One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
Abstract: 5G mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device to detect jamming attacks. We pursue a learning approach, with the detector being a CNN implementing a GLRT. To this end, the CNN is trained as a two-class classifier using two datasets: one of real legitimate signals and another generated artificially so that the resulting classifier implements the GLRT. The artificial dataset is generated mimicking different types of jamming signals. We evaluate the performance of this detector using experimental data obtained from a private 5G network and several jamming signals, showing the technique's effectiveness in detecting the attacks.
- Ericsson, “5G driving revenue growth in top 20 markets,” Ericsson Mobility Report — Business Review edition, Feb. 2023.
- S. Hong, K. Kim, and S.-H. Lee, “A hybrid jamming detection algorithm for wireless communications: Simultaneous classification of known attacks and detection of unknown attacks,” IEEE Communications Letters, vol. 27, no. 7, pp. 1769–1773, 2023.
- B. Chatfield, R. J. Haddad, and L. Chen, “Low-computational complexity intrusion detection system for jamming attacks in smart grids,” in Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2018, pp. 367–371.
- T. M. Hoang, A. Vahid, H. D. Tuan, and L. Hanzo, “Physical layer authentication and security design in the machine learning era,” IEEE Communications Surveys & Tutorials, pp. 1–1, Feb. 2024.
- M. Varotto, S. Valentin, and S. Tomasin, “Detecting 5G signal jammers with autoencoders based on loose observations,” in Proc. of IEEE Globecom Workshops (GC Wkshps), 2023, pp. 160–165.
- H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 767–809, Mar. 2022.
- F. Ardizzon, P. Casari, and S. Tomasin, “A RNN-based approach to physical layer authentication in underwater acoustic networks with mobile devices,” Computer Networks, vol. 243, p. 110311, Mar. 2024, URL verified on 2024-04-15. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128624001439
- L. Crosara, F. Ardizzon, S. Tomasin, and N. Laurenti, “Worst-case spoofing attack and robust countermeasure in satellite navigation systems,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 2039–2050, Dec. 2023.
- F. Ardizzon and S. Tomasin, “Learning the likelihood test with one-class classifiers,” 2024, arXiv, URL verified on 2024-04-15. [Online]. Available: https://arxiv.org/abs/2210.12494
- O. Zeitouni, J. Ziv, and N. Merhav, “When is the generalized likelihood ratio test optimal?” IEEE Transaction on Information Theory, vol. 38, no. 5, pp. 1597–1602, Sept. 1992.
- Software Radio Systems, “srsRAN project documentation,” online, Jun. 2023, URL verified on 2024-04-15. [Online]. Available: https://docs.srsran.com/projects/project/en/latest/
- Nuand LLC, “Datasheet bladeRF 2.0 micro,” online, 2023, URL verified on 2024-04-15. [Online]. Available: https://www.nuand.com/bladerf-2-0-micro/
- R. Getz, “ADALM-PLUTO detailed specifications,” online, Feb. 2021, URL verified on 2024-04-15. [Online]. Available: https://wiki.analog.com/university/tools/pluto/devs/specs
- S. Lee, “Open5GS: documentation,” online, Jul. 2023, URL verified on 2024-04-15. [Online]. Available: https://open5gs.org/open5gs/docs/
- Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, “Autoencoder-based network anomaly detection,” in Proc. of Wireless Telecommunications Symposium (WTS), 2018, pp. 1–5.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.