Antifragile Communications
@article{Lichtman2018AntifragileC, title={Antifragile Communications}, author={Marc Lichtman and Matthew Vondal and Thomas Charles Clancy and Jeffrey H. Reed}, journal={IEEE Systems Journal}, year={2018}, volume={12}, pages={659-670} }
This paper introduces the concept of antifragile communications, which we define as the capability for a communications system to improve in performance due to a system stressor or harsh condition. [] Key Method Through a novel strategy, we exploit the communications jammer, providing an increase in communications capability such as bits per second. We show that an antifragile gain is possible under a wide variety of reactive jamming scenarios and provide guidelines for realizing these gains by creating an…
Figures and Tables from this paper
table 2.1 figure 2.2 table 2.2 figure 2.4 figure 3.1 table 3.1 figure 3.2 figure 3.3 figure 3.4 figure 3.5 figure 3.6 figure 3.7 figure 3.8 figure 3.9 figure 4 figure 4.1 table 4.1 figure 4.10 figure 4.11 figure 4.12 figure 4.2 table 4.2 figure 4.3 table 4.3 figure 4.4 figure 4.5 figure 4.6 figure 4.7 figure 4.8 figure 4.9 figure 5.1 table 5.1 figure 5.10 figure 5.11 figure 5.12 figure 5.13 figure 5.2 table 5.2 figure 5.3 figure 5.4 figure 5.5 figure 5.6 figure 5.7 figure 5.8 figure 5.9 figure 6.1 figure 6.2 figure 6.3 figure 6.4 figure 6.5 figure 6.6 figure 7.1 table 7.1 figure 7.10 figure 7.11 figure 7.12 figure 7.13 figure 7.14 figure 7.2 table 7.2 figure 7.3 figure 7.4 table 7.4 figure 7.5 table 7.5 figure 7.6 figure 7.7 figure 7.8 figure 7.9 figure 8.1 figure 8.2 table 8.2 figure 8.3 figure 8.4 figure 8.5 figure 8.6 figure 8.7 figure 8.8 figure 8.9 figure 9.1 figure 9.10 figure 9.11 figure 9.2 figure 9.3 figure 9.4 figure 9.5 figure 9.6 figure 9.7 figure 9.8 figure 9.9
17 Citations
Reactive jammer piggybacking: Achieving antifragile electronic warfare
- Computer ScienceMILCOM 2016 - 2016 IEEE Military Communications Conference
- 2016
Results show that an antifragile gain is achievable under a variety of reactive jamming scenarios, and a jammer exploitation strategy in which the communications system causes an enemy reactive jammer to act as an unwitting relay is proposed.
FSK-Based Reactive Jammer Piggybacking
- Computer ScienceIEEE Communications Letters
- 2017
A jammer exploitation strategy is proposed in which the communications system causes an enemy reactive jammer to act as an unwitting relay, which can lead to an improvement in communications as a result of the jamming attack itself.
Antifragility for Intelligent Autonomous Systems
- Computer ScienceArXiv
- 2018
This paper proposes an architecture that imparts antifragility to intelligent autonomous systems, specifically those that are goal-driven and based on AI-planning and argues that this architecture allows the system to self-improve by uncovering new capabilities obtained either through the hazards themselves or through deliberation.
Complex Networks Antifragility under Sustained Edge Attack-Repair Mechanisms
- Computer Science
- 2020
This paper considers an edge-attack and local edge-repair response mechanism over several synthetic and real-world datasets, and quantifies both antifragility (as the dynamics of the largest connected component) and the cost incurred by edge repairs.
Anti-follower jamming wide gap multi-pattern frequency hopping communication method
- Computer Science, Business
- 2020
Convert Harm Into Benefit: A Coordination-Learning Based Dynamic Spectrum Anti-Jamming Approach
- Computer ScienceIEEE Transactions on Vehicular Technology
- 2020
Simulation results indicate that the proposed CLASA algorithm can help users confront the malicious jammer, and coordinate internal spectrum access simultaneously without information exchange, and the fairness of the proposed approach under different jamming attack patterns is analyzed.
Antifragility of Random Boolean Networks
- BiologyArXiv
- 2018
A simply calculable measure of antifragility, based on the change of "satisfaction" before and after adding perturbations, is proposed and applied to random Boolean networks (RBNs).
A smart reactive jamming approach to counter reinforcement learning‐based antijamming strategies in GEO SATCOM scenario
- Computer Science, EngineeringInt. J. Satell. Commun. Netw.
- 2022
The proposed smart reactive SATCOM jamming approach exploits the limitations in learning patterns of Q‐learning‐based RL agent and achieves effective jamming while conserving considerable amount of jamming power.
A Novel Antifragility Measure Based on Satisfaction and Its Application to Random and Biological Boolean Networks
- BiologyComplex.
- 2019
A simply calculable measure of antifragility, based on the change of “satisfaction” before and after adding perturbations, is proposed and applied to random Boolean networks (RBNs) and it is found that ordered RBNs are the most antIfragile.
References
SHOWING 1-10 OF 139 REFERENCES
Anti-jamming timing channels for wireless networks
- Computer Science, BusinessWiSec '08
- 2008
This paper shows that it is possible to detect failed packet events inspite of jamming, and explores single sender and multisender timing channel constructions that may be used to build a low-rate overlay link-layer.
Enhancing the security of LTE networks against jamming attacks
- Computer ScienceEURASIP J. Inf. Secur.
- 2014
A series of new effective attacks (smart jamming) that extend the range and effectiveness of basic radio jamming are overviews, aiming to enhance the resiliency of LTE networks against such attacks.
A Novel Approach Against Reactive Jamming Attacks
- Computer ScienceAd Hoc Sens. Wirel. Networks
- 2011
This paper provides an efficient method to identify the trigger nodes by utilizing the group testing techniques and minimum collection of disjoint disk covers and shows that the solution performs well in terms of time and message complexities, which provides a good approach to defend reactive jamming attacks.
Denial of Service Attacks in Wireless Networks: The Case of Jammers
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2011
This survey presents a detailed up-to-date discussion on the jamming attacks recorded in the literature and describes various techniques proposed for detecting the presence of jammers.
BitTrickle: Defending against broadband and high-power reactive jamming attacks
- Computer Science2012 Proceedings IEEE INFOCOM
- 2012
BitTrickle is proposed, an anti-jamming wireless communication scheme that allows communication in the presence of a broadband and high power reactive jammer by exploiting the reaction time of the jammer.
Jamming sensor networks: attack and defense strategies
- Computer ScienceIEEE Network
- 2006
In this article, a two-phase strategy involving the diagnosis of the attack, followed by a suitable defense strategy is discussed, highlighting the challenges associated with detecting jamming.
Short paper: reactive jamming in wireless networks: how realistic is the threat?
- Computer ScienceWiSec '11
- 2011
This work demonstrates that flexible and reliable software-defined reactive jamming is feasible by designing and implementing a reactive jammer against IEEE 802.15.4 networks and identifies the causes of loss at the physical layer of 802.
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 2008
A transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics, and suggests that LocDef is effective in identifying PUE attacks under certain conditions.
Detection of reactive jamming in sensor networks
- Computer ScienceTOSN
- 2010
This work proposes a novel jamming detection scheme that effectively detects sophisticated jamming attacks that cannot be detected with existing techniques and enables the formation of robust sensor networks for dependable delivery of alarm notifications.
Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing
- Computer Science2015 IEEE Conference on Standards for Communications and Networking (CSCN)
- 2015
This work introduces the term LTE control channel spoofing, which refers to transmitting a partial LTE downlink frame, created by a fake eNodeB which does not possess the registration keys nor offers any service.