Antifragile Communications

@article{Lichtman2018AntifragileC,
  title={Antifragile Communications},
  author={Marc Lichtman and Matthew Vondal and Thomas Charles Clancy and Jeffrey H. Reed},
  journal={IEEE Systems Journal},
  year={2018},
  volume={12},
  pages={659-670}
}
This paper introduces the concept of antifragile communications, which we define as the capability for a communications system to improve in performance due to a system stressor or harsh condition. [] Key Method Through a novel strategy, we exploit the communications jammer, providing an increase in communications capability such as bits per second. We show that an antifragile gain is possible under a wide variety of reactive jamming scenarios and provide guidelines for realizing these gains by creating an…
Reactive jammer piggybacking: Achieving antifragile electronic warfare
TLDR
Results show that an antifragile gain is achievable under a variety of reactive jamming scenarios, and a jammer exploitation strategy in which the communications system causes an enemy reactive jammer to act as an unwitting relay is proposed.
FSK-Based Reactive Jammer Piggybacking
TLDR
A jammer exploitation strategy is proposed in which the communications system causes an enemy reactive jammer to act as an unwitting relay, which can lead to an improvement in communications as a result of the jamming attack itself.
Antifragility for Intelligent Autonomous Systems
TLDR
This paper proposes an architecture that imparts antifragility to intelligent autonomous systems, specifically those that are goal-driven and based on AI-planning and argues that this architecture allows the system to self-improve by uncovering new capabilities obtained either through the hazards themselves or through deliberation.
Complex Networks Antifragility under Sustained Edge Attack-Repair Mechanisms
TLDR
This paper considers an edge-attack and local edge-repair response mechanism over several synthetic and real-world datasets, and quantifies both antifragility (as the dynamics of the largest connected component) and the cost incurred by edge repairs.
Convert Harm Into Benefit: A Coordination-Learning Based Dynamic Spectrum Anti-Jamming Approach
TLDR
Simulation results indicate that the proposed CLASA algorithm can help users confront the malicious jammer, and coordinate internal spectrum access simultaneously without information exchange, and the fairness of the proposed approach under different jamming attack patterns is analyzed.
Antifragility of Random Boolean Networks
TLDR
A simply calculable measure of antifragility, based on the change of "satisfaction" before and after adding perturbations, is proposed and applied to random Boolean networks (RBNs).
A smart reactive jamming approach to counter reinforcement learning‐based antijamming strategies in GEO SATCOM scenario
TLDR
The proposed smart reactive SATCOM jamming approach exploits the limitations in learning patterns of Q‐learning‐based RL agent and achieves effective jamming while conserving considerable amount of jamming power.
A Novel Antifragility Measure Based on Satisfaction and Its Application to Random and Biological Boolean Networks
TLDR
A simply calculable measure of antifragility, based on the change of “satisfaction” before and after adding perturbations, is proposed and applied to random Boolean networks (RBNs) and it is found that ordered RBNs are the most antIfragile.
...
1
2
...

References

SHOWING 1-10 OF 139 REFERENCES
Anti-jamming timing channels for wireless networks
TLDR
This paper shows that it is possible to detect failed packet events inspite of jamming, and explores single sender and multisender timing channel constructions that may be used to build a low-rate overlay link-layer.
Enhancing the security of LTE networks against jamming attacks
TLDR
A series of new effective attacks (smart jamming) that extend the range and effectiveness of basic radio jamming are overviews, aiming to enhance the resiliency of LTE networks against such attacks.
A Novel Approach Against Reactive Jamming Attacks
TLDR
This paper provides an efficient method to identify the trigger nodes by utilizing the group testing techniques and minimum collection of disjoint disk covers and shows that the solution performs well in terms of time and message complexities, which provides a good approach to defend reactive jamming attacks.
Denial of Service Attacks in Wireless Networks: The Case of Jammers
TLDR
This survey presents a detailed up-to-date discussion on the jamming attacks recorded in the literature and describes various techniques proposed for detecting the presence of jammers.
BitTrickle: Defending against broadband and high-power reactive jamming attacks
TLDR
BitTrickle is proposed, an anti-jamming wireless communication scheme that allows communication in the presence of a broadband and high power reactive jammer by exploiting the reaction time of the jammer.
Jamming sensor networks: attack and defense strategies
TLDR
In this article, a two-phase strategy involving the diagnosis of the attack, followed by a suitable defense strategy is discussed, highlighting the challenges associated with detecting jamming.
Short paper: reactive jamming in wireless networks: how realistic is the threat?
TLDR
This work demonstrates that flexible and reliable software-defined reactive jamming is feasible by designing and implementing a reactive jammer against IEEE 802.15.4 networks and identifies the causes of loss at the physical layer of 802.
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
TLDR
A transmitter verification scheme, called LocDef (localization-based defense), which verifies whether a given signal is that of an incumbent transmitter by estimating its location and observing its signal characteristics, and suggests that LocDef is effective in identifying PUE attacks under certain conditions.
Detection of reactive jamming in sensor networks
TLDR
This work proposes a novel jamming detection scheme that effectively detects sophisticated jamming attacks that cannot be detected with existing techniques and enables the formation of robust sensor networks for dependable delivery of alarm notifications.
Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing
TLDR
This work introduces the term LTE control channel spoofing, which refers to transmitting a partial LTE downlink frame, created by a fake eNodeB which does not possess the registration keys nor offers any service.
...
1
2
3
4
5
...