Browse > Article
http://dx.doi.org/10.4218/etrij.2019-0504

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems  

Ning, Lina (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
Li, Bin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
Wang, Xiang (Beijing Jianyi Co., Ltd.)
Liu, Xiaoming (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
Zhao, Chenglin (School of Information and Communication Engineering, Beijing University of Posts and Telecommunications)
Publication Information
ETRI Journal / v.43, no.5, 2021 , pp. 941-949 More about this Journal
Abstract
In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.
Keywords
multiple-input multiple-output; physical layer security; pilot spoofing attack; spatial spectrum method; time-division duplex;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Q. Wang and Z. Zheng, Hybrid MIMO and phased-array directional modulation for physical layer security in mmWave wireless communications, IEEE J. Sel. Areas Commun. 36 (2018), no. 7, 1383-1396.   DOI
2 H. Hui et al., Secure relay and jammer selection for physical layer security, IEEE Signal Process. Lett. 22 (2015), 1147-1151.   DOI
3 A. D. Wyner, The wire-tap channel, Bell Labs Tech. J. 54 (1975), 1355-1387.   DOI
4 J. Yang et al., A semiblind two-way training method for discriminatory channel estimation in MIMO systems, IEEE Trans. Commun. 62 (2014), 2400-2410.   DOI
5 J. K. Tugnait, Pilot spoofing attack detection and countermeasure, IEEE Trans. Commun. 66 (2018), 2093-2106.   DOI
6 J. K. Tugnait, On mitigation of pilot spoofing attack, in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (New Orleans, LA, USA), Mar. 2017, pp. 2097- 2101.
7 X. Zhou, B. Maham, and A. Hjorungnes, Pilot contamination for active eavesdropping, IEEE Trans. Wirel. Commun. 11 (2012), 903-907.   DOI
8 X. Tian, M. Li, and Q. Liu, Random-training-assisted pilot spoofing detection and security enhancement, IEEE Access, 5 (2017), 27384-27399.   DOI
9 H. Wang, K. Huang, and T. A. Tsiftsis, Multiple antennas secure transmission under pilot spoofing and jamming attack, IEEE J. Sel. Areas Commun. 36 (2018), 860-876.   DOI
10 Q. Xiong et al., An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems, IEEE Trans. Inform. Forensics Secur. 10 (2015), 932-940.   DOI
11 Q. Xiong et al., Secure transmission against pilot spoofing attack: A two-way training-based scheme, IEEE Trans. Inform. Forensics Secur. 11 (2016), 1017-1026.   DOI
12 X. Liu et al., Detecting pilot spoofing attack in MISO systems with trusted user, IEEE Commun. Lett. 23 (2019), 314-317.   DOI
13 B. Li et al., Efficient beamforming training for 60-GHz millimeter-wave communications: A novel numerical optimization framework, IEEE Trans. Veh. Technol. 63 (2014), 703-717.   DOI
14 W. Wang et al., On countermeasures of pilot spoofing attack in massive mimo systems: A double channel training based approach, IEEE Trans. Veh. Technol. 68 (2019), 6697-6708.   DOI
15 P. Salvo Rossi et al., Performance analysis of energy detection for mimo decision fusion in wireless sensor networks over arbitrary fading channels, IEEE Trans. Wirel. Commun. 15 (2016), 7794-7806.   DOI
16 T. Li and Y. Tang, Frequency estimation based on modulation FFT and MUSIC algorithm, in Proc. Int. Conf. Pervasive Comput., Signal Process. Appl. (Harbin, China), Sept. 2010, pp. 525-528.
17 K. Huang et al., Pilot spoofing attack by multiple eavesdroppers, IEEE Trans. Wirel. Commun. 17 (2018), 6433-6447.   DOI
18 S. Yan and R. Malaney, Line-of-sight based beamforming for security enhancements in wiretap channels, in Proc. Int. Conf. IT Convergence Secur. (ICITCS), (Beijing, China), Oct. 2014, pp. 1-4.
19 B. Li et al., On the efficient beam-forming training for 60 GHz wireless personal area networks, IEEE Trans. Wirel. Commun. 12 (2013), 504-515.   DOI
20 D. Ciuonzo, A. Aubry, and V. Carotenuto, Rician mimo channeland jamming-aware decision fusion, IEEE Trans. Signal Process. 65 (2017), 3866-3880.   DOI