Papers
Topics
Authors
Recent
Search
2000 character limit reached

Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines

Published 7 May 2024 in eess.SP, cs.LG, and cs.NI | (2405.09564v2)

Abstract: 5G cellular networks are particularly vulnerable against narrowband jammers that target specific control sub-channels in the radio signal. One mitigation approach is to detect such jamming attacks with an online observation system, based on machine learning. We propose to detect jamming at the physical layer with a pre-trained machine learning model that performs binary classification. Based on data from an experimental 5G network, we study the performance of different classification models. A convolutional neural network will be compared to support vector machines and k-nearest neighbors, where the last two methods are combined with principal component analysis. The obtained results show substantial differences in terms of classification accuracy and computation time.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (14)
  1. L. Chettri and R. Bera, “A comprehensive survey on internet of things (IoT) toward 5G wireless systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16–32, 2020.
  2. H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 767–809, Mar. 2022.
  3. M. A. Birutis and A. Mykkeltveit, “Practical jamming of a commercial 5G radio system at 3.6 GHz,” in in Proc. International Conference on Military Communication and Information Systems (ICMCIS), vol. 205, 2022, pp. 58–67.
  4. S. Hong, K. Kim, and S.-H. Lee, “A hybrid jamming detection algorithm for wireless communications: Simultaneous classification of known attacks and detection of unknown attacks,” IEEE Communications Letters, vol. 27, no. 7, pp. 1769–1773, 2023.
  5. M. Hachimi, G. Kaddoum, G. Gagnon, and P. Illy, “Multi-stage jamming attacks detection using deep learning combined with kernelized support vector machine in 5G cloud radio access networks,” in 2020 International Symposium on Networks, Computers and Communications (ISNCC), 2020, pp. 1–5.
  6. J. A. Jahanshahi, S. A. Ghorashi, and H. Sadreazami, “Jamming detection at base station using fuzzy c-means algorithm,” in in Proc. International Symposium on Computer Networks and Distributed Systems (CNDS), 2011, pp. 40–44.
  7. Software Radio Systems, “SRS RAN documentation,” https://docs.srsran.com/en/latest/, accessed: 2024-04-19.
  8. National Instruments, “USRP N300 datasheet,” https://www.ettus.com/all-products/usrp-n300/, accessed: 2024-04-19.
  9. Quectel, “RM520-GL modem datasheet,” https://www.quectel.com/product/5g-rm520n-series, accessed: 2024-04-19.
  10. S. Lee, “Open5GS documentation,” https://open5gs.org/open5gs/docs/, accessed: 2024-04-19.
  11. 3GPP, “3GPP specification series 38: 5G standards,” https://www.3gpp.org/dynareport?code=38-series.htm, accessed: 2024-04-19.
  12. Ettus, “USRPX 310 datasheet,” https://www.ettus.com/all-products/x310-kit/, accessed: 2024-04-19.
  13. “Scipy welch periodogram,” https://docs.scipy.org/doc/scipy/reference/generated/scipy.signal.periodogram.html, accessed: 2024-04-19.
  14. Z. Hu, J. Zhang, and Y. Ge, “Handling vanishing gradient problem using artificial derivative,” IEEE Access, vol. 9, pp. 22 371–22 377, 2021.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.