5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

United Against Jammers: Researchers Develop More Secure Method for Data Transmission

By dmiyares | March 29, 2019

The motto “united we stand, divided we fall” has found new application in an unlikely discipline—cyber security.

Machines—from simple ones like a personal computer to a complex one like a self-driving car—must transmit information in order to process it. A self-driving car, for instance, is designed to collect the same kinds of information a human driver might, and respond in kind. From traffic lights to the behavior of other cars, the self-driving car must sense and process information quickly and securely in order to decide on a course of action: braking, turning, and potentially saving lives.

But what if there’s another, adversarial signal in the mix, jeopardizing the communication? A research team based at the University of Illinois at Urbana-Champaign has developed a method to potentially avoid the interruptions caused by these signals, called jammers.

The research was published in the January issue of IEEE/CAA Journal of Automatica Sinica (JAS), a joint publication of the IEEE and the Chinese Association of Automation.

“The ability to transmit data from a source to a destination reliably in the presence of adversarial intervention, such as jamming, is of paramount importance and concern,” said lead author Tamer Basar.

Basar is Swanlund Endowed Chair of the department of electrical and computer engineering and director of the Center for Advanced Study at the University of Illinois at Urbana-Champaign.

“The prototype introduced in the paper captures scenarios that arise in many application areas, such as remote sensing systems, networked control systems, and cyber-physical systems,” Basar said.

For example, a sensor collects information over a period of time and transmits the data to a decision center that must work to accurately process the original data. The data can become corrupted as it must be encoded prior to the decision center and decoded afterwards. Time constraints and limited energy resources further complicate matters. To further complicate issues, a jammer can stop everything by literally jamming the system with a gluttony of noise.

“The sensor, the encoder, and the decoder act in unison, toward a common goal, whereas a jammer operates in a way to counteract the actions of the first three,” Basar said.

The researchers grouped the three pieces together, comprising one actor in the system, working to counter the actions of the jammer. By having all three pieces work as one, they simultaneously announce their policies regarding information.

It’s the difference between communicating via a carrier pigeon or a phone. A person must tie a message to the pigeon’s leg, the pigeon must travel, and the receiver must retrieve the message from the pigeon. Then the receiver must respond and repeat the process in reverse. The message could be lost or damaged at several points. If the same people picked up the phone, it’s far more likely they could decide on a course of action together with minimal interference.

When the sensor, encoder, and decoder work together, they commit to their next actions together. They don’t block the jammer altogether, but the jammer doesn’t have the opportunity to interrupt the work and cause a substantial error as the actors communicate back and forth.

Called a Stackelberg feedback solution, this hierarchal maneuver allows the system to commit to processing information based on a set of pre-computable thresholds, which depends on time and the number of transmission opportunities left. The jammer is left out of consideration as the sensor, encoder, and decoder decide together what, how, and when to process.

While effective, the solution is currently limited to one channel. The researchers hope to change that.

“Our goal is to extend the model introduced in the paper to more complex systems, allowing for more general source processes, multiple sensors, multiple channels, and sensors that are equipped with an energy harvester that has the potential to replenish the sensor’s used energy based on random availability of such resources—such as solar or wind power,” Basar said.


Filed Under: Wireless Design and Development

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

Second-generation tech extends range by 50 percent
Sequans announces production of latest LTE module
Transceiver supports 2.4 GHz ISM and SATCOM
Vehicles get Wi-Fi 7 with ublox module

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World