Spatial spectrum approach for pilot spoofing attack detection in MIMO systems |
Ning, Lina
(School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
Li, Bin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) Wang, Xiang (Beijing Jianyi Co., Ltd.) Liu, Xiaoming (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) Zhao, Chenglin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications) |
1 | W. Q. Wang and Z. Zheng, Hybrid MIMO and phased-array directional modulation for physical layer security in mmWave wireless communications, IEEE J. Sel. Areas Commun. 36 (2018), no. 7, 1383-1396. DOI |
2 | H. Hui et al., Secure relay and jammer selection for physical layer security, IEEE Signal Process. Lett. 22 (2015), 1147-1151. DOI |
3 | A. D. Wyner, The wire-tap channel, Bell Labs Tech. J. 54 (1975), 1355-1387. DOI |
4 | J. Yang et al., A semiblind two-way training method for discriminatory channel estimation in MIMO systems, IEEE Trans. Commun. 62 (2014), 2400-2410. DOI |
5 | J. K. Tugnait, Pilot spoofing attack detection and countermeasure, IEEE Trans. Commun. 66 (2018), 2093-2106. DOI |
6 | J. K. Tugnait, On mitigation of pilot spoofing attack, in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (New Orleans, LA, USA), Mar. 2017, pp. 2097- 2101. |
7 | X. Zhou, B. Maham, and A. Hjorungnes, Pilot contamination for active eavesdropping, IEEE Trans. Wirel. Commun. 11 (2012), 903-907. DOI |
8 | X. Tian, M. Li, and Q. Liu, Random-training-assisted pilot spoofing detection and security enhancement, IEEE Access, 5 (2017), 27384-27399. DOI |
9 | H. Wang, K. Huang, and T. A. Tsiftsis, Multiple antennas secure transmission under pilot spoofing and jamming attack, IEEE J. Sel. Areas Commun. 36 (2018), 860-876. DOI |
10 | Q. Xiong et al., An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems, IEEE Trans. Inform. Forensics Secur. 10 (2015), 932-940. DOI |
11 | Q. Xiong et al., Secure transmission against pilot spoofing attack: A two-way training-based scheme, IEEE Trans. Inform. Forensics Secur. 11 (2016), 1017-1026. DOI |
12 | X. Liu et al., Detecting pilot spoofing attack in MISO systems with trusted user, IEEE Commun. Lett. 23 (2019), 314-317. DOI |
13 | B. Li et al., Efficient beamforming training for 60-GHz millimeter-wave communications: A novel numerical optimization framework, IEEE Trans. Veh. Technol. 63 (2014), 703-717. DOI |
14 | W. Wang et al., On countermeasures of pilot spoofing attack in massive mimo systems: A double channel training based approach, IEEE Trans. Veh. Technol. 68 (2019), 6697-6708. DOI |
15 | P. Salvo Rossi et al., Performance analysis of energy detection for mimo decision fusion in wireless sensor networks over arbitrary fading channels, IEEE Trans. Wirel. Commun. 15 (2016), 7794-7806. DOI |
16 | T. Li and Y. Tang, Frequency estimation based on modulation FFT and MUSIC algorithm, in Proc. Int. Conf. Pervasive Comput., Signal Process. Appl. (Harbin, China), Sept. 2010, pp. 525-528. |
17 | K. Huang et al., Pilot spoofing attack by multiple eavesdroppers, IEEE Trans. Wirel. Commun. 17 (2018), 6433-6447. DOI |
18 | S. Yan and R. Malaney, Line-of-sight based beamforming for security enhancements in wiretap channels, in Proc. Int. Conf. IT Convergence Secur. (ICITCS), (Beijing, China), Oct. 2014, pp. 1-4. |
19 | B. Li et al., On the efficient beam-forming training for 60 GHz wireless personal area networks, IEEE Trans. Wirel. Commun. 12 (2013), 504-515. DOI |
20 | D. Ciuonzo, A. Aubry, and V. Carotenuto, Rician mimo channeland jamming-aware decision fusion, IEEE Trans. Signal Process. 65 (2017), 3866-3880. DOI |