Federated Transfer Learning Aided Interference Classification in GNSS Signals
Abstract
This study delves into the classification of interference signals to global navigation satellite systems (GNSS) stemming from mobile jammers such as unmanned aerial vehicles (UAVs) across diverse wireless communication zones, employing federated learning (FL) and transfer learning (TL). Specifically, we employ a neural network classifier, enhanced with FL to decentralize data processing and TL to hasten the training process, aiming to improve interference classification accuracy while preserving data privacy. Our evaluations span multiple data scenarios, incorporating both independent and identically distributed (IID) and non-identically distributed (non-IID), to gauge the performance of our approach under different interference conditions. Our results indicate an improvement of approximately in classification accuracy compared to basic convolutional neural network (CNN) model, accompanied by expedited convergence in networks utilizing pre-trained models. Additionally, the implementation of FL not only developed privacy but also matched the robustness of centralized learning methods, particularly under IID scenarios. Moreover, the federated averaging (FedAvg) algorithm effectively manages regional interference variability, thereby enhancing the regional communication performance indicator, , by roughly compared to isolated setups.
Index Terms:
GNSS interference, federated learning, transfer learning, communication performance, data privacy, interference classificationI Introduction
GNSS receivers are widely used in both industrial and civilian domains, thanks to their all-weather capability, robust real-time performance, and precise navigation and timing[1]. However, the GNSS jamming signals, particularly within the L-band spectrum, can disrupt a GNSS receiver to the point of disabling its operation[2]. Research has identified jamming as the primary reason for outages in GNSS-based services[3]. Thus, incorporating defenses against such attacks is considered an essential feature for GNSS receivers[4]. Furthermore, the considerable distance of GNSS satellites from Earth reduces the signal power reaching the receiver due to path loss, rendering it highly susceptible to interference[5], while most intentional interferences originate from personal privacy devices, which, despite being illegal, are readily available online[6]. Therefore, these interference devices may cause incorrect positioning, navigation and timing services. As results, interference signals can lower receiver performance by decreasing the carrier to noise ratio (), potentially leading to service interruptions.
With the increasing prevalence of interference signals, safeguarding GNSS receivers against such disruptions has become imperative. Accurate interference recognition enables the detection, characterization, and subsequent elimination of interference, utilizing interference parameter models in tandem with relevant techniques. Recently, solutions for interference mitigation have expanded to detection[7], mitigation[8], localization[9]. In [10], the authors proposed a predictor based on neural networks for global positioning system (GPS) anti-interference. Additionally, [11] assessed machine learning algorithms, including support vector machine (SVM), neural network, and random forest (RF), for detecting interference in wireless communication systems. Furthermore, authors in [12] proposed an intelligent radar anti-interference decision-making method based on deep deterministic policy gradient and multi-agent deep deterministic policy gradient to cope with changes in the interference aircraft’s strategies.
While considerable progress has been made in interference mitigation, research specifically targeting interference classification remains relatively sparse. In [2], the authors used SVM and CNN for interference classification, both methods achieved accuracies over . Building upon this work, [13] enhances GNSS interference signal classification accuracy using signal representation concatenation and transfer learning, evaluating classifiers like SVM, RF, and logistic regression (LR). Most GNSS interference research relies on synthetic data, however, collecting authentic data is crucial for training effective GNSS interference classifiers. Traditional crowdsourcing methods, which often require clients to record and directly share data with central servers, pose significant privacy threats[4]. Federated learning (FL) addresses this challenge by decentralizing data, enabling models to be trained on local devices and transmitting only updated model parameters to a central server. Thus, leveraging FL in the classification network enables indirect data exchange between clients and the central server, significantly enhancing both resource efficiency and privacy.
The effectiveness of collaborative management in mitigating GNSS interference was demonstrated by the authors in [14]. Furthermore, FL was utilized for interference classification in [4], achieving performance comparable to centralized learning. However, none of these studies dealt with the identified interference or analyzed the impact of interference on the performance of the communication system. For addressing the above-mentioned issue,the contributions of this paper are summarized as follows:
-
•
We propose a neural network-based interference classifier that prioritizes data privacy via federated learning (FL) and accelerates training using transfer learning (TL).
-
•
Within a wireless communication area, each local client efficiently manages changes in interference strategies and accomplishes classification tasks using a small training dataset. This is achieved by exchanging model parameters with the central server, thereby minimizing the impact on the GNSS receiver performance metric .
-
•
We evaluate the effectiveness of our interference classifiers under various data distribution scenarios, including both independent and identically distributed (IID) and non-IID settings.
The paper is structured as follows: Section II outlines the system model for interference classification in GNSS and provides an overview of different types of jamming. Section III elaborates on the FL technique utilized. Simulation results are presented in Section IV, followed by conclusions drawn in Section V.
![Refer to caption](extracted/5686113/system_model.png)
II System Model
II-A System Outline
In this article, we focus on the potential occurrence of signal interference in wireless communication zones, denoted as . Each zone is connected to a central cloud server (CCS), which facilitates information sharing with each base station across each zone. As shown in Fig. 1, we utilize a UAV as a mobile jammer, serving as the source of interference. This UAV potentially disrupts wireless communication signals in these zones through various strategies denoted as . The interference strategy varies with different zone , including different types of signals transmitted within the zones. This means that the jamming UAV may emit a specific or multiple jamming signal types in one specific area, while in another area, the UAV may transmit a completely different signal. We assume the UAV’s position varies within each zone, generating interference in zone , where , which varies due to different interference strategies . Each zone is equipped with interference detectors constructed with convolutional neural networks (CNNs), denoted as , where represents the zone index. Employing the FL strategy, base station in zone shares network model parameters with the CCS to accomplish the task of interference recognition. Subsequently, based on the recognition results, appropriate measures are implemented to mitigate the interference.
The presence of interference signals amplifies the system’s cumulative noise power, thereby reducing the and adversely affecting communication system performance[15]. Precise characterization of interference types enables a neural network classifier to initiate appropriate countermeasures against interference signals, mitigating their adverse effects on the of communication systems.
If the jammer is not detected under a specific region , we define the carrier-to-noise ratio under interference as . Otherwise, in the absence of interference, which includes conditions following successful interference recognition and elimination. Consequently, the corresponding is calculated as follows:
(1) |
where denotes the classification recognition accuracy.
Following [16], the relationship between and SNR is calculated as follows:
(2) |
where represents signal-to-noise ratio for base station under undetected interference , denotes the bandwidth of the received signal for . Similarly, we can calculate the as
(3) |
where represents signal-to-noise ratio for under detected interference .
II-B Classification of Jamming
We roughly model the received signal as follows:
(4) |
where represents the useful signal, denotes the interference signal generated by UAV interference sources, and we assume the noise signal is additive white Gaussian noise (AWGN), represented by . If there is no interference, is set to . This paper utilizes the interferences provided in [2], which include various signal types:
1) Amplitude modulation (AM) jamming: it is expressed as:
(5) |
AM interference manifests as continuous wave (CW) interference. When , it constitutes single-tone interference, while for , it transforms into multi-tone interference. Here, represents the power of the interference component, signifies its corresponding frequency and is the phase.
2) Chirp jamming: it is expressed as:
(6) |
This is a type of signal whose frequency is linearly modulated with time, achieved by scanning frequencies over a certain time range and frequency range. , it indicates upward linear frequency modulation, whereas signifies downward linear frequency modulation. denotes the interference power, represents the interference frequency, and signify the scanning start and end frequencies, respectively, denotes the scanning period and represents the initial phase.
3) Frequency modulation (FM) jamming: it is expressed as:
(7) |
FM interference signals also include both single-tone and multi-tone scenarios, with their carrier frequency influenced by the modulation factor and changing over time. Here, represents the power of the interference component, while denotes its frequency.
4) Pulse jamming or distance measurement equipment (DME)-like jamming: it is expressed as:
(8) |
Pulse interference refers to signals that are active only within a specific time interval, with the ratio of active time to the total period termed the duty cycle. Here, denotes the interference power, denotes a rectangular pulse with a duty cycle of , is the repetition frequency of the pulse and is the interference frequency.
5) Narrow band (NB) jamming: it is expressed as:
(9) |
Narrow-band interference operates within a relatively narrow frequency range of the signal. Here, represents the interference power, is the modulation index, and is a stationary random process with a mean of and a variance of .
Following [2], this paper excludes wide band (WB) jamming from consideration due to the difficulty in detecting its presence. The expressions for these five types of interference signals are detailed in [2]. By applying short-time frequency spectrum transformation, the spectrogram of is generated and rendered as a black-and-white image.
In this paper, we employ a FL strategy, whereby the central cloud server aggregates interference detector models from the regions. Ultimately, the interference detectors across regions share their model parameters with the central server, thus completing the recognition of interference signals.
III Federated Learning Methodology
In conventional machine learning, centralized learning is a common methodology that focuses on training models on a central server. FL is distinguished by its emphasis on privacy, similar to distributed learning, which spreads data across various nodes. Many clients independently train model parameters and then collaborate with a central server to update the global model parameters. FedAvg, a widely used FL algorithm, leverages this approach by allowing each client to independently train its local model. The global model parameters are then improved by calculating the weighted average of the local model parameters[17].
As demonstrated in [4], FL has shown promising results in the field of image classification, with its classification outcomes comparable to state-of-the-art centralized classification. clients collaboratively train a neural classification network, the model is defined as follows:
(10) |
where is the classification result, which consists of elements , , is the number of interference types, is the input image and represents the parameters of the global model. Each client contributes its local dataset to the overall dataset . We denote the size of each dataset as and the size of overall dataset is . Based on the FedAvg algorithm, the purpose of training is to minimize the loss function, which is defined as:
(11) |
Specifically, is the global model loss function, and is the local model loss function for zone . , in which is the loss function of the sample . The optimization process of the Eq.(11) can be expressed as follows. Before the start of the first iteration, the central server initializes a global model. During each iteration, the central server assigns the global model to each participating client in federated learning as its local model. Subsequently, each client conducts training on its local model using its local dataset to update local parameters, as denoted in:
(12) |
Following this, the central server aggregates the local model parameters by applying weight coefficients as:
(13) |
where is the updated local parameters and is the updated global parameters. After the aggregation, the local model parameters together form the update for the global model. The central server utilizes these updates to refresh the global model. Ultimately, this iterative process is repeated a predefined number of times, indicated by .
IV Simulation Results
IV-A Preprocessing procedure
In our experiments, we use the dataset from [2]. The dataset contains binary images with a resolution of pixels and DPI (Dots Per Inch). The dataset’s images are spectrum plots of various interference signals, obtained via short-time Fourier transform. The authors of [2] used images, per jammer type for training, images, per type for validation, and images, images per type for testing. To simplify training and save computational resources, we exclude the validation set in this study. Consequently, The dataset consists exclusively of training and testing sets. The training set comprises image, images per jammer type, while the testing set comprises images, images per jammer type. For faster training during data preprocessing, we downscale image dimensions from to both and .
IV-B Data distribution
In this study, we model the diverse interference strategies of the movable UAV jammer on GNSS receivers across regions by intentionally creating a non-IID training dataset. This approach ensures that movable UAV jammer emits specific interference patterns in each region, aligning with different interference strategies and fitting the system model. Making the dataset non-IID effectively simulates the diversity and complexity of data from various real-world participants, enhancing the model’s robustness and adaptability. As discussed in [4], the authors achieved non-IID by modeling client data to conform to a Dirichlet distribution. Each client receives different categories of interference signals based on probabilities generated by the Dirichlet distribution. These probabilities are determined by the concentration parameter , where a larger value results in a more uniform distribution with less disparity among components. Conversely, a smaller concentration parameter leads to greater disparities among components, causing the distribution to focus on specific components. In this research, we select a concentration parameter of to highlight the data distribution imbalance among clients, ensuring that each client has only specific categories of interference signals. Fig. 2 illustrates the distribution of data quantities corresponding to each interference category for each client when . Clearly, the data distribution shows significant diversity, with each client having only a limited number of interference categories. This accurately reflects the diverse interference strategies employed by drones in different regions.
![Refer to caption](x1.png)
Furthermore, this study examines the model’s performance during training with client data sampled from an IID distribution, contrasting these results with non-IID data scenarios. This comparative analysis enhances our understanding of the system model’s resilience to interference, especially when client data distribution shows significant diversity. Under IID conditions, where each of the client encounters an equal number of interference signals, the sample size totals .
IV-C Model Setting
Authors in [2] used a basic CNN to conduct classification tasks, yielding favorable outcomes. In our study, we first adopt a similar CNN architecture, comprising a convolutional layer, a ReLU layer, a pooling layer, and a fully connected layer. Specifically, the convolutional layer uses filters, each with dimensions of . The ReLU layer reduces redundant computations by kee** positive inputs and zeroing out negative ones. The pooling layer has a size of . Subsequently, the fully connected layer integrates features across the network. The softmax layer outputs class probabilities, enabling predictions across different categories. During training, we set a learning rate of and use the stochastic gradient descent (SGD) optimizer [18].
Furthermore, we utilize TL with the VGGNet architecture[19] for classification. The VGG-16 model includes convolutional layers with kernels, max-pooling layers, and fully connected layers. In this study, we apply TL by adjusting the sixth fully connected layer’s output size of VGG-16 to match our six classification categories. We use both pre-trained and untrained network models for interference classification. During training, we employed the Adam optimizer [20] with a learning rate of , while using the cross-entropy function to calculate the loss.
IV-D Results
Figure 3 shows a comparison of interference classification accuracy using three different network models. Among these, the CNN model [2] achieves an accuracy of . In contrast, the untrained VGGnet model improves accuracy by about to . Additionally, when comparing the convergence of pre-trained and untrained VGGnet models, the pre-trained model converge faster, achieving accuracy. This demonstrates the quicker convergence of pre-trained models on target tasks in transfer learning. Moreover, the untrained model’s slightly higher convergence accuracy than the pre-trained model suggests that untrained models can adapt more flexibly to specific tasks.
![Refer to caption](x2.png)
Figure 4 shows the classification accuracy of the FedAvg algorithm for two different data distributions and the accuracy in the Solo scenario. In the Solo scenario, training occurs on data from a single region, with the dataset containing just two interference types and no model parameter exchange with other regions. The accuracy of the centralized training model network serves as the baseline (with an accuracy of ). Both the FedAvg and Solo scenario use an untrained VGGnet model. Under IID conditions, the FedAvg algorithm’s classification accuracy closely matches centralized training at about . However, with non-IID datasets, accuracy drops slightly to , indicating the increased challenge of learning from diverse data distributions. Additionally, in the Solo scenario, classification accuracy falls to , only identifying the two types of interference in its dataset. This shows that the FedAvg algorithm can recognize different interference types without direct data exchange, even as the UAV jammer’s interference strategies change, unlike in the Solo scenario, where the classifier struggles with unencountered interference types.
![Refer to caption](x3.png)
Suppose that a movable UAV interference source in a given zone emits random types of interference at each moment. Fig. 5 illustrates the values across various interference models and time instances. Assume is and is . Considering the non-uniform distribution of interference across regions, we assess the FedAvg model’s performance with non-IID datasets. With interferences, the value with the FedAvg algorithm is , comparable to centralized learning models at . However, in the Solo scenario, facing three untrained interference types, the drops to , as expected. This shows that the FedAvg algorithm improves the regional by about over the Solo scenario in interference conditions.
![Refer to caption](x4.png)
In conclusion, our findings indicate that using the VGGnet model via TL improves interference classification accuracy by approximately over the convolutional network described in [2]. Furthermore, when client datasets are IID, the FedAvg algorithm’s classification accuracy closely matches that of centralized learning, with only a slight difference under the Dirichlet distribution. Additionally, using the FedAvg algorithm in interference-affected regions can increase the regional by about over the Solo scenario. This approach not only protects regional users’ privacy but also lessens the negative effects of interference on communication performance.
V Conclusion
This paper presented a study on identifying and classifying GNSS interference signals from the movable UAV jammer in five wireless communication regions. The simulation offered insights into classifying six potential interference spectrogram in GNSS systems under various models. Using TL with VGGnet, we achieved an approximate improvement in classification accuracy over the CNN model[2]. Notably, pretrained networks are demonstrated to converge faster than untrained models. Furthermore, the FL framework shows performance comparable to centralized learning, especially when datasets follow an IID pattern. Additionally, the FedAvg approach, compared to the Solo scenario in individual regions, not only protects regional privacy but also effectively tackles interference recognition amidst evolving interference strategies, as this approach significantly enhanced the regional communication performance metric, , by about .
References
- [1] K. J. Silva Lorraine and M. Ramarakula, “A comprehensive survey on GNSS interferences and the application of neural networks for anti-jamming,” IETE Journal of Research, vol. 69, no. 7, pp. 4286–4305, 2023.
- [2] R. Morales Ferre, A. de la Fuente, and E. S. Lohan, “Jammer classification in GNSS bands via machine learning algorithms,” Sensors, vol. 19, no. 22, p. 4841, 2019.
- [3] G. X. Gao, M. Sgammini, M. Lu, and N. Kubo, “Protecting GNSS receivers from jamming and interference,” Proceedings of the IEEE, vol. 104, no. 6, pp. 1327–1338, 2016.
- [4] P. Wu, H. Calatrava, T. Imbiriba, and P. Closas, “Jammer classification with Federated Learning,” in 2023 IEEE/ION Position, Location and Navigation Symposium (PLANS). IEEE, 2023, pp. 228–234.
- [5] A. Grant, P. Williams, N. Ward, and S. Basker, “GPS jamming and the impact on maritime navigation,” The Journal of Navigation, vol. 62, no. 2, pp. 173–187, 2009.
- [6] H. Elghamrawy, M. Karaim, M. Korenberg, and A. Noureldin, “High-resolution spectral estimation for continuous wave jamming mitigation of GNSS signals in autonomous vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 7881–7895, 2021.
- [7] E. Axell, F. M. Eklöf, P. Johansson, M. Alexandersson, and D. M. Akos, “Jamming detection in GNSS receivers: Performance evaluation of field trials,” NAVIGATION: Journal of the Institute of Navigation, vol. 62, no. 1, pp. 73–82, 2015.
- [8] W.-L. Mao, “Robust set-membership filtering techniques on GPS sensor jamming mitigation,” IEEE Sensors Journal, vol. 17, no. 6, pp. 1810–1818, 2016.
- [9] L. Strizic, D. M. Akos, and S. Lo, “Crowdsourcing GNSS jammer detection and localization,” in Proceedings of the 2018 International Technical Meeting of The Institute of Navigation, 2018, pp. 626–641.
- [10] M. Mosavi and F. Shafiee, “Narrowband interference suppression for GPS navigation using neural networks,” GPS solutions, vol. 20, pp. 341–351, 2016.
- [11] Y. Arjoune, F. Salahdine, M. S. Islam, E. Ghribi, and N. Kaabouch, “A novel jamming attacks detection approach based on machine learning for wireless communication,” in 2020 International Conference on Information Networking (ICOIN). IEEE, 2020, pp. 459–464.
- [12] J. Wei, Y. Wei, L. Yu, and R. Xu, “Radar anti-jamming decision-making method based on DDPG-MADDPG algorithm,” Remote Sensing, vol. 15, no. 16, p. 4046, 2023.
- [13] C. J. Swinney and J. C. Woods, “GNSS jamming classification via CNN, transfer learning & the novel concatenation of signal representations,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2021, pp. 1–9.
- [14] M. Nicola, G. Falco, R. Morales Ferre, E.-S. Lohan, A. De La Fuente, and E. Falletti, “Collaborative solutions for interference management in GNSS-based aircraft navigation,” Sensors, vol. 20, no. 15, p. 4085, 2020.
- [15] R. Poisel, Modern communications jamming principles and techniques. Artech house, 2011.
- [16] M. Ding, W. Chen, and W. Ding, “Performance analysis of a normal GNSS receiver model under different types of jamming signals,” Measurement, vol. 214, p. 112786, 2023.
- [17] B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics. PMLR, 2017, pp. 1273–1282.
- [18] N. Qian, “On the momentum term in gradient descent learning algorithms,” Neural networks, vol. 12, no. 1, pp. 145–151, 1999.
- [19] K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
- [20] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” arXiv preprint arXiv:1412.6980, 2014.