Abstract
As the demand for bandwidth in wireless communication increases, carrier frequencies will reach the terahertz (THz) regime. One of the common preconceived notions is that, at these high frequencies, signals can radiate with high directivity which inherently provides more secure channels. Here, we describe the first study of the vulnerability of these directional links to jamming, in which we identify several features that are distinct from the usual considerations of jamming at low frequencies. We show that the receiver’s use of an envelope detector provides the jammer with the ability to thwart active attempts to adapt to their attack. In addition, a jammer can exploit the broadband nature of typical receivers to implement a beat jamming attack, which allows them to optimize the efficacy of the interference even if their broadcast is detuned from the frequency of the intended link. Our work quantifies the increasing susceptibility of broadband receivers to jamming, revealing previously unidentified vulnerabilities which must be considered in the development of future wireless systems operating above 100 GHz.
Similar content being viewed by others
Introduction
With the roll-out of 5G networks, consumer data consumption is expected to rise and inevitably outgrow its capabilities. Eventually, technologies beyond 5G will be necessary to fulfill future requirements. Terahertz waves (100 GHz to 10 THz) are considered a likely candidate for future generations of wireless technology1,2, due to the promise of large bandwidths and high data rates3,4,5. Unlike conventional radio frequency (RF) broadcasts, THz links rely on the use of highly directional beams generated from high-gain antennas designed to overcome the large free-space path loss6,7. This has the potential to make THz communication links more secure by restricting the ability of eavesdroppers to intercept narrow beams8,9,10,11,12,13,14. However, prior research has not addressed the security of THz links in the presence of a jammer.
At lower frequencies, jamming attacks are well known, and have been a concern since the Second World War15. In the simplest scenario, a jammer broadcasts in every direction in order to flood a channel and prevent the intended receiver from detecting the desired signal16,17. Interference and jamming are distinctly different issues that are based on the same phenomena. The former is an obstacle in establishing a proper communication link, while the latter is an attack designed with the specific goal of completely disrupting the link. The attack can dynamically vary in efficacy based on the attacker’s approach. Consequently, jamming methodologies and counter measures will necessarily evolve as the carrier frequencies increase. Because of the high directivity of THz links, the jammer will need to accurately aim at the receiver to implement a successful attack. Yet, since a primary benefit of using THz links is the large available bandwidth which promises high data rates, the receiver must have a wide operating bandwidth. This can be detrimental to the security of the link, as a jammer can take advantage of this large bandwidth for interference18,19. These characteristics of directivity and large bandwidths represent new considerations for jamming attacks, and therefore new challenges for system designers.
In this work, we perform the first study of jamming at frequencies above 100 GHz. We consider a noncoherent on–off keying modulation scheme, which is one of the two identified modes in the recent standardization of the IEEE 802.15.3d task group20 and is intended for simple low-cost devices. We explore several jamming scenarios that could be employed by a malicious agent to disrupt a communication link in the context of a noncoherent modulation scheme. We consider a simple threat model in which Alice (the transmitter) is communicating with Bob (the intended receiver) via a static noncoherent line-of-sight link using the main lobes of both antennas21. Meanwhile, Mallory (a static malicious jammer) transmits signals towards Bob at an angle θM to this line-of-sight link (see Fig. 1). We first demonstrate that a simple single-frequency tone aimed at one of the side lobes of Bob’s antenna can be effective at disrupting the intended communication, and that the effectiveness of Mallory’s attack essentially depends on her coupling to Bob’s receiver. We show that even if Bob attempts to adapt to the attack, Mallory can thwart him by varying her jamming power. More strikingly, we show that even if Mallory is not operating at the same center frequency as Alice, she can still disrupt the Alice-Bob link. This attack—which we refer to as beat jamming—reveals an important vulnerability to jamming when Alice and Bob use broad transmission bandwidths, as would be commonly expected at millimeter-wave and THz frequencies. Finally, we consider the impact on Bob when Mallory uses a modulated jamming signal, which we refer to as broadband jamming, which we found to be even more devastating as it gives Mallory additional freedom to optimize her attack.
Results and discussion
Single-tone jamming
We first consider the consequences for Bob if Mallory attempts to jam his signal using a single-tone frequency, which may coincide with the center frequency of Alice’s spectrum or may be at a different frequency. In our experimental configuration (see Fig. 1), Alice transmits noncoherent 1.12 Gbps on–off keying (OOK)-modulated data at a carrier frequency of 197.5 GHz. We denote the data modulation by uA(t), and her center frequency by νA. Mallory is positioned off-axis at θM and attempts to disrupt the link by transmitting a single-tone frequency νM at Bob’s receiver. Bob detects signals with a zero-bias Schottky diode, which is a type of detector used for noncoherent measurement at THz frequencies and is part of the recent standardization efforts of the IEEE 802.15.3d task group20. As a power envelope detector, it essentially measures the square of the incident electric field EB, which in this case is:
Here, N(t) is the noise expressed in power, and the subscripts A, B, and M correspond to Alice, Bob, and Mallory respectively. After factoring the expression and eliminating the high frequency and DC components—which are filtered out by Bob (see experimental setup in Methods)—the result is:
with Δν and Δφ the differences in frequencies and phases between Alice and Mallory. We may assume that Δφ = 0 for this analysis; this assumption does not affect any of the conclusions of this work. On the right-hand side of Eq. 2, the first term corresponds to the power of the original data stream from Alice to Bob, which is the baseband signal that is centered at 0 GHz, covering a wide spectral bandwidth determined by the data rate and modulation format (Fig. 2a). The second term is the consequence of Mallory’s jamming and consists of the product of Alice’s data stream with a sinusoidal term oscillating at the beat frequency Δν. In the spectrum, this interference term is centered at Δν with a bandwidth determined by Alice’s data rate. This is important because it means that Mallory’s jamming is never small in bandwidth compared to Alice’s; even if Mallory uses a single-frequency source, the jamming signal overlaps the spectrum of the data signal. For Bob, this means that he cannot filter out this term without also removing a significant portion of Alice’s data22.
The effect of Mallory’s jamming can also be observed in the time domain, through the impact on the resulting eye diagrams (Fig. 2b). In our OOK scheme, the bits are conveyed through the term uA(t), which, in its simplest form, is a non-return-to-zero rectangular function that can take values of 0 and 1. We observe that the effect of the jamming is to add noise to the high bit (the “1”), without affecting the low bit (the “0”) (Fig. 2b). This is consistent with the prediction of Eq. 2, since the jamming term is proportional to uA(t), and therefore vanishes for the zero bits. That is, when uA = 0, the measured power is indistinguishable from the case without Mallory (only the noise term remains in both cases). This asymmetry between zero and one in OOK is a consequence of the use of incoherent detectors, which are often employed at these high frequencies and are explicitly incorporated as part of the approved IEEE 802.15.3d standards for the 252–325 GHz frequency range5,20,23. Typically, the interference model described in Eq. 2 is not observed in the vast majority of conventional low-frequency communication systems which uses coherent phase-sensitive detection. However, a similar noncoherent interference can be a characteristic of some radio technologies such as ultra-wide bandwidth (UWB) systems24,25,26.
Center frequency jamming
We now investigate in more detail the effectiveness of Mallory’s jamming attack when her single-tone is the same as Alice’s center frequency i.e., \({\nu }_{A}\,=\,{\nu }_{M}\). To do so, we define a metric which parameterizes this effectiveness, which we call the “jamming efficiency”, in analogy to secrecy capacity27:
Here, the jamming efficiency is a normalized function of the bit-error rate (BER) that Bob measures in the presence of Mallory’s jamming (\({{{{{\rm{BE}}}}}}{{{{{{\rm{R}}}}}}}_{{{{{{\rm{Jammed}}}}}}}\)) or in its absence (\({{{{{\rm{BE}}}}}}{{{{{{\rm{R}}}}}}}_{{{{{{\rm{Unjammed}}}}}}}\)). The term \({{{{{\rm{BE}}}}}}{{{{{{\rm{R}}}}}}}_{{{{{{\rm{Limit}}}}}}}\) is the BER value when Bob is completely unable to recover the signal. We consider \({{{{{\rm{BE}}}}}}{{{{{{\rm{R}}}}}}}_{{{{{{\rm{Limit}}}}}}}\) to be 10−3, a reasonable limit for forward error correction (FEC) algorithms28,29. With this definition, Mallory is ineffective with her jamming attack when eJ = 0, while when eJ ≥ 1, she has obscured the signal completely.
The success of Mallory’s attack is predicated on how efficiently she can couple her signal into Bob’s antenna relative to Alice’s coupling. This can be evaluated using the Friis transmission equation, which allows us to evaluate the ratio of powers of Alice (\({P}_{{{{{{\rm{Bob}}}}}}}^{{{{{{\rm{Alice}}}}}}}\)) and Mallory (\({P}_{{{{{{\rm{Bob}}}}}}}^{{{{{{\rm{Mal}}}}}}}\)) as measured by Bob (see Methods for the derivation):
where \({P}_{{{{{{\rm{Alice}}}}}}}\) and PMallory are Alice’s and Mallory’s nominal power respectively, \({G}_{{{{{{\rm{Alice}}}}}}}^{\theta \,=\,0}\) and \({G}_{{{{{{\rm{Mallory}}}}}}}^{\theta \,=\,0}\) are their respective maximal gain (in the direction of the primary lobe, θ = 0), and RAB and RMB are the distances from Alice to Bob and from Mallory to Bob respectively. Clearly, if Mallory increases her gain and/or transmit power and/or reduces her distance to Bob, she will have a more disrupting effect on the link. As for Alice, if she increases her power and/or her gain and/or reduces her distance to Bob, she can counter the effect of the jamming attack. \({G}_{{{{{{\rm{Bob}}}}}}}^{\theta \,=\,{\theta }_{M}}\) and \({G}_{{{{{{\rm{Bob}}}}}}}^{\theta \,=\,0}\) correspond to the gains of Bob’s receiver antenna in the direction of Mallory (θ = θM) and Alice respectively. To improve the security of the link, Bob can use a more directional antenna such that the gain in the front direction is larger than the gain on the side i.e., \({G}_{{{{{{\rm{Bob}}}}}}}^{\theta \,=\,0}\,\gg\, {G}_{{Bob}}^{\theta \,=\,{\theta }_{M}}\).
To explore these relationships, we experimentally characterize the effect of Mallory’s angular position and broadcast power on the real-time measured BER and the jamming efficiency when she uses Alice’s center frequency. Mallory directs her beam into Bob’s antenna at an angle, coupling the jamming signal into the side lobes of Bob’s antenna (20–45°). Evidently, Mallory’s jamming efficiency depends on her angular position. In Fig. 3a, we show the measured BER as a function of Mallory’s angle when she transmits a fixed power of 9.8 dBm (black curve) relative to Alice transmitted power of −10.5 dBm. For all measured angles, up to 45 degrees, Mallory’s attack degrades the BER, and induces an increase in Bob’s detected power (blue curve). Since Mallory couples into the side lobes of Bob’s antenna, it is not surprising that the BER tracks the radiation pattern (which is simulated with a finite element method in the inset of Fig. 3a). At angles of θM < 27° Mallory can access the edge of Bob’s primary lobe and increase the jamming efficiency to 100%, thus completely disrupting the link. Mallory can of course also improve the efficiency of her attack by increasing her transmitted power (and thus also increasing Bob’s received power, as noted in Eq. 4). Figure 3b shows how the jamming efficiency depends on the increase in power received by Bob, at a fixed θM = 22°. At this angle, the radiation pattern of Bob’s receiver is ~17 dB lower than the peak at 0°, which explains the required difference of nominal output power between Mallory (who is envisioned as a powerful adversary) and Alice. The results indicate that a small increase of ~0.25 dB in Bob’s received power can disrupt the link up to 50% in jamming efficiency. Moreover, if Mallory manages to increase Bob’s received power by ~0.75 dB, she can completely destroy the communication link (eJ > 1).
This conclusion is not surprising and would apply equally well to jamming attacks at lower frequencies. However, the asymmetry of the effect of jamming on the 0 and 1 bits (Fig. 2b) requires a more careful consideration. The results described above assume that Bob can optimize the decision threshold used to distinguish between a 0 bit and a 1 bit, as is often the case in incoherent OOK modulation schemes. However, the asymmetry illustrated in Fig. 2b suggests that this optimization would change as Mallory varies her broadcast power, meaning that if Bob attempts to adapt to the attack, Mallory can thwart him by changing her jamming power. In Fig. 4, we compare the BER achieved by Bob with a fixed decision threshold (no optimization, red dots) to that achieved when the threshold is manually optimized at each point (yellow to blue dots). As Mallory increases her interference (decreasing the signal-to-interference-plus-noise ratio (SINR)), the BER increases in both cases. However, the variation of the BER is quite different. Remarkably, as the interference increases, Bob must monotonically decrease the value of his decision threshold to optimize the BER (as can be seen by the monotonic change of the circle colors from yellow to blue). Typically, in the presence of noise that does not distinguish between bits 0 and 1, the decision threshold is taken at the half point between the bits30. Here, because of the asymmetry of Mallory’s interference jamming, only the bit 1 broadens in the eye diagram (see Fig. 2b), forcing Bob to position his decision point at a lower value to correctly decipher the bits. The measured results for the case of optimized decision threshold are well described by the theoretical error probability for an incoherent OOK transmission, corrected for a decision threshold not taken at half point30 (black curve, see Methods). Mallory’s interference also impacts the channel capacity by effectively decreasing the SINR. The inset of Fig. 4 shows the effect of the interference on the normalized channel capacity which we obtained from experimental measurements of the SINR and the standard equation for capacity (see “Methods” for details). As the interference term increases, the normalized capacity decreases.
Beat jamming
We next consider the possibility that Mallory’s single-tone frequency may be different from Alice’s i.e., \({\nu }_{A}\,\ne\, {\nu }_{M}\). As noted above, this possibility—which we refer to as beat jamming—has not previously been considered in the context of malicious jamming attacks, due to the narrowband nature of typical receivers at lower frequencies16,31. Here, because Bob’s receiver likely operates with a broad detection bandwidth, Mallory has this additional degree of freedom to optimize the effectiveness of her attack while minimizing the likelihood of alerting Alice and Bob to her presence. In our experiment, Mallory is positioned at θM = 22°, transmits 12 dB more power than Alice and sweeps her frequency from 197.6 to 201.6 GHz, while Alice’s center frequency is fixed at 197.5 GHz. In Fig. 5a, we show the effect of Mallory’s jamming on the spectrum measured by Bob, for various values of Δν. The blue curves are the jammed spectrum, and the red curves show the difference between this jammed spectrum and the original unjammed spectrum. Mallory’s jamming introduces a broad interference term spectrally centered at the beat frequency Δν (indicated by the black arrow in Fig. 5a). As Mallory’s transmit frequency increases, the position of the interference signal in Bob’s spectrum is shifted towards higher frequencies. A separate measurement when Alice and Mallory transmit single-tone signals without modulation (not shown) confirms the location of the beat frequency.
In this attack scenario, the effect of Mallory’s interference depends on the bandwidth and modulation format employed by Alice. We observe an oscillatory behavior in the BER with an increase in Mallory’s frequency (red circles in Fig. 5b). This is because, as she increases her frequency, the interference she introduces overlaps with the peaks and valleys of the spectrum of the original data, causing respectively greater and lower degradation of the communication link. We can model this phenomenon based on a simple description of the SINR. From Eq. 2, we assume that the first, second and third terms correspond respectively to the signal S, the interference I and the noise N. We consider a spectral representation of the individual terms, which we integrate over the bandwidth B corresponding to the main spectral lobe:
where \(\left|\widetilde{S}\left(\nu \right)\right|\), \(\left|\widetilde{I}\left(\nu \right)\right|\), and \(\left|\widetilde{N}\left(\nu \right)\right|\) are the absolute values of the Fourier transforms of the power terms corresponding to the signal, the interference, and the noise, respectively first, second and third term of Eq. 2. Here, the frequency integrals are taken between 0 and the bandwidth B. In practice, this could represent the use of a carefully designed bandpass filter that could remove the out-of-band noise and interference added by Mallory’s jamming. In particular, the interference term becomes
where \({\mathfrak{I}}{\mathfrak{\{}}{\mathfrak{\}}}\) denotes the Fourier transform and * is the convolution operator. The Fourier transform of the cosine gives rise to two delta functions centered at the frequencies ±Δν, which, by convolution and the sifting property, shift the data spectrum \({\mathfrak{I}}\left\{{u}_{A}\left(t\right)\right\}\) by ±Δν. This results in an interference whose center is defined by the beat frequency, and with a bandwidth proportional to Alice’s bandwidth. This is an important point because it means that the overlap between the interference and Alice’s data cannot be avoided if the beat frequency is smaller than the signal bandwidth, i.e., if \(\left|{\nu }_{A}\,-\,{\nu }_{M}\right| \, < \, B\).
This simple model of the SINR is used to obtain the semi-analytical BER shown in Fig. 5b. For simplicity, we assume that a single bit is transmitted in the form of a non-return-to-zero rectangular pulse of duration T related to the data rate B = 1/T. We then compute the SINR using Eq. 5 assuming a uniform spectral noise, and we deduce the BER from the fit shown in Fig. 4. The resulting calculated BER (blue curve in Fig. 5b) matches the experimental results very well. As can be seen, the degradation of the link is maximized when Mallory operates at the same carrier frequency as Alice (\(|{\nu }_{A}\,-\,{\nu }_{M}|\,=\,0\)), but also when the beat frequency is at half of the bandwidth of Alice’s transmission (\(\left|{\nu }_{A}\,-\,{\nu }_{M}\right|\,=\,B/2\)). This result suggests an optimization strategy for Mallory which avoids placing her jamming signal at the same carrier frequency as that used by Alice (thus minimizing the likelihood of detection). In general, as long as the interference signal is within Bob’s bandwidth, Mallory can have a disruptive effect on the Alice-Bob link. For larger detuning, when the interference signal exceeds this data bandwidth, the effect on the BER is negligible, as can be seen by the abrupt decrease in the modeled BER when the beat frequency increases. This result has profound implications, as it quantifies the extent to which the use of a broader transmission bandwidth (higher data rate) increases the vulnerability to jamming.
Modulated jamming
Finally, we consider the possibility that Mallory can use a modulated jamming signal rather than a single-frequency tone. To explore this idea, we equip Mallory with the possibility to transmit a random bit pattern (also OOK modulation) at a data rate of 0.5 Gbps. The results, presented in Fig. 6, show that this method of jamming is even more effective than the single-tone jamming scenario. With the same transmit power, Mal achieves \({e}_{J}\ge 1\) while operating with carrier frequencies between 197.52 and 200.5 GHz, completely destroying the communication link (Fig. 6a). Moreover, when Mallory’s frequency is greater than 201.5 GHz, the single-tone jamming is ineffective, yet the modulated jamming can still achieve a minimum eJ of 0.75. This phenomenon can be explained by reevaluating the analytical expression of Bob’s jammed signal. We introduce a new modulated signal term \({u}_{M}\left(t\right)\) in the second term of Eq. 1. The resulting expression, after eliminating the high frequency and DC terms, is:
As earlier, this expression includes a sinusoidal interference term at the beat frequency Δν, but it is now also a function of Mallory’s data stream, uM(t). In addition, a new DC term that corresponds to Mallory’s modulated data (second term on the right-hand side of Eq. 7) is now part of the interference signal. Figure 6b shows the spectra that Bob measures without (blue) and with (red) Mallory’s modulated jamming, while the modulated data that Mallory sends is shown in green (measured while blocking Alice).
The DC term that Mallory introduces in the spectrum can have significant impact on the jamming. Importantly, this term allows Mallory’s carrier frequency to be very different from Alice’s and still maintain a successful jamming attack. For example, in our experiments, Bob’s zero-bias Schottky diode receiver is sensitive to a wide band of frequencies from 140 to 220 GHz. Therefore, as long as Mallory sends her modulated data in this band, the DC interference term can still disrupt the link. Then, by tailoring the bandwidth of her modulated signal, she can overlap Alice’s data to completely destroy it.
In conclusion, we report the first investigation of jamming at THz frequencies in a noncoherent modulation scheme. We demonstrate that Mallory, the jammer, can effectively interfere with Alice, the transmitter, by aiming at Bob, the receiver, and coupling into one of the side lobes of his antenna. This aiming requirement contrasts with jamming attacks at lower frequencies and finds its origin from the use of highly directional antennas at THz frequencies. Mallory’s attack can be optimized by adjusting her angular position and transmit power. In our testbed demonstration, we show that if Mallory increases Bob’s received power by only ~0.25 dB, she can disrupt the link by 50%, while she completely disrupts it with an increase of only ~0.75 dB. Interestingly, the eye diagrams reveal that Mallory’s jamming affects only the high bit, which means that Bob must adjust the value of his decision threshold to correctly decipher the transmission. More importantly, we emphasize the new ability for Mallory to tune her carrier frequency away from that used by Alice and Bob, which can minimize her likelihood of detection without substantial sacrifice in her ability to jam the channel, a method that we term “beat jamming.” Finally, we show that the attack can be even more devastating if Mallory uses a modulated signal.
One of the unique aspects of jamming at such high frequency is that even a single-tone source located far from Alice’s center frequency can disrupt Bob’s measured signal (assuming of course that Bob’s receiver is able to detect the signal) via convolution of Alice’s spectrum with Mallory’s single-tone. This jamming mechanism is possible because Bob uses an envelope power detector—in our case, a Schottky diode. This type of noncoherent detection is in common use at THz frequencies and is part of the recent standardization efforts of the IEEE 802.15.3d task group20. It is intended to be used for low-cost and low-complexity devices in short range applications. In this work, we used OOK modulation, and showed how the jamming affected the bits 0 and 1 differently. For more advanced modulation schemes, such as coherent modulation, multi-carrier transmission and high-order modulation formats, additional research would be required to evaluate the efficacy of these types of jamming attacks. In addition, we have made several simplifying assumptions about the threat model, for example that Mallory is a constant jammer, not broadcasting randomly or in reaction to the activity on the channel. These assumptions facilitate our focus on those aspects of jamming that are of particular relevance to the millimeter-wave and terahertz ranges and could be refined in future research.
As for Alice and Bob, they have several counter-measures available to them. If Alice increases her power or Alice and Bob increase their directivity gains, Mallory will either be less effective or would need to increase her transmit power or directivity to maintain the same level of attack. To detect the attack, Bob can monitor changes in his detected power and/or spectrum. He can also monitor the eye diagrams, as the jamming has a nonuniform effects on the bits 0 and 1. More cleverly, Alice and Bob can use different interference mitigation strategies22,32,33,34,35,36. For example, they can use a low-weight channel coding scheme37 where more information is conveyed through the bit 0, therefore reducing the disrupting effect of Mallory’s jamming. They can also use a binary pattern modulation33, a chirp spread spectrum technique35, or phase-domain spreading36, which have shown to be robust against interference. Of course, if Mallory takes a non-static approach to jamming (no longer a constant jammer), the situation becomes more complex, requiring further research. Our findings reveal important vulnerabilities which may redefine aspects of the physical layer security in the THz range.
Methods
Experimental setup
The detailed experimental setup is depicted in Fig. 1b. Alice’s transmitter consists of a photoconductive antenna (PCA) illuminated by two slightly detuned 1535 nm distributed feedback (DFB) diode lasers. The difference in frequency between the two lasers is used to generate THz radiation through a photomixing process in the PCA38. For wireless communications, we modulate the optical signal using a fiber-coupled lithium niobate Mach-Zender modulator driven by a pulse pattern generator (PPG) outputting a 1.12 Gbps OOK signal with a pseudo-random binary sequence of length 27 − 139. Before reaching the photomixer, the optical signal is amplified with an erbium-doped fiber amplifier (EDFA). Mallory’s antenna consists of a frequency multiplier chain, with a multiplication factor of 16, driven by an RF oscillator (RF OSC) outputting 12.2–12.8 GHz. For broadband jamming, the driving RF signal is modulated using a double balanced mixer (DBL Mixer) with a limited bandwidth of 500 MHz driven by a PPG40. Bob’s receiver is a waveguide-coupled zero-bias Schottky diode with a detection sensitivity limited by the bandwidth of the waveguide, 140–220 GHz. The received signal passes through low-pass filters to obtain the baseband signal between 0.1 MHz and 6 GHz. The signal can then be routed to a power meter, an oscilloscope, or a real-time bit-error rate tester (BERT), which allows us to measure the bit error without any additional post-processing.
Alice’s antenna is positioned at 210 mm from Bob’s antenna, while Mallory is 280 mm away from Bob. Alice uses a 75 and 120 mm lens to focus her beam into Bob’s antenna while Mallory only uses a 75 mm lens. Mallory and Bob both use WR5.1 conical horn antennas. Mallory’s rotation angle can be adjusted from 20° to 45° relative to the Alice to Bob line-of-sight, limited at the minimum by the physical size of Alice’s lenses. This attack can be effective at lower angles given that Alice and Mallory do not physically block the beam of each other.
Effectiveness of jamming based on Friis equation
Mallory’s jamming depends on how well she can couple into Bob’s antenna relative to Alice’s coupling. This can be evaluated using the Friis transmission equation. Mallory’s power detected by Bob is:
where PMal is Mallory’s power, λ is the wavelength and RMB is the distance between from Mallory to Bob. \({G}_{{Mallory}}^{\theta \,=\,0}\) is the maximal gain of Mallory’s antenna (in the front direction, θ = 0, if she uses, e.g., a horn antenna). \({G}_{{Bob}}^{\theta \,=\,{\theta }_{M}}\) is the gain of Bob’s antenna in the direction from Mallory to Bob, θ = θM. Similarly, the power from Alice that Bob detects is:
where, we again assume that the maximal possible gains are taken in the forward directions, θ = 0. Then, the effectiveness of Mallory’s jamming can be evaluated by computing the ratio of powers of Mallory and Alice as measured by Bob’s receiver, which can be found in Eq. 4.
The exponential fit in Fig. 3b is represented by the following expression: \({e}_{j}\,=\,a\,{{{{{\rm{exp }}}}}}\left(-b\Delta {{{\rm{Power}}}}_{{{\rm{Bob}}}}\right)\,+\,c\). Using a least-square fitting procedure, we get a = −1.747, b = 0.9735 and c = 1.885. This fit describes the change in power detected by Bob’s receiver needed to in order to induce a change in jamming efficiency.
Error probability fit of the SINR
The fit in Fig. 4 is calculated from the analytical model of the probability of error for a noncoherent system with OOK modulation, which can be derived from a Rayleigh and Rician probability distribution functions used to model the envelop statistics, and which can be subsequently used to evaluate the probability of symbol error30. We use the following modified theoretical function to fit our measurements:
where \({{{{{\rm{erfc}}}}}}\left({{{{{\rm{x}}}}}}\right)\) is the complementary error function. The fitting parameters A, B, and C were obtained by minimization of the mean-square between the analytical model and the experimental results. The energy per bit \({\gamma }_{b}\,=\,{{{{{\rm{SINR}}}}}}\,\cdot\, A\) is proportional to the SINR through the parameter A, that we fit to obtain A = 7.77. In general, this parameter depends in a complicated manner on the transmission parameters (free-space path loss, antenna gains, distances, etc.), but also on the bandwidth, spectral efficiency and modulation scheme. The parameters B and C are used to consider the fact that the decision threshold for each BER measurement is not set at the standard half point but is rather optimized for each measurement to reduce the effect of jamming on the upper bit and minimize the BER. In Fig. 4, the slight deviation between the model (black curve) and the points for the case of optimized threshold (yellow to blue points) finds its experimental origin in the limited voltage resolution of the decision threshold in the BERT.
Effect of the jamming on the channel capacity
Inset of Fig. 4 shows the normalized channel capacity \(\widetilde{C}\) as a function of the interference term defined as:
Here, \({{{{{{\rm{SINR}}}}}}}_{{{{{{\rm{Jammed}}}}}}}\,=\,S/(I\,+\,N)\) is the measured SINR in the presence of Mallory’s jamming signal, while S is Alice’s signal, I is the interference caused by Mallory, and N is the noise. \({{{{{{\rm{SNR}}}}}}}_{{{{{{\rm{Unjammed}}}}}}}\,=\,S/N\) is the SNR that Bob detects in the absence of a jammer (I = 0), which is experimentally measured without Mallory’s presence. With this normalized definition, \(\widetilde{C}\,=\,1\) indicates no effect of the interference and the channel capacity is unaffected, while lower values indicate how much of the channel capacity has been negatively impacted by Mallory’s jamming. For example, when \(\widetilde{C}\,=\,0.4\), the channel capacity decreased to 40% of its original value.
Reporting summary
Further information on research design is available in the Nature Research Reporting Summary linked to this article.
Data availability
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
Nagatsuma, T., Ducournau, G. & Renaud, C. C. Advances in terahertz communications accelerated by photonics. Nat. Photonics 10, 371–379 (2016).
Sengupta, K., Nagatsuma, T. & Mittleman, D. M. Terahertz integrated electronic and hybrid electronic–photonic systems. Nat. Electron. 1, 622–635 (2018).
Song, H.-J. et al. 24 Gbit/s data transmission in 300 GHz band for future terahertz communications. Electron. Lett. 48, 953 (2012).
Koenig, S. et al. Wireless sub-THz communication system with high data rate. Nat. Photonics 7, 977–981 (2013).
Harter, T. et al. Generalized Kramers–Kronig receiver for coherent terahertz communications. Nat. Photonics 14, 601–606 (2020).
Schneider, T., Wiatrek, A., Preussler, S., Grigat, M. & Braun, R.-P. Link budget analysis for terahertz fixed wireless links. IEEE Trans. Terahertz Sci. Technol. 2, 250–256 (2012).
Guerboukha, H. et al. Efficient leaky-wave antennas at terahertz frequencies generating highly directional beams. Appl. Phys. Lett. 117, 261103 (2020).
Ma, J. et al. Security and eavesdropping in terahertz wireless links. Nature 563, 89–93 (2018).
Petrov, V. Moltchanov, D. Jornet, J. M. & Koucheryavy, Y. Exploiting Multipath Terahertz Communications for Physical Layer Security in Beyond 5G Networks. in IEEE INFOCOM 2019—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (IEEE, 2019), pp. 865–872.
Yeh, C.-Y., Ghasempour, Y., Amarasinghe, Y., Mittleman, D. M. & Knightly, E. W. Security in terahertz WLANs with Leaky wave antennas. in Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM, 2020), pp. 317–327.
Qiao, J. & Alouini, M. S. Secure transmission for intelligent reflecting surface-assisted mmWave and terahertz systems. IEEE Wirel. Commun. Lett. 9, 1743–1747 (2020).
Lu, X., Venkatesh, S., Tang, B. & Sengupta, K. 4.6 Space-Time Modulated 71-to-76GHz mm-Wave Transmitter Array for Physically Secure Directional Wireless Links. in 2020 IEEE International Solid- State Circuits Conference—(ISSCC) (IEEE, 2020), pp. 86–88.
Wang, R., Mei, Y., Meng, X. & Ma, J. Secrecy performance of terahertz wireless links in rain and snow. Nano Commun. Netw. 28, 100350 (2021).
Mei, Y., Ma, Y., Ma, J., Moeller, L. & Federici, J. F. Eavesdropping risk evaluation on terahertz wireless channels in atmospheric turbulence. IEEE Access 9, 101916–101923 (2021).
Taylor, E. R. Preliminary Design of Airborne Multiple Spot Jamming System. Report 993-2. (Office of Scientific Research Committee Division of Radio Coordinatation, Dayton, 1944).
Xu, W., Ma, K., Trappe, W. & Zhang, Y. Jamming sensor networks: attack and defense strategies. IEEE Netw. 20, 41–47 (2006).
Fang, S., Liu, Y. & Ning, P. Wireless communications under broadband reactive jamming attacks. IEEE Trans. Depend. Secur. Comput. 13, 394–408 (2016).
Petrov, V., Komarov, M., Moltchanov, D., Jornet, J. M. & Koucheryavy, Y. Interference and SINR in millimeter wave and terahertz communication systems with blocking and directional antennas. IEEE Trans. Wirel. Commun. 16, 1791–1808 (2017).
Petrov, V. et al. The impact of interference from the side lanes on mmWave/THz band V2V communication systems with directional antennas. IEEE Trans. Veh. Technol. 67, 5028–5041 (2018).
Petrov, V., Kurner, T. & Hosako, I. IEEE 802.15.3d: first standardization efforts for sub-terahertz band communications toward 6G. IEEE Commun. Mag. 58, 28–33 (2020).
Rivest, R. L., Shamir, A. & Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978).
Huang, X., Dolmans, G. & Long, J. R. An interference suppression technique for RF envelope detection transceivers. in 2015 Texas Symposium on Wireless and Microwave Circuits and Systems (WMCS) (IEEE, 2015), pp. 1–5.
Song, H.-J., Kim, J.-Y., Ajito, K., Yaita, M. & Kukutsu, N. Fully integrated ASK receiver MMIC for terahertz communications at 300 GHz. IEEE Trans. Terahertz Sci. Technol. 3, 445–452 (2013).
Witrisal, K. et al. Noncoherent ultra-wideband systems. IEEE Signal Process. Mag. 26, 48–66 (2009).
Alemseged, Y. D. & Witrisal, K. Energy detection under narrowband interference in UWB systems. in 2007 6th International Conference on Information, Communications & Signal Processing (IEEE, 2007), pp. 1–5.
Kiyani, N. F., Zhang, Y., Harpe, P., Huang, X. & Dolmans, G. Performance analysis and measurement results of an ultra-low power wakeup radio in the presence of interference. In 2011 XXXth URSI General Assembly and Scientific Symposium (IEEE, 2011), pp. 1–4.
Barros J. & Rodrigues, M. R. D. Secrecy Capacity of Wireless Channels. in 2006 IEEE International Symposium on Information Theory (IEEE, 2006), pp. 356–360.
Dyadyuk, V. et al. A multigigabit millimeter-wave communication system with improved spectral efficiency. IEEE Trans. Microw. Theory Tech. 55, 2813–2821 (2007).
Hirata Y. & Yamada, O. Applications to Communication Systems. in Essentials of Error-Control Coding Techniques (Elsevier, 1990), pp. 103–169.
Carlson, A. B. & Crilly, P. B. Bandpass Digital Transmission. In Communication Systems An Introduction to Signals and Noise, McGraw Hil (2010), pp. 647–720.
Vadlamani, S., Eksioglu, B., Medal, H. & Nandi, A. Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016).
Dehner, H.-U., Jakel, H., Burgkhardt, D. & Jondral, F. K. The Teager-Kaiser energy operator in presence of multiple narrowband interference. IEEE Commun. Lett. 14, 716–718 (2010).
Dehner, H.-U., Jakel, H. & Jondral, F. K. Narrow- and Broadband Interference Robustness for OOK/BPPM Based Energy Detection. In 2011 IEEE International Conference on Communications (ICC) (IEEE, 2011), pp. 1–5.
Kiyani, N. F., Sridharan, V. & Dolmans, G. Co-channel interference mitigation technique for non-coherent OOK receivers. IEEE Wirel. Commun. Lett. 3, 189–192 (2014).
Jeon, M., Kim, K. & Lee, J. Interference Reduction Modulation Based on Chirp Spread Spectrum for Capsule Endoscopy. In 2012 IEEE Workshop on Signal Processing Systems (IEEE, 2012), pp. 91–96.
Gambini, S., De Nardis, L. Alon, E. & Rabaey, J. M. Interference robust self-mixing UWB systems using phase-domain spreading. in 2011 IEEE International Conference on Ultra-Wideband (ICUWB) (IEEE, 2011), pp. 44–48.
Jornet, J. M. & Akyildiz, I. F. Low-Weight Channel Coding for Interference Mitigation in Electromagnetic Nanonetworks in the Terahertz Band. In 2011 IEEE International Conference on Communications (ICC) (IEEE, 2011), pp. 1–6.
Preu, S., Dhler, G. H., Malzer, S., Wang, L. J. & Gossard, A. C. Tunable, continuous-wave Terahertz photomixer sources and applications. J. Appl. Phys. 109, https://doi.org/10.1063/1.3552291 (2011).
Nallappan, K., Guerboukha, H., Nerguizian, C. & Skorobogatiy, M. Live streaming of uncompressed HD and 4K videos using terahertz wireless links. IEEE Access 6, 58030–58042 (2018).
Ma, J., Shrestha, R., Moeller, L. & Mittleman, D. M. Invited article: channel performance for indoor and outdoor terahertz wireless links. APL Photonics 3, 051601 (2018).
Acknowledgements
D.M. research was supported by the US National Science Foundation, grants NSF-1923733 and NSF-1954780, and by the Air Force Research Laboratory, grant AFRL-FA8750-19-1-0500. E.K. research was supported by the US National Science Foundation, grants CNS-1955075 and CNS-1923782, and by DOD: Army Research Laboratory, grant W911NF-19-2-0269. H.G. gratefully acknowledges support from Fonds de recherche du Québec—Nature et Technologies.
Author information
Authors and Affiliations
Contributions
R.S and H.G. contributed equally. R.S. conceptualized and performed the experiments with help from H.G. and Z.F. H.G. developed the analytical modeling and simulations. H.G. and R.S. wrote the manuscript and prepared the figures with inputs from D.M. and E.K. The project was supervised by D.M. All authors contributed ideas, discussed the results, and approved the final version of the paper.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Peer review
Peer review information
Nature Communications thanks Pham Tien Dat, Mohamed Shehata and the other anonymous reviewer(s) for their contribution to the peer review of this work.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Shrestha, R., Guerboukha, H., Fang, Z. et al. Jamming a terahertz wireless link. Nat Commun 13, 3045 (2022). https://doi.org/10.1038/s41467-022-30723-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41467-022-30723-8
This article is cited by
-
Wireless communications sensing and security above 100 GHz
Nature Communications (2023)
-
The effect of angular dispersion on THz data transmission
Scientific Reports (2022)
-
Achromatic Quarter-Waveplate for the Terahertz Frequency Range Made by 3D Printing
Journal of Infrared, Millimeter, and Terahertz Waves (2022)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.