A General Security Approach for Soft-information
Decoding against Smart Bursty Jammers
Furkan Ercan†, Kevin Galligan*, Ken R. Duffy*, Muriel Médard§, David Starobinski†, Rabia Tugce Yazicigil†
†Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA
§Department of Electrical Engineering and Computer Science, MIT, Cambridge, MA, USA
*Hamilton Institute, Maynooth University, Ireland
Abstract—Malicious attacks such as jamming can cause signif-
icant disruption or complete denial of service (DoS) to wireless
communication protocols. Moreover, jamming devices are getting
smarter, making them difficult to detect. Forward error correc-
tion, which adds redundancy to data, is commonly deployed to
protect communications against the deleterious effects of channel
noise. Soft-information error correction decoders obtain reliabil-
ity information from the receiver to inform their decoding, but
in the presence of a jammer such information is misleading and
results in degraded error correction performance. As decoders
assume noise occurs independently to each bit, a bursty jammer
will lead to greater degradation in performance than a non-bursty
one. Here we establish, however, that such temporal dependencies
can aid inferences on which bits have been subjected to jamming,
thus enabling counter-measures. In particular, we introduce a
pre-decoding processing step that updates log-likelihood ratio
(LLR) reliability information to reflect inferences in the presence
of a jammer, enabling improved decoding performance for
any soft detection decoder. The proposed method requires no
alteration to the decoding algorithm. Simulation results show that
the method correctly infers a significant proportion of jamming
in any received frame. Results with one particular decoding
algorithm, the recently introduced ORBGRAND, show that the
proposed method reduces the block-error rate (BLER) by an
order of magnitude for a selection of codes, and prevents complete
DoS at the receiver.
I. INTRODUCTION
Jammers typically aim to cause a denial of service (DoS) or
reduction of quality (RoQ) at the receiver [1] without getting
detected. They exploit the wireless transmission by mixing
their signals with legitimate communication. As a result, the
received frame becomes undecodable, which causes anoma-
lies such as increased repeat requests, reduced throughput,
prolonged delays, or a complete breakdown [2]. Powerful
jammers that blast channels with unrestrained amounts of
energy can be detected easily by the receiver. More subtle
jammers, on the other hand, might seek to inject short bursts
or lower levels of energy to disrupt communication while
circumventing their detection, causing a DoS. In general, jam-
mers must demonstrate high energy efficiency, low detection
probability, high levels of DoS, and resistance against physical
layer (PHY) anti-jamming techniques.
From an information-theoretic perspective, uniform jam-
mers are the most effective for reducing the channel capacity
and the code rate [3]. However, emerging techniques such as
rate-adaptation algorithms propose efficient countermeasures
for such jammer attacks [4]. On the other hand, bursty
jammers [5] can be an effective approach for increasing the
block-error rate (BLER), where an adversary jams a burst of
bits in a transmitted frame. Bursty jammers become more
effective in increasing the BLER when their burst patterns
are unpredictable to the receiver. With increased BLER, the
receiver must compensate by reducing the code rate, which
sacrifices information throughput. Therefore it is essential to
study countermeasures to such jammer attacks.
Most traditional security approaches for wireless technolo-
gies are applied to upper layers in the protocol stack [6].
However, with the rapid growth in use cases and network
density, maintaining security for 5G-and-beyond technologies
has become a challenge [7]. PHY-layer security is an emerging
solution to threats that arise with evolving adversaries [8].
Under such adversarial behavior, machine learning-based ap-
proaches [9], [10] and spectrum sensing-based approaches [11]
have been proposed to counter jamming. Our paper specifically
focuses on jamming attacks on soft-information decoders, a
topic that has received scant attention in the literature. Our
anti-jamming approach applies to general coding schemes
and can be effortlessly supported on the physical layer with
minimal computational overhead.
In this work, we consider a smart, reactive jammer that
is bursty and only active during a fraction of the trans-
mission. It is assumed that transmission parameters, such
as the modulation and the subcarrier frequency, are known
to the adversary. To counter such an attack, we propose a
modified log-likelihood ratio (LLR) computation that takes
the conditional probability of jamming into account for each
index of the received frame. The computation of this posterior
probability is performed in two steps. First, an initial value is
calculated based on the received signal strength. Anchor points
in the received frame, for which the conditional jamming
probability is high, are then used to inform the jamming esti-
mates of neighbouring points, based on Markov state transition
probabilities. The proposed method is general to any receiver
and carried out before decoding. Simulation results show that
the proposed method unveils a significant amount of the attack,
and therefore the attacker cannot maintain their deniability.
Using the universal ORBGRAND algorithm [12], [13], it is
shown that an order of magnitude of BLER performance can
be recovered with the proposed method and a complete DoS is
prevented, using different codebooks, i.e. random linear codes
(RLCs) and 5G cyclic redundancy check-aided Polar codes
arXiv:2210.04061v1 [cs.IT] 8 Oct 2022