Zachary Schutz, Daniel J. Jakubisin, Charles E. Thornton, R. Michael Buehrer
{"title":"Linear Jamming Bandits: Learning to Jam 5G-based Coded Communications Systems","authors":"Zachary Schutz, Daniel J. Jakubisin, Charles E. Thornton, R. Michael Buehrer","doi":"arxiv-2409.11191","DOIUrl":null,"url":null,"abstract":"We study jamming of an OFDM-modulated signal which employs forward error\ncorrection coding. We extend this to leverage reinforcement learning with a\ncontextual bandit to jam a 5G-based system implementing some aspects of the 5G\nprotocol. This model introduces unreliable reward feedback in the form of\nACK/NACK observations to the jammer to understand the effect of how imperfect\nobservations of errors can affect the jammer's ability to learn. We gain\ninsights into the convergence time of the jammer and its ability to jam a\nvictim 5G waveform, as well as insights into the vulnerabilities of wireless\ncommunications for reinforcement learning-based jamming.","PeriodicalId":501034,"journal":{"name":"arXiv - EE - Signal Processing","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - EE - Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.11191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We study jamming of an OFDM-modulated signal which employs forward error
correction coding. We extend this to leverage reinforcement learning with a
contextual bandit to jam a 5G-based system implementing some aspects of the 5G
protocol. This model introduces unreliable reward feedback in the form of
ACK/NACK observations to the jammer to understand the effect of how imperfect
observations of errors can affect the jammer's ability to learn. We gain
insights into the convergence time of the jammer and its ability to jam a
victim 5G waveform, as well as insights into the vulnerabilities of wireless
communications for reinforcement learning-based jamming.