AUTHORS: Dimitriya Mihaylova, Zlatka Valkova-Jarvis, Georgi Iliev
Download as PDF
ABSTRACT: Wireless communication systems are very vulnerable to pilot contamination attacks, which represents a major physical layer security issue. Hence, it is necessary to apply different approaches and methods to the detection of this type of attack. One effective method proposed in the literature is 2-N-PSK pilot detection, which consists of training with two random N-PSK pilots. Although the method is broadly effective, it is not able to detect an attack initiated during the transmission of the second pilot of the pair in the case when both the legitimate and non-legitimate pilots coincide. In this paper, an improvement to this method is proposed to detect an intrusion which misses the first pilot transmission and initiates an attack during the second training period. This improved technique is based on channel gain comparison and eliminates the need to use threshold values in the detection – a drawback of previously-existing solutions.
KEYWORDS: Wireless communication systems, Physical layer security, Pilot contamination attacks, 2-N-PSK pilot detection method, Channel state information, Detection statistic
REFERENCES:
[1] W. Trappe, The Challenges Facing Physical Layer Security, IEEE Communications Magazine, Vol. 53, No.6, 2015, pp. 16-20.
[2] Hui-Ming Wang and Xiang-Gen Xia, Enhancing Wireless Security via Cooperation: Signal Design and Optimization, IEEE Communications Magazine, Vol. 53, No. 12, 2015, pp. 47-53.
[3] Boulat A. Bash, Dennis Goeckel, Don Towsley, and Saikat Guha, Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication, IEEE Communications Magazine, Vol. 53, No. 12, 2015, pp. 26-31.
[4] X. Zhou, B. Maham, A. Hjorungnes, Pilot Contamination for Active Eavesdropping, IEEE Trans. Wireless Commun., Vol. 11, No.3, 2012, pp. 903-907.
[5] Ta-Yuan Liu, Pin-Hsun Lin, Shih-Chun Lin, Y.-W. Peter Hong, Eduard Axel Jorswieck, To Avoid or Not to Avoid CSI Leakage in Physical Layer Secret Communication Systems, IEEE Communications Magazine., Vol. 53, No. 12, 2015, pp. 19-25.
[6] B. A. Bash, D. Goeckel, D. Towsley, Limits of Reliable Communication with Low Probability of Detection on AWGN Channels, IEEE JSAC, Vol. 31, No. 9, 2013, pp. 1921–1930.
[7] D. Kapetanovic, A. Al-Nahari, A. Stojanovic, F. Rusek, Detection of Active Eavesdroppers in Massive MIMO, Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun. (PIMRC), 2014, pp. 585-589.
[8] D. Kapetanovic, G. Zheng, K.-K. Wong, B. Ottersten, Detection of Pilot Contamination Attack Using Random Training and Massive MIMO, Proc. IEEE Int. Symp. Personal Indoor and Mobile Radio Commun. (PIMRC), 2013, pp. 13-18.
[9] D. Mihaylova, G. Iliev, Z. Valkova-Jarvis, Comparison of Methods for the Detection of Pilot Contamination Attacks, Proc. BalkanCom, Tirana, Albania, 2017.
[10] D. Kapetanovic, G. Zheng, F. Rusek, Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks, IEEE Commun. Magazine, Vol. 53, No. 6, 2015, pp. 21- 27.