Military Non-Terrestrial Networks Architecture and Spectrum Sharing Method for Mitigating Jamming Attacks and Multiple Access Interference

Hyerim Jeon, Hoki Baek

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The non-terrestrial networks (NTN) have the potential to enhance military operations in the network-centric operational environment (NCOE) through improved communication coverage and connectivity. However, existing NTN cannot satisfy NCOE requirements. To satisfy the requirements, we propose the military NTN (M-NTN) architecture and a novel spectrum-sharing method for coexistence between Low Earth Orbit (LEO) beams and high altitude platforms (HAP) or unmanned aerial vehicles (UAV) cells. M-NTN employ slow frequency hopping (SFH) for primary users (PU) and fast frequency hopping (FFH) for secondary users (SU). To the best of our knowledge, there is no previous work where two different systems simultaneously performed FFH and SFH. We design the SFH method of the PU so that SU can easily access PU's spectrum. Then, we propose two FFH methods, FFHR and A-FFHR, considering SU mobility and mitigating jamming attacks. Mathematical models analyze pulse collision probabilities, showing M-NTN's effective spectrum-sharing and SU performing FFH, which has less multiple access interference among SUs. A-FFHR is effective owing to high jamming detection probability that we ensure via our proposed jamming detection algorithm. We can determine proper network parameters, such as the slot or frame length, to perform jamming detection algorithms via analysis of numerical results.

Original languageEnglish
Pages (from-to)1465-1474
Number of pages10
JournalIEEE Journal on Selected Areas in Communications
Volume42
Issue number5
DOIs
StatePublished - 1 May 2024

Keywords

  • Resource management
  • frequency hopping
  • non-terrestrial network
  • spectrum sharing
  • tactical network

Fingerprint

Dive into the research topics of 'Military Non-Terrestrial Networks Architecture and Spectrum Sharing Method for Mitigating Jamming Attacks and Multiple Access Interference'. Together they form a unique fingerprint.

Cite this