2020
DOI: 10.1109/tcomm.2020.2978192
|View full text |Cite
|
Sign up to set email alerts
|

Jamming-Robust Uplink Transmission for Spatially Correlated Massive MIMO Systems

Abstract: In this paper, we consider how the uplink transmission of a spatially correlated massive multiple-input multipleoutput (MIMO) system can be protected from a jamming attack. To suppress the jamming, we propose a novel framework including a new optimal linear estimator in the training phase and a bilinear equalizer in the data phase.The proposed estimator is optimal in the sense of maximizing the spectral efficiency of the legitimate system attacked by a jammer, and its implementation needs the statistical knowl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(25 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…1(a) illustrates the approach taken by these methods: The data phase is preceded by an augmented training phase in which the jammer's transmit characteristics are estimated in addition to the channel matrix. This augmented training phase can either complement a traditional pilot phase with a period during which the UEs do not transmit in order to enable jammer estimation (e.g., [3], [5]), or it can consist of an extended pilot phase so that there exist pilot sequences which are unused by the UEs and on whose span the receive signals can be projected to estimate the jammer's subspace (e.g., [8]- [10]). The estimated jammer characteristics are then used to perform jammer-mitigating data detection.…”
Section: A State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…1(a) illustrates the approach taken by these methods: The data phase is preceded by an augmented training phase in which the jammer's transmit characteristics are estimated in addition to the channel matrix. This augmented training phase can either complement a traditional pilot phase with a period during which the UEs do not transmit in order to enable jammer estimation (e.g., [3], [5]), or it can consist of an extended pilot phase so that there exist pilot sequences which are unused by the UEs and on whose span the receive signals can be projected to estimate the jammer's subspace (e.g., [8]- [10]). The estimated jammer characteristics are then used to perform jammer-mitigating data detection.…”
Section: A State Of the Artmentioning
confidence: 99%
“…Jammers that jam only the pilot phase have received considerable attention [12]- [16], as such attacks can be more energy-efficient than barrage jamming in disrupting communication systems that do not defend themselves against jammers [14]- [16]. However, if a jammer is active during the pilot phase, then a BS that does defend itself against jamming attacks can estimate the jammer's channel by exploiting knowledge of the UE transmit symbols, for instance with the aid of unused pilot sequences [8]- [10]. To disable such jammermitigating communication systems, a smart jammer might therefore refrain from jamming the pilot phase and only target the data phase, even if such jamming attacks have not received much attention so far [18], [19].…”
Section: A State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…This is of high importance especially for operation in hostile environments. The problems of jamming detection and suppression are discussed in many of the prior works in the field of physical layer security in massive MIMO systems [8][9][10][11][12][13][14][15][16][17][18][19]. In [8], a jamming attack detection scheme is proposed based on pilots drawn randomly from a known constellation.…”
Section: Introductionmentioning
confidence: 99%
“…The problems of jamming detection and suppression are discussed in many of the prior works in the field of physical layer security in massive MIMO systems [8]- [19]. In [8], a jamming attack detection scheme is proposed based on pilots drawn randomly from a known constellation.…”
Section: Introductionmentioning
confidence: 99%