2021
DOI: 10.1049/cmu2.12190
|View full text |Cite
|
Sign up to set email alerts
|

Direction‐based jamming detection and suppression in mmWave massive MIMO networks

Abstract: In this paper, the problem of physical layer security in the uplink of millimeter-wave massive multiple-input multiple-output (MIMO) networks is studied and a jamming detection and suppression method is proposed. The proposed method is based on directional information of the received signals at the base station antenna array. The proposed jamming detection method can accurately detect both the existence and direction of the jammer using the received pilot signals in the training phase. The obtained information… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…Similarly to our work, references [12], [13] propose to exploit spatially correlated channels in order to suppress jammer interference. In particular, the work in [13] applies a beamspace transform to separate the jammer from the UEs in the angular domain. The beamspace transform [14] is related to the concept of beam-slicing used by SNIPS.…”
Section: B Related Prior Workmentioning
confidence: 91%
See 2 more Smart Citations
“…Similarly to our work, references [12], [13] propose to exploit spatially correlated channels in order to suppress jammer interference. In particular, the work in [13] applies a beamspace transform to separate the jammer from the UEs in the angular domain. The beamspace transform [14] is related to the concept of beam-slicing used by SNIPS.…”
Section: B Related Prior Workmentioning
confidence: 91%
“…These works have considered different attacks, such as constant jamming attacks [4], [5], in which the jammer is permanently transmitting, as well as other types of attacks in which the jammer transmits only at specific time instances, such as when the UEs transmit [4] or during pilot transmission [6]. Furthermore, due to the complexity of the jammer problem, some works have devoted themselves only to detecting the presence of a jammer [6], [7], while other works have proposed methods to suppress jamming [4], [5], [8]- [13].…”
Section: B Related Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These works have considered different attacks, such as constant jamming attacks [6], [7], in which the jammer is permanently transmitting, as well as other types of attacks in which the jammer transmits only at specific time instances, e.g., when the UEs transmit [6], or during pilot transmission [8]. Moreover, given the complexity of the jammer problem, some works have devoted themselves only to detecting the presence of a jammer [8], [9], while other works have proposed methods to suppress the impact of the detected jammer [6], [7], [10]- [15].…”
Section: B Related Prior Workmentioning
confidence: 99%
“…Unfortunately, the use of low-resolution analog-to-digital converters (ADCs) leaves the BS vulnerable to jammers that could be introduced, for example, by a rogue user equipment (UE) or a malicious transmitter. Previous works [6]- [15] have analyzed the impact of different types of jamming attacks on massive MU-MIMO systems and proposed mitigation methods based on digital equalization. However, none of these works take into consideration the compounding challenge of low-resolution data conversion: A jammer can either saturate low-resolution ADCs or (if gain-control is used) widen their quantization range, which inevitably drowns the useful signals in quantization noise.…”
Section: Introductionmentioning
confidence: 99%