IRS-based Wireless Jamming Attacks: When Jammers can Attack without Power

01/07/2020
by   Bin Lyu, et al.
0

This paper introduces a new type of wireless jamming attack, called IRS jamming attack, which enables a jammer to attack a legitimate communication without using any internal energy to generate jamming signals. In particular, for such kind of attacks, the jammer uses an Intelligent Reflection Surface (IRS) which can control reflected signals to diminish the Signal-to-Interference-plus-Noise Ratio (SINR) at the legitimate receiver. To be more specific, once receiving signals from the legitimate transmitter, the IRS jammer will adjust its phase shifts to minimize the received signals at the legitimate receiver. In other words, the jammer can launch jamming attacks just by leveraging signals from the legitimate transmitter. Through simulation results, we show that by using the IRS-based jammer, we can reduce the signal power received at the legitimate receiver by up to 98%. Interestingly, the performance of the proposed IRS jammer is even better than that of the conventional active jamming attacks, although the IRS jammer does not need to use any energy to launch jamming attacks.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset