Performance Analysis of a MIMO System with Bursty Traffic in the presence of Energy Harvesting Jammer

  title={Performance Analysis of a MIMO System with Bursty Traffic in the presence of Energy Harvesting Jammer},
  author={Sujatha Allipuram and Parthajit Mohapatra and Nikolaos Pappas and Shabnam Parmar and Saswat Chakrabarti},
This paper explores the role of multiple antennas in mitigating jamming attacks for the Rayleigh fading environment with exogenous random traffic arrival. The jammer is assumed to have energy harvesting ability where energy arrives according to Bernoulli process. The outage probabilities are derived with different assumptions on the number of antennas at the transmitter and receiver. The outage probability for the Alamouti space-time code is also derived. The work characterizes the average… 


Mitigating Jamming Attacks in a MIMO System with Bursty Traffic
It is found that exploitation of space and time diversity with the use of space-time code can improve the performance of the system significantly even under the jamming attack.
Wireless jamming attacks under dynamic traffic uncertainty
It is shown that jammers cannot effectively increase the average energy cost and cannot decrease the feasible throughput for transmitters, if they face uncertainty on transmitter queue states, and medium access is less vulnerable to jamming attacks under increasing traffic uncertainty.
Deadline Constrained Packet Scheduling in the Presence of an Energy Harvesting Jammer
This article analyzes a three node system, where a legitimate link between the transmitter and the receiver is adversarially affected by independent Gaussian noise injected by a jammer.
Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks
This paper first formulate the throughput optimization problem for a secondary user under the attacks by jammers as a Markov decision process (MDP), and introduces a new solution based on the deception tactic to deal with smart jamming attacks.
Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks
We consider radio applications in sensor networks, where the nodes operate on batteries so that energy consumption must be minimized, while satisfying given throughput and delay requirements. In this
Effect of energy harvesting on stable throughput in cooperative relay systems
The impact of energy constraints on a two-hop network with a source, a relay and a destination under random medium access is studied and the relatively unexplored and important domain of energy harvesting is tapped.
Jamming probabilities and throughput of cognitive radio communications against a wideband jammer
  • Wednel Cadeau, Xiaohua Li
  • Computer Science
    2013 47th Annual Conference on Information Sciences and Systems (CISS)
  • 2013
This paper sets up a Markov model of the cognitive radio transmissions which consists of three states: spectrum sensing, channel access, and channel switching, and derives the jamming probabilities and throughput of cognitiveRadio transmissions when facing a wideband jammer.
Detection of jamming attacks in 802.11b wireless networks
A multi-modal scheme is investigated that models different jamming attacks by discovering the correlation between three parameters: packet delivery ratio, signal strength variation, and pulse width of the received signal and helps in clearly differentiating the jammed regions for various types ofJamming attacks.
Jamming games for power controlled medium access with dynamic traffic
It is shown that jammers incur a significant performance loss when they do not have knowledge of transmitter queue states and dynamically changing traffic increases the immunity to jamming attacks and gives insights into defense mechanisms.
Minimizing Secrecy Outage Probability in Multiuser Wireless Systems With Stochastic Traffic
A scheduling problem in the aforementioned system, jointly considering the reliability, security, and stability, is considered, where the scheduler tries to allocate wireless resources to the legitimate users, stabilize the system, and minimize the secrecy outage probability.