On Guard Against Wireless Jamming
July 17, 2019 | A*STAREstimated reading time: 2 minutes
An A*STAR team has developed a ‘guard node’ approach to securing internet of things networks.
As the field of wireless communication advances, the sheer number and variety of smart devices and physical objects connected to the internet will only increase. In this internet of things (IoT) universe, we might observe medical sensors monitoring vital signs in patients in real time, and self-driving cars updating their location every millisecond to avoid collisions.
If society is to rely on these IoT systems for critical functions, protecting them from cyberattacks will be vital. A team of researchers at A*STAR’s Institute for Infocomm Research (I2R) has thus developed a strategy involving a ‘guarding node’ to keep IoT networks secure.
In a typical IoT setup, several remote devices transmit information wirelessly to a base station, which must then separate the signal it receives into individual components, then decipher the original information sent by each device. “The base station has to do this ‘blind,’ without any prior knowledge about the true input signals it is meant to receive,” explained Peng Zhang, a Research Scientist at I2R who led the study.
However, this leaves the network open to being jammed by an attacker transmitting a false signal using the same channel as one of the remote devices, which would contaminate the information received by the base station. This is where the guarding node comes into play.
Put simply, the guarding node can be preconfigured at the base station to inject a known guarding signal into other incoming signals from remote devices—think of this as a barcode being overlaid onto the received signal. When the base station recovers the individual incoming signals from the received signal, it should be able to derive the barcode correctly in a jamming-free environment.
Incoming signals that have been subjected to jamming will have the barcode tampered with in a specific manner. Importantly, by analyzing the pattern of tampering, the base station can derive the original signals using an algorithm. This guard node approach enables greater security over low latency connections, the researchers said.
The traditional response to a jamming attack also introduces communication delays as it requires two separate steps: jamming detection, followed by jamming countermeasures such as switching the communication frequency between the base station and the remote device.
“In contrast, the guard node approach enables us to simultaneously detect the jamming attack, reject the jamming signals, and recover the legitimate signals, with just one snapshot of the received signal, preserving a network’s communication speed and security,” Zhang noted.
Moving forward, Zhang’s team will work on simulating modulated signals that are typical of an industrial IoT environment and demonstrate performance enhancements linked to their guard node approach.
Testimonial
"In a year when every marketing dollar mattered, I chose to keep I-Connect007 in our 2025 plan. Their commitment to high-quality, insightful content aligns with Koh Young’s values and helps readers navigate a changing industry. "
Brent Fischthal - Koh YoungSuggested Items
Designers Notebook: Power and Ground Distribution Basics
10/29/2025 | Vern Solberg -- Column: Designer's NotebookThe principal objectives to be established during the planning stage are to define the interrelationship between all component elements and confirm that there is sufficient surface area for placement, the space needed to ensure efficient circuit interconnect, and to accommodate adequate power and ground distribution.
Beyond Design: The Fundamental Structure of Spectral Integrity
10/21/2025 | Barry Olney -- Column: Beyond DesignImpedance can be characterized in both the time and frequency domains. In the time domain, it influences how electromagnetic energy propagates through interconnects, affecting signal integrity and waveform fidelity. In the frequency domain, AC impedance determines how well the network can suppress noise and deliver clean power at a range of frequencies. AC impedance shapes how power rails respond to transient loads.
Elementary Mr. Watson: Chasing Checkmarks, Not Signal Integrity
10/01/2025 | John Watson -- Column: Elementary, Mr. WatsonFor the September 2025 issue of Design007 Magazine on signal integrity, I explored how the PCB is similar to a military obstacle course: walls that sap energy like impedance mismatches, barbed wire that cuts like crosstalk, and mud pits that drag a signal down like attenuation. The takeaway was clear that a PCB is not a flat drawing; it's an electromagnetic ecosystem filled with hazards that test every signal that dares to cross it. The real danger lies not in the obstacles themselves, but in the fact that many designers never see them.
Signal Integrity: A Game of Margins
09/25/2025 | Andy Shaughnessy, Design007 MagazineAs the founder of Wild River Technology, Al Neves deals with some of the most challenging aspects of signal integrity. Wild River’s engineers consult with high-tech companies that work at very high speeds and frequencies, often above 100G. Al is always a fun interview, so we asked him to share his thoughts on the current state of signal integrity engineering.
Understanding Signal Integrity, the Foundation of High-Speed Digital Design
09/25/2025 | Stephen V. Chavez, Siemens EDASignal integrity has become a critical factor in ensuring reliable performance in high-speed digital systems. As data rates continue to increase, engineers must understand the fundamental principles that govern how signals propagate through transmission lines and how to mitigate common issues that can degrade signal quality.