2020
DOI: 10.1109/lwc.2020.3000892
|View full text |Cite
|
Sign up to set email alerts
|

IRS-Based Wireless Jamming Attacks: When Jammers Can Attack Without Power

Abstract: This paper proposes to use Intelligent Reflecting Surface (IRS) as a green jammer to attack a legitimate communication without using any internal energy to generate jamming signals. In particular, the IRS is used to intelligently reflect the signals from the legitimate transmitter to the legitimate receiver (LR) to guarantee that the received signals from direct and reflecting links can be added destructively, which thus diminishes the Signal-to-Interference-plus-Noise Ratio (SINR) at the LR. To minimize the r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(29 citation statements)
references
References 18 publications
(39 reference statements)
0
29
0
Order By: Relevance
“…In [208], the authors consider a jammer that attacks a legitimate communication without using any internal energy to generate jamming signals. The jammer uses an RIS that controls the reflected signals in order to decrease the SINR at the legitimate receiver.…”
Section: K Physical Layer Securitymentioning
confidence: 99%
“…In [208], the authors consider a jammer that attacks a legitimate communication without using any internal energy to generate jamming signals. The jammer uses an RIS that controls the reflected signals in order to decrease the SINR at the legitimate receiver.…”
Section: K Physical Layer Securitymentioning
confidence: 99%
“…As compared to the ideal case of full CSI, security could still be guaranteed by relaxing the QoS threshold at Bob as well as increasing the number of RIS reflecting elements. Unlike the current research trend on utilizing RIS to enhance the system secrecy, lyu et al [48] propose the use of an RIS as a passive jammer to attack legitimate communication between BS and Bob. BCD, SDR, and Gaussian randomization techniques are utilized to jointly optimize reflection coefficient magnitudes and discrete phase shifts at the RIS to diminish the signal-to-interferenceplus-noise ratio (SINR) at Bob.…”
Section: ) Single Bob and Evementioning
confidence: 99%
“…3-(b). Jamming is a common technique to deny the eavesdropper from receiving any useful signal, which can be done even actively as in [47], [49], [50] or passively with the aid of an illegitimate RIS as in [48]. Wang et al [49], considered the energy efficiency by optimizing the beamforming at the transmitter, as in [36], [38], [47], aided by a cooperative jamming with the support of an optimized RIS phase shifts.…”
Section: ) Multiple Bobs or Evesmentioning
confidence: 99%
“…Physical layer security (PLS) is a newly emerging secrecy communication technique [14]. In comparison with several existing PLS schemes, e.g., jammer-aided secure communication or the relay-aided secure communication, the IRS-aided secure transmission does not employ an additional transmitter to generate certain signal or interference, thus, no extra power consumption is need [15]. Besides, since operate in the full duplex (FD) mode, the IRS-aided scheme achieves higher spectrum efficiency than the half duplex (HD) relay scheme [16].…”
Section: A Motivationmentioning
confidence: 99%
“…In fact, (15) is the most difficult one among these subproblems. In the following, we will solve (15) using the penalty method [25].…”
Section: B Optimization Of the Reflect Coefficient (Rc)mentioning
confidence: 99%