highly distinct for different signals, along with the ANN classifier.