Next Article in Journal
A Multi-Feature Semantic Fusion Machine Learning Architecture for Detecting Encrypted Malicious Traffic
Previous Article in Journal
Triple-Shield Privacy in Healthcare: Federated Learning, p-ABCs, and Distributed Ledger Authentication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detecting Jamming in Smart Grid Communications via Deep Learning

by
Muhammad Irfan
1,*,
Aymen Omri
2,
Javier Hernandez Fernandez
2,
Savio Sciancalepore
3 and
Gabriele Oligeri
1
1
College of Science and Engineering, Hamad Bin Khalifa University, Doha 5825, Qatar
2
Iberdrola Innovation Middle East, Doha 210177, Qatar
3
Eindhoven Artificial Intelligence Systems Institute, Eindhoven University of Technology, 5612 Eindhoven, The Netherlands
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2025, 5(3), 46; https://doi.org/10.3390/jcp5030046
Submission received: 12 March 2025 / Revised: 14 May 2025 / Accepted: 20 May 2025 / Published: 15 July 2025

Abstract

Power-Line Communication (PLC) allows data transmission through existing power lines, thus avoiding the expensive deployment of ad hoc network infrastructures. However, power line networks remain vastly unattended, which allows tampering by malicious actors. In fact, an attacker can easily inject a malicious signal (jamming) with the aim of disrupting ongoing communications. In this paper, we propose a new solution to detect jamming attacks before they significantly affect the quality of the communication link, thus allowing the detection of a jammer (geographically) far away from a receiver. We consider two scenarios as a function of the receiver’s ability to know in advance the impact of the jammer on the received signal. In the first scenario (jamming-aware), we leverage a classifier based on a Convolutional Neural Network, which has been trained on both jammed and non-jammed signals. In the second scenario (jamming-unaware), we consider a one-class classifier based on autoencoders, allowing us to address the challenge of jamming detection as a classical anomaly detection problem. Our proposed solution can detect jamming attacks on PLC networks with an accuracy greater than 99% even when the jammer is 68 m away from the receiver while requiring training only on traffic acquired during the regular operation of the target PLC network.

1. Introduction

Power-Line Communication (PLC) technology has witnessed significant market growth due to its ability to utilize the existing electrical infrastructure for data transmission, offering cost-effective and reliable solutions for a range of applications. Recent market analyses estimate that the global Power-Line Communication (PLC) market will grow from approximately USD 9.8 billion in 2022 to USD 38 billion by 2032, with a compound annual growth rate (CAGR) of 14.5% [1]. This growth is driven by increasing adoption across various sectors, including Smart Grid (SG) technology, home automation, and industrial automation. Moreover, in SGs, PLC enhances operational efficiency by enabling real-time monitoring and control, playing an important role in the management of energy infrastructure. Similarly, the proliferation of Internet of Things (IoT) devices includes PLC as a valuable component in smart home networks, enabling seamless communication between devices. Industrial applications are also leveraging PLC for reliable and efficient communication in automation systems. Regionally, Europe and North America hold a significant market share, supported by investments in grid modernization and automation, while the Asia-Pacific region is emerging as a key growth area due to large-scale smart meter deployments and smart city initiatives [2].
As a matter of fact, PLC offers a reliable means of transmitting data through electrical cables since the electrical power infrastructure is already in place, thus enabling PLC technology to provide an efficient and cost-effective solution to communicate in various industrial, commercial, and residential applications [3]. Furthermore, PLC eases the deployment of many SG functions by offering real-time monitoring, load management, and fault detection within the power grid [4]. As described by the authors in [5], PLC is usually classified based on the spectrum it operates in. Ultra-Narrowband PLC (UNB-PLC) operates within a very narrow frequency band, typically below 3 kHz. Its key advantage lies in the ability to filter out significant noise, ensuring reliable communication even in high-noise environments. UNB-PLC transmits data using a single channel and, unlike its counterparts, provides data rates of tens of bits per second, relegating its applications to command-and-control scenarios. Broadband PLC (BB-PLC) operates at higher frequencies (typically between 2 MHz and 250 MHz), achieving high data rates (hundreds of Mbps). Therefore, BB-PLC deployments are more suitable for multimedia streaming and broadband internet access. Finally, an intermediate option is Narrowband PLC (NB-PLC), which operates at lower frequencies (3 kHz to 500 kHz) and is currently used in applications such as smart meters and SG management.
In the context of SG, integrating IoT devices has enhanced capabilities, such as disaster recovery, self-healing, warning systems, and overall reliability [6]. Smart buildings, homes, agriculture, and industrial systems are equipped with IoT sensors to monitor the environment and make intelligent decisions. The digital PLC modem, connected with IoT devices, facilitates data exchange between power utilities and consumers, enabling necessary actions [7].
Despite their many advantages, PLC technologies also face challenges specific to their physical medium, including high levels of background noise. The challenge stems from the inherent properties of power cables, which are designed primarily for electricity distribution rather than efficient data transmission. As the signal propagates through the cable, some of its energy is dissipated as heat due to resistance or reflections [8]. Energy dissipation causes signal attenuation, i.e., a reduction in the signal amplitude, leading to weaker received signals at the destination [9]. Noise from different sources, including Electromagnetic Interference (EMI) from other devices, switching transients, and Radio Frequency (RF) interference, also contribute to signal degradation [10]. At the same time, PLC technologies are vulnerable to traditional cyber-attacks. In this context, Denial of Service (DoS) constitutes a major challenge in PLC. It can be performed through a variety of techniques, including flooding, desynchronization, amplification, false data injection attacks, and jamming. It consists of injecting artificial noise into the communication channel in order to prevent the receiver from detecting the transmitted messages. Jamming is particularly effective since, even if a node detects the attack, reporting the jamming detection event to remote entities is challenging as all communication links should be considered disrupted under a jamming attack. Moreover, distinguishing between a noisy communication line and a jamming attack is particularly challenging due to the high level of noise that affects the PLC channel. This is particularly true for remote network management entities, which cannot easily detect ongoing jamming attacks due to the distance of their monitoring units from the monitored network. Jamming attacks against PLC systems can be detrimental to the overall infrastructure of the target organization as they can lead to disruption of energy services, unpredictable effects on Home Automation Systems (HASs), safety hazards, communication breakdowns, and ultimately negative financial consequences.
Motivation. Jamming attacks in PLC networks are particularly concerning due to their ability to degrade communication without easily distinguishable signatures, especially in noisy environments. The existing solutions, inspired by wireless and wired networks, fail to address the unique challenges posed by the PLC medium. The lack of targeted approaches for robust jamming detection leaves critical infrastructures exposed to operational disruptions and safety hazards. Our research aims to address the gap that arises when the Bit Error Rate (BER) 0 . By employing machine learning techniques, such as Convolutional Neural Networks (CNNs) and autoencoders, we aim to develop a robust jamming detection system specifically designed for PLC environments. Our solution not only addresses the limitations of the existing methods but also considers realistic deployment scenarios, including different adversarial assumptions and heterogeneous channel conditions.
Contribution. In this paper, we introduce a jamming detection technique specifically designed for PLC scenarios under different adversarial assumptions. This paper extends our previous work [11] as per the following points:
  • We consider a brand new scenario that includes “jamming unawareness” during the training of the model, and we compare this scenario with the one previously proposed.
  • We improve our system model by formulating the jamming detection as an anomaly detection problem.
  • We compare the multi-class classification solution from our previous work with the new one-class classification (based on autoencoders).
  • We expand our performance analysis considering multiple parameters, such as channel quality (Signal-to-Noise Ratio (SNR)), training metrics, the level of the Relative Jamming Power (RJP), and the distance of the receiver from the jammer.
Roadmap. This paper is organized as follows. Section 2 reviews the related work, Section 3 describes the considered scenarios, Section 4 discusses the preliminary notions, Section 5 includes the adversary model and provides the details of our solution, and Section 6 presents the evaluation results. Finally, Section 7 comprises the conclusion.

2. Related Work

PLC has paramount importance for communication in power systems, providing a cost-effective and reliable communication solution for SG applications. The possibility to use PLC for indoor and outdoor networks allows it to be used in a wider range of applications. However, its broadcast nature and ease of access to the power grid expose legitimate communicating devices, making them susceptible to malicious attacks and eavesdropping.
PLC networks face unique security challenges due to their dual role in power delivery and communication. These networks are particularly vulnerable to physical-layer attacks due to (i) the widespread accessibility of the power infrastructure, (ii) the difficulty in distinguishing between natural noise and malicious interference [12], (iii) the resource constraints of PLC devices [13], and (iv) the critical nature of SG communications [14]. As SGs usually include resource-constrained devices, traditional cryptographic systems may not be a feasible solution for all devices, thus creating an opportunity for physical-layer security solutions. The topic is not novel for PLC and has undergone thorough examination in numerous research papers [15,16,17,18].
Jamming Detection: Jamming detection has been extensively studied in wireless and other networked domains. Sciancalepore et al. [19] proposed BloodHound+, a technique for early jamming detection on drones leveraging autoencoders. This early detection allows the user to take the necessary actions before the communication link drops. In SG environments, DoS attacks typically manifest as either flooding or jamming. As for flooding attacks, Asri et al. [20] and Jin et al. [21] focused on transport-layer vulnerabilities, while Groat et al. [22] and Zhang et al. [23] addressed network-layer attacks and application-layer attacks, respectively. In contrast, our work focuses on physical-layer data, specifically addressing jamming attacks that manipulate the communication medium itself rather than affecting quality metrics associated with higher protocols. As for jamming attacks in wireless domains, Chatfield et al. [24] implemented anomaly detection systems, while Temple et al. [25] explored geometric delay mechanisms. Further contributions by Husheng [26] and Pelechrinis et al. [27] expanded the background knowledge on wireless jamming characteristics. However, our work addresses the fundamentally different challenge of jamming in PLC networks, where the attack surface and signal propagation characteristics differ significantly from wireless environments. Liu et al. [28] used packet delivery ratio (PDR), received signal strength (RSSI), and Start-of-Frame Delimiter (SFD) features to identify and detect jamming using threshold-based statistics.
Machine Learning for Network Security: Singh et al. [29] proposed the jamming attack detection technique (JADT) to detect jamming for opportunistic networks, which uses PDR and the decryption of acknowledgment sent by the sender; once jamming is detected, it requests the sender to re-transmit the message through a different channel. Katsuri et al. [30] used an ML-based technique to detect and classify the types of jamming attacks. They validated the results through a simulation study considering reactive, random, and constant jamming interference. Another study [31] used the BER and bad packet ratio and an energy statistic to detect the jamming for the automatic dependent surveillance-broadcast (ADS-B) system. Supervised machine learning algorithms such as support vector machine (SVM), k-nearest neighbor (kNN), artificial neural network (ANN), and decision tree were employed. The ANN outperformed with the given set of features.
In [32], the author proposed the detection of jamming considering shallow neural networks aided by dimensionality reduction at the gateway level of the network, considering three different types of jamming signals, namely constant, random, and reactive. Upadhyaya et al. [33] used an ML-based approach to detect jamming in a wireless IoT network by collecting the signal strength indication received from five anchor nodes at minimal communication cost.
In the context of anomaly detection in an Industrial Control System (ICS), the authors of [34] used autoencoders to encode normal profile data and then detect anomalies based on the reconstruction error. Lu et al. [35] devised a genetic-algorithm-based Cumulative Sum (CUSUM) approach to the real-time detection of jamming attacks in distributed and centralized Cyber–Physical Systems (CPSs).
Radio Frequency Fingerprinting: Radio Frequency Fingerprinting (RFF) leverages the unique hardware imperfections inherent in radio frequency front ends to enable device authentication. RFF-based solutions have emerged as a highly promising alternative to traditional cryptographic and localization-based methods for device identification and authentication [36]. Beyond authentication, RFF techniques have found applications in intrusion detection systems, device tracking, autonomous vehicles, and unmanned aerial vehicles (UAVs) [37]. Ross et al. [38] employed Multiple Discriminant Analysis and Maximum Likelihood (MDA/ML) classifiers to differentiate among six PLC devices, achieving an intrusion detection accuracy of 90%. Their approach utilized physical-layer features extracted from X10 protocol-based devices. In another study, Timothy et al. [39] demonstrated that augmenting the physical layer with Constellation-Based Distinct Native Attribute (CB-DNA) features derived from unintentional Ethernet cable emissions can significantly enhance network security, achieving Rogue Reject Rates between 85.2% and 93.1% at SNR levels above 26.0 dB.
Research Gap in PLC Jamming Detection: As shown in Table 1, the existing jamming detection approaches span various domains, and none of them address the task of detecting jamming attacks to PLC networks at the physical layer, particularly under low-BER scenarios. Some of the proposed solutions already exploit physical-layer information but consider different communication media, e.g., wireless networks [19,30,32]. Other solutions consider the SG scenario but resort to higher-layer metrics, e.g., PDR, thus being able to detect the presence of the jammer when it already affects the quality of the link [35]. Finally, as highlighted in Table 1, we stress that our analysis is the first one to (i) consider different assumptions at the receiver side, i.e., the receiver might or might not be exposed before (during training) to the presence of the jammer, (ii) estimate the performance of the jamming detection as a function of the distance between the jammer and the receiver, and, finally, (iii) evaluate the performance of the detection as a function of the jamming power.
In our previous work [11], we formulated jamming detection as a classification problem under the assumption that the model has been trained on jamming signals; i.e., the receiver is aware of the shape of the jammed signals and, therefore, trains the model on both jammed and non-jammed samples. In real-world scenarios, this might be difficult. Therefore, in this work, we assume that we have access to only clear signals transmitted and received in the presence of noise typical of the PLC medium. Therefore, we only train our model on clear samples (non-jammed signals) and compare the performance with the previously proposed solution. To the best of our knowledge, no previous work focused on the detection of jamming in PLC infrastructures under a low-BER regime.
Table 1. Comparison of jamming detection approaches in different domains with respect to scenarios, techniques, and performance metrics.
Table 1. Comparison of jamming detection approaches in different domains with respect to scenarios, techniques, and performance metrics.
PaperJamming SignalTechniqueScenarioSignal RepresentationApplicationJamming Detection in RegimeAdversary ProximityJamming
Jamming-Pattern-Aware Jamming-Pattern-Unaware
OurAWGNSpare Autoencoders/CNNIQ SamplesPLCNo-BER
 [40]Sine, GaussCNNIQ SamplesWireless NetworkBER
 [19]Sine and GaussianSparse AutoencoderIQ samplesDroneBER
 [35]AWGNGentic CUSUM-Smart Grid-
 [29]RandomStatistical Process ControlPDROpputnistic NetworkLow PDR
 [30]Constant, Reactive, randomGradient Boosting AlgorithmPDR and RSSAd hoc networkLow PDR
 [32]Constant, Reactive, randomShallow Neural NetworkPDRWireless NetworkLow PDR
 [33]RandomRandom ForestRSSIWireless Network---
 [20]GaussianEuclidean DistanceRSSI and Packet Loss RateAMIPacket Loss Rate
 [34]-AutoencoderTime series dataICS---

3. Scenario and Adversary Model

In our reference PLC network shown in Figure 1, there are three main entities: Alice ( A ), Bob ( B ), and Eve ( E ). A  and B  are legitimate parties within either a home area network or local area network, communicating over the PLC in the presence of an adversary, E . E aims to disrupt the communication between A and B . At the receiver side ( B ), the signal can be represented as
Y B ( t ) = h A B X A ( t ) + h E B J E ( t ) + n ( t )
where X A ( t ) represents A ’s legitimate signal with complex channel gain h A B , J E ( t ) denotes E ’s jamming signal with complex channel gain h A B , and  n ( t ) is the external noise component.
Detecting the presence of the jammer component ( h E B J E ( t ) ) in a link affected by noise n ( t ) is a challenging task. There are two assumptions we can make before going ahead with our analysis: (i) the receiver is aware of the shape of jammed signals, and, therefore, it had the opportunity to collect and analyze jammed samples before the actual detection process starts, or (ii) the receiver is not aware of the shape of jammed signals, and, therefore, it has never been exposed to jammed samples before the detection process is initiated.
Scenario 1: Awareness of Jammed Signals. In the first scenario, we consider the case where both jammed and non-jammed data samples are available, enabling a supervised learning approach. The detection system utilizes labeled training data from both classes—“jammed signal” and “non-jammed signal” (see Section 5)—to develop a robust binary classification model for jamming detection. While this approach effectively identifies known attack patterns, it faces several significant challenges. First, collecting and maintaining representative jamming samples requires substantial effort, particularly as E ’s jamming techniques evolve over time. Second, the system must accurately differentiate between intentional jamming attacks and the noise due to the communication link. Finally, maintaining a balanced dataset between clear and jammed samples is crucial for maximizing the classification performance.
Scenario 2: Unawareness of Jammed Signals. The second scenario presents a more realistic case where only clear (non-jammed) samples are available for training. This scenario employs an unsupervised learning approach, where the system builds a profile exclusively from clear (legitimate) data to detect anomalies. During the training phase, the model is exposed only to “non-jammed” signals, learning to characterize normal behavior patterns and identify potential attacks as deviations from these patterns. The detection mechanism relies on establishing appropriate thresholds to distinguish between normal operations and potential anomalies. This approach is characterized by the following challenges: determining the best threshold values that balance detection sensitivity with false alarm rates, discriminating between new attack patterns and legitimate signal variations, and adapting to changes in normal operating conditions.

4. Background

In this section, we introduce background concepts about (a) digital modulation (Section 4.1), (b) Convolutional Neural Networks (CNNs) (Section 4.2), and (c) autoencoders (Section 4.3), which are preparatory for the subsequent analysis.

4.1. Digital Modulation

Digital modulation schemes are widely adopted in communication systems independently of the medium, i.e., wired or wireless, to exchange signals at high frequencies [41]. There are several modulation techniques available for transmitting information from a source to a receiver device, such as Amplitude Modulation (AM), Frequency Modulation (FM), and Phase Modulation (PM). Each of these techniques has advantages and disadvantages; for example, FM is used for simple data communication links, but it does not provide good spectral efficiency [42].
Binary Phase-Shift Keying (BPSK) is the simplest and most noise-robust phase modulation technique, and it is largely used in PLC networks [43,44]. According to this technique, the phase is shifted (modulated) at 0 and 180 to transmit bits with values 0 and 1, respectively. Figure 2 shows a schematic representation of BPSK, highlighting the main components. BPSK modulates two symbols { 0 , 1 } by changing the phase of the reference carrier; i.e., when b = 1 , the phase ϕ becomes ϕ = π rad and ϕ = 0 when bit b = 0 is being transmitted, as defined by Equation (2).
x ( t ) = c o s 2 π f c t + ϕ ,
where f c is the carrier frequency of the signal, and  x ( t ) represents the modulated PLC signal to be transmitted. The transmitted stream is translated into two orthogonal components, I (real) and Q (imaginary), represented as complex values I + j Q . These orthogonal components are assembled at the receiver to recover the transmitted bit stream. A typical representation of the real and imaginary components of the signal is by resorting to the IQ plane. We show an example of such a representation from real data in Figure 3, where the red crosses show the ideal values of the IQ samples and the clouds of black dots represent the actual positions of the IQ samples. The actual received samples are mapped to different positions due to internal (hardware) and external (environment) noise. At the receiver end, IQ samples are converted into expected symbols (0 or 1) based on a decision threshold. Both external and internal noise factors are important for communication. Noise affects the received IQ samples, and, thus, the chances of data corruption increase as noise increases (↑ BER). In contrast, in this work, we exploit the displacement of the IQ samples introduced by the hardware imperfections at the transmitter side to evaluate the feasibility of performing Radio Frequency Fingerprinting of the PLC channel.

4.2. Convolutional Neural Networks

A category of Deep Learning (DL) models known as CNN recently brought a paradigm shift in the domains of computer vision and image processing. Neural networks possess the ability to learn and extrapolate data, making them indispensable assets in an extensive spectrum of applications, including, but not limited to, object detection [45,46], medical imaging [47,48], as well as face detection and recognition [49,50,51,52].
CNNs consist of neurons that refine their performance through the learning process. Each neuron receives an input and executes operations, such as a scalar product, followed by a nonlinear function. Typically, a CNN architecture is defined as a sequence of convolutional layers, pooling layers, and fully connected layers primarily dedicated to pattern recognition in images. A typical representation of a CNN is provided in Figure 4, where the input layer serves as the model’s input, and the output layer provides class predictions.
The primary role of the convolutional layer is to extract features. In contrast, the pooling layer conducts down-sampling to enhance computational efficiency and broaden the receptive field. Fully connected layers are commonly used in the later stages of a CNN, following convolutional and pooling layers, to perform advanced feature extraction and ultimately generate predictions. A convolutional layer has a kernel, also called a filter, that is convoluted with the input to the layer to generate a new feature map.
Activation functions are used to introduce nonlinearity to CNNs; some common activation functions are the Rectified Linear Unit (ReLU) [53], sigmoid, and tanh [54], to name a few. The activation value of a feature map z i , j , k l of the layer l at location (i,j) is passed to obtain the corresponding feature map’s activation value. Finally, the pooling layers are introduced to reduce the dimensionality of the data while simultaneously facilitating the extraction of critical features from the local neighborhood. These operations serve to diminish the susceptibility of the model to overfitting and provide the desirable property of shift invariance.

4.3. Autoencoders

Autoencoders use a dimensionality reduction process to detect anomalies in the data. They assume that data are correlated and can be compressed into a lower-dimensional subspace where regular and anomalous data appear significantly different. An autoencoder tries to find the encoder that reduces the input dimension d to p, A : R d R p . Then, a decoder maps the latent representation of the encoder p to the original input space d, B : R p R d , which satisfies Equation (3).
a r g min A , B E [ Δ ( x , B A ( x ) ] ,
where E represents the expected distribution of the input data x, and  Δ is the reconstruction loss function to measure the distance between the input and the output of the decoder [55]. In our case, the loss function Δ is the Mean Squared Error (MSE) function, in line with other relevant scientific research such as [19,55,56], and defined as per Equation (4) on distributions x and y.
M S E ( x , y ) = 1 d · | | x y | | 2 2 , x , y R d ,
Different variants of autoencoders are available, including regularized autoencoders, variational autoencoders, and sparse autoencoders [57]. Even when the bottleneck consists of a single node, overfitting remains a concern if the encoder and decoder capacities are sufficiently large to encode each sample into an index. Autoencoders involve a crucial trade-off between minimizing the reconstruction error for effective input reconstruction and ensuring that the low-dimensional representation generalizes meaningfully.
Historically, autoencoders have primarily found application in image generation, specifically in generating image sets that resemble the input data. However, security researchers take advantage of autoencoders, especially for anomaly detection, i.e., to detect the occurrence of abnormal events beyond the usual ones. For example, assume that an autoencoder a e is trained with a probability distribution P of clear samples, and Q is the distribution of malicious samples not used during the training process. Then, any unseen test sample with the same statistical distribution of P exhibits a smaller reconstruction error (calculated using Equation (4)). This reconstruction error is used to set a threshold to classify the testing dataset as either an anomaly or regular.

5. Theoretical Framework and Methodology

This section describes the methodology we followed to design and test our solution. Our approach aims to detect jamming attacks when standard techniques fail because they rely on higher-layer link-quality estimation techniques, e.g., BER. Detecting jamming attacks when BER is affected might be too late since the communication link might be broken. In contrast, our solution can identify jamming attacks when the communication link quality is still high (BER close to zero). Indeed, while we assume that the communication parties in close proximity to the jammer cannot communicate (raising alarms about the presence of the jammer), our solution allows the detection of the jamming source further away with respect to standard solutions, i.e., from a larger (geographical) distance between the jammer and the receiver where communication between the parties is still possible, thus allowing to raise an alarm about the presence of the jammer.

5.1. Theoretical Framework

As previously described regarding the two scenarios in Section 3, this section develops the theoretical framework for our reference scenario model. We consider a standard BB-PLC network deployed in a residential environment, as illustrated in Figure 5.
The network comprises various devices engaged in communication through the power-line medium. Our work focuses on the detection of denial of service attacks (jamming) to the communication between A and B by a malicious entity ( E ). In the reference scenario, the adversary ( E ) strategically uses a jamming attack, injecting a disruptive signal into the PLC network with the explicit goal of disrupting the communication between A and B . Within the framework of the PLC channel model (depicted in Figure 6), the parameters h A B and h E B model the intricate channel gains characterizing the A B and E B links, respectively. The inclusion of Additive White Gaussian Noise (AWGN), denoted as n B , further underscores the complexities inherent in the communication channels under consideration. This comprehensive analysis improves our understanding of the disruptive mechanisms orchestrated by the adversary within the PLC network. Consequently, we can model the instantaneous Signal-to-Noise Ratio (SNR) at B as per Equation (5).
γ A B = P T H A B P J H E B + N B ,
where P T represents the transmit signal power, P J denotes the jamming signal power, H X B is the squared magnitude of the complex channel gain h X B (where X { A , E } ), and  N B is the corresponding noise power. We model the PLC channels as Rayleigh-fading channels, in line with the existing literature [58,59,60], with the Probability Density Function (PDF) expressed as follows
f H X B ( x ) = 1 H ¯ X B ( F C , d X B ) exp x H ¯ X B ( F C , d X B ) ,
where H ¯ X B ( F C , d X B ) denotes the mean of H X B , representing the average frequency–distance-dependent PLC channel attenuation. F C is the carrier frequency, and d X B is the distance associated with the X B link. According to [60], H ¯ X B ( F C , d X B ) is expressed as per Equation (7).
H ¯ X B ( F C , d X B ) = exp 2 a 0 + a 1 F C a 2 d X B ,
Here, a 0 , a 1 , and  a 2 denote PLC signal attenuation parameters pertinent to the PLC environment. Table 2 provides a comprehensive overview of the primary notation utilized in this manuscript, along with the corresponding parameter values used later for evaluation purposes.
The PLC system employs Orthogonal Frequency Division Multiplexing (OFDM) with N S C sub-carriers per OFDM symbol. The Fast Fourier Transform (FFT) of size N F F T is used for OFDM modulation and demodulation, with sub-carrier spacing Δ f between adjacent frequencies. Each frame consists of N S y m b F r m OFDM symbols, and, for our total simulation time T S i m , we use N F r a m e frames, resulting in a total of N S y m b OFDM symbols transmitted during the experiment.
In the remainder of this section, we will discuss the main tasks performed by the receiver to identify the presence of a jammer in the network; recall Figure 1. A preliminary phase in our methodology involves generating images from the collected IQ samples. This phase is not mandatory, but it has been demonstrated that it helps to mitigate the impact of noise, thereby helping the classifier to isolate and identify consistent patterns, i.e., the features of the jammer [11,56]. Subsequently, we treat the jamming detection problem as an image classification problem: depending on the scenario, the classifier is challenged to classify the image as consisting of jammed samples (Scenario 1) or as an anomaly with respect to a baseline composed of non-jammed samples (Scenario 2).
Generation of Images. A baseline solution to detect the presence of a jammer might involve the use of IQ samples (as they are) as the input of the classifier. This methodology has been proven to be prone to (not negligible) misclassifications in the context of wireless communications [61] due to the presence of the physiological noise already present in the communication link, which hides the features of the phenomenon to be detected. In the following, we resort to a pre-processing technique, which turned out to be effective in mitigating the impact of the noise, thus being able to maximize the performance of the classifier. Such a technique involves translating IQ samples into images while resorting to the computation of the bi-variate histogram and mapping the output into an image.
Figure 7 provides details on the pre-processing stage of our solution and, in particular, how IQ samples are translated into images. The dataset is created using the reference model discussed in Section 5.1.
The IQ samples are generated by simulating the physical layer of a PLC channel and then translating the samples acquired from such a channel into images. Our approach is in line with some other pre-processing techniques of IQ-samples [40,56,61]. However, such techniques have never been applied to wired channels, and not even in (very noisy) PLC networks. We conducted an empirical study to choose the number of IQ samples required to create a bi-variate histogram h. Each value of the bi-variate histogram should be ≤ 3 256 1 = 767 , and therefore 634,880 samples are required for each image. We also consider that some IQ samples fall away from the ideal positions b = 0 { Q = 0 , I = 1 } and b = 1 { Q = 0 , I = 1 } due to the noise of the communication link. We filter out such samples by taking the 95 quantile of the I component and the 95 quantile of the Q component. We computed the minimum and maximum values of the I and Q components and used them as the range for the x-axis and y-axis, respectively. Then, we find the bi-variate histogram h by dividing the plane into N × M linearly spaced tiles. Finally, we use the following rule to map each tile to the corresponding pixel value of the specific channel of the RGB image.
  • For values of h ( i , j ) such that 0 h ( i , j ) 255 , the corresponding channel’s pixel values are p R ( i , j ) = h ( i , j ) , p G ( i , j ) = 0 , p B ( i , j ) = 0 .
  • When the range ( 256 h ( i , j ) 511 ) , pixel values are set according to the following mapping: p R ( i , j ) = 255 , p G ( i , j ) = h ( i , j ) 255 , p B ( i , j ) = 0 .
  • When h ( i , j ) > 511 , the pixel values are p R ( i , j ) = 255 , p G ( i , j ) = 255 , p B ( i , j ) = h ( i , j ) 510 .
Table 3 summarizes our dataset configuration. We consider different configurations with the aim of obtaining balanced datasets of jammed and non-jammed samples that can be compared; i.e., all the configurations resort to 750 images. As discussed before, translating IQ samples into images is an important step propaedeutical to the classification process. Therefore, we consider different image resolutions, as depicted in Table 3. In order to achieve uniform dataset sizes when applying different image resolutions, we considered a consistent number of samples, i.e., bit streams of different lengths. Finally, each dataset is composed of 1500 images (750 for X N J and X J each). During the training process, we randomly split X N J into training set T ( 60 % 450 ) and validation set V ( 40 % 300 ). From  X J , we only selected the 40 % set of data to avoid the class imbalance problem for evaluation.
Multi-Class Classification. This methodology is considered when assuming Scenario 1 (jamming awareness); i.e., the model has previously been exposed to images generated from jammed signals. In fact, we consider two datasets, X J and X N J , representing the jammed and non-jammed datasets, respectively. Each X y (where y J , N J ) is divided into three subsets, namely T , V , and  S , each of which constitutes ( 60 % 450 × 2 ( classes ) 900 ), ( 20 % 150 × 2 300 ), and ( 20 % 150 × 2 300 ) of the original dataset, respectively. We employ state-of-the-art CNN classifiers, specifically a CNN based on Residual Network (Resnet-18 and Resnet-50) and Inception-v3, implemented in MatLab2023b. Neural network models are pre-trained using the ImageNet database [62]. The input layers are adjusted to accommodate the output of the bi-variate histogram (image size), set at 224 × 224 , while the output layer is modified to match the two classes of our problem, namely jammed and non-jammed.
Jamming Detection. In this case, we consider Scenario 2, where we assume that the receiver has never been jammed before and has to detect the presence of the jammer by only considering a dataset consisting of images generated from non-jammed signals. Under this assumption, we address the problem of jamming detection by considering sparse autoencoders. The typical architecture of autoencoders is shown in Figure 8. The encoder processes input images of size N × M × 3 . The input is compressed into its corresponding latent space representation via multiple hidden units. In the latter stage, compressed features (latent representation) are decoded into N × M × 3 neurons with the help of a decoder. We stress that, since we assume Scenario 2 during the training process, only X N J (images generated from non-jammed signals) are considered and passed to the autoencoders. The training phase of the autoencoder is shown in Figure 9, where we highlight that only X N J is fed to the model.
To fine-tune the configuration of the key parameters in the autoencoder for Scenario 2, we use a subset of the data not used during the training process, namely the validation set. We use the reconstruction MSE of the training and validation sets to calculate a threshold value τ . If a sample image has a reconstruction MSE greater than τ , it is classified as an anomaly; otherwise, it is considered a legitimate sample. The threshold value should be chosen taking into account the sensitivity to minimal anomalies and false positives, i.e., wrong classification of legitimate events on the channel as jamming. If the threshold is too large, anomalies whose MSE value is close to the model cannot be detected. If the threshold is too small, legitimate channel samples could be mistaken for anomalies. We opted for an empirical selection of the threshold computation technique defined in [63] and formalized in Equation (8).
τ = m e a n ( M S E t r a i n ) + 3 × s t d ( M S E t r a i n ) ,
where M S E t r a i n is the MSE of the training set, m e a n is the statistical average, and s t d is the standard deviation. As demonstrated by the authors in [63], this choice increases the chances of detecting anomalous channel conditions due to jamming. As an example, Figure 10 shows the threshold calculation for three scenarios, with the receiver located at 65 m, 70 m, and 75 m from the jammer (the jammer uses the same transmission power of the transmitter, i.e., RJP = 1). In Figure 10a,b, the jammed samples (test dataset) are characterized by MSE values that are distinct from the non-jammed ones (training and validation sets). In fact, the distribution of the samples collected in the presence of the jammer exhibits higher MSE values than those collected without the presence of the jammer. In contrast, Figure 10c shows a situation where the two distributions (testing and validation sets) are very close to each other; i.e., the jammer is far from the receiver, and its impact cannot be clearly distinguished from the background noise. As a result, the threshold computed with the criteria mentioned above cannot distinguish between anomalous and regular data.

5.2. Hyperparameter Tuning and Statistical Validation

To identify an optimal and statistically justifiable configuration for our autoencoder model, we performed a comprehensive hyperparameter grid search using a controlled and efficient training setup. Specifically, we reduced the number of training epochs to 50 and utilized only 25% of the full dataset for each of the training, validation, and test sets. The subsets of images for training, validation, and testing significantly reduce computation time while still enabling meaningful statistical analysis.
We evaluated the influence of each hyperparameter on classification accuracy using both one-way and N-way ANOVA. The one-way ANOVA results confirmed that the decoder transfer function ( p < 0.0001 ), encoder function ( p = 0.0001 ), sparsity proportion ( p = 0.0499 ), and sparsity regularization ( p = 0.0039 ) had a statistically significant impact on model performance. In contrast, hidden layer size and L 2 weight regularization did not show statistical significance ( p > 0.1 ), suggesting robustness to those parameters.
The N-way ANOVA revealed further interaction effects, most notably between encoder and decoder functions ( p < 0.0001 ), and between sparsity and L 2 regularization ( p = 0.0113 ), indicating the importance of tuning certain parameter combinations jointly rather than independently.
Table 4 summarizes the full hyperparameter search space and highlights the optimal-performing configuration. This configuration achieved a classification accuracy of 0.9867, precision of 0.9740, recall of 1.0000, and an F1-score of 0.9868 using the following parameters: a logsig encoder, satlin decoder, hidden layer size of 32, sparsity proportion of 0.1, sparsity regularization of 10.0, and  L 2 weight regularization of 0.1.
The ANOVA-tuned model benefits from statistically validated hyperparameters, improving generalizability and reducing the risk of overfitting. This demonstrates the effectiveness of principled hyperparameter tuning, even under reduced training budgets.
Box plots shown in Figure 11 further support the ANOVA findings, highlighting substantial accuracy variation across activation and sparsity configurations while indicating minimal sensitivity to hidden layer size and L 2 regularization.

6. Performance Evaluation

In this section, we analyze the performance of our proposed solution. We start by defining the metrics, and then we show that our analysis considers PLC links characterized by negligible BER, i.e., where the jammer does not affect the quality of the communication link, and, finally, we discuss performance for different scenario parameters, i.e., the distance between the jammer and the receiver, the size of the images generated from the IQ samples, and, lastly, the relative jamming power.

6.1. Metrics

We evaluated the performance of our solution in terms of accuracy, precision, recall, and F1-score. Accuracy is defined as a c c = T P + T N T P + T N + F P + F N , where T P (True Positive) indicates how many samples of X J are correctly classified as jammed, F P (False Positive) indicates how many samples of X N J have been incorrectly classified as jammed signals, F N (False Negative) indicates how many samples in X J are wrongly classified as non-jammed, and finally T N (True Negative) indicates how many samples of X N J are correctly classified as non-jammed. We also used the True Positive Rate (TPR) and True Negative Rate (TNR) as evaluation metrics to measure robustness against the number of false alarms (False Positive (FP)) and number of no alarms (False Negatives (FNs)) using the T P R = T P T P + F P , T N R = T N T N + F N . The precision is the ratio of the number of T P to the total number of T P and F P , defined as T P T P + F P . Recall measures the fitness of the model to detect positive labels, defined as T P T P + T N . Finally, the F1-score is the harmonic mean of the recall and precision, defined as 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l .
In the remainder of this work, we will consider the previously defined metrics to compare the performance of our solution while varying different parameters, such as the receiver knowledge (either Scenario 1 or 2), the distance between A and E , and the RJP parameter. In particular, while the scenario choice affects the data and the associated labels considered for training the model, i.e., jammed and non-jammed for Scenario 1 and only non-jammed for Scenario 2, the testing phase is always characterized by two balanced datasets characterized by jammed and non-jammed samples.

6.2. Link Quality

Several metrics have been proposed to measure the reliability of data delivery, such as the BER, packet loss rate, latency, and jitter. In the remainder of this paper, we rely on the BER to measure the impact of the jamming signal on the receiver. We computed the BER by counting the number of corrupted bits at the receiver side with respect to the total transmitted ones. Figure 12 shows the BER as a function of the distance between the jammer and the receiver (x-axis) when varying RJP { 0.1 , 0.35 , 0.6 , 0.85 , 1 } (different curves in Figure 12), i.e., the ratio of the power used for jamming with respect to the power of the transmitter. We consider a scenario where the transmitter and the receiver are 30 m away, and the distance between the jammer and the receiver is a parameter of the system specified in the x-axis of Figure 12. In this regard, as shown in Figure 12, we notice that the BER of the link is always quite low, and, for distances higher than 40 m, it is always zero. Thus, detecting jamming at such a distance through the analysis of the BER is simply ineffective. When the adversary moves away from the receiver, the BER drops. It should be noted that, when the jammer is at the same distance from the transmitter, i.e., 30 m, the BER cannot be greater than 15%, assuming the worst case of a jammer that equals the transmission power of the transmitter (RJP = 1). Another important result from Figure 12 is the distance according to which the BER 0 independently of the RJP. In fact, we observe that, when the distance between the jammer and the receiver is greater than 50 m, BER 0 , recalling that the distance between the transmitter and the receiver is 30 meters.
To detect the presence of noise, whether artificial or malicious, SNR has been commonly used in prior studies to assess link quality [64,65]. The probability density function of SNR is shown in Figure 13, and it is computed using Equation (9), where P r x represents the received signal power and N denotes the noise power.
S N R | d B = P r x | d B N | d B ,
N | d B = 30 + 10 log 10 E [ ( I 2 + Q 2 μ ) 2 ] ,
P r x | d B = 30 + 10 log 10 ( I 2 + Q 2 ) ,
Here, E [ ( I 2 + Q 2 μ ) 2 ] is computed over a sliding window of 10 IQ samples, and  μ is the mean of the magnitude over that window. In Figure 13, the transmitter ( A ) and receiver ( B ) are separated by 30 m, while the jammer ( E ) is placed at varying distances from the receiver, specifically at {30, 40, 50, 60, 65, 70, and 75} m with a fixed RJP of 1.0. The figure shows that, as E  moves away from B , the SNR increases, indicating reduced noise dominance. This results in a more challenging scenario for distinguishing jammed from non-jammed signals based purely on SNR analysis.

6.3. Distance Between the Jammer and the Receiver

For this experiment, we consider E features the same transmission power as A , i.e.,  R J P = 1 , and we vary the distance between E and B while setting the distance A B to 30 m. We consider the two reference use cases introduced in Section 5.1.
Scenario 1. We trained our model by limiting the number of epochs to 15. Figure 14a shows the accuracy of three reference CNNs! (CNNs!), i.e., resnet-18, resnet-50, and inceptionv3, as a function of the distance between E and B . We observe that all three networks are characterized by the same behavior, and the accuracy decreases when the distance E B reaches 76 m: CNN cannot detect the presence of a jammer (more than a random guess) when the distance E B is greater than 90 m (assuming the distance A B equals 30 m).
Recalling Figure 12, we highlight the importance of this finding. In fact, the jammer can be identified when its position is far enough not to affect the quality of the link. In fact, BER 0 when the distance B - E  is between 50 and 76 m.
We also report the average training time for each network in Figure 14b. We recall that the networks have been pre-trained on the ImageNet dataset and designed for the classification of 1000 labels in such a dataset. As previously discussed, we re-trained the network to expose them to images representing IQ samples. Moreover, we adapted the output layers to the number of classes of our problem, i.e., jammed and non-jammed.
Scenario 2. We evaluated the effectiveness of our solution by selecting the optimal parameters, as discussed in Section 5.2. Specifically, we selected the logsig and satlin functions as encoder and decoder transfer functions, respectively, with a sparsity regularization of 10, a sparsity proportion of 0.5 , and a weight regularization of L 2  [66]. We also set the number of epochs to 100, the number of hidden units to 32, and used the K-fold cross-validation with K = 5 .
Figure 14c shows the performance of the classifier (autoencoders) when the jammer ( E ) is moved away from the receiver. We found that the maximum distance where a jammer can be detected is about 68 m. It should be noted that this distance is much less than the one experienced for Scenario 1, i.e., 76 m. In fact, we recall that Scenario 1 assumes the a priori knowledge of jammed signals; i.e., the CNN models have been trained with jammed signals, thus making the model more sensitive to the jamming phenomenon and being able to detect the presence of the jammer further away from the jammer itself.
We also consider the analysis associated with the TP! (TP!) and the TNR, as shown in Figure 14d. We observe that the decrease in accuracy at 70 m (Figure 14c) is justified by the drop in TPR in Figure 14d. In fact, as expected, the TNR is not affected by the distance since the actual challenge is to detect the presence of the jammer at large distances between E and B (TPR). We also evaluated the effectiveness of different combinations of hyperparameters, as discussed in Appendix A.

6.4. Image Size

An important parameter that affects the performance of the classifier is the size of the images considered as the input to the classifier itself. In this section, we investigate the impact of image size on the performance of the classifier. In particular, we only focus on Scenario 2, i.e., jamming detection via autoencoders without prior knowledge of jammed signals. We do not apply our analysis to Scenario 1 since changing the input size for CNN involves significant changes in the input layers of the network, thus making the comparison unfair between the cases considered.
Figure 15a shows the accuracy of the autoencoder as a function of distance E B while considering different image sizes. We observe that image size affects the performance of the classifier: larger images ( 224 × 224 ) allow for the detection of the jammer at longer distances, i.e., 68 m with respect to 66 m when considering images of size 128 × 128 . Our analysis also considers the training time as a function of the image size, as shown in Figure 15b. While performances are slightly affected by the size of the image (about 6%), the training time increases from about 37.7 s to 112 s (about +300%). Thus, system administrators should consider the trade-off between performance (accuracy) and training time when choosing the image size to be used at deployment time.

6.5. Relative Jamming Power (RJP)

We investigate the impact of the jamming power by fixing the distance between E and B at 65 m and varying the power of the signal injected by the jammer, i.e., the RJP. As previously conducted, we evaluate the performance of our solution in the settings of Scenario 1 using the networks resnet18, resnet50, and inceptionv3, while we use the autoencoder for Scenario 2.
Scenario 1. Figure 16a shows the accuracy of the CNN as a function of the RJP. We observe that an RJP equal to 0.1 is enough to guarantee an accuracy of about 1. This result should be compared with Figure 14a, where RJP was set to 1. In fact, we highlight that the jammer can be detected with overwhelming probability even when transmitting at a negligible fraction of the power, i.e., RJP = 1.
Scenario 2. Finally, we consider the performance of the autoencoder by varying the RJP. Figure 16b shows the accuracy, precision, recall, and F1-score as a function of the RJP while setting the E B distance to 65 m. We observe that the autoencoder requires the jammer to use a higher RJP (0.5) compared to the previous case (Figure 16a) to work effectively for anomaly detection. As discussed for the distance analysis, CNNs are trained on jammed signals, making them more sensitive and capable of detecting the presence of the jammer, even in the presence of lower RJP.

7. Conclusions

This work has presented a solution to detect jamming attacks in PLC networks by considering CNNs and autoencoders as a function of the type of data considered for training the neural network model, i.e., with or without the presence of the jammer. We highlighted the trade-off between CNNs and autoencoders in detecting the presence of a jammer in the network: while autoencoders are less sensitive, thus requiring closer positioning of the jammer to the receiver, they do not require signals affected by jamming for training. Finally, we highlight that our jamming detection techniques are successful with overwhelming probability, even when the jammer is far away from the receiver, thus not affecting the quality of the link. To further strengthen the model’s robustness and generalizability, we conducted a comprehensive hyperparameter tuning process validated through ANOVA statistical tests. We also analyzed the SNR trends and BER behavior as a function of jammer distance, offering insight into the physical-layer limitations and detection boundaries. In the future, we will investigate the additional jamming types under a real-world scenario.

Author Contributions

Conceptualization, M.I., A.O., J.H.F., S.S. and G.O.; methodology, M.I. and G.O.; software, M.I. and G.O.; validation, A.O. and J.H.F.; formal analysis, M.I. and G.O.; investigation, M.I., S.S. and G.O.; resources, G.O.; data curation, M.I.; writing—original draft preparation, M.I.; writing—review and editing, A.O., J.H.F., S.S. and G.O.; visualization, M.I.; supervision, S.S.; project administration, G.O.; funding acquisition, G.O. All authors have read and agreed to the published version of the manuscript.

Funding

This publication was supported by the NPRP grant NPRP12C-0814-190012-SP165 from the Qatar National Research Fund (a member of Qatar Foundation), and Iberdrola S.A. as part of its innovation department research studies. Open Access funding provided by the Qatar National Library. Its contents are solely the responsibility of the authors and do not necessarily represent the official views of Iberdrola Group.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

Authors Aymen Omri and Javier Hernandez Fernandez were employed by the company Iberdrola Innovation Middle East. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AEAutoencoder
AMIAdvanced Metering Infrastructure
AWGNAdditive White Gaussian Noise
BB-PLCBroadband PLC
BERBit Error Rate
BPSKBinary Phase-Shift Keying
CNNConvolutional Neural Network
DLDeep Learning
DoSDenial of Service
FNFalse Negative
FPFalse Positive
IoTInternet of Things
MSEMean Squared Error
NB-PLCNarrowband PLC
PDFProbability Density Function
PHYPhysical
PLCPower-Line Communication
QPSKQuadrature Phase-Shift Keying
RFRadio Frequency
RJPRelative Jamming Power
SGSmart Grid
SNRSignal-to-Noise Ratio
TNRTrue Negative Rate
TPRTrue Positive Rate
UNB-PLCUltra-Narrowband PLC

Appendix A. Different Hyperparameter Search

We tried an empirical approach to search for the best parameter values for the autoencoder, considering various parameters for the encoder transfer functions (logsig and satlin), decoder transfer functions (logsig, satlin, and purelin), sparsity proportion (0.1, 0.5, and 1), sparsity regularization (1, 5), and L 2 weight regularization (0.001, 0.01, 0.1, 0.5, and 1). These combinations led to a total of 180 combinations. We report all our results in Table A1.
Table A1. Testing results of different hyperparameter combinations at distance E B = 70 m and hidden size of 16. The red color shows the values performing worst, while the green color shows the best case, and yellow is the value associated with the median. All settings are trained at 250 epochs, and RJP is 1.
Table A1. Testing results of different hyperparameter combinations at distance E B = 70 m and hidden size of 16. The red color shows the values performing worst, while the green color shows the best case, and yellow is the value associated with the median. All settings are trained at 250 epochs, and RJP is 1.
En-
Coder
Sparsity
Prop.
Sparsity
Reg.
L 2
Weight Reg.
Decoder
logsig satlin purelin
Acc Prec Rec F1 Acc Prec Rec F1 Acc Prec Rec F1
logsig0.101.000.0010.990.971.000.990.800.950.630.760.980.970.990.98
0.0100.990.981.000.990.980.970.990.980.990.971.000.99
0.1000.980.961.000.980.920.990.840.910.990.981.000.99
0.5000.980.970.990.980.880.970.790.870.990.971.000.99
1.0000.980.971.000.980.970.980.960.970.990.981.000.99
5.000.0010.990.981.000.990.850.980.720.830.980.961.000.98
0.0100.990.990.990.990.850.970.730.830.991.000.980.99
0.1000.990.971.000.990.920.990.850.910.990.981.000.99
0.5000.990.980.990.990.950.990.920.950.990.990.990.99
1.0000.990.980.990.990.960.990.920.950.980.961.000.98
0.501.000.0010.990.981.000.990.930.980.870.930.990.981.000.99
0.0100.990.990.990.990.940.990.900.940.990.971.000.99
0.1000.990.990.990.990.930.970.890.930.990.981.000.99
0.5000.990.980.990.990.960.960.960.960.990.981.000.99
1.0000.990.990.990.990.841.000.680.810.990.981.000.99
5.000.0010.990.981.000.990.980.980.990.980.990.981.000.99
0.0101.000.991.001.000.830.990.660.790.980.990.970.98
0.1000.990.981.000.990.890.980.800.880.980.971.000.98
0.5000.980.961.000.980.861.000.730.840.990.980.990.99
1.0000.990.991.000.990.660.980.330.490.990.981.000.99
1.001.000.0011.000.991.001.000.810.970.640.770.990.980.990.99
0.0100.990.971.000.990.670.950.350.510.990.981.000.99
0.1000.990.981.000.990.580.940.170.290.990.971.000.99
0.5000.990.981.000.990.610.920.240.390.990.991.000.99
1.0000.990.981.000.990.700.970.420.591.000.991.001.00
5.000.0010.990.990.990.990.820.990.640.780.990.971.000.99
0.0100.990.990.990.990.670.950.350.510.990.981.000.99
0.1000.990.981.000.990.670.960.360.520.990.971.000.99
0.5001.001.001.001.000.690.980.400.560.980.971.000.98
1.0000.980.961.000.980.740.980.480.650.990.980.990.99
satlin0.101.000.0010.980.961.000.980.560.810.150.260.990.991.000.99
0.0100.990.991.000.990.690.990.390.560.990.981.000.99
0.1000.990.981.000.990.630.960.270.430.990.981.000.99
0.5000.980.961.000.980.870.970.760.860.990.980.990.99
1.0000.990.971.000.990.620.940.260.410.980.971.000.98
5.000.0010.990.981.000.990.590.960.180.310.990.980.990.99
0.0100.990.991.000.990.640.960.290.441.000.991.001.00
0.1000.990.980.990.990.600.940.210.350.990.990.990.99
0.5000.990.980.990.990.660.970.320.490.990.990.990.99
1.0000.990.990.990.990.670.950.350.510.990.980.990.99
0.501.000.0010.990.991.000.990.690.950.390.560.980.961.000.98
0.0100.990.980.990.990.580.960.170.290.990.971.000.99
0.1000.990.990.990.990.690.980.390.560.990.991.000.99
0.5000.990.981.000.990.640.980.290.451.000.991.001.00
1.0000.990.990.990.990.590.980.180.300.990.971.000.99
5.000.0010.990.991.000.990.540.820.090.170.990.991.000.99
0.0100.990.971.000.990.710.990.420.590.990.991.000.99
0.1000.990.980.990.990.740.950.500.650.990.991.000.99
0.5000.990.991.000.990.630.950.280.430.990.981.000.99
1.0000.980.970.990.980.640.940.300.450.990.981.000.99
1.001.000.0010.990.981.000.990.690.970.390.550.990.991.000.99
0.0100.990.981.000.990.650.920.320.480.990.981.000.99
0.1000.980.961.000.980.700.950.420.580.990.981.000.99
0.5000.990.980.990.990.660.960.340.500.990.990.990.99
1.0000.980.980.980.980.560.880.150.250.980.971.000.98
5.000.0010.990.990.990.990.700.950.420.590.990.980.990.99
0.0100.990.990.990.990.730.960.490.650.990.990.990.99
0.1000.990.980.990.990.590.950.190.310.990.981.000.99
0.5000.990.981.000.990.770.970.560.710.980.971.000.98
1.0000.980.961.000.980.530.940.050.100.980.961.000.98

References

  1. Wadhwani, P. Power Line Communication Market Size, Global Report 2032. Available online: https://www.gminsights.com/industry-analysis/power-line-communication-plc-market (accessed on 6 January 2025).
  2. Tayade, P. Power Line Communication Market Size and Forecast. Available online: https://www.coherentmarketinsights.com/industry-reports/power-line-communication-market (accessed on 6 January 2025).
  3. Cano, C.; Pittolo, A.; Malone, D.; Lampe, L.; Tonello, A.M.; Dabak, A.G. State of the art in power line communications: From the applications to the medium. IEEE J. Sel. Areas Commun. 2016, 34, 1935–1952. [Google Scholar] [CrossRef]
  4. Galli, S.; Scaglione, A.; Wang, Z. For the grid and through the grid: The role of power line communications in the smart grid. Proc. IEEE 2011, 99, 998–1027. [Google Scholar] [CrossRef]
  5. Raponi, S.; Fernandez, J.H.; Omri, A.; Oligeri, G. Long-Term Noise Characterization of Narrowband Power Line Communications. IEEE Trans. Power Deliv. 2022, 37, 365–373. [Google Scholar] [CrossRef]
  6. Ghasempour, A. Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions 2019, 4, 22. [Google Scholar] [CrossRef]
  7. Qian, Y.; Shi, L.; Li, J.; Zhou, X.; Shu, F.; Wang, J. An edge-computing paradigm for internet of things over power line communication networks. IEEE Netw. 2020, 34, 262–269. [Google Scholar] [CrossRef]
  8. Fernandez, J.H.; Omri, A.; Di Pietro, R. Power grid surveillance: Topology change detection system using power line communications. Int. J. Electr. Power Energy Syst. 2023, 145, 108634. [Google Scholar] [CrossRef]
  9. Omri, A.; Fernandez, J.H.; Di Pietro, R. Extending device noise measurement capacity for OFDM-based PLC systems: Design, implementation, and on-field validation. Comput. Netw. 2023, 237, 110038. [Google Scholar] [CrossRef]
  10. Fernandez, J.H.; Omri, A.; Oligeri, G. A noise reduction scheme for OFDM NB-PLC systems. E-Prime Electr. Eng. Electron. Energy 2022, 2, 100043. [Google Scholar] [CrossRef]
  11. Irfan, M.; Omri, A.; Fernandez, J.H.; Sciancalepore, S.; Oligeri, G. Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques. In Proceedings of the International Symposium on Networks, Computers and Communications, Doha, Qatar, 23–26 October 2023; pp. 22–24. [Google Scholar]
  12. Yin, Z.; Zhang, H.; Liu, W.; Wang, H.; Yin, C. Construction of the Remote Welding System based on Power Line Communication. IOP Conf. Ser. Mater. Sci. Eng. 2019, 612, 042001. [Google Scholar] [CrossRef]
  13. Ronen, E.; Shamir, A.; Weingarten, A.O.; O’Flynn, C. IoT goes nuclear: Creating a ZigBee chain reaction. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 195–212. [Google Scholar]
  14. Yaacoub, J.P.A.; Fernandez, J.H.; Noura, H.N.; Chehab, A. Security of power line communication systems: Issues, limitations and existing solutions. Comput. Sci. Rev. 2021, 39, 100331. [Google Scholar] [CrossRef]
  15. Fernandez, J.H.; Omri, A.; Di Pietro, R. Performance Analysis of Physical Layer Security in Power Line Communication Networks. In Proceedings of the 2023 IEEE Symposium on Computers and Communications (ISCC), Gammarth, Tunisia, 9–12 July 2023; pp. 777–782. [Google Scholar]
  16. Camponogara, A.; Poor, H.V.; Ribeiro, M.V. Physical layer security of in-home PLC systems: Analysis based on a measurement campaign. IEEE Syst. J. 2020, 15, 617–628. [Google Scholar] [CrossRef]
  17. Pittolo, A.; Tonello, A.M. Physical layer security in PLC networks: Achievable secrecy rate and channel effects. In Proceedings of the 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications, Johannesburg, South Africa, 24–27 March 2013; pp. 273–278. [Google Scholar]
  18. Pittolo, A.; Tonello, A.M. Physical layer security in power line communication networks: An emerging scenario, other than wireless. IET Commun. 2014, 8, 1239–1247. [Google Scholar] [CrossRef]
  19. Sciancalepore, S.; Kusters, F.; Abdelhadi, N.K.; Oligeri, G. Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning. IEEE Internet Things J. 2023, 11, 14682–14697. [Google Scholar] [CrossRef]
  20. Asri, S.; Pranggono, B. Impact of distributed denial-of-service attack on advanced metering infrastructure. Wirel. Pers. Commun. 2015, 83, 2211–2223. [Google Scholar] [CrossRef]
  21. Jin, D.; Nicol, D.M.; Yan, G. An event buffer flooding attack in DNP3 controlled SCADA systems. In Proceedings of the 2011 Winter Simulation Conference (WSC), Phoenix, AZ, USA, 11–14 December 2011; pp. 2614–2626. [Google Scholar]
  22. Groat, S.; Dunlop, M.; Urbanksi, W.; Marchany, R.; Tront, J. Using an IPv6 moving target defense to protect the Smart Grid. In Proceedings of the 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), Washington, DC, USA, 16–20 January 2012; pp. 1–7. [Google Scholar]
  23. Zhang, F.; Mahler, M.; Li, Q. Flooding attacks against secure time-critical communications in the power grid. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 23–27 October 2017; pp. 449–454. [Google Scholar]
  24. Chatfield, B.; Haddad, R.J.; Chen, L. Low-computational complexity intrusion detection system for jamming attacks in smart grids. In Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 5–8 March 2018; pp. 367–371. [Google Scholar]
  25. Temple, W.G.; Chen, B.; Tippenhauer, N.O. Delay makes a difference: Smart grid resilience under remote meter disconnect attack. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 462–467. [Google Scholar]
  26. Li, H.; Lai, L.; Qiu, R.C. A denial-of-service jamming game for remote state monitoring in smart grid. In Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 23–25 March 2011; pp. 1–6. [Google Scholar] [CrossRef]
  27. Pelechrinis, K.; Iliofotou, M.; Krishnamurthy, S.V. Denial of service attacks in wireless networks: The case of jammers. IEEE Commun. Surv. Tutor. 2010, 13, 245–257. [Google Scholar] [CrossRef]
  28. Liu, D.; Raymer, J.; Fox, A. Efficient and timely jamming detection in wireless sensor networks. In Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), Las Vegas, NV, USA, 8–11 October 2012; pp. 335–343. [Google Scholar] [CrossRef]
  29. Singh, J.; Woungang, I.; Dhurandher, S.K.; Khalid, K. A jamming attack detection technique for opportunistic networks. Internet Things 2022, 17, 100464. [Google Scholar] [CrossRef]
  30. Kasturi, G.; Jain, A.; Singh, J. Detection and Classification of Radio Frequency Jamming Attacks using Machine learning. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2020, 11, 49–62. [Google Scholar]
  31. Manesh, M.R.; Velashani, M.S.; Ghribi, E.; Kaabouch, N. Performance comparison of machine learning algorithms in detecting jamming attacks on ADS-B devices. In Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA, 20–22 May 2019; pp. 200–206. [Google Scholar]
  32. Testi, E.; Arcangeloni, L.; Giorgetti, A. Machine learning-based jamming detection and classification in wireless networks. In Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, Guildford, UK, 1 June 2023; pp. 39–44. [Google Scholar]
  33. Upadhyaya, B.; Sun, S.; Sikdar, B. Machine learning-based jamming detection in wireless IoT networks. In Proceedings of the 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), Singapore, 28–30 August 2019; pp. 1–5. [Google Scholar]
  34. Wang, C.; Wang, B.; Liu, H.; Qu, H. Anomaly detection for industrial control system based on autoencoder neural network. Wirel. Commun. Mob. Comput. 2020, 2020, 8897926. [Google Scholar] [CrossRef]
  35. Lu, K.D.; Wu, Z.G. Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems. IEEE Trans. Instrum. Meas. 2022, 71, 1–10. [Google Scholar] [CrossRef]
  36. Soltanieh, N.; Norouzi, Y.; Yang, Y.; Karmakar, N.C. A review of radio frequency fingerprinting techniques. IEEE J. Radio Freq. Identif. 2020, 4, 222–233. [Google Scholar] [CrossRef]
  37. Abbas, S.; Abu Talib, M.; Nasir, Q.; Idhis, S.; Alaboudi, M.; Mohamed, A. Radio frequency fingerprinting techniques for device identification: A survey. Int. J. Inf. Secur. 2024, 23, 1389–1427. [Google Scholar] [CrossRef]
  38. Ross, B.P.; Carbino, T.J.; Stone, S.J. Physical-layer discrimination of power line communications. In Proceedings of the 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA, 26–29 January 2017; pp. 341–345. [Google Scholar]
  39. Carbino, T.J.; Temple, M.A.; Lopez, J. Conditional Constellation Based-Distinct Native Attribute (CB-DNA) fingerprinting for network device authentication. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar] [CrossRef]
  40. Alhazbi, S.; Sciancalepore, S.; Oligeri, G. BloodHound: Early Detection and Identification of Jamming at the PHY-layer. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023; pp. 1033–1041. [Google Scholar]
  41. Rappaport, T.S. Wireless Communications–Principles and Practice, (The Book End). Microw. J. 2002, 45, 128–129. [Google Scholar]
  42. Large, D.; Farmer, J. Modern Cable Television Technology; Elsevier: Amsterdam, The Netherlands, 2004. [Google Scholar]
  43. Meng, H.; Guan, Y.L.; Chen, S. Modeling and analysis of noise effects on broadband power-line communications. IEEE Trans. Power Deliv. 2005, 20, 630–637. [Google Scholar] [CrossRef]
  44. Microchip. Consumer-Band Bpsk 7.2 Kbps Power-Line Soft-Modem Pictail Plus Daughter Board. 2024. Available online: https://www.microchip.com/en-us/development-tool/ac164142 (accessed on 14 May 2025).
  45. Galvez, R.L.; Bandala, A.A.; Dadios, E.P.; Vicerra, R.R.P.; Maningo, J.M.Z. Object detection using convolutional neural networks. In Proceedings of the TENCON 2018-2018 IEEE Region 10 Conference, Jeju, Reublic of Korea, 28–31 October 2018; pp. 2023–2027. [Google Scholar]
  46. Tien, P.W.; Wei, S.; Liu, T.; Calautit, J.; Darkwa, J.; Wood, C. A deep learning approach towards the detection and recognition of opening of windows for effective management of building ventilation heat losses and reducing space heating demand. Renew. Energy 2021, 177, 603–625. [Google Scholar] [CrossRef]
  47. Islam, M.Z.; Islam, M.M.; Asraf, A. A combined deep CNN-LSTM network for the detection of novel coronavirus (COVID-19) using X-ray images. Inform. Med. Unlocked 2020, 20, 100412. [Google Scholar] [CrossRef]
  48. Kleesiek, J.; Urban, G.; Hubert, A.; Schwarz, D.; Maier-Hein, K.; Bendszus, M.; Biller, A. Deep MRI brain extraction: A 3D convolutional neural network for skull stripping. NeuroImage 2016, 129, 460–469. [Google Scholar] [CrossRef]
  49. Ge, S.; Li, J.; Ye, Q.; Luo, Z. Detecting masked faces in the wild with lle-cnns. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 2682–2690. [Google Scholar]
  50. Li, H.; Lin, Z.; Shen, X.; Brandt, J.; Hua, G. A convolutional neural network cascade for face detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 5325–5334. [Google Scholar]
  51. Duan, Y.; Lu, J.; Zhou, J. Uniformface: Learning deep equidistributed representation for face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019; pp. 3415–3424. [Google Scholar]
  52. Liu, X.; Kumar, B.; Yang, C.; Tang, Q.; You, J. Dependency-aware attention control for unconstrained face recognition with image sets. In Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, 8–14 September 2018; pp. 548–565. [Google Scholar]
  53. Nair, V.; Hinton, G.E. Rectified linear units improve restricted boltzmann machines. In Proceedings of the 27th International Conference on Machine Learning (ICML-10), Haifa, Israel, 21–24 June 2010; pp. 807–814. [Google Scholar]
  54. LeCun, Y.; Bottou, L.; Orr, G.B.; Müller, K.R. Efficient backprop. In Neural Networks: Tricks of the Trade; Springer: Berlin/Heidelberg, Germany, 2002; pp. 9–50. [Google Scholar]
  55. Bank, D.; Koenigstein, N.; Giryes, R. Machine learning for data science handbook: Data mining and knowledge discovery handbook. Autoencoders 2023, 353–374. [Google Scholar]
  56. Oligeri, G.; Sciancalepore, S.; Raponi, S.; Di Pietro, R. PAST-AI: Physical-layer authentication of satellite transmitters via deep learning. IEEE Trans. Inf. Forensics Secur. 2022, 18, 274–289. [Google Scholar] [CrossRef]
  57. Michelucci, U. An introduction to autoencoders. arXiv 2022, arXiv:2201.03898. [Google Scholar]
  58. Mathur, A.; Bhatnagar, M.R.; Panigrahi, B.K. PLC Performance Analysis Over Rayleigh Fading Channel Under Nakagami-m Additive Noise. IEEE Commun. Lett. 2014, 18, 2101–2104. [Google Scholar] [CrossRef]
  59. Abou-Rjeily, C. Power Line Communications Under Rayleigh Fading and Nakagami Noise: Novel Insights on the MIMO and Multi-Hop Techniques. IET Commun. 2018, 12, 184–191. [Google Scholar] [CrossRef]
  60. Ai, Y.; Cheffena, M. Capacity Analysis of PLC over Rayleigh Fading Channels with Colored Nakagami-m Additive Noise. In Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–5. [Google Scholar]
  61. Alhazbi, S.; Sciancalepore, S.; Oligeri, G. The day-after-tomorrow: On the performance of radio fingerprinting over time. In Proceedings of the 39th Annual Computer Security Applications Conference, Austin, TX, USA, 4–8 December 2023; pp. 439–450. [Google Scholar]
  62. Russakovsky, O.; Deng, J.; Su, H.; Krause, J.; Satheesh, S.; Ma, S.; Huang, Z.; Karpathy, A.; Khosla, A.; Bernstein, M.; et al. ImageNet Large Scale Visual Recognition Challenge. Int. J. Comp. Vis. 2015, 115, 211–252. [Google Scholar] [CrossRef]
  63. Erfani, S.M.; Rajasegarar, S.; Karunasekera, S.; Leckie, C. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognit. 2016, 58, 121–134. [Google Scholar] [CrossRef]
  64. Qu, Q.; Wei, S.; Liu, S.; Liang, J.; Shi, J. JRNet: Jamming recognition networks for radar compound suppression jamming signals. IEEE Trans. Veh. Technol. 2020, 69, 15035–15045. [Google Scholar] [CrossRef]
  65. Cai, Y.; Shi, K.; Song, F.; Xu, Y.; Wang, X.; Luan, H. Jamming pattern recognition using spectrum waterfall: A deep learning method. In Proceedings of the 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China, 6–9 December 2019; pp. 2113–2117. [Google Scholar]
  66. Olshausen, B.; Field, D. Sparse coding with an overcomplete basis set: A strategy employed by V1? Vis. Res. 1997, 37, 3311–3325. [Google Scholar] [CrossRef]
Figure 1. Illustration of two reference scenarios in PLC jamming detection: Scenario 1 employs binary classification with both clear and jammed samples, while Scenario 2 leverages anomaly detection with thresholding based solely on clear samples.
Figure 1. Illustration of two reference scenarios in PLC jamming detection: Scenario 1 employs binary classification with both clear and jammed samples, while Scenario 2 leverages anomaly detection with thresholding based solely on clear samples.
Jcp 05 00046 g001
Figure 2. BPSK modulation and demodulation. The binary stream is translated into in-phase (I) and quadrature (Q) components. IQ components are then modulated by a given carrier. During the demodulation phase, the I and Q components are extracted from the received signal to recover the transmitted stream.
Figure 2. BPSK modulation and demodulation. The binary stream is translated into in-phase (I) and quadrature (Q) components. IQ components are then modulated by a given carrier. During the demodulation phase, the I and Q components are extracted from the received signal to recover the transmitted stream.
Jcp 05 00046 g002
Figure 3. BPSK modulation. The receiver assumes the positions of the symbols at red crosses under ideal conditions [I = −1, Q = 0 ] and [ I = 1 , Q = 0 ], but signals are displaced from their actual positions due to noise and manufacturing imperfections.
Figure 3. BPSK modulation. The receiver assumes the positions of the symbols at red crosses under ideal conditions [I = −1, Q = 0 ] and [ I = 1 , Q = 0 ], but signals are displaced from their actual positions due to noise and manufacturing imperfections.
Jcp 05 00046 g003
Figure 4. Typical CNN architecture.
Figure 4. Typical CNN architecture.
Jcp 05 00046 g004
Figure 5. Broadband in-home PLC system considered in our paper. A and B exchange messages over the PLC network in the presence of a PLC jammer device ( E ).
Figure 5. Broadband in-home PLC system considered in our paper. A and B exchange messages over the PLC network in the presence of a PLC jammer device ( E ).
Jcp 05 00046 g005
Figure 6. Block diagram of the PLC wiretap channel model.
Figure 6. Block diagram of the PLC wiretap channel model.
Jcp 05 00046 g006
Figure 7. Dataset generation process: IQ samples are collected with and without the presence of the jammer. Then, we compute the bi-variate histogram of the IQ samples and translate it into RGB images. At last, we create two datasets of images with labels of non-jammed and jammed samples.
Figure 7. Dataset generation process: IQ samples are collected with and without the presence of the jammer. Then, we compute the bi-variate histogram of the IQ samples and translate it into RGB images. At last, we create two datasets of images with labels of non-jammed and jammed samples.
Jcp 05 00046 g007
Figure 8. Autoencoder architecture.
Figure 8. Autoencoder architecture.
Jcp 05 00046 g008
Figure 9. Training phase of autoencoders with known data samples, which follows P distribution. It is worth noting that only regular or “non-jammed” samples are fed to the autoencoder.
Figure 9. Training phase of autoencoders with known data samples, which follows P distribution. It is worth noting that only regular or “non-jammed” samples are fed to the autoencoder.
Jcp 05 00046 g009
Figure 10. Example of the threshold selection process. The autoencoder is configured with 16 hidden units. The jammer transmits noise with R J P = 1 and is located (a) 65 m, (b) 70 m, and (c) 75 m from the receiver.
Figure 10. Example of the threshold selection process. The autoencoder is configured with 16 hidden units. The jammer transmits noise with R J P = 1 and is located (a) 65 m, (b) 70 m, and (c) 75 m from the receiver.
Jcp 05 00046 g010
Figure 11. Box plots showing classification accuracy across hyperparameter values. The variability in decoder function, encoder function, sparsity proportion, and sparsity regularization is statistically significant and directly affects model performance.
Figure 11. Box plots showing classification accuracy across hyperparameter values. The variability in decoder function, encoder function, sparsity proportion, and sparsity regularization is statistically significant and directly affects model performance.
Jcp 05 00046 g011
Figure 12. BER as a function of the distance between the receiver and the jammer, with different RJP levels. The distance between the transmitter and the receiver (legitimate link) has been set to 30 m.
Figure 12. BER as a function of the distance between the receiver and the jammer, with different RJP levels. The distance between the transmitter and the receiver (legitimate link) has been set to 30 m.
Jcp 05 00046 g012
Figure 13. The SNRs with RJP = 1 at different distances regarding the jammer ( E ) and receiver ( B ). Transmitter ( A ) and receiver ( B ) have been set to 30 m.
Figure 13. The SNRs with RJP = 1 at different distances regarding the jammer ( E ) and receiver ( B ). Transmitter ( A ) and receiver ( B ) have been set to 30 m.
Jcp 05 00046 g013
Figure 14. E B distance analysis. Performance evaluation of Scenario 1 (CNN) and Scenario 2 (autoencoder) assuming R J P = 1 , the distance of A B being equal to 30 m while varying the distance of E B . (a,b) Refer to Scenario 1 (CNN), while (c,d) refer to Scenario 2 (autoencoder).
Figure 14. E B distance analysis. Performance evaluation of Scenario 1 (CNN) and Scenario 2 (autoencoder) assuming R J P = 1 , the distance of A B being equal to 30 m while varying the distance of E B . (a,b) Refer to Scenario 1 (CNN), while (c,d) refer to Scenario 2 (autoencoder).
Jcp 05 00046 g014
Figure 15. Image size analysis: performance evaluation of Scenario 2 (autoencoder) assuming RJP equals 1 and A B distance equals 30 m while varying the distance E B . (a) Takes into account the accuracy, while (b) the training time.
Figure 15. Image size analysis: performance evaluation of Scenario 2 (autoencoder) assuming RJP equals 1 and A B distance equals 30 m while varying the distance E B . (a) Takes into account the accuracy, while (b) the training time.
Jcp 05 00046 g015
Figure 16. RJP analysis. Performance evaluation of Scenario 1 (CNN) and Scenario 2 (autoencoder) assuming A B and E B distances equal to 30 m and 65 m, respectively. (a) Refers to the accuracy of CNNs, while (b) shows the performance of the autoencoder.
Figure 16. RJP analysis. Performance evaluation of Scenario 1 (CNN) and Scenario 2 (autoencoder) assuming A B and E B distances equal to 30 m and 65 m, respectively. (a) Refers to the accuracy of CNNs, while (b) shows the performance of the autoencoder.
Jcp 05 00046 g016
Table 2. Notations, descriptions, and considered values.
Table 2. Notations, descriptions, and considered values.
ParameterNotationValue
Transmit Power [dB μ V] P T 120
Noise Power [dB μ V] P N 70
Number of SC per OFDM Symbol N S C 512
FFT Size N F F T 512
Carrier Frequency [Hz] F c 20 × 10 6
Sub-Carrier Spacing [Hz] Δ f 15 × 10 3
OFDM Symbols per Frame N S y m b F r m 20
Sampling Time [s] T s a m p 1 / ( 2 × F c )
OFDM Symbol Duration [s] T S y m b N F F T × T s a m p
Frame Duration [s] T F r a m e N S y m b F r m × T S y m b
Number of Frames N F r a m e T S i m / T F r a m e
Number of OFDM Symbols N S y m b N F r a m e × N S y m b F r m
Distance A B [m] d A B 30
Distance E B [m] d E B ≥60
Simulation time [s] T S i m 2
Table 3. Dataset description: we consider various image sizes and a total of 750 images for both jammed and non-jammed signals while reporting the IQ samples required to generate the images.
Table 3. Dataset description: we consider various image sizes and a total of 750 images for both jammed and non-jammed signals while reporting the IQ samples required to generate the images.
Image ResolutionNo. of SamplesNo Jamming
[Images]
Jamming
[Images]
224 × 224 × 3 655,360750750
192 × 192 × 3 471,040750750
156 × 156 × 3 317,440750750
128 × 128 × 3 204,800750750
Table 4. Hyperparameter search spaces and selected optimal configurations.
Table 4. Hyperparameter search spaces and selected optimal configurations.
HyperparameterSearch RangeOptimal Configuration
Hidden Layer Size{4, 16, 32}32
Encoder Transfer Function{logsig, satlin}logsig
Decoder Transfer Function{logsig, satlin, purelin}satlin
Sparsity Proportion{0.1, 0.5, 1.0}0.1
Sparsity Regularization{1, 5, 10}10.0
L 2 Weight Regularization{0.001, 0.01, 0.1, 0.5, 1.0}0.1
Training Epochs5050
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Irfan, M.; Omri, A.; Hernandez Fernandez, J.; Sciancalepore, S.; Oligeri, G. Detecting Jamming in Smart Grid Communications via Deep Learning. J. Cybersecur. Priv. 2025, 5, 46. https://doi.org/10.3390/jcp5030046

AMA Style

Irfan M, Omri A, Hernandez Fernandez J, Sciancalepore S, Oligeri G. Detecting Jamming in Smart Grid Communications via Deep Learning. Journal of Cybersecurity and Privacy. 2025; 5(3):46. https://doi.org/10.3390/jcp5030046

Chicago/Turabian Style

Irfan, Muhammad, Aymen Omri, Javier Hernandez Fernandez, Savio Sciancalepore, and Gabriele Oligeri. 2025. "Detecting Jamming in Smart Grid Communications via Deep Learning" Journal of Cybersecurity and Privacy 5, no. 3: 46. https://doi.org/10.3390/jcp5030046

APA Style

Irfan, M., Omri, A., Hernandez Fernandez, J., Sciancalepore, S., & Oligeri, G. (2025). Detecting Jamming in Smart Grid Communications via Deep Learning. Journal of Cybersecurity and Privacy, 5(3), 46. https://doi.org/10.3390/jcp5030046

Article Metrics

Back to TopTop