Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Performance Analysis of Underwater Acoustic Channel Amid Jamming by Random Jammers (2405.02885v1)

Published 5 May 2024 in eess.SP and cs.ET

Abstract: Underwater communication networks are increasingly popularized by various important maritime applications. However, this also leads to an increased threat landscape. This letter presents the first study that considers jamming attacks by random jammers present in the surroundings of legitimate transceivers in underwater acoustic communication systems. We investigate the impact of jamming attacks on various performance parameters of the legitimate underwater acoustic communication link. In particular, we investigate the legitimate link using stochastic geometry for important performance parameters, namely coverage probability, average rate, and energy efficiency of the link between two legitimate nodes, i.e., underwater and surface nodes. We then derive and present tractable expressions for these performance parameters. Finally, we performed a Monte Carlo simulation to validate our analysis. We plot the performance metrics against the transmit power, and jamming power for different intensities of the jammers in shallow, mid, and deep water scenarios. Results reveal that on average, jamming in deep water has a relatively high impact on the performance of legitimate link than in shallow water.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. S. Fattah, A. Gani, I. Ahmedy, M. Y. I. Idris, and I. A. Targio Hashem, “A survey on underwater wireless sensor networks: Requirements, taxonomy, recent advances, and open research challenges,” Sensors, vol. 20, no. 18, p. 5393, 2020.
  2. X. Cui, Y. Cai, J. Li, L. Li, B. Jiang, and L. Liu, “An integrated waveform design method for underwater acoustic detection and communication,” Internet Technology Letters, p. e522.
  3. W. Aman, S. Al-Kuwari, M. Muzzammil, M. M. U. Rahman, and A. Kumar, “Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook,” Ad Hoc Networks, vol. 142, p. 103114, 2023.
  4. S. Misra, S. Dash, M. Khatua, A. V. Vasilakos, and M. S. Obaidat, “Jamming in underwater sensor networks: detection and mitigation,” IET communications, vol. 6, no. 14, pp. 2178–2188, 2012.
  5. L. Xiao, X. Wan, W. Su, Y. Tang, et al., “Anti-jamming underwater transmission with mobility and learning,” IEEE Communications Letters, vol. 22, no. 3, pp. 542–545, 2018.
  6. H. Zhang, L. Wu, Y. Zhi, C. Yang, X. Cao, J. Zhang, and H. Li, “Throughput maximization for usv-enabled underwater wireless networks under jamming attack,” IEEE Sensors Journal, pp. 1–1, 2023.
  7. L. Xiao, Q. Li, T. Chen, E. Cheng, and H. Dai, “Jamming games in underwater sensor networks with reinforcement learning,” in 2015 IEEE Global Communications Conference (GLOBECOM).   IEEE, 2015, pp. 1–6.
  8. F. Chiariotti, A. Signori, F. Campagnaro, and M. Zorzi, “Underwater jamming attacks as incomplete information games,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).   IEEE, 2020, pp. 1033–1038.
  9. A. Signori, F. Chiariotti, F. Campagnaro, and M. Zorzi, “A game-theoretic and experimental analysis of energy-depleting underwater jamming attacks,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9793–9804, 2020.
  10. A. Signori, F. Chiariotti, F. Campagnaro, R. Petroccia, K. Pelekanakis, P. Paglierani, J. Alves, and M. Zorzi, “A geometry-based game theoretical model of blind and reactive underwater jamming,” IEEE Transactions on Wireless Communications, vol. 21, no. 6, pp. 3737–3751, 2021.
  11. H. Wang, Y. Huang, and X. Zeng, “Jamming games in underwater sensor networks with hierarchical learning,” in 2022 8th International Conference on Big Data Computing and Communications (BigCom).   IEEE, 2022, pp. 428–434.
  12. P. Qarabaqi and M. Stojanovic, “Statistical characterization and computationally efficient modeling of a class of underwater acoustic communication channels,” IEEE Journal of Oceanic Engineering, vol. 38, no. 4, pp. 701–717, 2013.
  13. M. Stojanovic, “On the relationship between capacity and distance in an underwater acoustic communication channel,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 4, pp. 34–43, 2007.
  14. M. Di Renzo and P. Guan, “Stochastic geometry modeling of coverage and rate of cellular networks using the gil-pelaez inversion theorem,” IEEE Communications Letters, vol. 18, no. 9, pp. 1575–1578, 2014.
  15. K. A. Hamdi, “A useful lemma for capacity analysis of fading interference channels,” IEEE Transactions on Communications, vol. 58, no. 2, pp. 411–416, 2010.
  16. R. Gan, Y. Wang, Z. Xiao, H. Zhang, X. Wang, and M. Yang, “Energy-efficient dos attack against remote state estimation,” Internet Technology Letters, vol. 5, no. 4, p. e370, e370 ITL-21-0190.R1. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/itl2.370
  17. “Popoto Modem,” https://www.popotomodem.com/, 2020.
  18. J. Lavis, “Shallow, mid to ultra deepwater definitions,” https://drillers.com/shallow-mid-to-ultra-deepwater-definitions/.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com